Home > D-Link > Router > D-Link Router DIR-655 User Manual

D-Link Router DIR-655 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual D-Link Router DIR-655 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    Enter a name for the inbound filter rule.
    Select Allow or Deny.
    Check to enable rule.
    Enter the starting IP address. Enter 0.0.0.0 if 
    you do not want to specify an IP range.
    E n t e r   t h e   e n d i n g   I P   a d d r e s s .   E n t e r 
    255.255.255.255 if you do not want to specify 
    and IP range.
    Click the Save button to apply your settings. 
    You  must  click Save  Settings  at  the  top  to 
    save the settings.
    This section will list any rules that are created. 
    You  may  click  the Edit  icon  to  change  the 
    settings or enable/disable the rule, or click the 
    Delete icon to remove the rule.
    Name:
    Action:
    Enable:
    Source IP Start:
    Source IP End:
    Save:
    Inbound Filter 
    Rules List:
    The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you 
    can configure inbound data filtering rules that control data based on an IP address range.  Inbound Filters can be used 
    with Virtual Server, Port Forwarding, or Remote Administration features.\
    Inbound Filters 
    						
    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    SPI  (Stateful  Packet  Inspection,  also  known  as  dynamic  packet 
    filtering) helps to prevent cyber attacks by tracking more state per 
    session.  It  validates  that  the  traffic  passing  through  the  session 
    conforms to the protocol.
    Select one of the following for TCP and UDP ports:
    Endpoint Independent - Any incoming traffic sent to an open port 
    will be forwarded to the application that opened the port. The port 
    will close if idle for 5 minutes.
    Address Restricted - Incoming traffic must match the IP address 
    of the outgoing connection.
    Address + Port Restriction - Incoming traffic must match the IP 
    address and port of the outgoing connection.
    If  an  application  has  trouble  working  from  behind  the  router,  you 
    can  expose  one  computer  to  the  Internet  and  run  the  application 
    on that computer.
    Note: Placing a computer in the DMZ may expose that computer to 
    a variety of security risks. Use of this option is only recommended 
    as a last resort.
    Specify the IP address of the computer on the LAN that you want 
    to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to 
    make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change.
    Enable SPI:
    NAT Endpoint 
    Filtering:
    Enable DMZ Host:
    IP Address:
    Firewall Settings
    A firewall protects your network from the outside world. The D-Link DIR-655 offers a firewall type functionality. The SPI 
    feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain 
    types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone. 
    This option will expose the chosen computer completely to the outside wo\
    rld. 
    						
    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    Application Level Gateway (ALG) Configuration
    Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to 
    make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol 
    or application. A number of ALGs for common applications are enabled by \
    default.
    Allows multiple machines on the LAN to connect to their corporate networ\
    k using PPTP protocol. 
    Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec 
    through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your 
    corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether 
    your VPN client supports NAT traversal.
    Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and 
    Real Player are some of the common applications using this protocol. 
    Allows  devices  and  applications  using  VoIP  (Voice  over  IP)  to  communicate  across  NAT.  Some  VoIP  applications  and 
    devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such 
    devices. If you are having trouble making VoIP calls, try turning this A\
    LG off. 
    PPTP:
    IPSEC (VPN):
    RTSP:
    SIP: 
    						
    							
    0
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton Transmit Power
     Mode
    Set the transmit power of the antennas.
    Beacons are packets sent by an Access Point to 
    synchronize a wireless network. Specify a value. 
    100 is the default setting and is recommended. 
    This value should remain at its default setting of 
    2432. If inconsistent data flow is a problem, only 
    a minor modification should be made.
    The fragmentation threshold, which is specified 
    in  bytes,  determines  whether  packets  will  be 
    fragmented.  Packets  exceeding  the  2346  byte 
    setting will be fragmented before transmission. 
    2346 is the default setting. 
    (Delivery  Traffic  Indication  Message)  3  is  the 
    default setting. A DTIM is a countdown informing 
    clients  of  the  next  window  for  listening  to 
    broadcast and multicast messages.
    WMM  is  QoS  for  your  wireless  network.  This  will  improve  the  quality  of  video  and  voice  applications  for  your  wireless 
    clients.
    Check this box to reduce the guard interval time therefore increasing the data capacity.  However, it’s less reliable and may 
    create higher data loss.
    Transmit Power:
    Beacon Period:
    RTS Threshold:
    Fragmentation 
    Threshold:
    DTIM Interval:
    WMM Function:
    Short GI:
    Advanced Wireless Settings 
    						
    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    WISH Settings
    WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using 
    a wireless network by prioritizing the traffic of different applications. 
    Enable this option if you want to allow WISH to 
    prioritize your traffic. 
    Enable WISH:
    Allows the router to recognize HTTP transfers 
    for  many  common  audio  and  video  streams 
    and  prioritize  them  above  other  traffic.  Such 
    streams  are  frequently  used  by  digital  media 
    players. 
    HTTP:
    Enables the router to recognize certain audio 
    and  video  streams  generated  by  a  Windows 
    Media Center PC and to prioritize these above 
    other traffic. Such streams are used by systems 
    known as Windows Media Extenders, such as 
    the Xbox 360. 
    Windows Media 
    Center:
    When enabled, this option causes the router to 
    automatically attempt to prioritize traffic streams 
    that  it  doesn’t  otherwise  recognize,  based  on 
    the  behaviour  that  the  streams  exhibit.  This 
    acts  to  deprioritize  streams  that  exhibit  bulk 
    transfer characteristics, such as file transfers, 
    while leaving interactive traffic, such as gaming 
    or VoIP, running at a normal priority.
    Automatic:
    WISH Rules:A  WISH  Rule  identifies  a  specific  message  flow  and  assigns  a  priority  to  that  flow.  For  most  applications,  the  priority 
    classifiers ensure the right priorities and specific WISH Rules are not required. 
    WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest 
    priority will be used.  
    						
