D-Link Router DHP-1565 User Manual
Have a look at the manual D-Link Router DHP-1565 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
66 D-Link DHP-1565 User Manual Section 3 - Configuration QoS Engine This option is disabled by default. Enable this option for better performance and experience with online games and other interactive applications, such as VoIP. This option is enabled by default when the QoS Engine option is enabled. This option will allow your router to automatically determine the uplink speed of your Internet connection. This displays the detected uplink speed. The speed at which data can be transferred from the router to your ISP. This is determined by your ISP. ISP’s often define speed as a download/upload pair. For example, 1.5Mbits/284Kbits. Using this example, you would enter 284. Alternatively you can test your uplink speed with a service such as www.dslreports.com. This option is enabled by default. This will allow your router to automatically determine the network priority of running programs. This option is enabled by default so that your router will automatically determine which programs should have network priority. For best performance, use the Automatic Classification option to automatically set the priority for your applications. This option should be enabled when you have a slow Internet uplink. It helps to reduce the impact that large low priority network packets can have on more urgent ones. Enable Traffic Shaping: Automatic Uplink Speed: Measured Uplink Speed: Manual Uplink Speed: Enabled QoS Engine: Automatic Classification: Dynamic Fragmentation: The QoS Engine option helps improve your network gaming performance by prioritizing applications. By default the QoS Engine settings are disabled and application priority is not classified automatically.
67 D-Link DHP-1565 User Manual Section 3 - Configuration A QoS Engine Rule identifies a specific message flow and assigns a priority to that flow. For most applications, automatic classification will be adequate, and specific QoS Engine Rules will not be required. The QoS Engine supports overlaps between rules, where more than one rule can match for a specific message flow. If more than one rule is found to match the rule with the highest priority will be used. Create a name for the rule that is meaningful to you. The priority of the message flow is entered here -- 1 receives the highest priority (most urgent) and 255 receives the lowest priority (least urgent). The protocol used by the messages. The rule applies to a flow of messages whose LAN-side IP address falls within the range set here. The rule applies to a flow of messages whose LAN-side port number is within the range set here. The rule applies to a flow of messages whose WAN-side IP address falls within the range set here. The rule applies to a flow of messages whose WAN-side port number is within the range set here. QoS Engine Rules: Name: Priority: Protocol: Local IP Range: Local Port Range: Remote IP Range: Remote Port Range:
68 D-Link DHP-1565 User Manual Section 3 - Configuration Network Filter Select Turn MAC Filtering OFF, Turn MAC Filtering ON and ALLOW computers listed to access the network , or Turn MAC Filtering ON and DENY computers listed to access the network from the drop-down menu. Enter the MAC address you would like to filter. To find the MAC address on a computer, please refer to the Networking Basics section in this manual. Select a DHCP client from the Computer Name drop down menu and click
69 D-Link DHP-1565 User Manual Section 3 - Configuration Access Control Check the Enable Access Control check box and click the Add Policy button to start the Access Control Wizard. Add Policy: The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games. Click Next to continue with the wizard. Access Control Wizard
70 D-Link DHP-1565 User Manual Section 3 - Configuration Enter a name for the policy and then click Next to continue. Select a schedule (I.E. Always) from the drop-down menu and then click Next to continue. Enter the following information and then click Next to continue. • Address Type - Select IP address, MAC address, or Other Machines. • IP Address - Enter the IP address of the computer you want to apply the rule to. Select the filtering method and then click Next to continue.
71 D-Link DHP-1565 User Manual Section 3 - Configuration Enter the rule: Enable - Check to enable the rule. Name - Enter a name for your rule. Dest IP Start - Enter the starting IP address. Dest IP End - Enter the ending IP address. Protocol - Select the protocol. Dest Port Start - Enter the starting port number. Dest Port End - Enter the ending port number. To enable web logging, click Enable. Click Save to save the access control rule. Once your changes have been saved, you can select Reboot Now or Reboot Later.
72 D-Link DHP-1565 User Manual Section 3 - Configuration Configure Web Filtering: Website URL: Website Filter Select ALLOW computers access to ONLY these sites, or DENY computers access to ONLY these sites from the drop-down menu. Enter the keywords or URLs that you want to allow or block. Website Filters are used to allow you to set up a list of Web sites that can be viewed by multiple users through the network. To use this feature select the appropriate Web Filtering option, enter the domain or website, and click Save Settings. Click the Save Settings button to save any changes made.
73 D-Link DHP-1565 User Manual Section 3 - Configuration Inbound Filter Enter a name for the inbound filter rule. Select Allow or Deny. Check to enable rule. Enter the starting IP address. Enter 0.0.0.0 if you do not want to specify an IP range. Enter the ending IP address. Enter 255.255.255.255 if you do not want to specify and IP range. Click the Add button to apply your settings. Name: Action: Enable: Remote IP Start: Remote IP End: Add: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features.
74 D-Link DHP-1565 User Manual Section 3 - Configuration Check the Enable SPI box to enable the SPI (Stateful Packet Inspection, also known as dynamic packet filtering) feature. Enabling SPI helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. Select one of the following for TCP and UDP ports: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes. Address Restricted - Incoming traffic must match the IP address of the outgoing connection. Address + Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection. Enable this option to provide protection from certain kinds of “spoofing” attacks. Firewall Settings: NAT Endpoint Filtering: Enable Anti-Spoof Checking: Firewall Settings A firewall protects your network from the outside world. The DHP-1565 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
75 D-Link DHP-1565 User Manual Section 3 - Configuration 1. Check the Enable DMZ box. 2. Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication in the DMZ IP address field. To specify an existing DHCP client, use the Computer Name drop-down to select the computer that you want to make a DMZ host. If selecting a computer that is a DHCP client, be sure to make a static reser vation in the Setup > Network Settings page so that the IP address of the DMZ machine does not change. 3. Click the Save Settings button to add the new DMZ host. DMZ Host: IP Address: If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. Carry out the following to create a DMZ host: Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains its IP address automatically using DHCP, be sure to make a static reservation on the System > Network Settings page so that the IP address of the DMZ machine does not change. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.