Home > D-Link > Router > D-Link Router DGL-4300 User Manual

D-Link Router DGL-4300 User Manual

Here you can view all the pages of manual D-Link Router DGL-4300 User Manual. The D-Link manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 51

Using the Configuration Interface
51 D-Link Systems, Inc. Refresh Statistics:
Clear Statistics:Refresh:
Clear:
Email Now:
Save Log:
Logs
The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t
enough internal memory for all events, logs of older events are deleted but logs of the latest events
are retained. The Logs option allows you to view the router logs. You can define what types of events
you want to view and the level of the events to view. This...

Page 52

Using the Configuration Interface
52 D-Link Systems, Inc. Sent:
Received:
TX Packets Dropped:
RX Packets Dropped:
Collisions:
Errors:
Sent:
Received:
TX Packets Dropped:
RX Packets Dropped:
Collisions:
Errors:
Sent:
Received:
TX Packets Dropped:
Errors:
LAN Statistics
The number of packets transmitted to the local area network.
The number of packets received from the local area network.
The number of transmit packets dropped on the local area network.
The number of receive packets dropped on the local...

Page 53

Using the Configuration Interface
53 D-Link Systems, Inc.
Appendix
Securing Your Network
1. Change Admin Password
Changing the password to access your new router is the first step in securing your network.  This can
done through the Wizard or on the Admin Page of the Tools tab.  There is no password by default and
hackers will know this when trying to access your network.  Make sure that the password you choose
is not commonly known or something that is easy to guess such as your last name or your pet’s...

Page 54

Using the Configuration Interface
54 D-Link Systems, Inc. 4. Changing the Wireless Network Name (SSID - used for wireless devices only)
It is always a good idea to change the wireless network name (SSID) from the default value.  Leaving
it in the default state is usually a good indication to intruders that all settings (including security) are
probably defaults. This setting identifies your wireless network. Make sure that the name you choose
is not commonly known or something that is easy to guess. Try...

Page 55

Appendix
55 D-Link Systems, Inc.
Glossary
A
Access Control List - ACL.  Database of network devices that are allowed to access resources on the network.
Access Point - AP. Device that allows wireless clients to connect to it and access the network
Ad-hoc network - Peer-to-Peer network between wireless clients
Address Resolution Protocol - ARP. Used to map MAC addresses to IP addresses so that conversions can
be made in both directions.
ADSL - Asymmetric Digital Subscriber Line
Advanced Encryption...

Page 56

Appendix
56 D-Link Systems, Inc.
B
Backward Compatible - The ability for new devices to communicate and interact with older legacy devices to
guarantee interoperability
Bandwidth - The maximum amount of bytes or bits per second that can be transmitted to and from a network
device
Basic Input/Output System – BIOS. A program that the processor of a computer uses to startup the system
once it is turned on
Baud – Data transmission speed
Bit rate – The amount of bits that pass in given amount of time
bit/sec...

Page 57

Appendix
57 D-Link Systems, Inc.
D
Data – Information that has been translated into binary do that it can be processed or moved to another device
Data Encryption Standard – Uses a randomly selected 56-bit key that must be known by both the sender and
the receiver when information is exchanged
Data-Link layer – The second layer of the OSI model.  Controls the movement of data on the physical link of
a network
Database – Organizes information so that it can be managed updated, as well as easily accessed by...

Page 58

Appendix
58 D-Link Systems, Inc.
Dynamic IP address – IP address that is assigned by a DHCP server and that may change.  Cable Internet
providers usually use this method to assign IP addresses to their customers.
E
EAP – Extensible Authentication Protocol
Email – Electronic Mail is a computer-stored message that is transmitted over the Internet
Encryption – Converting data into cyphertext so that it cannot be easily read
Enterprise – Large organizations that use computers
Ethernet – The most widely used...

Page 59

Appendix
59 D-Link Systems, Inc.
Half-duplex – Data cannot be transmitted and received at the same time
Hashing – Transforming a string of characters into a shorter string with a predefined length
Hexadecimal – Characters 0-9 and A-F
HomePNA – Networking over telephone lines
HomeRF – Networking standard that combines 802.11b and DECT (Digital Enhanced Cordless
Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a Frequency Hopping
transmission method
Hop – The action of...

Page 60

Appendix
60 D-Link Systems, Inc.
Intrusion Detection – A type of security that scans a network to detect attacks coming from inside and
outside of the network
IP – Internet Protocol
IP address – A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer
that transmits data on the Internet or on an Intranet
IPsec – Internet Protocol Security
IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we
face of running our of IP...
Start reading D-Link Router DGL-4300 User Manual

Related Manuals for D-Link Router DGL-4300 User Manual

All D-Link manuals