D-Link Router DGL-4300 User Manual
Have a look at the manual D-Link Router DGL-4300 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Using the Configuration Interface 51 D-Link Systems, Inc. Refresh Statistics: Clear Statistics:Refresh: Clear: Email Now: Save Log: Logs The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility. Log Options You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected. There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log. Will filter the log results so that only the selected options appear. Log Details Updates the log details on the screen so it displays any recent activity. Clears all of the log contents. This option will send a copy of the router log to the email address configured in the Tools > Email screen. This option will save the router to a log file on your computer. Statistics Network Traffic Stats Updates the screen with the latest router statistics. Clears all of the values on the screen. What to View: View Levels: Apply Log Settings Now: Status > Logs
Using the Configuration Interface 52 D-Link Systems, Inc. Sent: Received: TX Packets Dropped: RX Packets Dropped: Collisions: Errors: Sent: Received: TX Packets Dropped: RX Packets Dropped: Collisions: Errors: Sent: Received: TX Packets Dropped: Errors: LAN Statistics The number of packets transmitted to the local area network. The number of packets received from the local area network. The number of transmit packets dropped on the local area network. The number of receive packets dropped on the local area network. The number of collisions on the local area network. The number of errors occuring on the local area network. WAN Statistics The number of packets transmitted to the Internet. The number of packets received from the Internet. The number of transmit packets sent to the WAN port that were dropped. The number of receive packets sent to the WAN port that were dropped. The number of collisions involving packets intended for the WAN port. The number of errors occuring with packets intended for the WAN port. Wireless Statistics The number of packets sent to the wireless network. The number of packets received from the wireless network. The amount of transmit packets dropped. The number of errors relating to packets to/from the wireless network. Active Sessions The Active Session page displays the full details of active sessions to your router.
Using the Configuration Interface 53 D-Link Systems, Inc. Appendix Securing Your Network 1. Change Admin Password Changing the password to access your new router is the first step in securing your network. This can done through the Wizard or on the Admin Page of the Tools tab. There is no password by default and hackers will know this when trying to access your network. Make sure that the password you choose is not commonly known or something that is easy to guess such as your last name or your pet’s name. Try using a combination of letters and numbers to deter intruders from hacking into your network. Your private information should be kept private. 2. Disable DHCP and use Static IP addresses or Use Static DHCP and limit scope to the amount of users on your network. In the event that an intruder manages to gain access to your network, having DHCP enabled makes it easier for the intruder to access other computers on your network. There are two methods for getting around this. One is to disable DHCP and use static IP addressing on all the devices connected to your network. This would mean that the intruder would have to know what IP network your devices are on in order to access them. The second way is to change the scope of the DHCP server to only include enough IP addresses for the devices in your network. You can then use the Static DHCP feature of the router to assign an IP address to each device on your network. Static DHCP still dynamically assigns an IP address to your network devices but only allows for those defined devices to obtain an IP address. 3. Change the default LAN IP address Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There are 3 ranges of IP addresses that have been reserved for use on Private Networks. 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) 192.168.0.0 - 192.168.255.255 (192.168.0.0/16) D-Link routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate IP address lessens the probabilty of an intruders knowing what IP network your devices are on.
Using the Configuration Interface 54 D-Link Systems, Inc. 4. Changing the Wireless Network Name (SSID - used for wireless devices only) It is always a good idea to change the wireless network name (SSID) from the default value. Leaving it in the default state is usually a good indication to intruders that all settings (including security) are probably defaults. This setting identifies your wireless network. Make sure that the name you choose is not commonly known or something that is easy to guess. Try using a combination of letters and numbers to add complexity to it. 5. Set the Visibility Status to Invisible Wireless routers typically broadcast the wireless network name (SSID) to users attempting to connect to a wireless network. By setting the Visibility Status to Invisible, all devices attempting to connect to the router will need to know the wireless network name (SSID) in order to connect. 6. Enable WPA Personal or Enterprise Along with changing the wireless network name and setting the visibility status to invisible, we highly recommended that you enable some sort of encryption feature. There are different methods of securing wireless transmissions, but the most effective is WPA-Personal and WPA-Enterprise. WPA-Personal is easier to configure but does not offer the extensive level of security that WPA Enterprise does. If you have the infrastructure to support WPA Enterprise, we recommend that you use this method. If not, then WPA-Personal will suffice. 7. Set up MAC Filtering Each networking device (router, access point, wireless card, etc.) on a network contains a unique hexadecimal number that identifies that specific product. This number is referred to as a MAC address. MAC filtering allows you to create a list of the MAC address of each device on your network and only allows these specific devices to associate with your network. With this feature enabled, devices attempting to connect to your network with a MAC address that is not in the list you created, will be denied access.
