Home > D-Link > Router > D-Link Router DIR:652 User Manual

D-Link Router DIR:652 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual D-Link Router DIR:652 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							56D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Network Filters
    Use MAC (Media Access Contro\f) Fi\fters to a\f\fow or deny LAN (Loca\f Area Network) computers by their MAC addresses from accessin\b the Network. You 
    can either manua\f\fy a\udd a MAC address or se\fect the MAC address from the \fist of c\fients that are current\fy connected to the Broadband Router.
    Se\fect Turn.MAC .Fi\btering .\fff, Turn .MAC .Fi\btering .\fN.
    and .ALL\fW .computers .\bisted .to .access .the .network, or 
    Turn .MAC .Fi\btering .\fN .and .DENY .computers .\bisted .to.
    access .the .network from the drop-down menu. 
    Enter the MAC address you wou\fd \fike to fi\fter.
    To find the MAC address on a computer, p\fease refer to the 
    Networkin\b Basics section in this manua\f. 
    Se\fect a DHCP c\fient from the drop-down menu and c\fick 
    						
    							57D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    A\f\fess Control
    C\fick  the Add.Po\bicy  button  to  start  the  Access 
    Contro\f Wizard. 
    Add Poli\fy:
    The Access Contro\f section a\f\fows you to contro\f access in and out of your network. Use this feature as Parenta\f Contro\fs to on\fy \brant access to 
    approved sites, \fimit web access based on time o\ur dates, and/or b\fock access from app\fications \fike P2P uti\fit\uies or \bames.
    C\fick Next to continue with the wizard.
    A\f\fess Control Wizard  
    						
    							58D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Enter a name for the po\ficy and then c\fick Next to continue.
    Se\fect  a  schedu\fe  (I.E.  A\fways)  from  the  drop-down  menu  and 
    then c\fick Next to continue.
    Enter the fo\f\fowin\b information and then c\fick Next to continue.
    • Address.Type  -  Se\fect  IP  address,  MAC  address,  or  Other 
    Machines.
    • IP. Address - Enter the IP address of the computer you want 
    to app\fy the ru\fe to.  
    						
    							59D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Se\fect the fi\fterin\b method and then c\u\fick Next to continue.
    If you se\fected App\by.Advanced .Port .Fi\bters, then enter the ru\fe:
    . Enab\be - Check to enab\fe the ru\fe.
    .Name - Enter a name for your ru\fe.
    .Dest.IP.Start - Enter the startin\b IP address.
    .Dest.IP.End - Enter the endin\b IP add\uress.
    .Protoco\b - Se\fect the protoco\f.
    .Dest.Port.Start - Enter the startin\b port number.
    .Dest.Port.End - Enter the endin\b port number.
    To enab\fe web \fo\b\bin\b, c\fick Enab\be.
    C\fick Save to save the access contro\f ru\fe.  
    						
    							60D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Website Fi\fters are used to deny LAN computers from accessin\b specific web sites by the URL or domain. A URL is a specia\f\fy formatted text strin\b 
    that defines a \focation on the Internet. If any part of the URL contains the b\focked word, the site wi\f\f not be accessib\fe and the web pa\be wi\f\f not 
    disp\fay. To use this feature, enter the text strin\b to be b\focked and c\fick Save.Settings. The text to be b\focked wi\f\f appear in the \fist. To de\fete the 
    text, c\fick.C\bear.the.List.Be\bow.
    Website Filters
    Se\fect A\b\bow or Deny.
    Enter the keywords or URLs that you want 
    to a\f\fow or deny. C\fick Save.Settings.
    Configure Website 
    Filter Below:
    Website URL/Domain:  
    						
    							61D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Enter a name for the inbound fi\fter ru\fe.
    Se\fect A\b\bow or Deny.
    Check to enab\fe ru\fe.
    Enter  the  startin\b  IP  address.  Enter  0.0.0.0  if  you 
    do not want to specify an IP ran\be.
    Enter the endin\b IP address. Enter 255.255.255.255 
    if you do not want to specify and IP r\uan\be.
    C\fick  the Add  button  to  add  the  ru\fe.  You  must 
    c\fick Save.Settings at the top to save the settin\bs.
    This section wi\f\f \fist any ru\fes that are created. You 
    may c\fick the Edit icon to chan\be the settin\bs or 
    enab\fe/disab\fe  the  ru\fe,  or  c\fick  the De\bete  icon 
    to remove the ru\fe.
    Name:
    A\ftion:
    Enable:
    Sour\fe IP Start:
    Sour\fe IP End:
    Add:
    Inbound Filter 
    Rules List:
    The  Inbound  Fi\fter  option  is  an  advanced  method  of  contro\f\fin\b  data  received  from  the  Internet. With  this  feature  you  can  confi\bure  inbound 
    data  fi\fterin\b  ru\fes  that  contro\f  data  based  on  an  IP  address  ran\be.  Inbound  Fi\fters  can  be  used  with Virtua\f  Server,  Port  Forwardin\b,  or  Remote 
    Administration features.
    Inbound Filters  
    						
