ʳʳ ʳʳʳʳʳʳʳʳʳʳʳʳʳྤᒵሁطᕴʳ ',5
Table of Contents Table of Contents Package Contents ......................................................................1 System Requirements ...........................................................1 Features................................................................................. 2 Hardware Overview ...............................................................3 Connections ....................................................................3 LEDs and USB Port ..............................
Table of Contents % ( )!! " .......................................64 ................... 67 ! * + ) , - ) ,# ............................................................................/ ! .................... 76 % 0) 2 3 8 ! : $# ; % 0) 2 3 8 ! : $# ......................
Section 1 - Product Overview A - The DIR-6 provides up to 300Mbps* wireless connection with other 802.11n wireless clients. This capability allows users to participate in real-time activities online, such as video streaming, online gaming, and real-time audio. A & = % ; ::= ! ; :: B D - The DIR-6 is still fully compatible with the IEEE 802.11b and IEEE 802.11g standard, so it can connect with existing 802.11b and IEEE 802.
Section 2 - Installation Installation This section will walk you through the installation process. Placement of the router is very important. Do not place the router in an enclosed area such as a closet, cabinet, or in the attic or garage. ? F ? Please configure the router with the computer that was last connected directly to your modem. Also, you can only use the Ethernet port on your modem.
Section 2 - Installation ( ! The D-Link wireless router lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business.
Section 2 - Installation = EB 8E 0 ! & If you are connecting the router to a cable/DSL/satellite modem, please follow the steps below: 1. Place the router in an open and central location. Do not plug the power adapter into the router. Turn the power off on your modem. If there is no on/off switch, then unplug the modem’s power adapter. Shut down your computer. 3.
Section 2 - Installation ) % K If you are connecting the D-Link router to another router to use as a wireless access point and/or switch, you will have to do the following before connecting the router to your network: ™ accept a DHCP address from your other router. " # $ To connect to another router, please follow the steps below: 1. Plug the power into the router.
Section 2 - Installation 6. Disconnect the Ethernet cable from the router and reconnect your computer to your network. 7. Connect an Ethernet cable in one of the LAN ports of the router and connect it to your other router. Do not plug anything into the WAN port of the D-Link router. 8. You may now use the other three LAN ports to connect other Ethernet devices and computers. To configure your wireless network, open a web browser and enter the IP address you assigned to the router.
Section 3 - Configuration This section will show you how to configure your new D-Link wireless router using the web-based configuration utility. = = ! To access the configuration utility, open a web-browser such as Internet Explorer and enter the IP address of the router (192.168.0.1). Type “admin” for the User Name and leave the field blank in the Password field. Leave the password blank by default.
Section 3 - Configuration G ! You may run the setup wizard from the opening Internet Setup window to quickly set up your router. Click ( G !, and the first window of the wizard will open. Click L to continue. Create a new password, and then click L to continue.
Section 3 - Configuration Select the type of Internet connection you use and then configure the information below. If clicking the B & ( )!! radio button, enter the username in the & field and password in ! and " F ! fields. The D & is optional but may be required by some ISPs. If clicking the ( radio button, enter the username in the & field and password in ! and " F ! fields.
Section 3 - Configuration Click G ! to open the wizard window of configuring wireless connection. Click K = to directly restart the Router. If clicking K = , the Router will save the new settings and reboot. Please allow 1-2 minutes for rebooting. When the router has finished rebooting, the opening window will be displayed. If clicking window will open. Click L to continue.
Section 3 - Configuration If selecting Manually assign a network key in the previous window, this window will open. Enter a wireless security password in the Network Key box. Click L to continue. This window displays a summary of your wireless security settings. Please print this out or record this information in a safe place and then click D to continue. The Router will save the new settings and reboot. Please allow 1-2 minutes for rebooting.
Section 3 - Configuration ( If you want to configure the Router manually without using the wizard, click the 0 ( button.
Section 3 - Configuration ( B & * Click the B & *(Point to Point Protocol over Ethernet) radio button to see the following configuration if your ISP uses dynamic PPPoE . & J Enter your PPPoE user name. !J Enter your PPPoE password. & !J Retype the password. D & J Enter the ISP Service Name. The Service Name is optional but may be required by some ISPs. B J Click K D B F & ( to get the DNS automatically.