Appendix 55 D-Link Systems, Inc. Glossary A Access Control List - ACL. Database of network devices that are allowed to access resources on the network. Access Point - AP. Device that allows wireless clients to connect to it and access the network Ad-hoc network - Peer-to-Peer network between wireless clients Address Resolution Protocol - ARP. Used to map MAC addresses to IP addresses so that conversions can be made in both directions. ADSL - Asymmetric Digital Subscriber Line Advanced Encryption Standard - AES. Government encryption standard Alphanumeric - Characters A-Z and 0-9 Antenna - Used to transmit and receive RF signals. AppleTalk – A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol – AARP. Used to map the MAC addresses of Apple computers to their AppleTalk network addresses, so that conversions can be made in both directions. Application layer - 7th Layer of the OSI model. Provides services to applications to ensure that they can communicate properly with other applications on a network. ASCII - American Standard Code for Information Interchange. This system of characters is most commonly used for text files Attenuation – The loss in strength of digital an analog signals. The loss is greater when the signal is being transmitted over long distances. Authentication –To provide credentials, like a Password, in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing - APIPA. An IP address that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network
Appendix 56 D-Link Systems, Inc. B Backward Compatible - The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth - The maximum amount of bytes or bits per second that can be transmitted to and from a network device Basic Input/Output System – BIOS. A program that the processor of a computer uses to startup the system once it is turned on Baud – Data transmission speed Bit rate – The amount of bits that pass in given amount of time bit/sec – bits per second BOOTP – Bootstrap Protocol. Allows for computers to be booted up and given an IP address with no user intervention Bottleneck – A time during processes when something causes the process to slowdown or stop all together Broadband – A wide band of frequencies available for transmitting data Broadcast – Transmitting data in all directions at once Browser – A program that allows you to access resources on the web and provides them to you graphically C Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus – A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and consumes less voltage Carrier Sense Multiple Access/Collision Avoidance – CSMA/CA Carrier Sense Multiple Access/Collision Detect – CSMA/CD CAT 5 – Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections Client – A program or user that requests data from a server Collision – When do two devices on the same Ethernet network try and transmit data at the exact same time. Cookie – Information that is stored on the hard drive of your computer that holds your preferences to the site that gave your computer the cookie CSMA/CA – Carrier Sense Multiple Access/Collision Avoidance CSMA/CD – Carrier Sense Multiple Access/Collision Detection
Appendix 57 D-Link Systems, Inc. D Data – Information that has been translated into binary do that it can be processed or moved to another device Data Encryption Standard – Uses a randomly selected 56-bit key that must be known by both the sender and the receiver when information is exchanged Data-Link layer – The second layer of the OSI model. Controls the movement of data on the physical link of a network Database – Organizes information so that it can be managed updated, as well as easily accessed by users or applications. DB-25 – A 25 ping male connector for attaching External modems or RS-232 serial devices DB-9 – A 9 pin connector for RS-232 connections dBd - decibels related to dipole antenna dBi - decibels relative to isotropic radiator dBm - decibels relative to one milliwatt Decrypt – To unscramble an encrypted message back into plain text Default – A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone – DMZ. A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network, but that is not protected by the same security as the Local Network. DHCP – Dynamic Host Configuration Protocol. Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that requests them Digital certificate – An electronic method of providing credentials to a server in order to have access to it or a network Direct Sequence Spread Spectrum – DSSS. Modulation technique used by 802.11b wireless devices DNS – Domain Name System. Translates Domain Names to IP addresses DOCSIS – Data Over Cable Service Interface Specifications. The standard interface for cable modems Domain name – A name that is associated with an IP address Download – To send a request from one computer to another and have the file transmitted back to the requesting computer DSL – Digital Subscriber Line. High bandwidth Internet connection over telephone lines Duplex – Sending and Receiving data transmissions at the sane time Dynamic DNS service – DDNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address. The IP address is updated by either client software running on a computer or by a router that supports DDNS, whenever the IP address changes
