Section 3 - Configuration Log The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view.
Section 3 - Configuration Statistics The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-615 on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
Section 3 - Configuration Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. Local: The IP address and, where appropriate, port number of the local application. NAT: The port number of the LAN-side application as viewed by the WAN-side application.
Section 3 - Configuration Time Out: The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. 7800 seconds - Established or closing TCP connections.
Section 3 - Configuration Routing Table This page displays the routing details configured for your router.
Section 3 - Configuration Wireless The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients.
Section 3 - Configuration Support D-Link DIR-615 User Manual 67
Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-615 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) • WPA2-PSK(Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
Section 4 - Security Wireless Network Setup Wizard To run the security wizard, browse to the Setup page and then click the Wireless Network Setup Wizard button.
Section 4 - Security Enter the SSID (Service Set Identifier). The SSID is the name of your wireless network. Create a name using up to 32 characters. The SSID is case-sensitive. Select Automatically and click Next. Once this screen appears, the setup is complete. You will be given a detailed summary of your wireless security settings. Click Save to continue.
Section 4 - Security Enter the SSID (Service Set Identifier). The SSID is the name of your wireless network. Create a name using up to 32 characters. The SSID is case-sensitive. Select Manually and click on Next. Select a wireless security password. It must be exactly 5 or 13 characters. It must also be exactly 10 or 26 characters using 0-9 and A-F. Click Next to continue. Your Setup is complete. You will be given a detailed summary of your wireless security settings.
Section 4 - Security Add Wireless Device with WPS Wizard From the Setup > Wireless Settings screen, click Add Wireless Device with WPS. Select Auto to add a wireless client using WPS (Wi-Fi Protected Setup). Once you select Auto and click Connect, you will have a 120 second time limit to apply the settings to your wireless client(s) and successfully establish a connection. If you select Manual, a settings summary screen will appear. Write down the security key and enter this on your wireless clients.
Section 4 - Security Configure WPA-Personal (PSK) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2.
Section 4 - Security Configure WPA-Enterprise (RADIUS) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2.
Section 4 - Security 12. Click Advanced to enter settings for a secondary RADIUS Server. 13. Click Apply Settings to save your settings.
Section 5 - Connecting to a Wireless Network Connect to a Wireless Network Using Windows® 7 It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Click on the wireless icon in your system tray (lower-right corner). Wireless Icon 2. The utility will display any available wireless networks in your area.
Section 5 - Connecting to a Wireless Network 3. Highlight the wireless network (SSID) you would like to connect to and click the Connect button. If you get a good signal, but cannot access the Internet, check your TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. 4. The following window appears while your computer tries to connect to the router.
Section 5 - Connecting to a Wireless Network 5. Enter the same security key or passphrase that is on your router and click Connect. You can also connect by pushing the WPS button on the router. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Configure WPS The WPS feature of the DIR-615 can be configured using Windows® 7. Carry out the following steps to use Windows® 7 to configure the WPS feature of the DIR-615: 1. Click the Start button and select Computer from the Start menu. 2. Click the Network option.
Section 5 - Connecting to a Wireless Network 3. Double-click the DIR-615 router. 4. Input the WPS PIN number (displayed in the WPS window on the Router’s LCD screen or in the Setup > Wireless Setup menu in the Router’s Web UI) and click Next.
Section 5 - Connecting to a Wireless Network 5. Type a name to identify the network. 6. To configure advanced settings, click the icon. Click Next to continue.
Section 5 - Connecting to a Wireless Network 7. The following window appears while the Router is being configured. Wait for the configuration to complete. 8. The following window informs you that WPS on the DIR-615 has been setup successfully. Make a note of the security key as you may need to provide this security key if adding an older wireless device to the network in the future. 9. Click Close to complete WPS setup.
Section 5 - Connecting to a Wireless Network Using Windows Vista® Windows Vista® users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows Vista® utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility.
Section 5 - Connecting to a Wireless Network Configure WPA/WPA2 It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Open the Windows Vista® Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network. 2.
Section 5 - Connecting to a Wireless Network 3. Enter the same security key or passphrase that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Connect Using WCN 2.0 The router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista® and Windows 7. The following instructions for setting this up depends on whether you are using Windows Vista® and Windows 7 to configure the router or third party software. When you first set up the router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection, the router must be both enabled and configured.
