Version 3.
Preface D-Link reserves the right to revise this publication and to make changes in the content hereof without obligation to notify any person or organization of such revisions or changes. Manual Revisions Revision 3.00 Date September 11, 2014 Description • B2 hardware revision Trademarks D-Link and the D-Link logo are trademarks or registered trademarks of D-Link Corporation or its subsidiaries in the United States or other countries.
Table of Contents Table of Contents Preface.................................................................................. i Manual Revisions............................................................................ i Trademarks....................................................................................... i Product Overview............................................................... 1 Package Contents..........................................................................
Table of Contents Connect to a Wireless Network........................................54 Using Windows® 8.......................................................................54 Using Windows® 7.......................................................................56 Using Windows Vista® ...............................................................59 Using Windows® XP.....................................................................60 Configure Wireless Security......................................
Section 1 - Product Overview Package Contents DIR-605L Wireless N 300 Cloud Router Power Adapter Ethernet Cable Wi-Fi Configuration Card Quick Install Guide If any of the above items are missing, please contact your reseller. Note: Always attach the power cord plug to the power supply, before inserting the power cord and connected power supply to the wall outlet.
Section 1 - Product Overview System Requirements Network Requirements • An Ethernet-based Cable or DSL modem • IEEE 802.11b, 802.11g, 802.11n wireless clients • 10/100 Ethernet Computer with the following: • Windows®, Macintosh, or Linux-based operating system • An installed Ethernet adapter Web-based Configuration Utility Requirements Browser Requirements: • Internet Explorer 8 or higher • Firefox 2.0 or higher indows® Users: Make sure you have the latest version of Java W installed. Visit www.java.
Section 1 - Product Overview Features • Faster Wireless Networking - The DIR-605L provides up to 300 Mbps* wireless connection with other 802.11n wireless clients. This capability allows users to participate in real-time activities online, such as video streaming, online gaming, and real-time audio. • Compatible with 802.11b and 802.11g Devices - The DIR-605L is fully compatible with the IEEE 802.11b and IEEE 802.11g standards, so it can connect with existing 802.11b and 802.
Section 1 - Product Overview Hardware Overview LEDs 1 1 Power LED 2 Internet 3 Wireless LED 4 LAN D-Link DIR-605L User Manual 2 3 4 A solid green light indicates a proper connection to the power supply. A solid light indicates connection on the WAN port. This LED blinks during data transmission. A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission. A solid light indicates connection on the LAN port.
Section 1 - Product Overview Hardware Overview Connections 1 1 Reset 2 LAN Ports (1-4) 3 Internet Port 4 Power Receptor D-Link DIR-605L User Manual 2 3 4 Pressing the Reset button on the bottom of the device for 10 seconds restores the router to its original factory default settings. Connect Ethernet devices such as computers, switches, and hubs. Connect your DSL, cable modem or other Internet connection here to provide Internet connectivity to the router.
Section 2 - Installation Installation This section will walk you through the installation process. Placement of the router is very important. Do not place the router in an enclosed area such as a closet, cabinet, or in the attic or garage. Before You Begin • Please configure the router with the computer that was last connected directly to your modem. • You can only use the Ethernet port on your modem.
Section 2 - Installation Wireless Installation Considerations The D-Link wireless router lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
Section 2 - Installation Connect to Cable/DSL/Satellite Modem If you are connecting the router to a cable/DSL/satellite modem, please follow the steps below: 1. Place the router in an open and central location. Do not plug the power adapter into the router. 2. Turn the power off on your modem. If there is no on/off switch, then unplug the modem’s power adapter. Shut down your computer. 3.
Section 3 - Configuration Configuration Easy Setup Wizard This section will show you how to configure your new D-Link wireless router using the Easy Setup Wizard. Step 1: To access the configuration utility, open a Web browser such as Internet Explorer and enter the IP address of the router (192.168.0.1) or http://dlinkrouter.local./ Step 2: Select your preferred language and click Start.
