Section 3 - Configuration Advanced Wireless Settings Transmit Power: Set the transmit power of the antennas. Beacon Period: Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. RTS Threshold: This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made.
Section 3 - Configuration Wi-Fi Protected Setup Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup” as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering the 8-digit code for the Pin-Code Method.
Section 3 - Configuration Add Wireless This Wizard helps you add wireless devices to the wireless network. Station: The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device.
Section 3 - Configuration Advanced Network Settings UPnP: To use the Universal Plug and Play (UPnP™) feature check the Enabled UPnP box. UPNP provides compatibility with networking equipment, software and peripherals. WAN Ping: Unchecking the box will not allow the DIR-628 to respond to pings. Blocking the Ping may provide some extra security from hackers. Check the box to allow the WAN port to be “pinged”. Inbound Filter: This section will list any rules that are created.
Section 3 - Configuration Administrator Settings This page will allow you to change the Administrator and User passwords. You can also enable Remote Management. There are two accounts that can access the management interface through the web browser. The accounts are admin and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot make any changes. Only the admin account has the ability to change both admin and user account passwords.
Section 3 - Configuration Time Settings The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also be configured to automatically adjust the time when needed. Time Zone: Select the Time Zone from the drop-down menu.
Section 3 - Configuration SysLog The Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs to a SysLog server on your network. Enable Logging to Check this box to send the router logs to a SysLog Server: SysLog Server. SysLog Server IP The address of the SysLog server that will be Address: used to send the logs. You may also select your computer from the drop-down menu (only if receiving an IP address from the router via DHCP).
Section 3 - Configuration Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Email When this option is enabled, router activity logs Notification: are e-mailed to a designated email address. From Email This email address will appear as the sender Address: when you receive a log file or firmware upgrade notification via email. To Email Address: Enter the email address where you want the email sent.
Section 3 - Configuration System Settings Save Settings to Use this option to save the current router Local Hard Drive: configuration settings to a file on the hard disk of the computer you are using. First, click the Save button. You will then see a file dialog, where you can select a location and file name for the settings. Load Settings Use this option to load previously saved from Local Hard router configuration settings.
Section 3 - Configuration Update Firmware You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the D-Link support site.
Section 3 - Configuration DDNS The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is.
Section 3 - Configuration System Check Ping Test: The Ping Test is used to send Ping packets to test if a computer is on the Internet. Enter the IP Address that you wish to Ping, and click Ping. Ping Results: The results of your ping attempts will be displayed here.
Section 3 - Configuration Schedules Name: Enter a name for your new schedule. Days: Select a day, a range of days, or All Week to include every day. Time: Check All Day - 24hrs or enter a start and end time for your schedule. Save: Click Save to save your schedule. You must click Save Settings at the top for your schedules to go into effect. Schedule Rules The list of schedules will be listed here. Click the List: Edit icon to make changes or click the Delete icon to remove the schedule.
Section 3 - Configuration Device Information This page displays the current information for the DIR-628. It will display the LAN, WAN (Internet), and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed.
Section 3 - Configuration Log The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view.
Section 3 - Configuration Stats The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-628 on both the WAN and the LAN ports. The traffic counter will reset if the device is rebooted.
Section 3 - Configuration Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Local: The IP address and, where appropriate, port number of the local application. NAT: The por t number of the LAN-side application as viewed by the WAN-side application.
Section 3 - Configuration Dir: The direction of initiation of the conversation: Out - Initiated from LAN to WAN. In - Initiated from WAN to LAN. Priority: The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections.
Section 3 - Configuration Wireless The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients.
Section 3 - Configuration Support D-Link DIR-628 User Manual 70
Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-655 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
Section 4 - Security Wireless Security Setup Wizard To run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard. Type your desired wireless network name (SSID). Automatically: Select this option to automatically generate the router’s network key and click Next. Manually: Select this option to manually enter your network key and click Next.
Section 4 - Security If you selected Automatically, the summary window will display your settings. Write down the security key and enter this on your wireless clients. Click Save to save your settings. If you selected Manually, the following screen will appear.
Section 4 - Security Add Wireless Device with WPS Wizard From the Basic > Wizard screen, click Add Wireless Device with WPS. Select Auto to add a wireless client using WPS (Wi-Fi Protected Setup). Once you select Auto and click Connect, you will have a 120 second time limit to apply the settings to your wireless client(s) and successfully establish a connection. If you select Manual, a settings summary screen will appear. Write down the security key and enter this on your wireless clients.
Section 4 - Security Configure WPA-Personal (PSK) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2.
Section 4 - Security Configure WPA-Enterprise (RADIUS) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2.
Section 4 - Security 8. Next to RADIUS Server Port, enter the port you are using with your RADIUS server. 1812 is the default port. 9. Next to RADIUS Server Shared Secret, enter the security key. 10. If the MAC Address Authentication box is selected then the user will need to connect from the same computer whenever logging into the wireless network. 11. Click Advanced to enter settings for a secondary RADIUS Server. 12. Click Apply Settings to save your settings.