Section 3 - Configuration ( * Click * radio button if your ISP uses a static PPPoE connection. Your ISP will provide you with a username and password. This option is typically used for DSL services. Make sure to remove your PPPoE software from your computer. The software is no longer needed and will not work through a router. B 8) Tick the check box to enable IP Unnumbered on LAN (1-3) * = J interface and NAT on Wireless Interface. & J Enter your PPPoE user name.
Section 3 - Configuration 0 L & & (! < & J Enter a maximum idle time during which the Internet connection is maintained during inactivity. To disable this feature, enable Auto-reconnect. 0< J Maximum Transmission Unit - You may need to change the MTU for optimal performance with your specific ISP. 1492 is the default MTU. Connection 0 ! J Select either ) , 0 , or ! & !.
Section 3 - Configuration Wireless settings for the router may be configured manually or by using a wizard. To use the wizard, click the G ! button and then follow the steps that are described below. To configure the wireless settings manually, click the 0 button. The parameters for this window are described later in this section.
Section 3 - Configuration Click G ! to start wireless setup wizard. Click L to continue. Enter a Wireless Network Name, also known as SSID, in the text box. Click ) & K && ! !# or 0 for the wireless security key, and use the check box to select the desired level of wireless security, WEP, WPA. and then click L to continue. If selecting Manually assign a network key in the previous window, this window will open.
Section 3 - Configuration This window displays a summary of your wireless security settings. Please print this out or record this information in a safe place and then click D to continue. The Router will save the new settings and reboot. Please allow 1-2 minutes for rebooting. When the router has finished rebooting, the opening Wireless Setup window is displayed.
Section 3 - Configuration Click the 0 button to manually configure the wireless Internet setup. To enter this window, make sure at least one SSID is selected in Wireless Network Name Setup ( -> -> 0 & ). To implement Wi-Fi protection, or WCN 2.0, tick the Enable ! checkbox, click either M ( or K ( J B F , and then configure the Wi-Fi settings below.
Section 3 - Configuration 1. To enable WEP, next to 0 ! , select Enable WEP Wireless Security (basic). Select the Authentication method, WEP Encryption, it’s default and the key value. 3. Click D to save your settings.
Section 3 - Configuration 1. To enable Enable WPA/WPA2 Wireless Security (enhanced). Next to % < , select TKIP, AES, or AUTO(TKIP/AES). 3. Next to , E *) , select PSK. 4. Next to , , enter a passphrase. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. Make sure you enter this key exactly the same on all other wireless clients. 5. Click D to save your settings.
Section 3 - Configuration 1. To enable Enable WPA/WPA2 Wireless Security (enhanced). Next to % < , select TKIP, AES, or AUTO(TKIP/AES). 3. Next to , E *) , select EAP. 4. Next to K)B( D ( )!! enter the IP address of your RADIUS server. 5. Next to , enter the port you are using with your RADIUS server. 1812 is the default port. 6. Next to % ! , enter the security key. 7. Click D to save your settings.
Section 3 - Configuration Click the 0 & to add or select SSIDs. Enter wireless network work names (SSIDs) in the field. Tick the check box to select the SSID.
Section 3 - Configuration 8) This section will allow you to change the local network settings of the router and to configure the DHCP settings. K ( Enter the IP address of the router. The default )!! J IP address is 192.168.0.1. If you change the IP address, once you click ) , you will need to enter the new IP address in your browser to get back into the configuration utility. B F = Enter the Subnet Mask. The default subnet mask 0 J is 255.255.255.0.
Section 3 - Configuration BN D DHCP stands for Dynamic Host Control Protocol. The DIR-6 0 has a built-in DHCP server. The DHCP Server will automatically assign an IP address to the computers on the LAN/private network. Be sure to set your computers to be DHCP clients by setting their TCP/IP settings to “Obtain an IP Address Automatically.” When you turn your computers on, they will automatically load the proper TCP/IP settings provided by the DIR-6 .