Section 3 - Configuration Step 5: You can configure your custom wireless settings on the next screen. Click Next when you are done. Step 6: You can change the username and password for your router’s administrator account. Click Next when you are done. Step 7: Select the Time Zone for your location. Click Next to save the settings. The “Easy Setup Complete” page will display your configuration summary.
Section 3 - Configuration Step 9: If you do not have a mydlink account, click No, I want to register with a new mydlink account and complete the registration form. Click Register. OR If you already have a mydlink account, click Yes, I have a mydlink account and enter your account name and password. Click Login. Step 10: On the next screen, there will be a note indicating mydlink service is activated and the status will show “Connected”.
Section 3 - Configuration The next time you access the router’s IP from your browser, you will need to log in with the username and password for the administrator account. Click Login. The current network settings will be shown and you can click Manual Setup to continue to the management UI for further configuration.
Section 3 - Configuration After the router is connected to mydlink service, you can download the “mydlink Lite” app from Google Play or App Store for your mobile device! After installation, simply log in with your mydlink account details and you can manage your router from anywhere! D-Link DIR-605L User Manual 13
Section 3 - Configuration Internet Connection Static IP (assigned by ISP) Select Static IP Address if all WAN IP information is provided to you by your ISP. You will need to enter in the IP address, subnet mask, gateway address, and DNS address(es) provided to you by your ISP. Each IP address entered in the fields must be in the appropriate IP form, which are four octets separated by a dot (x.x.x.x). The router will not accept the IP address if it is not in this format. Click Save Settings to apply them.
Section 3 - Configuration Internet Setup Dynamic IP (DHCP) To manually set up the Internet connection, click the Manual Internet Connection Setup button on the router’s opening window. Click Save Settings to apply them. Dynamic IP Choose Dynamic IP Address to obtain IP address information Address: automatically from your ISP. Select this option if your ISP does not give you any IP numbers to use. This option is commonly used for cable modem services.
Section 3 - Configuration Internet Setup PPPoE Choose PPPoE (Point to Point Protocol over Ethernet) if your ISP uses a PPPoE connection. Your ISP will provide you with a username and password. This option is typically used for DSL services. Make sure to remove your PPPoE software from your computer. The software is no longer needed and will not work through a router. Click Save Settings to apply them. PPPoE: Select Dynamic IP (most common) or Static IP.
Section 3 - Configuration Primary and Enter the primary and secondary DNS server addresses Secondary DNS (Static PPPoE only). Servers: Maximum Idle Enter a maximum idle time during which the Internet Time: connection is maintained during inactivity. MTU: Maximum Transmission Unit - You may need to change the MTU for optimal performance with your specific ISP. 1492 is the default MTU. Connection Select either Always-on, Manual, or Connect-on demand.
Section 3 - Configuration Internet Setup PPTP Choose PPTP (Point-to-Point-Tunneling Protocol ) if your ISP uses a PPTP connection. Your ISP will provide you with a username and password. This option is typically used for DSL services. PPTP: Select Dynamic (most common) or Static. Select Static if your ISP assigned you the IP address, subnet mask, gateway, and DNS server addresses. IP Address: Enter the IP address (Static PPTP only).
Section 3 - Configuration User Name: Enter your PPTP account name. Password: Enter your PPTP password, then retype the password in the next box. Maximum Idle Enter a maximum idle time during which the Internet Time: connection is maintained during inactivity. MTU: Maximum Transmission Unit - You may need to change the MTU for optimal performance. Connect Mode: Select either Always-on, Manual, or Connect-on demand.
Section 3 - Configuration Internet Setup L2TP Choose L2TP (Layer 2 Tunneling Protocol) if your ISP uses a L2TP connection. Your ISP will provide you with a username and password. This option is typically used for DSL services. L2TP: Select Dynamic (most common) or Static. Select Static if your ISP assigned you the IP address, subnet mask, gateway, and DNS server addresses. L2TP IP Address: Enter the IP address (Static L2TP only).
