Home > D-Link > Router > D-Link Router DIR-635 User Manual

D-Link Router DIR-635 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual D-Link Router DIR-635 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    51D-Link DIR-635 User Manual
    Section 3 - Configuration
    Dynamic Domain Name System is a method of 
    keeping a domain name linked to a changing IP 
    Address. Check the box to enable DDNS.
    Choose  your  DDNS  provider  from  the  drop 
    down menu.
    Enter  the  Host  Name  that  you  registered  with 
    your DDNS service provider.
    Enter the Username for your DDNS account.
    Enter the Password for your DDNS account.
    Enter a time (in hours).
    DDNS:
    Server Address:
    Host Name:
    Username or Key:
    Password or Key:
    Timeout:
    DDNS
    The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have 
    purchased  (www.whateveryournameis.com)  with  your  dynamically  assigned  IP  address.  Most  broadband  Internet 
    Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in 
    your domain name to connect to your server no matter what your IP addres\
    s is. 
    						
    							
    5D-Link DIR-635 User Manual
    Section 3 - Configuration
    The  Ping  Test  is  used  to  send  Ping  packets  to  test  if  a 
    computer is on the Internet. Enter the IP Address that you 
    wish to Ping, and click Ping.
    The results of your ping attempts will be displayed here.
    System Check
    Ping Test:
    Ping Results: 
    						
    							
    53D-Link DIR-635 User Manual
    Section 3 - Configuration
    Enter a name for your new schedule.
    Select  a  day,  a  range  of  days,  or  All  Week  to 
    include every day.
    Check All Day - 24hrs or enter a start and end 
    time for your schedule.
    Click Save to save your schedule. You must click 
    Save Settings at the top for your schedules to go 
    into effect.
    The list of schedules will be listed here. Click the 
    Edit  icon  to  make  changes  or  click  the Delete 
    icon to remove the schedule.
    Name:
    Days:
    Time:
    Save:
    Schedule Rules 
    List:
    Schedules 
    						
    							
    5D-Link DIR-635 User Manual
    Section 3 - Configuration
    This  page  displays  the  current  information  for  the  DIR-635.  It  will  display  the  LAN,  WAN  (Internet),  and  Wireless 
    information.
    If  your  Internet  connection  is  set  up  for  a  Dynamic  IP  address  then  a Release  button  and  a Renew  button  will  be 
    displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. 
    If  your  Internet  connection  is  set  up  for  PPPoE,  a Connect  button  and  a Disconnect  button  will  be  displayed.  Use 
    Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.
    Displays the router’s time and firmware version.
    Displays the MAC address and the public IP settings for the router.
    Displays  the  MAC  address  and  the  private  (local)  IP  settings  for  the 
    router.
    Displays the wireless MAC address and your wireless settings such as 
    SSID and Channel.
    Displays  computers  and  devices  that  are  connected  to  the  router  via 
    Ethernet  and  that  are  receiving  an  IP  address  assigned  by  the  router 
    (DHCP). 
    Displays the Multicast Group IP Address.
    General:
    WAN:
    LAN:
    Wireless LAN:
    LAN Computers:
    IGMP Multicast 
    Memberships:
    Device Information 
    						
    							
    55D-Link DIR-635 User Manual
    Section 3 - Configuration
    Log
    What to View:
    View Levels:
    Apply Log 
    Settings:
    Refresh:
    Clear:
    Email Now:
    Save Log:
    You can select the types of messages that you want 
    to display from the log. Firewall & Security, System, 
    and Router Status messages can be selected.
    There  are  three  levels  of  message  importance: 
    Informational, Warning, and Critical. Select the levels 
    that you want displayed in the log.
    Will  filter  the  log  results  so  that  only  the  selected 
    options appear.
    Updates the log details on the screen so it displays 
    any recent activity.
    Clears all of the log contents.
    This  option  will  send  a  copy  of  the  router  log  to 
    the  email  address  configured  in  the  Tools  >  Email 
    screen.
    This  option  will  save  the  router  to  a  log  file  on  your 
    computer.
    The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal 
    memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows 
    you to view the router logs. You can define what types of events you want to view and the level of the events to view. 
    This router also has external Syslog Server support so you can send the log files to a computer on your network that 
    is running a Syslog utility. 
    						
    							
    56D-Link DIR-635 User Manual
    Section 3 - Configuration
    Stats
    The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-635 
    on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
    Active Sessions 
    						
    							
    5D-Link DIR-635 User Manual
    Section 3 - Configuration
    Support
    The wireless client table displays a list of current connected wireless clients. This table also displays the connection 
    time and MAC address of the connected wireless clients.
    Wireless 
    						
    							
    5D-Link DIR-635 User Manual
    Section  - Security
    Wireless Security
    This section will show you the different levels of security you can use \
    to protect your data from intruders. The 
    DIR-635 offers the following types of security:• WPA2 (Wi-Fi Protected Access 2)     • WPA2-PSK (Pre-Shared Key)
    • WPA (Wi-Fi Protected Access)      • WPA-PSK (Pre-Shared Key)
    • WEP (Wired Equivalent Privacy)
    What is WEP?
    WEP  stands  for  Wired  Equivalent  Privacy.  It  is  based  on  the  IEEE  802.11  standard  and  uses  the  RC4  encryption 
    algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted 
    from one wireless device to another.
    To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When 
    using  WEP,  you  must  determine  the  level  of  encryption.  The  type  of  encryption  determines  the  key  length.  128-bit 
    encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal 
    - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) 
    format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to 
    HEX for use over the network. Four keys can be defined so that you can change keys easily. 
    						
    							
    5D-Link DIR-635 User Manual
    Section  - Security
    What is WPA?
    WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired 
    Equivalent Privacy).  
    The 2 major improvements over WEP: 
    • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys 
    using  a  hashing  algorithm  and,  by  adding  an  integrity-checking  feature,  ensures  that  the  keys  haven’t 
    been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead 
    of TKIP.
    • User authentication, which is generally missing in WEP, through the extensible authentication protocol 
    (EAP).  WEP  regulates  access  to  a  wireless  network  based  on  a  computer’s  hardware-specific  MAC 
    address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key 
    encryption system to ensure that only authorized network users can acces\
    s the network.
    WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric 
    password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must 
    be the exact same key entered on your wireless router or access point.
    WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a 
    more secure public key encryption system to ensure that only authorized \
    network users can access the network. 
    						
    							
    60D-Link DIR-635 User Manual
    Section  - Security
    Wireless Security Setup Wizard
    To run the security wizard, click on Setup at the top and then 
    click Launch Wireless Security Setup Wizard.
    Click Next to continue. 
    						
    All D-Link manuals Comments (0)

    Related Manuals for D-Link Router DIR-635 User Manual