Page 6 / 49 Scroll up to view Page 1 - 5
6
prevent unauthorized Internet users from accessing private networks or
corporate LAN’s and Intranets.
A firewall watches all of the information moving to and from your
network and analyzes each piece of data. Each piece of data is checked
against a set of criteria that the administrator configures. If any data does not
meet the criteria, that data is blocked and discarded. If the data meets
the
criteria, the data is passed through. This method is called packet filtering.
A firewall can also run specific security functions based on the type of
application or type of port that is being used. For example, a firewall can be
configured to work with an FTP or Telnet server. Or a firewall can be
configured to work with specific UDP or TCP ports to allow certain
applications or games to work properly over the Internet.
Introduction to Local Area Networking
Local Area Networking (LAN) is the term used when connecting
several computers together over a small area such as a building or group of
buildings. LAN’s can be connected over large areas. A collection of LAN’s
connected over a large area is called a Wide Area Network (WAN).
A LAN consists of multiple computers connected to each other. There
are many types of media that can connect computers together. The most
common media is CAT5 cable (UTP or STP twisted pair wire.) On the other
hand, wireless networks do not use wires; instead they communicate over
radio waves. Each computer must have a Network Interface Card (NIC),
which communicates the data between computers. A NIC is usually a
10Mbps network card, or 10/100Mbps network card, or a wireless network
card.
Most networks use hardware devices such as hubs or switches that
each cable can be connected to in order to continue the connection between
computers. A hub simply takes any data arriving through each port and
forwards the data to all other ports. A switch is more sophisticated, in that a
switch can determine the destination port for a specific piece of data.
A
switch minimizes network traffic overhead and speeds up the communication
over a network.
Networks take some time in order to plan and implement correctly.
There are many ways to configure your network.
You may want to take
some time to determine the best network set-up for your needs.
Introduction to Virtual Private Networking
Page 7 / 49
Virtual Private Networking (VPN) uses a publicly wired network (the
Internet) to securely connect two different networks as if they were the same
network. For example, an employee can access the corporate network from
home using VPN, allowing the employee to access files and printers. Here
are several different implementations of VPN that can be used.
Point-to-Point Tunneling Protocol (PPTP)
PPTP uses proprietary means of connecting two private networks over the
Internet. PPTP is a way of securing the information that is communicated
between networks. PPTP secures information by encrypting the data inside
of a packet
.
IP Security (IPSec)
IPSec provides a more secure network-to-network connection across the
Internet or a Wide Area Network (WAN). IPSec encrypts all communication
between the client and server whereas PPTP only encrypts the data packets.
Both of these VPN implementations are used because there is not a
standard for VPN server software. Because of this, each ISP or business
can implement its own VPN network making interoperability a challenge.
LEDS
WAN & LAN
Ethernet port indicators, Green. The LED flickers when the
LAN or WAN port is sending or receiving data.
Link/Act.
Link status indicators, Green. The LED flickers when the
corresponding port is sending or receiving data
Page 8 / 49
8
CONNECTIONS
Reset
LAN ports (1-4)
WAN port
Power
jack
Getting Started
The
Infrastructure Network
example shown contains the following D-Link
network devices:
Express Ethernetwork
TM
Broadband Router -
D-Link DI-604
A laptop computer with an Ethernet adapter -
D-Link DFE-670TXD
A desktop computer with an Ethernet adapter -
D-Link DFE-530TX+
A Cable modem -
D-Link DCM-200
Page 9 / 49
Using the Configuration Wizard
The DI-604 provides Web based configuration. You can configure your
DI-604 through your Netscape Communicator or Internet Explorer
browser in MS Windows, Macintosh or UNIX based platforms.
Activate your browser. Then type the IP address of the DI-604 into the
Location
(for Netscape) or
Address
(for IE) field and press “
Enter
.” For
example:
.
(The IP Address shown in the example above is the default setting. If you have changed the
IP Address of the DI-604 to conform to a network, then input that IP Address in the web
browser, instead of the default IP Address shown.)
This screen will appear.
Click
Run Wizard
.
The
Setup Wizard
screen
will appear. Follow the
Wizard step by step to
quickly configure the
DI-604.
Click
Next
Open the web browser
Type in the
IP Address
of
the DI-604
Type
admin
in the
User Name
field
(lower case)
Leave the
Password
blank
Click
OK
admin
Page 10 / 49
10
It is recommended that
you change the admin
password for security
purposes. Enter in your
new password. Enter it in
a second time for
verification.
Click Next
In the window below, select the method you use to connect to the Internet.
This is called the WAN connection or WAN Type.
Static IP Address:
Select this option to
manually input the IP
address that your ISP
assigned to you.
(
Please see
Assigning
a Static IP Address
in
the
Troubleshooting
section of this manual
.)
Dynamic IP Address:
(e.g., Cable users)
Select this option to obtain an IP address automatically from your ISP.
Please see Dynamic IP Address section.
Dynamic IP Address with Road Runner Session Management:
(e.g.,
Telstra BigPond users)
Choose this option if it is required by your ISP
PPP over Ethernet (PPPoE)
:
(e.g., DSL users) Select this option if your ISP
requires the use of PPPoE to connect to their services.
Please see PPPoE
section.
PPTP:
Select this option if your ISP requires it
Once you have made the appropriate selection, click
Next
.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top