Section 3 - Configuration User Name: Enter your L2TP account name. Password: Enter your L2TP password, then retype the password in the next box. Maximum Idle Enter a maximum idle time during which the Internet Time: connection is maintained during inactivity. To disable this feature, enable Auto-reconnect. MTU: Maximum Transmission Unit - You may need to change the MTU for optimal performance with your specific ISP. Connect Mode Select either Always-on, Manual, or Connect-on demand.
Section 3 - Configuration Wireless Connection You can configure your specific wireless network settings in this section. Click Save Settings to apply them. Wi-Fi Protected To implement WPS, tick the Enable checkbox. Click either Setup: Generate New PIN or Reset PIN to Default, then configure the Wi-Fi settings below. Click Add Wireless Device with WPS to connect a WPS-enabled device. Wireless Mode: Select between Wireless Router, Access Point, WDS Only, WDS +AP, WDS +AP +Router modes.
Section 3 - Configuration Wireless Security Select between WEP, WPA Only, WPA2 Only, WPA/WPA2, Mode: or Disabled wireless security. The fields below will change according to your choice and you can set a custom key for your network. Cipher Type: Select the appropriate cipher type to use here. Options to choose from are Temporal Key Integrity Protocol (TKIP), Advanced Encryption Standard (AES), and Both (TKIP and AES). PSK/EAP: Select between Personal (PSK) and Enterprise (EAP).
Section 3 - Configuration Wireless Security 1. To enable wireless security on the router, use the drop-down menu to select the desired option. To enable WEP, select Enable WEP Wireless Security (basic). 2. Next to Authentication, select either Open or Shared Key. Shared Key provides greater security. 3. Select either 64-bit or 128-bit encryption from the drop-down menu next to WEP Key Length. 4. Next to Default WEP Key, select WEP Key 1 and enter a WEP key next to WEP Password.
Section 3 - Configuration 1. To enable WPA, WPA2, or WPA/WPA2, select either Enable WPA Only Wireless Security (enhanced), Enable WPA2 Only Wireless Security (enhanced), or Enable WPA/WPA2 Wireless Security (enhanced). 2. Next to Cipher Type, select AUTO, TKIP, or AES. 3. Next to PSK/EAP, select PSK. 4. Next to Network Key, enter a passphrase. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces.
Section 3 - Configuration LAN Setup This section will allow you to change the local network settings of the router and to configure the DHCP settings. Click Save Settings to apply your settings. Router IP Enter the IP address of the router. The default IP address is Address: 192.168.0.1. If you change the IP address, once you click Apply, you will need to enter the new IP address in your browser to get back into the configuration utility. Subnet Mask: Enter the subnet mask. The default subnet mask is 255.
Section 3 - Configuration Enable DHCP Check the box to enable the DHCP server on your router. Server: Uncheck to disable this function. DHCP IP Enter the starting and ending IP addresses for the DHCP Address Range: server’s IP assignment. DHCP Lease The length of time for the IP address lease. Enter the Lease Time: time in minutes. DHCP Client List: Displays currently connected client details. Avoid ARP Tick this to enable ARP spoofing prevention feature.
Section 3 - Configuration Time and Date This section will allow you to configure, update, and maintain the correct time on the internal system clock of the device. Click Save Settings to apply your settings. Time Zone: Select the Time Zone from the drop-down menu. Enable Ticking this checkbox enables Daylight Saving time. Click Daylight Sync your computer’s time settings to copy your PC’s Saving: time settings.
Section 3 - Configuration Parental Control Rules This feature allows you to create a list of websites that you want to either allow or deny users access. Click Save Settings to apply your settings. Configure Select Turn Parental Control OFF, Turn Parental Control Parental ON and ALLOW computers access to ONLY these sites, Control: or Turn Parental Control ON and DENY computers access to ONLY these sites. Website URL: Enter the keywords or URLs that you want to block (or allow).
