Section 3 - Configuration Website Filters Website Filters are used to deny LAN computers from accessing specific web sites by the URL or domain. A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked and click Save Settings. The text to be blocked will appear in the list.
Section 3 - Configuration Inbound Filters The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features. Name: Enter a name for the inbound filter rule. Action: Select Allow or Deny. Enable: Check to enable rule. Source IP Start: Enter the starting IP address.
Section 3 - Configuration Firewall Settings A firewall protects your network from the outside world. The D-Link DIR-652 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
Section 3 - Configuration Application Level Gateway Configuration Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. PPTP: Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
Section 3 - Configuration Routing The Routing option is an advanced method of customizing specific routes of data through your network. Destination IP: Enter the IP address of packets that will take this route. Netmask: Enter the netmask of the route, please note that the octets must match your destination IP address. Gateway: Enter your next hop gateway to be taken if this route is used. Metric: The route metric is a value from 1 to 16 that indicates the cost of using this route.
Section 3 - Configuration Advanced Wireless Settings Transmit Power: Set the transmit power of the antennas. Beacon Period: Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. RTS Threshold: This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made.
Section 3 - Configuration Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup” as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering the 8-digit code for the Pin-Code Method.
Section 3 - Configuration Advanced Network Settings UPnP Settings: To use the Universal Plug and Play (UPnP™) feature click on Enabled. UPNP provides compatibility with networking equipment, software and peripherals. PPPoE Pass Through: Check PPPoe Pass Through to allow PPPoE authentication to the LAN Clients as an authenticating point. WAN Ping: Unchecking the box will not allow the DIR-652 to respond to pings. Blocking the Ping may provide some extra security from hackers.
Section 3 - Configuration Guest Zone The Guest Zone feature will allow you to create temporary zones that can be used by guests to access the Internet. These zones will be separate from your main wireless network. Enable Guest Zone: Check to enable the Guest Zone feature. Schedule: The schedule of time when the Guest Zone will be active. The schedule may be set to Always, which will allow the particular service to always be enabled. You can create your own times in the Tools > Schedules section.
Section 3 - Configuration IPv6 Firewall This section may be used to allow or deny traffic from passing through the device. It works the same way as IP Filters with additional settings. Users can create more detailed rules for the device.
Section 3 - Configuration IPv6 Routing This page allows you to specify custom routes that determine how data is moved around your network.
Section 3 - Configuration Administrator Settings This page will allow you to change the Administrator and User passwords. You can also enable Remote Management. There are two accounts that can access the management interface through the web browser. The accounts are admin and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot make any changes. Only the admin account has the ability to change both admin and user account passwords.
Section 3 - Configuration Time Settings The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also be configured to automatically adjust the time when needed. Time Zone: Select the Time Zone from the drop-down menu.
Section 3 - Configuration SysLog The Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs to a SysLog server on your network. Enable Logging to Check this box to send the router logs to a SysLog Server. SysLog Server: SysLog Server IP The address of the SysLog server that will be used to send Address: the logs. You may also select your computer from the drop-down menu (only if receiving an IP address from the router via DHCP).
Section 3 - Configuration Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Email When this option is enabled, router activity logs are e-mailed to Notification: a designated email address. From Email Address: This email address will appear as the sender when you receive a log file or firmware upgrade notification via email. To Email Address: Enter the email address where you want the email sent.
Section 3 - Configuration System Settings Save Settings to Use this option to save the current router configuration Local Hard Drive: settings to a file on the hard disk of the computer you are using. First, click the Save button. You will then see a file dialog, where you can select a location and file name for the settings. Load Settings Use this option to load previously saved router configuration from Local Hard settings.
Section 3 - Configuration Update Firmware You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the D-Link support site.
Section 3 - Configuration DDNS The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis. com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is.
Section 3 - Configuration System Check Ping Test: The Ping Test is used to send Ping packets to test if a computer is on the Internet. Enter the IP Address that you wish to Ping, and click Ping. Ping Results: The results of your ping attempts will be displayed here.
Section 3 - Configuration Schedules Name: Enter a name for your new schedule. Days: Select a day, a range of days, or All Week to include every day. Time: Check All Day - 24hrs or enter a start and end time for your schedule. Save: Click Save to save your schedule. You must click Save Settings at the top for your schedules to go into effect. Schedule Rules List: The list of schedules will be listed here. Click the Edit icon to make changes or click the Delete icon to remove the schedule.
Section 3 - Configuration Device Information This page displays the current information for the DIR-652. It will display the LAN, WAN (Internet), and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed.
Section 3 - Configuration Log The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view.
Section 3 - Configuration Stats The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-652 on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
Section 3 - Configuration Wireless The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients.
Section 3 - Configuration IPv6 The IPv6 page displays a summary of the Router’s IPv6 settings and lists the IPv6 address and host name of any IPv6 clients. In the IPv6 Connection Information section, more information about the IPv6 connection will be displayed. Information like the connection type, gateway address, Link-Local address, DNS Servers, and more. In the LAN IPv6 Computers section, a list of actively connected LAN IPv6 computers will be displayed.
Section 3 - Configuration Support D-Link DIR-652 User Manual 82
Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-652 offers the following types of security: • WPA2™ (Wi-Fi Protected Access 2) • WPA™ (Wi-Fi Protected Access) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
Section 4 - Security Wireless Security Setup Wizard To run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard. Click Next to continue.
