D-Link Router DIR-685 User Manual
Have a look at the manual D-Link Router DIR-685 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

66 D-Link DIR-685 User Manual Section 3 - Configuration Tick the checkbox to enable SPI. SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more states per session. It validates that the traffic passing through the session conforms to the protocol. I f a n a p p l i c a t i o n h a s t r o u b l e w o r k i n g from behind the router, you can expose one computer to the Internet and run the application on that computer. Tick the Enable DMZ Host checkbox if you want to add a computer to your DMZ. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains its IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change. Enable SPI: Enable DMZ Host: DMZ IP Address: SPI / DMZ Host Firewall Settings

67 D-Link DIR-685 User Manual Section 3 - Configuration To enable a Firewall Rule, tick the checkbox next to the corresponding rule. Enter a name for the Firewall Rule. Use the drop-down menu to select the source interface for the Firewall Rule. Use these fields to specify the range of IP Addresses that you want to create the Firewall Rule for. Enter the lowest IP Address of the range in the box at the top and the highest IP Address of the range in the box underneath. Use the drop-down menu to select the protocol for the Firewall Rule (ALL, TCP, UDP, or ICMP). Use the drop-down menu to select the destination interface for the Firewall Rule. Use these fields to specify the range of ports that should be used for the Firewall Rule. Enter the lowest port number of the range in the box at the top and the highest port number of the range in the box underneath. Use the drop-down menu to determine when the Firewall should run. Click the New Schedule button to list the Schedules that have been defined in the Tools > Schedules window (see page 88 for instructions on how to create a New Schedule). Enable checkbox: Name: Interface- Source: IP Address: Protocol: Interface- Destination: Port Range: Schedule: Firewall Settings Firewall Rules

68 D-Link DIR-685 User Manual Section 3 - Configuration To enable a new route, tick the checkbox next to the corresponding route. Select the interface that the IP packet must use to transit out of the router when this route is used. Enter the IP address of packets that will take this route. Enter the netmask of the route, please note that the numbers must match your destination IP address. Enter your next hop gateway to be taken if this route is used. Enable checkbox: Interface: Destination: Subnet Mask: Gateway: Routing The Routing option is an advanced method of customizing specific routes of data through your network.

69 D-Link DIR-685 User Manual Section 3 - Configuration Set the transmit power of the antennas. Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. (Delivery Traffic Indication Message) 1 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. Select Short Preamble or Long Preamble . Clear To Send (CTS) is a mechanism that wireless devices use when the surrounding environment is ‘dirty’ (i.e. many senders and receivers over the same wireless frequency). When the CTS Mode is set to Always the transmitting device will need to send out an RTS (Request To Send), and the intended receiving device needs to send out a CTS (Clear To Send), bef\ ore the actual data can be sent. Setting the CTS Mode to Auto indicates that the router will decide whether or not the CTS mechanism should be used or not, depending on the current environment and data length. Transmit Power: Beacon interval: RTS Threshold:Fragmentation: DTIM interval: Preamble Type: CTS Mode: Advanced Wireless

70 D-Link DIR-685 User Manual Section 3 - Configuration To use the Universal Plug and Play (UPnP™) feature, tick the Enable UPnP b o x . U P n P provides compatibility with networking equipment, software and peripherals. Unticking the box will not allow the DIR-685 to respond to pings. Blocking the Ping may provide some extra security from hackers. Tick the box to allow the WAN port to be “pinged”. You may set the port speed of the WAN/Internet port to 10Mbps, 100Mbps, or auto. Some older cable or DSL modems may require you to set the port speed to 10Mbps. Tick the box to allow multicast traffic to pass through the router from the Internet. UPnP: WAN Ping: WAN Port Speed: Multicast streams: Advanced Network

71 D-Link DIR-685 User Manual Section 3 - Configuration Guest Zone Tick this checkbox to enable the Guest Zone feature. Enter a wireless network name (SSID) that is different from your main wireless network. Select the type of security or encryption you would like to enable for the guest zone. Type the IP Address that the router will use for the Guest Zone network. Type the Subnet Mask that the router will use for the Guest Zone network. Tick this checkbox to prevent guest clients accessing other guest clients in the Guest Zone. Ticking this option only allows guest clients to access the Internet. Tick this checkbox to allow network connectivity between the different zones created. Tick the Enable DHCP Server checkbox to configure the built-in DHCP server to assign IP addresses to computers in the Guest Zone. Specify the range of IP addresses that will be assigned to computers in the Guest Zone in the DHCP IP Address Range fields. Type the last IP octet of the first host in the range in the textbox on the left and the last IP octet of the last host in the range in the textbox on the right. Enable Guest Zone: Wireless Network Name: Security Mode: Router IP Address: Default Subnet Mask: Enable Guest Zone Client Isolation: Enable Routing Between Zones: DHCP Server Settings for Guest Zone: The Guest Zone feature will allow you to create temporary zones that can be used by guests to access the Internet. These zones will be separate from your main wireless network.

72 D-Link DIR-685 User Manual Section 3 - Configuration Tick the Enable DHCP Server checkbox to configure the built-in DHCP server to assign IP addresses to computers in the Guest Zone. Enter the starting and ending IP addresses that will be assigned to devices in the Guest Zone in the DHCP IP Address Range fields. Specify the length of time (in minutes) for the IP address lease in th\ e DHCP Lease Time field. Displays the Host Name, IP Address and the time the DHCP lease will expire for all the DHCP clients in the Guest Zone. DHCP Server Settings for Guest Zone: DHCP Client List for Guest Zone:

73 D-Link DIR-685 User Manual Section 3 - Configuration Wake on LAN Tick the checkbox to enable the Wake on LAN feature. Type a port number to specify the UDP port that the Magic Packet will use when trying to turn on or wake up a computer on your network, Use the drop-down menu to specify the destination interface of the Magic Packet. Enable Wake on LAN: UDP Port: Interface: The Wake on LAN feature allows computers on your network to be turned on\ or woken up remotely.

74 D-Link DIR-685 User Manual Section 3 - Configuration Disk Management This window displays the hard drive information such as size, available space, used space, and format. Click the Format Hard Drive button to format the hard drive. Warning: When formatting your hard drive, all data will be lost. Tick the box to turn off the hard drive after it has been idle for the amount of time (minutes) specified in the Timeout field. Hard Disk Drive Information: Format Setting: Hard Drive Setting:

75 D-Link DIR-685 User Manual Section 3 - Configuration User / Groups User and Group Creation List of All Users Users in Group The DIR-685 supports up to 64 unique users. The users can be added to a group, or individually. The users and groups are created to allow access to specific folders on the DIR-685, via FTP or your local network. This section contains required attributes for a new user or group. Including User Name and Password or Group name. If creating a new user carry out the following steps: • Click the User radio button. • Type in a User Name, Password and Confirm the Password in the relevant fields. If creating a new group carry out the following steps: • Click the Group Radio button. • Type in a Group Name in the Add New Group text box. • Click the Add button to finish creating the group Displays the list of users that you may assign to the selected group. Displays the users that are members of the group selected in the Select Group drop-down menu. To add a new user to the selected group, click the user then click the Add >> button. To remove a user from the group, click the user and then click the