Section 3 - Configuration Advanced Advanced Port Forwarding Rules This will allow you to open a single port or a range of ports. Click Save Settings to apply your settings. Rule: Check the box to enable the rule. Name: Enter a name for the rule. You can also choose from the Application Name drop-down box. IP Address: Enter the IP address of the computer on your local network that you want to allow the incoming service to. You can also choose from the Computer Name drop-down box.
Section 3 - Configuration Application Rules Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and others. These applications have difficulties working through NAT (Network Address Translation). Application rules let these applications trigger and pass through the DIR-605L’s firewall. Click Save Settings to apply your settings. Rule: Check the box to enable the rule. Name: Enter a name for the rule.
Section 3 - Configuration MAC Filtering The MAC (Media Access Controller) Address filter option is used to control network access based on the MAC Address of the client device. This feature can be configured to ALLOW or DENY network/Internet access for this client. Click Save Settings to apply your settings. Configure MAC Select how the rule will work: Turn MAC Filtering OFF, Turn Filtering below: MAC Filtering ON and ALLOW computers, or Turn MAC Filtering ON and DENY computers listed.
Section 3 - Configuration ACL Filter Use ACL (Access Control Lists) Filter rules to allow or deny LAN (Local Area Network) computers by their MAC addresses from accessing the network. You can manually add a MAC address and apply a rule. Click Save Settings to apply your settings. Configure ACL Select Close ACL filter or Turn ACL filtering ON and DENY Filter: computers listed to access the network. MAC Address: Enter the MAC address you would like to filter.
Section 3 - Configuration Traffic Control Traffic Control can guarantee bandwidth priority to specified LAN/Wireless clients. You can do this by setting up traffic control rules. Click Save Settings to apply your settings. Enable Traffic Select this function to control the access bandwidth of Control: computers in LAN. Automatic All of the computers in LAN will have their bandwidth Distribute distributed equally. Bandwidth: Key in Download Key in the value in kbps to setup the bandwidth manually.
Section 3 - Configuration Firewall & DMZ If you have a client PC that cannot run Internet applications properly from behind the DIR-605L, then you can set the client up for unrestricted Internet access. It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. Enter the IP address of the internal computer that will be the DMZ host.
Section 3 - Configuration Name: Choose a name for the firewall rule. Action: Select to Allow or Deny transport of the data packets according to the criteria defined in the rule. Interface: The Source/Destination is the TCP/UDP port on either the LAN or WAN side. IP Address: Enter a beginning and ending IP address. Protocol: Select the transport protocol that will be used for the filter rule. Port Range: Enter the desired port range for the filter rule. Schedule: Click Add New to access the Schedules window.
Section 3 - Configuration Advanced Wireless Settings This window allows you to change the behavior of the wireless radio from the standard settings. Please be aware that any changes to the factory default settings may adversely affect the behavior of your network. Click Save Settings to apply your settings. Transmit Power: Set the transmit power of the antennas. Beacon Period: Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value.
Section 3 - Configuration CTS Mode: CTS (Clear To Send) is a function used to minimize collisions among wireless devices on a wireless local area network (LAN). CTS will make sure the wireless network is clear before a wireless client attempts to send wireless data. Enabling CTS will add overhead and may lower wireless throughput. None: CTS is typically used in a pure 802.11g environment. If CTS is set to “None” in a mixed mode environment populated by 802.
Section 3 - Configuration Advanced Network Settings This window allows you to change the LAN settings. Please be aware that any changes to the factory default settings may affect the behavior of your network. Click Save Settings to apply your settings. Enable UPnP: To use the Universal Plug and Play (UPnP™) feature tick this checkbox. UPnP provides compatibility with networking equipment, software and peripherals. Enable WAN Unchecking the box will not allow the DIR-605L to respond Ping Respond: to pings.
Section 3 - Configuration Routing This option allows you to define fixed routes to defined destinations. Click Save Settings to apply your settings. Enable: Tick this checkbox to enable or disable fixed routes to defined destinations. Interface: Use the drop-down menu to choose the WAN or WAN (Physical Port) Interface the IP packet must use to transit out of the router. Destination: The IP address of the packets that will take this route.
