Manual
Table Of Contents
- Preface
- Introduction
- Installation
- Basic Configuration
- LAN Configuration
- Connect to the Internet
- Wireless Settings
- VPN
- Security
- Maintenance
- Status and Statistics
- Troubleshooting
- Appendix A - Glossary
- Appendix B - Factory Default Settings
- Appendix C - Standard Services for Port Forwarding & Firewall Configuration
- Appendix D - Log Output Reference
- Appendix E - RJ-45 Pin-outs
- Appendix F - New Wi Fi Frequency table ( New appendix section )
- Appendix G - Product Statement
D-Link DSR-Series User Manual 229
Appendix A - Glossary
PPPoE
Point-to-Point Protocol over Ethernet. Protocol for connecting a network of hosts to an ISP
without the ISP having to manage the allocation of IP addresses.
PPTP
Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data
from remote clients to private servers over the Internet.
RADIUS
Remote Authentication Dial-In User Service. Protocol for remote user authentication and
accounting. Provides centralized management of usernames and passwords.
RSA Rivest-Shamir-Adleman. Public key encryption algorithm.
TCP
Transmission Control Protocol. Protocol for transmitting data over the Internet with guaranteed
reliability and in-order delivery.
UDP
User Data Protocol. Protocol for transmitting data over the Internet quickly but with no
guarantee of reliability or in-order delivery.
VPN
Virtual private network. Network that enables IP trac to travel securely over a public TCP/IP
network by encrypting all trac from one network to another. Uses tunneling to encrypt all
information at the IP level.
WINS
Windows Internet Name Service. Service for name resolution. Allows clients on dierent IP
subnets to dynamically resolve addresses, register themselves, and browse the network without
sending broadcasts.
XAUTH
IKE Extended Authentication. Method, based on the IKE protocol, for authenticating not just
devices (which IKE authenticates) but also users. User authentication is performed after device
authentication and before IPsec negotiation.