D-Link Router DGL-4300 User Manual
Have a look at the manual D-Link Router DGL-4300 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

Using the Configuration Interface 21 D-Link Systems, Inc. PPPoE WAN Mode A method of connection that requires you to enter a Username and Password (provided by your Internet Service Provider) to gain access to the Internet. The username that you use to login to your Internet connection. Enter the password associated with your username. Retype the password for verification. If your ISP requires a service name, enter it here. Typically PPPoE connections are not always on. The D-Link Router allows you to set the connection mode: Always on: A connection to the Internet is always maintained. On demand: A connection to the Internet is made as needed. Connect Manually: You have to open up the Web-based management interface and click the Connect button manually any time that you wish to connect to the Internet. Defines how long the machine can be idle before the PPPoE connection is disconnected. The Disconnect button will immediately terminate any active connection. Note: These buttons become enabled after the router has been rebooted with the PPPoE mode selected. LAN Your internal network settings are configured based on the IP Address and Subnet Mask assigned in this section. The IP address is also used to access this Web-based management interface. It is recommended that you use the default settings if you do not have an existing network. LAN Settings The IP address of the router on the local area network. The local network settings are based on the address assigned here. The subnet mask of your router on the local area network. Used with multiple routers to broadcast routing information. This option is used if you have multiple routers. IP Address: Default Subnet Mask: RIP Announcement: Gateway Metric:Username: Password: Verify Password: Service Name: Reconnect Mode: Maximum Idle Time: PPPoE Connection: Basic > WAN > PPPoE Basic > LAN

Using the Configuration Interface 22 D-Link Systems, Inc. DHCP The DHCP section is where you configure the built-in DHCP Server to assign IP addresses to the computers and other devices on your local area network. DHCP Settings Once your D-Link Router is properly configured and this option is enabled, the DHCP Server function will assign your network devices the necessary information to connect to the LAN and Internet. This eliminates the need to manually configure each device on your network with IP settings. Note: The devices on your network must have TCP/IP bound to the Ethernet connection with the “DHCP” or “Obtain an IP address automatically” option enabled. This option defines the range of addresses available for the Router to assign to your internal network. If you have any devices using static IP addresses, be sure the addresses do not fall within the range defined here. A Static IP address is one that is entered in manually on the device. Example: Your D-Link Router uses an IP address of 192.168.0.1. You’ve assigned a computer designated as a Web server with a static IP address of 192.168.0.2. You’ve assigned another computer designated as an FTP server with a static IP address of 192.168.0.3. The starting IP address for your DHCP server needs to be 192.168.0.4 or above. The amount of time a computer may have an IP address before it is required to renew the lease. The lease functions just as a lease on an apartment would. The initial lease designates the amount of time before the lease expires. If the tenant wishes to retain the address when the lease expires then a new lease is established. If the lease expires and the address is no longer needed, then another tenant may use the address. Number of Dynamic DHCP Clients In this section, you can see what LAN devices are currently leasing IP addresses. The DHCP Client table displays the number of clients that are receiving an IP address from the router. The computer name, MAC address, and IP address assigned to each computer are displayed here as well. You can Revoke IP addresses in this section. The revoke option allows you to tale away a leased IP address from a client. This feature is useful for freeing up addresses when the client table is full or nearly full. Be sure to only revoke addresses from devices that are no longer needed on the network.DHCP Server Enabled: DHCP IP Address Range: DHCP Lease Time: Basic > DHCP

Using the Configuration Interface 23 D-Link Systems, Inc. Add Static DHCP Client Static DHCP Clients receive the same IP address all the time. This is almost the same as if a device has a static IP address except that it must still actually request an IP address from the D-Link Router. The D-Link Router will provide the device the same IP address all the time. Servers on your network should either use a static IP address or this option. To input the MAC address of your system, enter it in manually or connect to the D-Link Router’s Web-Management interface from the system and click the Copy Your PC’s MAC Address button. A MAC address is usually located on a sticker on the bottom of a network device. The MAC address is comprised of twelve digits. Each pair of hexadecimal digits are usually separated by dashes or colons such as 00-0D-88-11-22-33 or 00:0D:88:11:22:33. If your network device is a computer and the network card is already located inside the computer, you can connect to the D-Link Router from the computer and use the Copy Your PC’s MAC Address option to enter the MAC address. Example: You have an FTP server that you want to share files over the Internet. You can connect to the D-Link Router from the computer designated as the FTP server. 1. Enter a designated IP address somewhere between the Starting IP and Ending IP addresses. 2. Click the Copy Your PC’s MAC Address button and the D-Link Router will detect the MAC address and enter it automatically. 3. The computer name can be entered in for reference but is not required. 4. Click the OK button and then click on the Save Settings button at the top of the page. The IP address will now only be assigned to the designated computer and it will always receive the same IP address as long as it uses the same Ethernet adapter. Note: If you replace the Ethernet adapter in a computer that is using Static DHCP, you will need to Copy the PC’s MAC Address again because every Ethernet adapter has a unique MAC address. The same goes for any network device. If you replace a network device such as a print server, you will need to input the MAC address of the new print server into the Static DHCP configuration. Static DHCP Client List Entries on this list can be enabled/disabled by toggling the Enable checkbox. Entries can be modified by clicking on the paper and pencil icon. To delete an entry, click on the trash can icon. After you’ve completed all modifications or deletions, you must click the Save Settings button at the top of the page to save your changes. The router must reboot before new settings will take effect. You will be prompted to Reboot the Device or Continue. If you need to make additional settings changes, click Continue. If you are finished with your configuration settings, click the Reboot the Device button.