Section 3 - Configuration Maintenance Device Administration This window will allow you to change the administrator password. You can also enable remote management. Administrator Enter a new Login Name for the administrator account. Login Name: Administrator Enter a new password for the administrator Login Name, Password: then retype the new password in the Confirm Password text box. The administrator can make changes to the settings.
Section 3 - Configuration Save and Restore Settings This window allows you to save your configuration file to a hard drive, load configuration settings from a hard drive, and restore the router’s factory default settings. Save Settings to Use this option to save the current router configuration Local Hard Drive: settings to a file on the hard disk of the computer you are using. First, click the Save button. You will then see a file dialog, where you can select a location and file name for the settings.
Section 3 - Configuration Firmware Update You can upgrade the firmware of the router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the D-Link support site. Firmware This section displays the firmware version and date.
Section 3 - Configuration Language Pack Click the Browse button (or the link at the top of the Upgrade: window) and Upload to install the language pack. mydlink Pack You can click Browse in this window to locate the mydlink Upgrade: pack upgrade on your hard drive. Click Upload to complete the upgrade.
Section 3 - Configuration Dynamic DNS The router supports DDNS (Dynamic Domain Name Service). The Dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any domain, allowing access to a specified host from various locations on the Internet. Many ISPs assign public IP addresses using DHCP, which can make it difficult to locate a specific host if the IP changes.
Section 3 - Configuration System Check This tool is used to verify the physical connectivity on both the LAN and the WAN interfaces. The Ping Test can be used to test the status of the Internet. Virtual Cable VCT is an advanced feature that integrates a LAN cable Tester (VCT) Info: tester on every Ethernet port on the router. Through the graphical user interface (GUI), VCT can be used to remotely diagnose and report cable faults such as opens, shorts, swaps, and impedance mismatch.
Section 3 - Configuration Schedule The router allows the user the ability to manage schedule rules for various firewall and parental control features on this window. Once you have finished configuring the new schedule rule, click the Save Settings button at the top of the window. Name: Enter a name for the new schedule rule. Day(s): Choose the desired day(s), either All Week or Select Day(s). If the latter is selected, please use the checkboxes directly below to specify the individual days.
Section 3 - Configuration Log Settings The system log displays chronological event log data specified by the admin. You may also save a simple text file containing the log to your computer. Click the Save Settings button to apply changes. Save Log File: Click on the Save button link on this window to save the log file to your local hard drive.
Section 3 - Configuration Status Device Info This window displays the current information for the DIR-605L. It will display the LAN, WAN, and Wireless information. If your WAN connection is set up for a Dynamic IP address then a DHCP Release button and a DHCP Renew button will be displayed. Use DHCP Release to disconnect from your ISP and use DHCP Renew to connect to your ISP. If your WAN connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed.
Section 3 - Configuration View Log This section allows you to view a log of activities on the router. This is especially helpful for detecting unauthorized network usage. First Page: View the first page of the log. Last Page: View the last page of the log. Previous: View the previous page. Next Page: View the next page. Clear: Clear the log. Link to Log Click this button to go directly to the Log Settings window Settings: (Maintenance > Log Settings).
Section 3 - Configuration Traffic Statistics The window below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-605L on both the WAN and the LAN ports. The traffic counter will reset if the device is rebooted. Click Refresh to update the statistics. Click Reset to reset the statistics.
Section 3 - Configuration Active Sessions The NAPT Active Sessions table displays a list of all active conversations between WAN computers and LAN computers. Click Refresh to update the statistics.
Section 3 - Configuration Wireless The wireless client table displays a list of currently connected wireless clients. This table also displays the connection details of any connected wireless clients.
Section 5 - Connecting to a Wireless Network Connect to a Wireless Network Using Windows® 8 It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key (Wi-Fi password) being used. To join an existing network, locate the wireless network icon in the taskbar, next to the time display.