Section 3 - Configuration < & ! B This section will allow you to configure, update, and maintain the correct time on the internal system clock. J Deselect the ) & % G % B 8 O ( & D check box to be able to see the option. Click the & O & button to make the Router’s time same as your computer. < & Q J Select the Time Zone from the drop-down menu. * = B % Ticking this checkbox enables Daylight Saving D J time.
Section 3 - Configuration This feature allows you to create a list of websites that you want to either allow or deny users access. Select Turn Parental Control Rules OFF, or Turn Parental Control Rules ON and DENY J computers access to ONLY these sites. = K8J Enter the keywords or URLs that you want to block. Any URL with the keyword in it will be blocked. % ! J The schedule of time when the parental control filter will be enabled.
Section 3 - Configuration ! This will allow you to open a single port or a range of ports. K J Check the box to enabled the rule. & J Enter a name for the rule. ( )!! J Enter the IP address of the computer on your local network that you want to allow the incoming service to. E Enter the port or ports that you want to open. If * ! J you want to open one port, enter the same port in both boxes.
Section 3 - Configuration K The Filter Rules allows you to configure IP or MAC address of a network adapter and allow or deny its network access at certain time. 0) E( Enter the MAC or IP address of a network )!! J adapter for a filter rule. B Enter a port or range of ports of TCP or UDP J for the filter rule. < F < J Select a traffic type (TCP, UDP, or Any) that will be used for the filter rule. ) J Use the drop-down menu to select ) or B the network access.
Section 3 - Configuration - B0Q This section will allow you to set up inside and outside firewall. The outside firewall can choose various which part you want to prevernt from. * = 8) Tick to enable the firewall from LAN to WAN. ) J ) Select the WAN Connection you want to set up the firewall. J Tick to enable the firewall from WAN to LAN.
Section 3 - Configuration )!D ! This window allows you to change the behavior of the 802.11g wireless radio from the standard settings. Please be aware that any changes to the factory default settings may adversely affect the behavior of your network. < & J Set the transmit power of the antennas. ? Beacons are packets sent by an Access Point to synchronize D J a wireless network. Specify a value. 100 is the default setting and is recommended.
Section 3 - Configuration 0 ! J Select one of the following: ; :: 2 - Select only if all of your wireless clients are 802.11n. ; :: 0 L ! E=# - Select if you are using both 802.11b and 802.11g wireless clients. ; :: 0 L ! E E=# - Select if you are using a mix of 802.11n, 11g, and 11b wireless clients. ? ! ! %J Select the Channel Width: 0NG - Select if you are not using any 802.11n wireless clients. This is the default setting. ER 0NG ) # - Select if you are using both 802.
Section 3 - Configuration )!D ! This window allows you to change the LAN settings. Please be aware that any changes to the factory default settings may affect the behavior of your network. * = J To use the Universal Plug and Play (UPnP™) feature tick this checkbox. UPNP provides compatibility with networking equipment, software and peripherals. ) You may set the port speed of the WAN port to !J 10Mbps, 100Mbps, or 10/100Mbps Auto.
Section 3 - Configuration K This option allows you to define fixed routes to defined destinations. * = J Tick this checkbox to enable or disable fixed routes to defined destinations. ( F J Use the drop-down menu to choose the WAN or WAN (Physical Port) Interface the IP packet must use to transit out of the Router. Destination: The IP address of the packets that will take this route. Subnet Mask: The subnet of the IP address of the packets that will take this route.
Section 3 - Configuration B D )!& This window will allow you to change the Administrator password. You can also enable Remote Management. )!& Enter a New Password for the administrator login name and !J then retype the new password in the Confirm Password textbox. The administrator can make changes to the settings. * = K & Remote management allows the DIR-6 to be configured 0 & J from the Internet by a web browser.
Section 3 - Configuration D ! K This window allows you to save your configuration file to a hard drive, load configuration settings from a hard drive, and restore the Router’s factory default settings. D Use this option to save the current router 8 N ! configuration settings to a file on the hard disk of the B D J computer you are using. First, click the D button. You will then see a file dialog, where you can select a location and file name for the settings.
