Section 3 - Configuration Schedules The Schedules screen allows the user to manage schedule rules for various firewall and parental control features. Once you have finished configuring or creating a schedule rule, click the Save Settings button at the top of the window. Name: Enter a name for the new schedule rule. Day(s): Choose All Week to have the schedule run every day, or choose Select Day(s) to have the schedule run only on particular days.
Section 3 - Configuration Log Settings The system log displays chronological event log data specified by the router user. You can customize what data is logged and then save the log to disk. You can also send log information to a syslog server, or have the log sent to an e-mail address. Save Log File: Click on the Save button link on this window to save the current log file to your local hard drive.
Section 3 - Configuration Log Settings - Email Notification Email notification is a feature that sends the router log to a specified e-mail address. Log updates will be sent to the specified e-mail address automatically in 5 minute intervals, or when the log becomes full. You can also send logs according to a set schedule you can define. Enable Email To enable e-mail notification, tick this checkbox.
Section 3 - Configuration Device Information This window displays the current information for the DIR-400. It will display LAN, WAN, and Wireless information. If your WAN connection is set up for a Dynamic IP address then a DHCP Release button and a DHCP Renew button will be displayed. Use DHCP ������� Release to disconnect from your ISP and use DHCP ����� Renew to connect/reconnect to your ISP. LAN: Displays the MAC address and the private (local) IP settings for the router.
Section 3 - Configuration Log This window allows you to view a log of activities on the router. This is especially helpful for detecting unauthorized network usage. First Page: View the first page of the log. Last Page: View the last page of the log. Previous: View the previous page. Next: View the next page. Clear: Clear the log. Link to Log Click this button to go directly to the Log Settings Settings: window (Maintenance > Log Settings).
Section 3 - Configuration Statistics The window below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-400 on both the WAN and the LAN ports. The traffic counter will reset if the device is rebooted. Active Session The NAPT Active Session table displays a list of all active sessions between WAN computers and LAN computers.
Section 3 - Configuration Wireless The wireless client table displays a list of currently connected wireless clients. This table also displays the connection time and MAC address of each connected wireless client.
Section 3 - Configuration Help Click the desired hyperlink to view more information about how to use the router.
Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders.
Section 4 - Security Configuring WEP It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Wireless Setup on the left side. 2.
Section 4 - Security What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The two major improvements over WEP are: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.
Section 4 - Security Configuring WPA-PSK and WPA2-PSK It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Wireless Setup on the left side. 2.
Section 4 - Security Configuring WPA/WPA2-PSK It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Wireless Setup on the left side. 2.
Section 4 - Security Configuring WPA, WPA2, & WPA/WPA2 (RADIUS) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Wireless Settings on the left side. 2.
Section 5 - Connecting to a Wireless Network Connecting to a Wireless Network Using Windows® XP Windows® XP users may use XP’s built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.
Section 5 - Connecting to a Wireless Network Configure WEP It is recommended to enable WEP encryption on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the same WEP key that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WEP settings are correct. The WEP key must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Configuring WPA-PSK It is recommended to enable WPA-PSK encryption on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WPA-PSK passphrase being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) The DIR-400 supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista. The instructions for setting this up depend on whether you are using Windows Vista or third party software to configure the router. Initial Router Configuration for Wi-Fi Protection When you first set up the router, Wi-Fi protection is disabled and unconfigured.
Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) Setting Up a Configured Router Once the router has been configured, you can use the push button on the router or in the third party software interface to invite a newcomer to join your Wi-Fi protected network. For maximum security, the software method is recommended. However, the push button method is ideal if there is no access to a GUI.
Section 7 - Changing the Computer Name and Joining a Workgroup Changing the Computer Name and Joining a Workgroup The following are step-by-step directions to change the computer name and join a workgroup. 1. Right-click on Control Panel and click on Properties. 2. Click on the Advanced system settings link.
Section 7 - Changing the Computer Name and Joining a Workgroup 3. Click the Computer Name tab in the System Properties window and enter a description of your computer in the text box. When you are finished, click the Change button. 4. Go to the Computer Name/Domain Changes window and click the radio button next to the Workgroup you want to join. When you are finished, click the OK button.
Section 8 - Configuring the IP Address in Vista Configuring the IP Address in Vista The following are step-by-step directions to configure the IP address in Windows Vista. 1. Right-click on Network and click on Properties. 2. Go to the Network and Internet window and click the appropriate Local Area Connection icon. 3. Right-click the Local Area Connection icon and then select Properties from the context menu.
Section 8 - Configuring the IP Address in Vista 4. Tick the Internet Protocol Version 4 (TCP/IPv4) checkbox in the Networking tab in the Local Area Connection Properties window, then click on the Properties button. 5. Click the “Use the following IP address” option in the General tab in the Local Area Connection’s Properties window and enter the desired IP address in the space offered.
Section 8 - Configuring the IP Address in Vista 6. Right-click the Local Area Connection icon and then select Status from the drop-down menu. 7. Go to the Local Area Connection Status window and click the Details button. 8. Confirm your new settings on the Network Connection Status window. When you are finished, click the Done button.
Section 9 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) The following are step-by-step directions to set up a wireless connection. 1. Right-click on Network and click on Properties. 2. Click the Manage network connections link in the Network and Sharing Center window.