Section 5 - Connecting to a Wireless Network You will then be prompted to enter the network security key (Wi-Fi password) for the wireless network. Enter the password into the box and click Next. If you wish to use Wi-Fi Protected Setup (WPS) to connect to the router, you can also press the WPS button on your router at this point to enable the WPS function.
Section 5 - Connecting to a Wireless Network Using Windows® 7 It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Click on the wireless icon in your system tray (lower-right corner). Wireless Icon 2. The utility will display any available wireless networks in your area.
Section 5 - Connecting to a Wireless Network 3. Highlight the wireless network (SSID) you would like to connect to and click the Connect button. If you get a good signal but cannot access the Internet, check your TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. 4. The following window appears while your computer tries to connect to the router.
Section 5 - Connecting to a Wireless Network 5. Enter the same security key or passphrase that is on your router and click Connect. You can also connect by pushing the WPS button on the router. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Using Windows Vista® Windows Vista® users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows Vista® utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility.
Section 5 - Connecting to a Wireless Network Using Windows® XP Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.
Section 5 - Connecting to a Wireless Network Configure Wireless Security It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Open the Windows Vista® Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network. 2.
Section 5 - Connecting to a Wireless Network 3. Enter the same security key or passphrase that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WPA on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WPA key being used. 1. Open the Windows ® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Troubleshooting Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR-605L. Read the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have a different operating system, the screenshots on your computer will look similar to the following examples.) 1. Why can’t I access the web-based configuration utility? When entering the IP address of the D-Link router (192.168.0.
Section 6 - Troubleshooting • Configure your Internet settings: • Go to Start > Settings > Control Panel. Double-click the Internet Options Icon. From the Security tab, click the button to restore the settings to their defaults. • Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings button. Make sure nothing is checked. Click OK. • Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three times.
Section 6 - Troubleshooting 3. Why can’t I connect to certain sites or send and receive e-mails when connecting through my router? If you are having a problem sending or receiving e-mail, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). Note: AOL DSL+ users must use MTU of 1400. To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to.
Section 6 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, let’s say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size.
Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics What is Wireless? Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. Why D-Link Wireless? D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford.
Appendix A - Wireless Basics Wireless Personal Area Network (WPAN) Bluetooth is the industry standard wireless technology used for WPAN. Bluetooth devices in WPAN operate in a range up to 30 feet away. Compared to WLAN the speed and wireless operation range are both less than WLAN, but in return it doesn’t use nearly as much power which makes it ideal for personal devices, such as mobile phones, PDAs, headphones, laptops, speakers, and other devices that operate on batteries.
Appendix A - Wireless Basics Where is wireless used? Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places are usually called “hotspots”.
Appendix A - Wireless Basics Wireless Modes There are basically two modes of networking: • Infrastructure – All wireless clients will connect to an access point or wireless router. • Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more DIR-605L wireless network Cardbus adapters. An Infrastructure network contains an Access Point or wireless router.
Appendix B - Networking Basics Networking Basics Check your IP address After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. (Windows® 7/Vista® users type cmd in the Start Search box.) At the prompt, type ipconfig and press Enter.
Appendix B - Networking Basics Statically Assign an IP address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 Windows® 7 - Click on Start > Control Panel > Network and Internet > Network and Sharing Center > Change Adapter Setting. Windows Vista® - Click on Start > Control Panel > Network and Internet > Network and Sharing Center > Manage Network Connections.
Appendix C - Technical Specifications Technical Specifications Standards • IEEE 802.11b • IEEE 802.11g • IEEE 802.11n • IEEE 802.3 • IEEE 802.3u • IEEE 802.3x Wireless Signal Rates* • 300 Mbps • 150 Mbps • 54 Mbps • 48 Mbps • 36 Mbps • 24 Mbps • 18 Mbps • 12 Mbps • 11 Mbps • 9 Mbps • 6 Mbps • 5.5 Mbps • 2 Mbps • 1 Mbps Security • WPA - Wi-Fi Protected Access (TKIP, MIC, IV Expansion, Shared Key Authentication) • 64/128-bit WEP Modulation Technology • 802.11b : DSSS / DBPSK / DQPSK / CCK • 802.