Section 4 - Security Connect to a Wireless Network Using Windows® Vista™ Windows® Vista™ users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® Vista™ utility as seen below.
Section 4 - Security Configure Wireless Security It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Open the Windows® Vista™ Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network. 2.
Section 4 - Security 3. Enter the same security key or passphrase that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 4 - Security Connect Using WCN 2.0 in Windows Vista™ The router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista™. The following instructions for setting this up depends on whether you are using Windows Vista™ to configure the router or third party software. When you first set up the router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection, the router must be both enabled and configured.
Section 5 - Connecting to a Wireless Network Connect to a Wireless Network Using Windows® XP Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.
Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable encryption on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the passphrase being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Troubleshooting Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR-628. Read the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have a different operating system, the screenshots on your computer will look similar to the following examples.) 1. Why can’t I access the web-based configuration utility? When entering the IP address of the D-Link router (192.168.0.
Section 6 - Troubleshooting • Configure your Internet settings: • Go to Start > Settings > Control Panel. Double-click the Internet Options Icon. From the Security tab, click the button to restore the settings to their defaults. • Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings button. Make sure nothing is checked. Click OK. • Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three times.
Section 6 - Troubleshooting 3. Why can’t I connect to certain sites or send and receive emails when connecting through my router? If you are having a problem sending or receiving email, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). Note: AOL DSL+ users must use MTU of 1400. To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to.
Section 6 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size.
Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics What is Wireless? Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. Why D-Link Wireless? D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford.
Appendix A - Wireless Basics Wireless Personal Area Network (WPAN) Bluetooth is the industry standard wireless technology used for WPAN. Bluetooth devices in WPAN operate in a range up to 30 feet away. Compared to WLAN the speed and wireless operation range are both less than WLAN, but in return it doesn’t use nearly as much power which makes it ideal for personal devices, such as mobile phones, PDAs, headphones, laptops, speakers, and other devices that operate on batteries.
Appendix A - Wireless Basics Where is wireless used? Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places is usually called “hotspots”.
Appendix A - Wireless Basics Security Don’t let you next-door neighbors or intruders connect to your wireless network. Secure your wireless network by turning on the WPA or WEP security feature on the router. Refer to product manual for detail information on how to set it up. Wireless Modes There are basically two modes of networking: • Infrastructure – All wireless clients will connect to an access point or wireless router.
Appendix B - Networking Basics Networking Basics Check your IP address After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. (Windows® Vista™ users type cmd in the Start Search box.) At the prompt, type ipconfig and press Enter.
Appendix B - Networking Basics Statically Assign an IP address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 Windows® Vista™ - Click on Start > Control Panel > Network and Internet > Network and Sharing Center > Manage Network Connections. ® Windows XP Click on Start > Control Panel > Network Connections. Windows® 2000 - From the desktop, right-click My Network Places > Properties.
Appendix C - Technical Specifications Technical Specifications Safety & Emissions • FCC • CE • IC Standards • IEEE 802.11n (draft) • IEEE 802.11g • IEEE 802.11a • IEEE 802.3 • IEEE 802.3u Dimensions • L = 7.6 inches • W = 4.6 inches • H = 1.2inches Security • WPA-Personal • WPA2-Personal • WPA-Enterprise • WPA2-Enterprise Warranty • 1 Year Frequency Range • 2.4GHz to 2.483GHz (802.11n/g) • 5.15GHz to 5.25GHz (802.11a) • 5.725GHz to 5.85GHz (802.
Appendix D - Contacting Technical Support Contacting Technical Support U.S. and Canadian customers can contact D-Link technical support through our web site or by phone. Before you contact technical support, please have the following ready: • Model number of the product (e.g. DIR-628) • Hardware Revision (located on the label on the bottom of the router (e.g. rev A1)) • Serial Number (s/n number located on the label on the bottom of the router).
Appendix E - Warranty Warranty Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty: • Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and • Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions or Protectorates, U.S. Military Installations, or addresses with an APO or FPO.
Appendix E - Warranty Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”) will substantially conform to D-Link’s then current functional specifications for the Software, as set forth in the applicable documentation, from the date of original retail purchase of the Software for a period of ninety (90) days (“Software Warranty Period”), provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation.
Appendix E - Warranty • After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. Do not include any manuals or accessories in the shipping package. DLink will only replace the defective portion of the product and will not ship back any accessories.
Appendix E - Warranty IF ANY IMPLIED WARRANTY CANNOT BE DISCLAIMED IN ANY TERRITORY WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE LIMITED TO THE DURATION OF THE APPLICABLE WARRANTY PERIOD SET FORTH ABOVE. EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT.
Appendix E - Warranty CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Par t 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix E - Warranty The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. We declare that the product is limited in CH1~CH11 by specified firmware controlled in the USA.
Appendix F - Registration Registration Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Version 1.