D-Link Router DIR-615 User Manual
Here you can view all the pages of manual D-Link Router DIR-615 User Manual. The D-Link manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 61
61D-Link DIR-615 User Manual Section 3 - Configuration This page displays the current information for the DIR-615. It will display the LAN, WAN (Internet), and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a...
Page 62
6D-Link DIR-615 User Manual Section 3 - Configuration Displays the router’s time and firmware version. Displays the MAC address and the public IP settings for the router. Displays the MAC address and the private (local) IP settings for the router. Displays the wireless MAC address and your wireless settings such as SSID and Channel. Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP)....
Page 63
63D-Link DIR-615 User Manual Section 3 - Configuration Log What to View: View Levels: Apply Log Settings: Refresh: Clear: Email Now: Save Log: You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected. There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log. Will filter the log results so that only the selected...
Page 64
64D-Link DIR-615 User Manual Section 3 - Configuration Stats The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-615 on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
Page 65
65D-Link DIR-615 User Manual Section 3 - Configuration Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN- side computer. Local: NAT: Internet: Protocol: State: The IP address and, where appropriate, port number of the local application. The port number of the LAN-side application as viewed by the...
Page 66
66D-Link DIR-615 User Manual Section 3 - Configuration Dir: Priority: Time Out: The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that...
Page 67
67D-Link DIR-615 User Manual Section 3 - Configuration The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients. Wireless
Page 69
69D-Link DIR-615 User Manual Section 4 - Security Wireless Security This section will show you the different levels of security you can use \ to protect your data from intruders. The DIR-615 offers the following types of security:• WPA2 (Wi-Fi Protected Access 2) • WPA2-PSK(Pre-Shared Key) • WPA (Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key) • WEP (Wired Equivalent Privacy) What is WEP? WEP stands for Wired Equivalent Privacy. It is based on the IEEE 80.11 standard and...
Page 70
70D-Link DIR-615 User Manual Section 4 - Security What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA is based on...