D-Link Router DGL-4300 User Manual
Here you can view all the pages of manual D-Link Router DGL-4300 User Manual. The D-Link manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 51
Using the Configuration Interface 51 D-Link Systems, Inc. Refresh Statistics: Clear Statistics:Refresh: Clear: Email Now: Save Log: Logs The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This...
Page 52
Using the Configuration Interface 52 D-Link Systems, Inc. Sent: Received: TX Packets Dropped: RX Packets Dropped: Collisions: Errors: Sent: Received: TX Packets Dropped: RX Packets Dropped: Collisions: Errors: Sent: Received: TX Packets Dropped: Errors: LAN Statistics The number of packets transmitted to the local area network. The number of packets received from the local area network. The number of transmit packets dropped on the local area network. The number of receive packets dropped on the local...
Page 53
Using the Configuration Interface 53 D-Link Systems, Inc. Appendix Securing Your Network 1. Change Admin Password Changing the password to access your new router is the first step in securing your network. This can done through the Wizard or on the Admin Page of the Tools tab. There is no password by default and hackers will know this when trying to access your network. Make sure that the password you choose is not commonly known or something that is easy to guess such as your last name or your pet’s...
Page 54
Using the Configuration Interface 54 D-Link Systems, Inc. 4. Changing the Wireless Network Name (SSID - used for wireless devices only) It is always a good idea to change the wireless network name (SSID) from the default value. Leaving it in the default state is usually a good indication to intruders that all settings (including security) are probably defaults. This setting identifies your wireless network. Make sure that the name you choose is not commonly known or something that is easy to guess. Try...
Page 55
Appendix 55 D-Link Systems, Inc. Glossary A Access Control List - ACL. Database of network devices that are allowed to access resources on the network. Access Point - AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network - Peer-to-Peer network between wireless clients Address Resolution Protocol - ARP. Used to map MAC addresses to IP addresses so that conversions can be made in both directions. ADSL - Asymmetric Digital Subscriber Line Advanced Encryption...
Page 56
Appendix 56 D-Link Systems, Inc. B Backward Compatible - The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth - The maximum amount of bytes or bits per second that can be transmitted to and from a network device Basic Input/Output System – BIOS. A program that the processor of a computer uses to startup the system once it is turned on Baud – Data transmission speed Bit rate – The amount of bits that pass in given amount of time bit/sec...
Page 57
Appendix 57 D-Link Systems, Inc. D Data – Information that has been translated into binary do that it can be processed or moved to another device Data Encryption Standard – Uses a randomly selected 56-bit key that must be known by both the sender and the receiver when information is exchanged Data-Link layer – The second layer of the OSI model. Controls the movement of data on the physical link of a network Database – Organizes information so that it can be managed updated, as well as easily accessed by...
Page 58
Appendix 58 D-Link Systems, Inc. Dynamic IP address – IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP addresses to their customers. E EAP – Extensible Authentication Protocol Email – Electronic Mail is a computer-stored message that is transmitted over the Internet Encryption – Converting data into cyphertext so that it cannot be easily read Enterprise – Large organizations that use computers Ethernet – The most widely used...
Page 59
Appendix 59 D-Link Systems, Inc. Half-duplex – Data cannot be transmitted and received at the same time Hashing – Transforming a string of characters into a shorter string with a predefined length Hexadecimal – Characters 0-9 and A-F HomePNA – Networking over telephone lines HomeRF – Networking standard that combines 802.11b and DECT (Digital Enhanced Cordless Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a Frequency Hopping transmission method Hop – The action of...
Page 60
Appendix 60 D-Link Systems, Inc. Intrusion Detection – A type of security that scans a network to detect attacks coming from inside and outside of the network IP – Internet Protocol IP address – A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running our of IP...