Section 3 - Configuration BB The router supports DDNS (Dynamic Domain Name Service). The Dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, allowing access to a specified host from various locations on the Internet. This is enabled to allow remote access to a host by clicking a hyperlinked URL in the form “hostname.dyndns.org”.
Section 3 - Configuration & % This tool is used to verify the physical connectivity on both the LAN and the WAN interfaces. The Ping Test can be used to test the status of the Internet. " = VCT is an advanced feature that integrates a < " <# LAN cable tester on every Ethernet port on the ( F J router. Through the graphical user interface (GUI), VCT can be used to remotely diagnose and report cable faults such as opens, shorts, swaps, and impedance mismatch.
Section 3 - Configuration % ! The Router allows the user the ability to manage schedule rules for various firewall and parental control features on this window. Once you have finished configuring the new schedule rule, click the D button at the top of the window. & J Enter a name for the new schedule rule. B #J Choose the desired day(s), either All Week or Select Days. If the latter is selected, please use the checkboxes directly below to specify the individual days.
Section 3 - Configuration 8 The system log displays chronological event log data specified by the router user. You may also save a simple text file containing the log to your computer. Click the D button and follow the prompts to save the file. D 8 J Click on the D button link on this window to save the log file to your local hard drive. D J click the checkbox to save the log in the log server in the LAN side.
Section 3 - Configuration B D ( F This window displays the current information for the DIR-6 . It will display the LAN, WAN, and Wireless information. If your WAN connection is set up for a Dynamic IP address then a BN K button and a BN K button will be displayed. Use BN K to disconnect from your ISP and use BN K to connect to your ISP. If your WAN connection is set up for PPPoE, a Connect button and a B button will be displayed.
Section 3 - Configuration 8 This window allows you to view a log of activities on the Router. This is especially helpful detecting unauthorized network usage. J View the first page of the log. 8 J View the last page of the log. D J View the previous page. L J View the next page. J Clear the log. 8 8 Click this button to go directly to the Log Settings J window (0 > 8 ).
Section 3 - Configuration The window below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-6 on both the WAN and the LAN ports. The traffic counter will reset if the device is rebooted. ) D The window displays the the source and destination packets passing throught the device.
Section 3 - Configuration The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless client. N Click the desired hyperlink to get more information about how to use the Router.
Section 4 - Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-6 offers the following types of security: % ' +% ;< $ $$ '= % +% ;< $ $$ = %Q +% Q[ $ = % '; @J + ;@ J = % ; @J + ;@ J = % * S WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm.
Section 4 - Security * It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on on the left side.
Section 4 - Security % )S WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The two major improvements over WEP: \# $ # " \# J $ +"J = "J $ \ using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.
Section 4 - Security ) , ! ) , It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on on the left side.
Section 4 - Security )E ) , It is recommended to enable encryption on your wireless Router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on on the left side.
Section 4 - Security )+ ) + ! )E ) K)B( # It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on on the left side.
Section 5 - Connecting to a Wireless Network ! ® 3 Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.
Section 5 - Connecting to a Wireless Network * It is recommended to enable WEP on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select " )D = .
Section 5 - Connecting to a Wireless Network 3. The box will appear. Enter the same WEP key that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WEP settings are correct. The WEP key must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network ) , It is recommended to enable WEP on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WEP key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select " )D = .
Section 5 - Connecting to a Wireless Network 3. The box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) ! " # The DIR-6 supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista. The instructions for setting this up depend on whether you are using Windows Vista to configure the Router or third party software. ( K F When you first set up the Router, Wi-Fi protection is disabled and unconfigured.
Section 6 - Setting Up Wi-Fi Protection (WCN 2.0 in Windows Vista) ! K Once the Router has been configured, you can use the push button on the Router or third party software to invite a newcomer to join your Wi-Fi protected network. For maximum security, the software method is recommended. However, the push button method is ideal if there is no access to a GUI.
Section 7 - Changing the Computer Name and Joining a Workgroup % % & & ! ' The following are step-by-step directions to change the computer name and join a workgroup. 1. Click on . Click on the )!D ! & D-Link DIR-6 User Manual link.