    							62D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    SPI  (Statefu\f  Packet  Inspection,  a\fso  known  as  dynamic 
    packet fi\fterin\b) he\fps to prevent cyber attacks by trackin\b 
    more state per session. It va\fidates that the traffic passin\b 
    throu\bh the session conforms to the protoco\f.
    Se\fect one of the fo\f\fowin\b for TCP and UDP ports:
    Endpoint.Independent .-  Any  incomin\b  traffic  sent  to 
    an  open  port  wi\f\f  be  forwarded  to  the  app\fication  that 
    opened the port. The port wi\f\f c\fose if id\fe f\uor 5 minutes.
    Address.Restricted - Incomin\b traffic must match the IP 
    address of the out\boin\b connection.
    Address.+ .Port .Restriction - Incomin\b traffic must match 
    the IP address and port of the out\boin\b connection.
    If  an  app\fication  has  troub\fe  workin\b  from  behind  the 
    router, you can expose one computer to the Internet and 
    run the app\fication on that computer.
    Note: Placing  a  computer  in  the  DMZ  may  expose  that 
    computer to a \fariety of security risks. Use of this option is 
    only recommended as a last\ff resort.
    Specify the IP address of the computer on the LAN that 
    you want to have unrestricted Internet communication. If 
    this computer obtains it’s IP address automatica\f\fy usin\b 
    DHCP, be sure to make a static reservation on the Basic 
    > DHCP pa\be so that the IP address of the DMZ machine 
    does not chan\be.
    Enable SPI:
    NAT Endpoint 
    Filtering:
    Enable DMZ Host:
    IP Address:
    Firewall Settings
    A firewa\f\f protects your network from the outside wor\fd. The D-Link DIR-652 offers a firewa\f\f type functiona\fity. The SPI feature he\fps prevent cyber 
    attacks. Sometimes you may want a computer exposed to the outside wor\fd for certain types of app\fications. If you choose to expose a computer, 
    you cam enab\fe DMZ. \uDMZ is short for Demi\fitarized Zone. This option wi\f\f expose the chosen computer comp\fete\fy to the outside wor\fd.  
    						
    							63D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Appli\fation Level Gateway Configuration
    Here you can enab\fe or disab\fe ALG’s. Some protoco\fs and app\fications require specia\f hand\fin\b of the IP pay\foad to make them work with network 
    address trans\fation (NAT ). Each ALG provides specia\f hand\fin\b for a specific protoco\f or app\fication. A number of ALGs for common app\fications 
    are enab\fed by defau\ft.
    A\f\fows mu\ftip\fe machines o\un the LAN to connect to their corporate network usin\b PPTP protoco\f. 
    A\f\fows mu\ftip\fe VPN c\fients to connect to their corporate network usin\b IPSec. Some VPN c\fients support traversa\f of IPSec throu\bh NAT. This ALG may interfere 
    with  the  operation  of  such VPN  c\fients.  If  you  are  havin\b  troub\fe  connectin\b  with  your  corporate  network,  try  turnin\b  this  ALG  off.  P\fease  check  with  the 
    system adminstrator of your corporate network whether your VPN c\fient supports NAT traversa\f.
    A\f\fows app\fications that use Rea\f Time Streamin\b Protoco\f to receive streamin\b media from the internet. QuickTime and Rea\f P\fayer are some of the common 
    app\fications usin\b this protoco\f. 
    A\f\fows devices and app\fications usin\b VoIP (Voice over IP) to communicate across NAT. Some VoIP app\fications and devices have the abi\fity to discover NAT 
    devices and work around them. This ALG may interfere with the operation of such devices. If you are havin\b troub\fe makin\b VoIP ca\f\fs, try turnin\b this ALG 
    off. 
    PPTP:
    IPSEC (VPN):
    RTSP:
    SIP:  
    						
    							64D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Enter the IP address of packets that wi\f\f take this route.
    Enter the netmask of the route, p\fease note that the octets 
    must match your destination IP address.
    Enter  your  next  hop  \bateway  to  be  taken  if  this  route  is 
    used.
    The route metric is a va\fue from 1 to 16 that indicates the 
    cost of usin\b this route. A va\fue 1 is the \fowest cost and 15 
    is the hi\bhest cost. 
    Se\fect the interface that the IP packet must use to transit 
    out of the router when this route is used. 
    Destination IP:
    Netmask:
    Gateway:
    Metri\f:
    Interfa\fe:
    Routing
    The Routin\b option is an \uadvanced method of customizin\b specific routes of data throu\bh your network.  
    						
    							65D-Link DIR-652 User Manua\f
    Section 3 - Confi\buration
    Set the transmit power of the antennas.
    Beacons are packets sent by an Access Point to synchronize 
    a wire\fess network. Specify a va\fue. 100 is the defau\ft settin\b 
    and is recommended. 
    This  va\fue  shou\fd  remain  at  its  defau\ft  settin\b  of  2432.  If 
    inconsistent data flow is a prob\fem, on\fy a minor modification 
    shou\fd be made.
    The  fra\bmentation  thresho\fd,  which  is  specified  in  bytes, 
    determines  whether  packets  wi\f\f  be  fra\bmented.  Packets 
    exceedin\b the 2346 byte settin\b wi\f\f be fra\bmented before 
    transmission. 2346 i\us the defau\ft settin\b. 
    (De\fivery Traffic Indication Messa\be) 3 is the defau\ft settin\b. 
    A DTIM is a countdown informin\b c\fients of the next window 
    for \fistenin\b to broadcast and mu\fticas\ut messa\bes.
    WMM  is  QoS  for  your  wire\fess  network.  This  wi\f\f  improve 
    the qua\fity of video and voice app\fications for your wire\fess 
    c\fients.
    Check this box to reduce the \buard interva\f time therefore 
    increasin\b  the  data  capacity.  However,  it’s  \fess  re\fiab\fe  and 
    may create hi\bher data \foss.
    Transmit Power:
    Bea\fon Period:
    RTS Threshold:
    Fragmentation 
    Threshold:
    DTIM Interval:
    WMM Fun\ftion:
    Short GI:
    Advan\fed Wireless Settings  
    						
    All D-Link manuals Comments (0)

    Related Manuals for D-Link Router DIR:652 User Manual