    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    Create a name for the rule that is meaningful 
    to you.
    Name:
    The  priority  of  the  message  flow  is  entered 
    here. The four priorities are defined as:
    BK: Background (least urgent)
    BE: Best Effort.
    VI: Video
    VO: Voice (most urgent)
    Priority:
    The protocol used by the messages. Protocol:
    The rule applies to a flow of messages for which one computer’s IP address falls within the range set here.  Host IP Range:
    The rule applies to a flow of messages for which host’s port number is within the range set here. Host Port Range: 
    						
    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    Wi-Fi Protected Setup (WPS)
    Enable the Wi-Fi Protected Setup feature. 
    Locking the wireless security settings prevents the 
    settings from being changed by the Wi-Fi Protected 
    Setup  feature  of  the  router.  Devices  can  still  be 
    added to the network using Wi-Fi Protected Setup. 
    However, the settings of the network will not change 
    once this option is checked.
    A PIN is a unique number that can be used to add 
    the router to an existing network or to create a new 
    network.  The  default  PIN  may  be  printed  on  the 
    bottom of the router. For extra security, a new PIN 
    can be generated. You can restore the default PIN 
    at any time. Only the Administrator (“admin” account) 
    can change or reset the PIN. 
    Shows the current value of the router’s PIN. 
    Restore the default PIN of the router. 
    Create a random number that is a valid PIN. This becomes the router’s PIN. You can then copy this PIN to the user interface 
    of the registrar.
    Enable:
    Lock Wireless 
    Security Settings:
    PIN Settings:
    Current PIN:
    Reset PIN to 
    Default:
    Generate New PIN:
    Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup” 
    as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well 
    as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering 
    the 8-digit code for the Pin-Code Method.  The time reduction in setup and ease of use are quite beneficial, while the 
    highest wireless Security setting of WPA2 is automatically used. 
    						
    							
    
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    This Wizard helps you add wireless devices to the wireless network.
    The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the 
    PIN for the device, or ask you to press the configuration button on the device. If the device supports Wi-Fi Protected Setup 
    and has a configuration button, you can add it to the network by pressing the configuration button on the device and then 
    the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully 
    added to the network.
    There are several ways to add a wireless device to your network. A “registrar” controls access to the wireless network. A 
    registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected 
    Setup button on the device. The router acts as a registrar for the network, although other devices may act as a registrar as 
    well.
    Start the wizard.
    Add Wireless 
    Station:
    Add Wireless 
    Device Wizard: 
    						
    							
    5
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton UPnP
    Internet Ping Block
    Internet Port Speed
    Multicast Streams
    To use the Universal Plug and Play (UPnP™) 
    feature  click  on Enabled.  UPNP  provides 
    compatibility  with  networking  equipment, 
    software and peripherals.
    Unchecking the box will not allow the DIR-655 
    to  respond  to  pings.  Blocking  the  Ping  may 
    provide  some  extra  security  from  hackers. 
    Check the box to allow the Internet port to be 
    “pinged”.
    You  may  set  the  port  speed  of  the  Internet 
    port to 10Mbps, 100Mbps, 1000Mbps, or Auto 
    10/100/1000Mbps. Some older cable or DSL 
    modems may require you to set the port speed 
    to 10Mbps.
    Check the box to allow multicast traffic to pass 
    through the router from the Internet.
    UPnP Settings:
    Internet Ping:
    Internet Port 
    Speed:
    Multicast 
    streams:
    Advanced Network Settings 
    						
    							
    6
    D-Lnk DIR-655 User Manual
    Secton  - Configuraton
    Guest Zone
    Check to enable the Guest Zone feature. 
    The  schedule  of  time  when  the  Guest  Zone  will 
    be  active.  The  schedule  may  be  set  to  Always, 
    which  will  allow  the  particular  service  to  always 
    be enabled. You can create your own times in the 
    Tools > Schedules section.
    Enter  a  wireless  network  name  (SSID)  that  is 
    different from your main wireless network.
    Check  to  allow  network  connectivity  between  the 
    different zones created. 
    Select the type of security or encryption you would 
    like to enable for the guest zone.  
    Enable Guest Zone:
    Schedule:
    Wireless Network 
    Name:
    Enable Routing 
    Between Zones:
    Security Mode:
    The Guest Zone feature will allow you to create temporary zones that can be used by guests to access the Internet. 
    These  zones  will  be  separate  from  your  main  wireless  network.  You  may  configure  different  zones  for  the 2.4GHz 
    wireless band. 
    						
    All D-Link manuals Comments (0)

    Related Manuals for D-Link Router DIR-655 User Manual