D-Link Router DIR-825 User Manual
Have a look at the manual D-Link Router DIR-825 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
76D-Link DIR-825 User Manual Section 3 - Configuration Enter a name for your new schedule. Select a day, a range of days, or All Week to include every day. Check All Day - 24hrs or enter a start and end time for your schedule. Click Save to save your schedule. You must click Save Settings at the top for your schedules to go into effect. The list of schedules will be listed here. Click the Edit icon to make changes or click the Delete icon to remove the schedule. Name: Days: Time: Save: Schedule Rules List: Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
77D-Link DIR-825 User Manual Section 3 - Configuration This page displays the current information for the DIR-825. It will display the LAN, WAN (Internet), and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection. Displays the router’s time and firmware version. Displays the MAC address and the public IP settings for the router. Displays the MAC address and the private (local) IP settings for the router. Displays the wireless MAC address and your wireless settings such as SSID and Channel. Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP). General: WAN: LAN: Wireless LAN: LAN Computers: Device Information
78D-Link DIR-825 User Manual Section 3 - Configuration Log What to View: View Levels: Apply Log Settings: Refresh: Clear: Email Now: Save Log: You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected. There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log. Will filter the log results so that only the selected options appear. Updates the log details on the screen so it displays any recent activity. Clears all of the log contents. This option will send a copy of the router log to the email address configured in the Tools > Email Settings screen. This option will save the router to a log file on your computer. The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
79D-Link DIR-825 User Manual Section 3 - Configuration Statistics The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-825 on both the Internet, LAN ports and both the 802.11n/g (2.4GHz) and 802.11n/a (5GHz) wireless bands. The traffic counter will reset if the device is rebooted.
80D-Link DIR-825 User Manual Section 3 - Configuration Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN- side computer.
81D-Link DIR-825 User Manual Section 3 - Configuration The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients. Wireless
82D-Link DIR-825 User Manual Section 3 - Configuration Support
83D-Link DIR-825 User Manual Section 4 - Security Wireless Security This section will show you the different levels of security you can use \ to protect your data from intruders. The DIR-825 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA2-PSK (Pre-Shared Key) • WPA (Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key) What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can acces\ s the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized \ network users can access the network.
84D-Link DIR-825 User Manual Section 4 - Security Wireless Security Setup Wizard To run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard. Check the Manually set 5GHz band Network Name... box to manually set your desired wireless network name for the 5GHz band. Type your desired wireless network name (SSID). Automatically: Select this option to automatically generate the router’s network key and click Next. Manually: Select this option to manually enter your network key and click Next.
85D-Link DIR-825 User Manual Section 4 - Security If you selected Automatically, the summary window will display your settings. Write down the security key and enter this on your wireless clients. Click Save to save your settings. If you selected Manually, the following screen will appear.