D-Link Router DIR-615 User Manual
Have a look at the manual D-Link Router DIR-615 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
61D-Link DIR-615 User Manual Section 3 - Configuration This page displays the current information for the DIR-615. It will display the LAN, WAN (Internet), and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection. See the following page for more information. Device Information
6D-Link DIR-615 User Manual Section 3 - Configuration Displays the router’s time and firmware version. Displays the MAC address and the public IP settings for the router. Displays the MAC address and the private (local) IP settings for the router. Displays the wireless MAC address and your wireless settings such as SSID and Channel. Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP). Displays the Multicast Group IP Address. General: WAN: LAN: Wireless LAN: LAN Computers: IGMP Multicast Memberships:
63D-Link DIR-615 User Manual Section 3 - Configuration Log What to View: View Levels: Apply Log Settings: Refresh: Clear: Email Now: Save Log: You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected. There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log. Will filter the log results so that only the selected options appear. Updates the log details on the screen so it displays any recent activity. Clears all of the log contents. This option will send a copy of the router log to the e-mail address configured in the Tools > Email Settings screen. This option will save the router to a log file on your computer. The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
64D-Link DIR-615 User Manual Section 3 - Configuration Stats The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-615 on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
65D-Link DIR-615 User Manual Section 3 - Configuration Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN- side computer. Local: NAT: Internet: Protocol: State: The IP address and, where appropriate, port number of the local application. The port number of the LAN-side application as viewed by the WAN-side application. The IP address and, where appropriate, port number of the application on the Internet. The communications protocol used for the conversation. State for sessions that use the TCP protocol: NO: None -- This entry is used as a placeholder for a future connection \ that may occur. SS: SYN Sent -- One of the systems is attempting to start a connection. EST: Established -- the connection is passing data. FW: FIN Wait -- The client system has requested that the connection be s\ topped. CW: Close Wait -- The server system has requested that the connection be\ stopped. TW: Time Wait -- Waiting for a short time while a connection that was in\ FIN Wait is fully closed. LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed. CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted packets still pending. The direction of initiation of the conversation: Out - Initiated from LAN to WAN. In - Initiated from WAN to LAN.
66D-Link DIR-615 User Manual Section 3 - Configuration Dir: Priority: Time Out: The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority. The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection. 300 seconds - UDP connections. 240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established. 7800 seconds - Established or closing TCP connections.
67D-Link DIR-615 User Manual Section 3 - Configuration The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients. Wireless
68D-Link DIR-615 User Manual Section 3 - Configuration Support
69D-Link DIR-615 User Manual Section 4 - Security Wireless Security This section will show you the different levels of security you can use \ to protect your data from intruders. The DIR-615 offers the following types of security:• WPA2 (Wi-Fi Protected Access 2) • WPA2-PSK(Pre-Shared Key) • WPA (Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key) • WEP (Wired Equivalent Privacy) What is WEP? WEP stands for Wired Equivalent Privacy. It is based on the IEEE 80.11 standard and uses the RC4 encryption algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted from one wireless device to another. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 18-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily.
70D-Link DIR-615 User Manual Section 4 - Security What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA is based on 80.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can acces\ s the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. WPA/WPA incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized \ network users can access the network.