Section 7 - Changing the Computer Name and Joining a Workgroup 3. Click the & & tab in the & window and enter a description of your computer in the textbox. When you are finished, click the Change button. 4. Go to the & & EB & % window and click the radio button next to the Workgroup you want to join. When you are finished, click the 2, button.
Section 8 - Configuring the IP Address in Vista % ( )!! " The following are step-by-step directions to configure the IP address in Windows Vista. 1. Click on . Go to the ! ( window and click the appropriate 8 ) icon. 3. Right-click the 8 ) icon and then select from the drop-down menu.
Section 8 - Configuring the IP Address in Vista 4. Tick the ( " R < E( DR# checkbox in the tab in the 8 ) window. 5. Click the “Use the following IP address” option in the M tab in the 8 ) window and enter the desired IP address in the space offered. Then click the “Use the following DNS server adresses” option on the same tab and enter the desired DNS server information.
Section 8 - Configuring the IP Address in Vista 6. Right-click the 8 ) icon and then select from the drop-down menu. 7. Go to the 8 ) the B button. window and click 8. Confirm your new settings on the window. When you are finished, click the B button.
Section 9 - Setting Up a Connection Wirelessly The following are step-by-step directions to set up a wireless connection. 1. Click on % ! % section. Go to the window and choose the F % & = option. Click the L button.
Section 9 - Setting Up a Connection Wirelessly 3. Click the L button on the window. 4. The following window displays the system progress. 5. This window confirms that you want to create wireless network settings that are savable to a USB flash drive.
Section 9 - Setting Up a Connection Wirelessly 6. Enter a network name on the M D & window in the wizard. Click the L button. 7. Enter a passphrase on the N & & % % window in the wizard. Click the % !D ! link. 8. Select security method on the % !D ! window in the wizard.
Section 9 - Setting Up a Connection Wirelessly 9. Once you have selected the desired security method on the Choose !D ! window in the wizard, click the L button. : Select the desired file and printer sharing option on the Choose ! % window in the wizard. Click the L button. 11.
Section 9 - Setting Up a Connection Wirelessly : Once you have saved your network settings to USB, the % ? ! D window in the wizard opens to indicate the system progress. 13.Once you are finished, the < !! ! D & + F % window in the wizard opens. When you are finished, click the Close button.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) ! * + ) , - ) ,# The following are step-by-step directions to set up a wireless connection. 1. Click on . Click the 0 link in the ! % window.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 3. Right-click the entry and then select EB from the drop-down menu. 4. Select a network to connect to in the to window in the wizard and then click the Connect button. 5. The following wizard window displays the system progress.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 6. Enter the network security key or passphrase for the Router in the textbox provided in the < % % F ! V window in the wizard. When you are finished, click the Connect button. 7. The following F ! ! V window in the wizard is displayed. Choose to save to the network and/or start the new connection automatically.
Section 10 - Connecting to a Secured Wireless Network (WEP, WPA-PSK & WPA2-PSK) 9. Confirm your new settings by calling up the command prompt and then entering the ipconfig command. : To test the new IP address, use the Ping feature of the command prompt.
Section 11 - Connecting to an Unsecured Wireless Network ! The following are step-by-step directions to set up an unsecured wireless connection. 1. Click on . Go to the ! % window and click the 0 link.
Section 11 - Connecting to an Unsecured Wireless Network 3. Right-click the entry and then select EB from the drop-down menu. 4. Select a network to connect to in the to window in the wizard and then click the Connect button. 5. Confirm your desire to connect anyway on the following window.
Section 11 - Connecting to an Unsecured Wireless Network 6. The following wizard window displays the system progress. 7. The following F ! ! V window in the wizard is displayed. Choose to save to the network and/or start the new connection automatically. When you are finished, click the Close button. 8. The successful connection is displayed at the bottom of the Windows start up menu.
Section 11 - Connecting to an Unsecured Wireless Network 9. Confirm your new settings by calling up the command prompt and then entering the ipconfig command. : To test the new IP address, use the Ping feature of the command prompt.