Section 4 - Security The following screen will show you your Pre-Shared Key to enter on your wireless clients. Click Save to finish the Security Wizard. If you selected WPA-Enterprise, the RADIUS information will be displayed. Click Save to finish the Security Wizard.
Section 4 - Security Configure WPA-Personal (PSK) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2.
Section 4 - Security Configure WPA-Enterprise (RADIUS) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2.
Section 4 - Security 10. Click Advanced to enter settings for a secondary RADIUS Server. 11. Click Apply Settings to save your settings.
Section 4 - Security Using Windows® 7 and WPS for Wireless Configuration The following steps allow you to configure your DIR-652 wireless network settings using Windows® 7 through WPS. 1. Click the Start button and select Computer from the Start menu. 2. Click the Network option.
Section 4 - Security 3. Double-click the DIR-652 router. DIR-652 4. Input the WPS PIN number (displayed in the Advanced > Wi-Fi Protected Setup section in the Router’s Web UI) and click Next.
Section 4 - Security 5. Type a name for your wireless network. 6. To configure advanced settings, click the icon. Click Next to continue.
Section 4 - Security 7. The following window will appear while the Router is being configured. Wait for the configuration to complete. 8. After configuration is complete, a window will appear that your wireless network has been set up successfully. Make a note of the security key as you may need to provide this security key when adding an older wireless device to the network in the future. Click Close to complete WPS setup.
Section 4 - Security Connect to a Wireless Network Using Windows® 7 It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Click on the wireless icon in your system tray (lower-right corner). 2. The utility will display any available wireless networks in your area.
Section 4 - Security 3. Highlight the wireless network (SSID) you would like to connect to and click the Connect button. If you get a good signal but cannot access the Internet, check your TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. 4. The following window appears while your computer tries to connect to the router.
Section 4 - Security 5. Enter the same security key or passphrase that is on your router and click Ok. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Using Windows Vista® Windows Vista users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows Vista utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility.
Section 5 - Connecting to a Wireless Network Configure Wireless Security It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Open the Windows Vista® Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network. 2.
Section 5 - Connecting to a Wireless Network 3. Enter the same security key or passphrase that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
Section 5 - Connecting to a Wireless Network Using Windows® XP Windows XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows XP utility as seen below.
Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable encryption on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the passphrase being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2.
Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router.
Section 6 - Troubleshooting Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR-652. Read the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have a different operating system, the screenshots on your computer will look similar to the following examples.) 1. Why can’t I access the web-based configuration utility? When entering the IP address of the D-Link router (192.168.0.
Section 6 - Troubleshooting • Configure your Internet settings: • Go to Start > Settings > Control Panel. Double-click the Internet Options Icon. From the Security tab, click the button to restore the settings to their defaults. • Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings button. Make sure nothing is checked. Click OK. • Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three times.
Section 6 - Troubleshooting 3. Why can’t I connect to certain sites or send and receive emails when connecting through my router? If you are having a problem sending or receiving email, or connecting to secure sites such as eBay, banking sites, and Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc). Note: AOL DSL+ users must use MTU of 1400. To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to.
Section 6 - Troubleshooting You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480). Once you find your MTU, you can now configure your router with the proper MTU size.
Appendix A - Wireless Basics Wireless Basics D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.
Appendix A - Wireless Basics How does wireless work? Wireless works similar to how cordless phone work, through radio signals to transmit data from one point A to point B. But wireless technology has restrictions as to how you can access the network. You must be within the wireless network range area to be able to connect your computer. There are two different types of wireless networks: Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN).
Appendix A - Wireless Basics Where is wireless used? Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless connection in public places is usually called “hotspots”.
Appendix A - Wireless Basics Wireless Modes There are basically two modes of networking: • Infrastructure – All wireless clients will connect to an access point or wireless router. • Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more DIR-652 wireless network Cardbus adapters. An Infrastructure network contains an Access Point or wireless router.
Appendix B - Networking Basics Networking Basics Check your IP address After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below. Click on Start > Run. In the run box type cmd and click OK. (Windows Vista® users type cmd in the Start Search box.) At the prompt, type ipconfig and press Enter.
Appendix B - Networking Basics Statically Assign an IP address If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below: Step 1 Windows® 7 - Click on Start > Control Panel > Network and Internet > Network and Sharing Center. Windows Vista® - Click on Start > Control Panel > Network and Internet > Network and Sharing Center > Manage Network Connections. Windows XP - Click on Start > Control Panel > Network Connections.
Appendix C - Technical Specifications Technical Specifications Standards • IEEE 802.11n • IEEE 802.11g • IEEE 802.3 • IEEE 802.3u • IEEE 802.3ab Security • WPA-Personal • WPA2-Personal • WPA-Enterprise • WPA2-Enterprise Wireless Signal Rates* IEEE 802.11n 2.4GHz(HT20/40): • 144.4Mbps (300) • 130Mbps (270) • 115.6Mbps (240) • 86.7Mbps (180) • 72.2Mbps (150) • 65Mbps (135) • 57.8Mbps (120) • 43.3Mbps (90) • 28.9Mbps (60) • 21.7Mbps (45) •14.4Mbps (30) • 7.2Mbps (15) IEEE 802.
Appendix E - Warranty Trademarks: D-Link is a registered trademark of D-Link Corporation/D-Link Systems, Inc. Other trademarks or registered trademarks are the property of their respective owners. Copyright Statement: No part of this publication or documentation accompanying this product may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from D-Link Corporation/D-Link Systems, Inc.
Appendix E - Warranty IMPORTANT NOTICE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.