D-Link Router DIR-825 User Manual
Have a look at the manual D-Link Router DIR-825 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
46D-Link DIR-825 User Manual Section 3 - Configuration Enter a name for the inbound filter rule. Select Allow or Deny. Check to enable rule. Enter the starting IP address. Enter 0.0.0.0 if you do not want to specify an IP range. E n t e r t h e e n d i n g I P a d d r e s s . E n t e r 255.255.255.255 if you do not want to specify and IP range. Click the Add button to apply your settings. You must click Save Settings at the top to save the settings. This section will list any rules that are created. You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule. Name: Action: Enable: Remote IP Start: Remote IP End: Add: Inbound Filter Rules List: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features.\ Inbound Filters
47D-Link DIR-825 User Manual Section 3 - Configuration SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. Select one of the following for TCP and UDP ports: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes. Address Restricted - Incoming traffic must match the IP address of the outgoing connection. Address + Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection. Enable this feature to protect your network from certain kinds of “spoofing” attacks. If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Setup > Network Settings page so that the IP address of the DMZ machine does not change. Enable SPI: NAT Endpoint Filtering: Anti-Spoof Check: Enable DMZ: DMZ IP Address: Firewall Settings A firewall protects your network from the outside world. The DIR-825 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
48D-Link DIR-825 User Manual Section 3 - Configuration Enter the IP address of packets that will take this route. Enter the netmask of the route, please note that the octets must match your destination IP address. Enter your next hop gateway to be taken if this route is used. The route metric is a value from 1 to 16 that indicates the cost of using this route. A value 1 is the lowest cost and 15 is the highest cost. Select the interface that the IP packet must use to transit out of the router when this route is used. Destination IP: Netmask: Gateway: Metric: Interface: Routing The Routing option is an advanced method of customizing specific routes of data through your network.
49D-Link DIR-825 User Manual Section 3 - Configuration Set the transmit power of the antennas. Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. Enable this option to prevent associated wireless clients from communica\ ting with each other. WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients. Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. Transmit Power: Beacon Period: RTS Threshold: Fragmentation Threshold: DTIM Interval: WLAN Partition: WMM Function: Short GI: Advanced Wireless Settings 802.11n/g (2.4GHz)
50D-Link DIR-825 User Manual Section 3 - Configuration Advanced Wireless Settings 802.11n/a (5GHz) Set the transmit power of the antennas. Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. Enable this option to prevent associated wireless clients from communica\ ting with each other. WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients. Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. Transmit Power: Beacon Period: RTS Threshold: Fragmentation Threshold: DTIM Interval: WLAN Partition: WMM Function: Short GI:
51D-Link DIR-825 User Manual Section 3 - Configuration Wi-Fi Protected Setup (WPS) Enable the Wi-Fi Protected Setup feature. Locking the wireless security settings prevents the settings from being changed by the Wi-Fi Protected Setup feature of the router. Devices can still be added to the network using Wi-Fi Protected Setup. However, the settings of the network will not change once this option is checked. A PIN is a unique number that can be used to add the router to an existing network or to create a new network. The default PIN may be printed on the bottom of the router. For extra security, a new PIN can be generated. You can restore the default PIN at any time. Only the Administrator (“admin” account) can change or reset the PIN. Shows the current value of the router’s PIN. Restore the default PIN of the router. Create a random number that is a valid PIN. This becomes the router’s PIN. You can then copy this PIN to the user interface of the registrar. Enable: Lock Wireless Security Settings: PIN Settings: Current PIN: Reset PIN to Default: Generate New PIN: Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup” as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering the 8-digit code for the Pin-Code Method. The time reduction in setup and ease of use are quite beneficial, while the highest wireless Security setting of WPA2 is automatically used.
52D-Link DIR-825 User Manual Section 3 - Configuration This Wizard helps you add wireless devices to the wireless network. The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device. If the device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. A “registrar” controls access to the wireless network. A registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup button on the device. The router acts as a registrar for the network, al\ though other devices may act as a registrar as well. Start the wizard. Add Wireless Station: Add Wireless Device Wizard:
53D-Link DIR-825 User Manual Section 3 - ConfigurationUPnP Internet Ping Block Internet Port Speed Multicast Streams To use the Universal Plug and Play (UPnP™) feature click on Enabled. UPNP provides compatibility with networking equipment, software and peripherals. Unchecking the box will not allow the DIR-825 to respond to pings. Blocking the Ping may provide some extra security from hackers. Check the box to allow the Internet port to be “pinged”. Select from the drop-down menu if you would like to apply the Inbound Filter to the WAN ping. Refer to page 46 for more information regarding Inbound Filter. You may set the port speed of the Internet port to 10Mbps, 100Mbps, or auto. Some older cable or DSL modems may require you to set the port speed to 10Mbps. Check the box to allow multicast traffic to pass through the router from the Internet. Enable UPnP: WAN Ping: WAN Ping Inbound Filter: WAN Port Speed: Multicast streams: Advanced Network Settings
54D-Link DIR-825 User Manual Section 3 - Configuration Guest Zone Check to enable the Guest Zone feature. The schedule of time when the Guest Zone will be active. The schedule may be set to Always, which will allow the particular service to always be enabled. You can create your own times in the Tools > Schedules section. Enter a wireless network name (SSID) that is different from your main wireless network. Check to allow network connectivity between the different zones created. Select the type of security or encryption you would like to enable for the guest zone. Enable Guest Zone: Schedule: Wireless Network Name: Enable Routing Between Zones: Security Mode: The Guest Zone feature will allow you to create temporary zones that can be used by guests to access the Internet. These zones will be separate from your main wireless network. You may configure different zones for the 2.4GHz and 5.0GHz wireless bands.
55D-Link DIR-825 User Manual Section 3 - Configuration IPV6 Select Link-Local Only from the drop-down menu. Displays the IPv6 address of the router. My IPv6 Connection: LAN IPv6 Address Settings: Link-Local Connectivity