Appendix C - Technical Specifications • URL Filtering • Scheduling LEDs • Power • Status • Internet • WLAN (Wireless Connection) • LAN (10/100) Operating Temperature • 0 °C to 40 °C (32 °F to 129 °F) • • • • CE C-tick NCC CCC Dimensions • L = 132 mm (5.2 inches) • W = 87 mm (3.4 inches) • H = 29 mm (1.14 inches) Weight • 145.2 grams (5.12 ounces) Humidity • 95% maximum (non-condensing) Safety and Emissions • FCC Part 15B/ 15C/ MPE * Maximum wireless signal rate derived from IEEE Standard 802.11b, 802.
Appendix D - Contacting Technical Support Contacting Technical Support U.S. and Canadian customers can contact D-Link technical support through our web site or by phone. Before you contact technical support, please have the following ready: • Model number of the product (e.g. DIR-605L) • Hardware Revision (located on the label on the bottom of the router (e.g. rev B2)) • Serial Number (s/n number located on the label on the bottom of the router).
Appendix E - GNU General Public License GPL Code Statement This D-Link product includes software code developed by third parties, including software code subject to the GNU General Public License (“GPL”) or GNU Lesser General Public License (“LGPL”). As applicable, the terms of the GPL and LGPL, and information on obtaining access to the GPL code and LGPL code used in this product, are available to you at: http://tsd.dlink.com.tw/GPL.
Appendix E - GNU General Public License Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
Appendix E - GNU General Public License TERMS AND CONDITIONS 0. Definitions. “This License” refers to version 3 of the GNU General Public License. “Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.
Appendix E - GNU General Public License The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form.
Appendix E - GNU General Public License 3. Protecting Users’ Legal Rights From Anti-Circumvention Law. No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
Appendix E - GNU General Public License A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation’s users beyond what the individual works permit.
Appendix E - GNU General Public License A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage.
Appendix E - GNU General Public License When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work). You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.
Appendix E - GNU General Public License 8. Termination. You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).
Appendix E - GNU General Public License You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11.
Appendix E - GNU General Public License A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the nonexercise of one or more of the rights that are specifically granted under this License.
Appendix E - GNU General Public License Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version. 15. Disclaimer of Warranty. THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
Appendix F - Warranty Warranty Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty: • Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and • Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions or Protectorates, U.S. Military Installations, or addresses with an APO or FPO.
Appendix F - Warranty Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”) will substantially conform to D-Link’s then current functional specifications for the Software, as set forth in the applicable documentation, from the date of original retail purchase of the Software for a period of ninety (90) days (“Software Warranty Period”), provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation.
Appendix F - Warranty • After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. Please refer to shipping and packaging instructions located online at http://rma.dlink.com/. • The customer is responsible for all in-bound shipping charges to D-Link. No Cash on Delivery (“COD”) is allowed.
Appendix F - Warranty • The customer is responsible for all in-bound shipping charges to D-Link. No Cash on Delivery (“COD”) is allowed. Products sent COD will be rejected by D-Link. Products shall be fully insured by the customer and shipped to D-Link Networks, Inc., 2525 Meadowvale Boulevard Mississauga, Ontario, L5N 5S2 Canada. D-Link will not be held responsible for any packages that are lost in transit to D-Link.
Appendix F - Warranty Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT, INCONVENIENCE OR DAMAGES OF ANY CHARACTER, WHETHER DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOSS OF REVENUE OR PROFIT, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, FAILURE OF OTHER EQUIPMENT OR COMPUTER PROGRAMS T
Appendix E - Warranty CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. FCC Statement: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix E - Warranty ICC Notice: Operation is subject to the following two conditions: (1) This device may not cause interference and (2) This device must accept any interference, including interference that may cause undesired operation of the device. IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance.
Appendix G - Registration Registration Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Version 3.