Section 11 - Connecting to an Unsecured Wireless Network % 0) 2 3 8 ! : $# The following are step-by-step directions to configure the network in MAC OS X Snow Leopard (10.6). 1. Click the icon in your Dock to open your System Preferences window. 2. Click the icon in System Preferences menu to view the Network menu.
Section 11 - Connecting to an Unsecured Wireless Network 3. Click *% on the left to see the local network settings. TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. The IP address, its subnet mask and the router’s IP address displays when selecting BN from the ( DR drop-down menu.
Section 11 - Connecting to an Unsecured Wireless Network % 0) 2 3 8 ! : $# The following are step-by-step directions to configure the Wireless in MAC OS X Snow Leopard (10.6). 1. Click the icon in your Dock to open your System Preferences window. 2. Click the icon in System Preferences menu to view the Network menu.
Section 11 - Connecting to an Unsecured Wireless Network 3. Click AirPort on the left to configure the wireless network. 4. Make sure the is 2 . If the Status is Off, click the < ) 2 button to enable AirPort. 5. Click the )!D ! button to see the window. 6. Click the + button to see the window in the next page.
Section 11 - Connecting to an Unsecured Wireless Network 7. Enter the Network Name (SSID) of the Router. 8. Select the Security type of the network from the drop-down list, and security related information below. Click the )!! button to add the wireless network in the Preferred Network list.
Section 11 - Connecting to an Unsecured Wireless Network 9. Click 2, to proceed. 10. 11. Select the & from the drop-down menu. Click the ) button to save the settings.
Section 12 - Troubleshooting < = % This chapter provides solutions to problems that can occur during the installation and operation of the DIR-6 . Read the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have a different operating system, the screenshots on your computer will look similar to the following examples.) : % O ( % = = ! S When entering the IP address of the D-Link router (192.168.0.
Section 12 - Troubleshooting } ~ > > . Double-click the ( 2 Icon. From the tab, click the button to restore the settings to their defaults. $ Connection tab and set the dial-up option to Never Dial a Connection. Click the 8) button. Make sure nothing is checked. Click 2,. )!D ! tab and click the button to restore these settings to their defaults. Click 2, three times.
Section 12 - Troubleshooting V % O ( ! ! D & % % % & S If you are having a problem sending or receiving email, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). J )28 B 8X & 0< F :R To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to.
Section 12 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size.
Appendix A - Wireless Basics ? D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics % S Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network. % B 8 S D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford.
Appendix A - Wireless Basics ) ) # Bluetooth is the industry standard wireless technology used for WPAN. Bluetooth devices in WPAN operate in a range up to 30 feet away. Compared to WLAN the speed and wireless operation range are both less than WLAN, but in return it doesn’t use nearly as much power which makes it ideal for personal devices, such as mobile phones, PDAs, headphones, laptops, speakers, and other devices that operate on batteries.
Appendix A - Wireless Basics % !S Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places is usually called “hotspots”.
Appendix A - Wireless Basics * & ( F 0 ! Place home appliances such as cordless telephones, microwaves, and televisions as far away as possible from the router/access point. This would significantly reduce any interference that the appliances might cause since they operate on same frequency. Don’t let you next-door neighbors or intruders connect to your wireless network. Secure your wireless network by turning on the WPA or WEP security feature on the router.
Appendix B - Networking Basics ? % ( !! After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on > K . In the run box type cmd and click 2,. At the prompt, type ipconfig and press * . This will display the IP address, subnet mask, and the default gateway of your adapter. If the address is 0.0.
Appendix B - Networking Basics ) ( !! If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: : Windows® XP - Click on > > . Windows® 2000 - From the desktop, right-click 0 > Right-click on the 8 ) . which represents your D-Link network adapter and select V Highlight ( < E( # and click . .
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
以下警語適用台灣地區 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用者均不得擅自變更頻率、加大 功率或變更原設計之特性及功能。 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現有干擾現象時,應立即停用, 並改善至無干擾時方得繼續使用。前項合法通信,指依電信法規定作業之無線電通信。低功率射 頻電機須忍受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。