Appendix 58 D-Link Systems, Inc. Dynamic IP address – IP address that is assigned by a DHCP server and that may change. Cable Internet providers usually use this method to assign IP addresses to their customers. E EAP – Extensible Authentication Protocol Email – Electronic Mail is a computer-stored message that is transmitted over the Internet Encryption – Converting data into cyphertext so that it cannot be easily read Enterprise – Large organizations that use computers Ethernet – The most widely used technology for Local Area Networks. F Fiber optic – A way of sending data through light impulses over glass or plastic wire or fiber File server – A computer on a network that stores data so that the other computers on the network can all access it File sharing – Allowing data from computers on a network to be accessed by other computers on the network will different levels of access rights Firewall – A device that protects resources of the Local Area Network from unauthorized users outside of the local network Firmware – Programming that is inserted into a hardware device that tells it how to function Fragmentation – Breaking up data into smaller pieces to make it easier to store FTP – File Transfer Protocol. Easiest way to transfer files between computers on the Internet Full-duplex – Sending and Receiving data at the same time G Gain – The amount an amplifier boosts the wireless signal Gateway – A device that connects your network to another, like the internet Gbps – Gigabits per second Gigabit Ethernet – Transmission technology that provides a data rate of 1 billion bits per second Graphical user interface – GUI H H.323 – A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices
Appendix 59 D-Link Systems, Inc. Half-duplex – Data cannot be transmitted and received at the same time Hashing – Transforming a string of characters into a shorter string with a predefined length Hexadecimal – Characters 0-9 and A-F HomePNA – Networking over telephone lines HomeRF – Networking standard that combines 802.11b and DECT (Digital Enhanced Cordless Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a Frequency Hopping transmission method Hop – The action of data packets being transmitted from one router to another Host – Computer on a network HTTP – Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients (web browsers) HTTPS – HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub – A networking device that connects multiple devices together I ICMP – Internet Control Message Protocol IEEE – Institute of Electrical and Electronics Engineers IETF – Internet Engineering Task Force IGMP – Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS – Internet Information Server is a WEB server and FTP server provided by Microsoft IKE – Internet Key Exchange is used to ensure security for VPN connections Infrastructure – In terms of a wireless network, this is when wireless clients use an Access Point to gain access to the network Internet – A system of worldwide networks which use TCP/IP to allow for resources to be accessed from computers around the world Internet Explorer – A World Wide Web browser created and provided by Microsoft Internet Protocol – The method of transferring data from one computer to another on the Internet Internet Protocol Security – IPsec provides security at the packet processing layer of network communication Internet Service Provider – An ISP provides access to the Internet to individuals or companies Interoperability – The ability for products to interact with other products without much customer interaction Intranet – A private network
Appendix 60 D-Link Systems, Inc. Intrusion Detection – A type of security that scans a network to detect attacks coming from inside and outside of the network IP – Internet Protocol IP address – A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer that transmits data on the Internet or on an Intranet IPsec – Internet Protocol Security IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we face of running our of IP version 4 addresses IPX – Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware clients and servers to communicate ISP – Internet Service Provider J Java – A programming language used to create programs and applets for web pages K Kbps – Kilobits per second Kbyte - Kilobyte Kerberos – A method of securing and authenticating requests for services on a network L LAN – Local Area Network Latency – The amount of time that it takes a packet to get from the one point to another on a network. Also referred to as delay LED - Light Emitting Diode Legacy – Older devices or technology Local Area Network – A group of computers in a building that usually access files from a server M MAC address – A unique hardware address for devices on a Local Area Network MDI – Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable MDIX - Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable Megabit - Mb