Section 5 - Connecting to a Wireless Network Using Windows® XP Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.
Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WEP on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Troubleshooting Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR-615. Read the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have a different operating system, the screen shots on your computer will look similar to the following examples.) 1. Why can’t I access the web-based configuration utility? When entering the IP address of the D-Link router (192.168.
Section 6 - Troubleshooting • Configure your Internet settings: • Go to Start > Settings > Control Panel. Double-click the Internet Options Icon. From the Security tab, click the button to restore the settings to their defaults. • Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings button. Make sure nothing is checked. Click OK. • Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three times.
Section 6 - Troubleshooting 3. Why can’t I connect to certain sites or send and receive e-mails when connecting through my router? If you are having a problem sending or receiving e-mail, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). Note: AOL DSL+ users must use MTU of 1400. To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to.
Section 6 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size.
Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics What is Wireless? Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. Why D-Link Wireless? D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford.
Appendix A - Wireless Basics Who uses wireless? Wireless technology as become so popular in recent years that almost everyone is using it, whether it’s for home, office, business, D-Link has a wireless solution for it.
Appendix A - Wireless Basics Where is wireless used? Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places is usually called “hotspots”.
Appendix A - Wireless Basics Wireless Modes There are basically two modes of networking: • Infrastructure – All wireless clients will connect to an access point or wireless router. • Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more DIR-615 wireless network Cardbus adapters. An Infrastructure network contains an Access Point or wireless router.
Appendix B - Networking Basics Networking Basics Check your IP address After you install your adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. (Windows Vista® users type cmd in the Start Search box.) At the prompt, type ipconfig and press Enter.
Appendix B - Networking Basics Statically Assign an IP address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 Windows® 7 Windows Vista® Windows® XP Windows® 2000 - Click on Start > Control Panel > Network and Internet > Network and Sharing Center > Change Adapter Setting. Click on Start > Control Panel > Network and Internet > Network and Sharing Center > Manage Network Connections.
Frequency Range • 2.4GHz to 2.483GHz Standards • IEEE 802.11n • IEEE 802.11g • IEEE 802.3 • IEEE 802.3u LEDs Security • WPA-Personal • WPA2-Personal • WPA-Enterprise • WPA2-Enterprise • Internet • LAN (10/100) Operating Temperature • 32°F to 104°F ( 0°C to 40°C) Wireless Signal Rates* • 300Mbps • 12Mbps • 108Mbps • 11Mbps • 54Mbps • 9Mbps • 48Mbps • 6Mbps • 36Mbps • 5.
Appendix D - Contacting Technical Support Contacting Technical Support U.S. and Canadian customers can contact D-Link technical support through our web site or by phone. Before you contact technical support, please have the following ready: • Model number of the product (e.g. DIR-615) • Hardware Revision (located on the label on the bottom of the router (e.g. rev I1)) • Serial Number (s/n number located on the label on the bottom of the router).
Appendix E - GPL Code Statement GPL Code Statement This D-Link product includes software code developed by third parties, including software code subject to the GNU General Public License (“GPL”) or GNU Lesser General Public License (“LGPL”). As applicable, the terms of the GPL and LGPL, and information on obtaining access to the GPL code and LGPL code used in this product, are available to you at: http://tsd.dlink.com.tw/GPL.
Appendix E - GPL Code Statement Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
Appendix F - Warranty Warranty Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty: • Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and • Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions or Protectorates, U.S. Military Installations, or addresses with an APO or FPO.
Appendix F - Warranty Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”) will substantially conform to D-Link’s then current functional specifications for the Software, as set forth in the applicable documentation, from the date of original retail purchase of the Software for a period of ninety (90) days (“Software Warranty Period”), provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation.
Appendix F - Warranty • After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. Do not include any manuals or accessories in the shipping package. D-Link will only replace the defective portion of the product and will not ship back any accessories.
Appendix F - Warranty Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT, INCONVENIENCE OR DAMAGES OF ANY CHARACTER, WHETHER DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOSS OF REVENUE OR PROFIT, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, FAILURE OF OTHER EQUIPMENT OR COMPUTER PROGRAMS T
Appendix F - Warranty Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix F - Registration Registration Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights. Version 8.