Home > D-Link > Router > D-Link Router DIR-615 User Manual

D-Link Router DIR-615 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual D-Link Router DIR-615 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    61D-Link DIR-615 User Manual
    Section 3 - Configuration
    This  page  displays  the  current  information  for  the  DIR-615.  It  will  display  the  LAN,  WAN  (Internet),  and  Wireless 
    information.
    If  your  Internet  connection  is  set  up  for  a  Dynamic  IP  address  then  a Release  button  and  a Renew  button  will  be 
    displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. 
    If  your  Internet  connection  is  set  up  for  PPPoE,  a 
    Connect  button  and  a Disconnect  button  will  be 
    displayed.  Use Disconnect  to  drop  the  PPPoE 
    connection and use Connect to establish the PPPoE 
    connection.
    See the following page for more information.
    Device Information 
    						
    							
    6D-Link DIR-615 User Manual
    Section 3 - Configuration
    Displays the router’s time and firmware version.
    Displays  the  MAC  address  and  the  public  IP 
    settings for the router.
    Displays the MAC address and the private (local) 
    IP settings for the router.
    Displays  the  wireless  MAC  address  and  your 
    wireless settings such as SSID and Channel.
    Displays computers and devices that are connected 
    to the router via Ethernet and that are receiving an 
    IP address assigned by the router (DHCP). 
    Displays the Multicast Group IP Address.
    General:
    WAN:
    LAN:
    Wireless LAN:
    LAN Computers:
    IGMP Multicast 
    Memberships: 
    						
    							
    63D-Link DIR-615 User Manual
    Section 3 - Configuration
    Log
    What to View:
    View Levels:
    Apply Log 
    Settings:
    Refresh:
    Clear:
    Email Now:
    Save Log:
    You can select the types of messages that you want 
    to display from the log. Firewall & Security, System, 
    and Router Status messages can be selected.
    There  are  three  levels  of  message  importance: 
    Informational, Warning, and Critical. Select the levels 
    that you want displayed in the log.
    Will  filter  the  log  results  so  that  only  the  selected 
    options appear.
    Updates the log details on the screen so it displays 
    any recent activity.
    Clears all of the log contents.
    This option will send a copy of the router log to the 
    e-mail  address  configured  in  the Tools  >  Email 
    Settings screen.
    This  option  will  save  the  router  to  a  log  file  on  your 
    computer.
    The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal 
    memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows 
    you to view the router logs. You can define what types of events you want to view and the level of the events to view. 
    This router also has external Syslog Server support so you can send the log files to a computer on your network that 
    is running a Syslog utility. 
    						
    							
    64D-Link DIR-615 User Manual
    Section 3 - Configuration
    Stats
    The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-615 
    on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted. 
    						
    							
    65D-Link DIR-615 User Manual
    Section 3 - Configuration
    Internet Sessions
    The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is 
    a conversation between a program or application on a LAN-side computer and a program or application on a WAN-
    side computer. 
    Local:
    NAT:
    Internet:
    Protocol:
    State:
    The  IP  address  and,  where  appropriate,  port 
    number of the local application. 
    The port number of the LAN-side application as 
    viewed by the WAN-side application. 
    The  IP  address  and,  where  appropriate,  port 
    number of the application on the Internet. 
    The  communications  protocol  used  for  the 
    conversation. 
    State for sessions that use the TCP protocol:
     NO: None -- This entry is used as a placeholder for a future connection \
    that may occur.
      SS: SYN Sent -- One of the systems is attempting to start a connection.
      EST: Established -- the connection is passing data.
      FW: FIN Wait -- The client system has requested that the connection be s\
    topped.
      CW: Close Wait -- The server system has requested that the connection be\
     stopped.
      TW: Time Wait -- Waiting for a short time while a connection that was in\
     FIN Wait is fully closed.
      LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed.
      CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted 
    packets still pending.
    The direction of initiation of the conversation: 
      Out
     - Initiated from LAN to WAN.
      In
     - Initiated from WAN to LAN. 
    						
    							
    66D-Link DIR-615 User Manual
    Section 3 - Configuration
    Dir:
    Priority:
    Time Out:
    The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher 
    priority. 
    The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends 
    on the type and state of the connection.
     300 seconds - UDP connections.
    240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets 
    can pass or the connection can be re-established.
     7800 seconds - Established or closing TCP connections. 
    						
    							
    67D-Link DIR-615 User Manual
    Section 3 - Configuration
    The wireless client table displays a list of current connected wireless clients. This table also displays the connection 
    time and MAC address of the connected wireless clients.
    Wireless 
    						
    							
    68D-Link DIR-615 User Manual
    Section 3 - Configuration
    Support 
    						
    							
    69D-Link DIR-615 User Manual
    Section 4 - Security
    Wireless Security
    This section will show you the different levels of security you can use \
    to protect your data from intruders. The 
    DIR-615 offers the following types of security:• WPA2 (Wi-Fi Protected Access 2)     • WPA2-PSK(Pre-Shared Key)
    • WPA (Wi-Fi Protected Access)      • WPA-PSK (Pre-Shared Key)
    • WEP (Wired Equivalent Privacy)
    What is WEP?
    WEP  stands  for  Wired  Equivalent  Privacy.  It  is  based  on  the  IEEE  80.11  standard  and  uses  the  RC4  encryption 
    algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted 
    from one wireless device to another.
    To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When 
    using  WEP,  you  must  determine  the  level  of  encryption.  The  type  of  encryption  determines  the  key  length.  18-bit 
    encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal 
    - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) 
    format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to 
    HEX for use over the network. Four keys can be defined so that you can change keys easily. 
    						
    							
    70D-Link DIR-615 User Manual
    Section 4 - Security
    What is WPA?
    WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired 
    Equivalent Privacy).  
    The  major improvements over WEP: 
    • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys 
    using  a  hashing  algorithm  and,  by  adding  an  integrity-checking  feature,  ensures  that  the  keys  haven’t 
    been tampered with. WPA is based on 80.11i and uses Advanced Encryption Standard (AES) instead 
    of TKIP.
    • User authentication, which is generally missing in WEP, through the extensible authentication protocol 
    (EAP).  WEP  regulates  access  to  a  wireless  network  based  on  a  computer’s  hardware-specific  MAC 
    address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key 
    encryption system to ensure that only authorized network users can acces\
    s the network.
    WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric 
    password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must 
    be the exact same key entered on your wireless router or access point.
    WPA/WPA incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a 
    more secure public key encryption system to ensure that only authorized \
    network users can access the network. 
    						
    All D-Link manuals Comments (0)

    Related Manuals for D-Link Router DIR-615 User Manual