Using the Configuration Interface 24 D-Link Systems, Inc. Wireless The wireless section is used to configure the wireless settings for your D-Link Router. Please note that changes made on this section may also need to be duplicated on your Wireless Client. Basic Wireless Settings This option turns off and on the wireless connection feature of the router. If this is not enabled, you cannot connect using a wireless network adapter. When you are browsing for available wireless networks, this is the name that will appear in the list (unless Visibility Status is set to Invisible, see below). This name is also referred to as the SSID. The Invisible option allows you to hide your wireless network. When this option is set to Visible, your wireless network name is broadcast to anyone within the range of your signal. If you’re not using encryption then they could connect to your network. When Invisible mode is enabled, you must enter the Wireless Network Name (SSID) manually to connect to the network. Select the channel with the clearest signal. By default the transmission rate will automatically select the fastest rate. You have the option of selecting the speed if necessary. If all of your devices can connect in 802.11g Mode then leave the setting at 802.11g only. If you have some devices that are 802.11b than you can change the mode to Mixed. Super G Turbo Modes must use channel 6 for transmission and 802.11 Mode must be set to 802.11g. Super G without Turbo: Performance enhancing features such as Packet Bursting, FastFrames, and Compression. Super G with Static Turbo: Mode is not backwards compatible with non-Turbo (legacy) devices. Static turbo mode is always on and is only enabled when all devices on the wireless network are Super G with Static Turbo enabled. Super G with Dynamic Turbo: Mode is backwards compatible with non-Turbo (legacy) devices. Dynamic Turbo mode is only enabled when all devices on the wireless network are Super G with Dynamic Turbo enabled.Wireless Radio Enabled: Wireless Network Name: Visibility Status: Channel: Transmission Rate: 802.11 Mode: Super G ™ Mode: Basic > Wireless

Using the Configuration Interface 25 D-Link Systems, Inc. Wireless Security Mode To protect your privacy, use the wireless security mode to configure the wireless security features. This device supports three wireless security modes including: WEP, WPA-Personal, and WPA- Enterprise. WEP is the original wireless encryption standard. WPA provides a higher level of security. WPA-Personal does not require an authentication server. The WPA-Enterprise option does require a RADIUS authentication server. WEP A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network. WEP is not as secure as WPA encryption. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily. A default key is selected for use on the network. Example: 64-bit hexadecimal keys are exactly 10 characters in length. (12345678FA is a valid string of 10 characters for 64-bit encryption) 128-bit hexadecimal keys are exactly 26 characters in length. (456FBCDF123400122225271730 is a valid string of 26 characters for 128-bit encryption) 64-bit ASCII keys are exactly 5 characters in length (DMODE is a valid string of 5 characters for 64-bit encryption) 128-bit ASCII keys are exactly 13 characters in length (2002HALOSWIN1 is a valid string of 13 characters for 128-bit encryption)

Using the Configuration Interface 26 D-Link Systems, Inc. WPA-Personal This option uses Wi-Fi Protected Access with a Pre-Shared Key (PSK). The key is entered as a pass-phrase of up to 63 characters in ASCII format at both ends of the wireless connection. The pass-phrase cannot be shorter than 8 characters. The pass-phrase is used to generate session keys that are unique for each wireless client. The encryption algorithm used to secure the data communication. TKIP (Temporal Key Integrity Protocol) provides per packet key generation and is based on WEP. AES (Advanced Encryption Standard) is a very secure block based encryption. The amount of time before the group key used for broadcast and multicast data is changed. WPA-Enterprise This option works with a RADIUS server to authenticate wireless clients. Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through the Gateway. Furthermore, the RADIUS Server may need to be configured to allow this Gateway to authenticate users. The method in which the pre-shared key is changed. The amount of time before the group key used for broadcast and multicast data is changed. Amount of time before a client is required to re-authenticate. The IP address of the authentication server. The port number used to connect to the authentication server. A passphrase that must much with the authentication server. If this is selected then the user will need to connect from the same computer whenever logging into the wireless network. Pre-Shared Key: Cipher Type: Group Key Update Interval: Cipher Type: Group Key Update Interval: Authentication Timeout: RADIUS Server IP Address: RADIUS Server Port: RADIUS Server Shared Secret: MAC Address Authentication:

Using the Configuration Interface 27 D-Link Systems, Inc. Advanced The Advanced options allow you to configure a variety of advanced features including ports, application priority, Internet access, filters, and advanced wireless settings. Virtual Server The Virtual Server option gives Internet users access to services on your LAN. This feature is useful for hosting online services such as FTP, Web, or Game Servers. For each Virtual Server, you define a public port on your router for redirection to an internal LAN IP Address and port. Example: You are hosting a Web Server on a PC that has Private IP Address of 192.168.0.50 and your ISP is blocking Port 80. 1. Name the Virtual Server Rule (ex. Web Server) 2. Enter in the IP Address of the machine on your LAN – 192.168.0.50 3. Enter the Private Port as [80] 4. Enter the Public Port as [8888] 5. Select the Protocol - TCP 6. Ensure the schedule is set to Always 7. Check the Add Rule to add the settings to the Virtual Server List 8. Repeat these steps for each Virtual Server Rule you wish to add. After the list is complete, click Save Settings at the top of the page. With this Virtual Server Rule all Internet traffic on Port 8888 will be redirected to your internal web server on port 80 at IP Address 192.168.0.50. Advanced > Virtual Server

Using the Configuration Interface 28 D-Link Systems, Inc. Add/Edit Virtual Server Name of the virtual server, such as Web Server. The IP address of the system on your internal network that will provide the virtual service, such as 192.168.0.50. Select the protocol used by the service. The port that will be used on your internal network. The port that will be accessed from the Internet. Select a schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools -> Schedules screen and create a new schedule. Saves the new rule or modified existing rule to the Rules list. When you are done editing the settings, you must click the Save Settings button at the top of the page to make the changes effective and permanent. Virtual Servers List Entries on this list can be enabled/disabled by toggling the Enable checkbox. Entries can be modified by clicking on the paper and pencil icon. To delete an entry, click on the trash can icon. After you’ve completed all modifications or deletions, you must click the Save Settings button at the top of the page to save your changes. The router must reboot before new settings will take effect. You will be prompted to Reboot the Device or Continue. If you need to make additional settings changes, click Continue. If you are finished with your configuration settings, click the Reboot the Device button. Virtual Server Rule: IP Address: Protocol: Private Port: Public Port: Schedule: Save:

Using the Configuration Interface 29 D-Link Systems, Inc. Special Applications The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a ‘trigger’ port or port range. Special Applications rules apply to all computers on your internal network. Application Level Gateway (ALG) Configurations Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol. Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether your VPN client supports NAT traversal. Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced -> Virtual Server page if you want to host an FTP server. Allows Microsoft NetMeeting clients to communicate across NAT. Note that if you want your buddies to call you, you should also set up a virtual server for NetMeeting. Refer to the Advanced -> Virtual Server page for information on how to set up a virtual server. Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices. If you are having trouble making VoIP calls, try turning this ALG off. Allows Windows Media Player, using MMS protocol, to receive streaming media from the internet. Allows multiple machines on the LAN to connect to their corporate network using the L2TP protocol. PPTP: IPSec VPN: RTSP: FTP: NetMeeting: SIP: MMS: L2TP: Advanced > Special Applications

Using the Configuration Interface 30 D-Link Systems, Inc. Add/Edit Special Applications Rule The Special Application section is used to open single or multiple ports on your router when the router senses data sent to the Internet on a “trigger” port or port range. Special Applications rules apply to all computers on your internal network. Enter a name for the Special Application Rule, for example Game App, which will help you identify the rule in the future. You can also select from a list of common applications, and the remaining configuration values will be filled in accordingly. Enter the outgoing port range used by your application. Select the outbound protocol used by your application. Enter the port range that you want to open up to Internet traffic. Select the protocol used by the Internet traffic coming back into the router through the opened port range. Select a schedule for when this rule is in effect. If you do not see the schedule you need in the list of schedules, go to the Tools -> Schedules screen and create a new schedule. Saves the new rule or modified existing rule to the Rules list. When you are done editing the settings, you must click the Save Settings button at the top of the page to make the changes effective and permanent. Special Applications Rules List Entries on this list can be enabled/disabled by toggling the Enable checkbox. Entries can be modified by clicking on the paper and pencil icon. To delete an entry, click on the trash can icon. After you’ve completed all modifications or deletions, you must click the Save Settings button at the top of the page to save your changes. The router must reboot before new settings will take effect. You will be prompted to Reboot the Device or Continue. If you need to make additional settings changes, click Continue. If you are finished with your configuration settings, click the Reboot the Device button. Rule Name: Trigger Port Range: Trigger Port Protocol: Input Port Range: Input Port Protocol: Schedule: Save: