D-Link Router DIR-857 User Manual
Have a look at the manual D-Link Router DIR-857 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
56 D-Link DIR-857 User Manual Section 3 - Configuration Access Control Click the Add Policy button to start the Access Control Wizard. Add Policy: The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games. Click Next to continue with the wizard. Access Control Wizard
57 D-Link DIR-857 User Manual Section 3 - Configuration Enter a name for the policy and then click Next to continue. Select a schedule (I.E. Always) from the drop-down menu and then click Next to continue. Enter the following information and then click Next to continue. • Address Type - Select IP address, MAC address, or Other Machines. • IP Address - Enter the IP address of the computer you want to apply the rule to.
58 D-Link DIR-857 User Manual Section 3 - Configuration Select the filtering method and then click Next to continue. If you selected Apply Advanced Port Filters , then enter the rule: Enable - Check to enable the rule. Name - Enter a name for your rule. Dest IP Start - Enter the starting IP address. Dest IP End - Enter the ending IP address. Protocol - Select the protocol. Dest Port Start - Enter the starting port number. Dest Port End - Enter the ending port number. To enable web logging, click Enable. Click Save to save the access control rule.
59 D-Link DIR-857 User Manual Section 3 - Configuration Website Filters are used to deny LAN computers from accessing specific web sites by the URL or domain. A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked and click Save Settings. The text to be blocked will appear in the list. To delete the text, click Clear the List Below. Website Filters Select Allow or Deny. Enter the keywords or URLs that you want to allow or deny. Click Save Settings. Configure Website Filter Below: Website URL/Domain:
60 D-Link DIR-857 User Manual Section 3 - Configuration Enter a name for the inbound filter rule. Select Allow or Deny. Check to enable rule. Enter the starting IP address. Enter 0.0.0.0 if you do not want to specify an IP range. Enter the ending IP address. Enter 255.255.255.255 if you do not want to specify and IP range. Click the Add button to add the rule. You must click Save Settings at the top to save the settings. This section will list any rules that are created. You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule. Name: Action: Enable: Source IP Start: Source IP End: Add: Inbound Filter Rules List: The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features. Inbound Filters
61 D-Link DIR-857 User Manual Section 3 - Configuration SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. Select one of the following for TCP and UDP ports: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes. Address Restricted - Incoming traffic must match the IP address of the outgoing connection. Address + Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection. If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change. Enable SPI: NAT Endpoint Filtering: Enable DMZ Host: IP Address: Firewall Settings A firewall protects your network from the outside world. The D-Link DIR-857 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
62 D-Link DIR-857 User Manual Section 3 - Configuration Application Level Gateway Configuration Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT ). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol. Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether your VPN client supports NAT traversal. Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices. If you are having trouble making VoIP calls, try turning this ALG off. PPTP: IPSEC (VPN): RTSP:SIP:
63 D-Link DIR-857 User Manual Section 3 - Configuration Enter the IP address of packets that will take this route. Enter the netmask of the route, please note that the octets must match your destination IP address. Enter your next hop gateway to be taken if this route is used. The route metric is a value from 1 to 16 that indicates the cost of using this route. A value 1 is the lowest cost and 15 is the highest cost. Select the interface that the IP packet must use to transit out of the router when this route is used. Destination IP: Netmask: Gateway: Metric: Interface: Routing The Routing option is an advanced method of customizing specific routes of data through your network.
64 D-Link DIR-857 User Manual Section 3 - Configuration Set the transmit power of the antennas. Beacons are packets sent by a Router to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients. Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. Transmit Power: Beacon Period: RTS Threshold: Fragmentation Threshold: DTIM Interval: WMM Function: Short GI: Advanced Wireless Settings
65 D-Link DIR-857 User Manual Section 3 - Configuration WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable this option if you want to allow WISH to prioritize your traffic. Enable WISH: Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players. HTTP: Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Windows Media Center: When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn’t otherwise recognize, based on the behavior that the streams exhibit. This acts to deprioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. Automatic: WISH Rules: A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used. WISH Settings