D-Link Dir655 B1 Manual
Here you can view all the pages of manual D-Link Dir655 B1 Manual. The D-Link manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 61
57D-Link DIR-655 User Manual Section 3 - Configuration This will allow you to open a single port or a range of ports. Port Forwarding Enter a name for the rule or select an application from the drop-down menu. Select an application and click
Page 62
58D-Link DIR-655 User Manual Section 3 - Configuration Enter a name for the rule. You may select a pre- defined application from the drop-down menu and click
Page 63
59D-Link DIR-655 User Manual Section 3 - Configuration QoS Engine This option is disabled by default. Enable this option for better performance and experience with online games and other interactive applications, such as VoIP. This option should be enabled when you have a slow Internet uplink. It helps to reduce the impact that large low priority network packets can have on more urgent ones. This option is enabled by default when the QoS Engine option is enabled. This option will...
Page 64
60D-Link DIR-655 User Manual Section 3 - Configuration Network Filters S e l e c t Tu r n M A C F i l t e r i n g O f f, a l l o w M A C addresses listed below, or deny MAC addresses listed below from the drop-down menu. Enter the MAC address you would like to filter. To find the MAC address on a computer, please refer to the Networking Basics section in this manual. Select a DHCP client from the drop-down menu and click
Page 65
61D-Link DIR-655 User Manual Section 3 - Configuration Access Control Click the Add Policy button to start the Access Control Wizard. Add Policy: The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games. Click Next to continue with the wizard. Access Control Wizard
Page 66
62D-Link DIR-655 User Manual Section 3 - Configuration Enter a name for the policy and then click Next to continue. Select a schedule (I.E. Always) from the drop-down menu and then click Next to continue. Enter the following information and then click Next to continue. • Address Type - Select IP address, MAC address, or Other Machines. • IP Address - Enter the IP address of the computer you want to apply the rule to.
Page 67
63D-Link DIR-655 User Manual Section 3 - Configuration Select the filtering method and then click Next to continue. Enter the rule: Enable - Check to enable the rule. Name - Enter a name for your rule. Dest IP Start - Enter the starting IP address. Dest IP End - Enter the ending IP address. Protocol - Select the protocol. Dest Port Start - Enter the starting port number. Dest Port End - Enter the ending port number. To enable web logging, click Enable. Click Save to save the access control rule.
Page 68
64D-Link DIR-655 User Manual Section 3 - Configuration Enter the keywords or URLs that you want to block (or allow). Any URL with the keyword in it will be blocked. Website URL/ Domain: Website Filters are used to deny LAN computers from accessing specific web sites by the URL or domain. A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. To use this...
Page 69
65D-Link DIR-655 User Manual Section 3 - Configuration Enter a name for the inbound filter rule. Select Allow or Deny. Check to enable rule. Enter the starting IP address. Enter 0.0.0.0 if you do not want to specify an IP range. Enter the ending IP address. Enter 255.255.255.255 if you do not want to specify and IP range. Click the Save button to apply your settings. You must click Save Settings at the top to save the settings. This section will list any rules that are created. You may click the...
Page 70
66D-Link DIR-655 User Manual Section 3 - Configuration SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. Select one of the following for TCP and UDP ports: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5...