Page 6 / 145 Scroll up to view Page 1 - 5
6
Features & Benefits
continued
±
Access Control supported
Allows you to assign different access rights for different users.
±
Packet filter supported
Packet Filter
allows you to control access to a network by analyzing the
incoming and outgoing packets and letting them pass or halting them
based on the IP address of the source and destination.
±
Virtual Server supported
Enables you to expose WWW, FTP and other services on your LAN to be
accessible to Internet users.
±
User-Definable Application Sensing Tunnel
You can define the attributes, for instance opening special ports to allow
packets to come through, to support special applications requiring multiple
connections, such as Internet gaming, video conferencing, and Internet
telephony. The DI-804HV can sense the application type and open a multi-
port tunnel for it.
±
DMZ Host supported
Allows a networked computer to be fully exposed to the Internet; this
function is used when the special “application-sensing tunnel feature” is
insufficient to allow an application to function correctly.
Introduction to Broadband
Router Technology
A router is a device that forwards data packets from a source to a destination. Routers
forward data packets using IP addresses and not a MAC address. A router will forward
data from the Internet to a particular computer on your LAN.
The information that resides on the Internet gets moved around using routers. When
you click on a link on a web page, you send a request to a server to show you the next
page. The information that is sent and received from your computer is moved from your
computer to the server using routers. A router also determines the best route that your
information should follow to ensure that the information is delivered properly.
A router controls the amount of data that is sent through your network by eliminating
information that should not be there. This provides security for the computers con-
nected to your router, because computers from the outside cannot access or send
information directly to any computer on your network. The router determines which
computer the information should be forwarded to and sends it. If the information is not
intended for any computer on your network, the data is discarded. This keeps any
unwanted or harmful information from accessing or damaging your network.
Page 7 / 145
7
Introduction to Firewalls
A firewall is a device that sits between your computer and the Internet that prevents
unauthorized access to or from your network. A firewall can be a computer using
firewall software or a special piece of hardware built specifically to act as a firewall. In
most circumstances, a firewall is used to prevent unauthorized Internet users from
accessing private networks or corporate LAN's and Intranets.
A firewall watches all of the information moving to and from your network and analyzes
each piece of data. Each piece of data is checked against a set of criteria that the
administrator configures. If any data does not meet the criteria, that data is blocked
and discarded. If the data meets the criteria, the data is passed through. This method
is called packet filtering.
A firewall can also run specific security functions based on the type of application or
type of port that is being used. For example, a firewall can be configured to work with
an FTP or Telnet server. Or a firewall can be configured to work with specific UDP or
TCP ports to allow certain applications or games to work properly over the Internet.
Introduction to Local Area Networking
Local Area Networking (LAN) is the term used when connecting several computers
together over a small area such as a building or group of buildings. LAN's can be
connected over large areas. A collection of LAN's connected over a large area is called
a Wide Area Network (WAN).
A LAN consists of multiple computers connected to each other. There are many types
of media that can connect computers together. The most common media is CAT5
cable (UTP or STP twisted pair wire.) Each computer must have a Network Interface
Card (NIC), which communicates the data between computers. A NIC is usually a
10Mbps network card, or 10/100Mbps network card, or a wireless network card.
Wireless Local Area Networks (WLANs) do not use wires; instead they communicate
over radio waves.
Most networks use hardware devices such as hubs or switches that each cable can be
connected to in order to continue the connection between computers. A hub simply
takes any data arriving through each port and forwards the data to all other ports. A
switch is more sophisticated, in that a switch can determine the destination port for a
specific piece of data.
A switch minimizes network traffic overhead and speeds up the
communication over a network.
Networks take some time in order to plan and implement correctly. There are many
ways to configure your network.
You may want to take some time to determine the
best network set-up for your needs.
Page 8 / 145
8
Introduction to Virtual Private Networking
Virtual Private Networking (VPN) uses a publicly wired network (the Internet) to se-
curely connect two different networks as if they were the same network. For example,
an employee can access a corporate network from home using VPN, allowing the
employee to access files, databases, and other networked resources. Here are several
different implementations of VPN that can be used.
Point-to-Point Tunneling Protocol (PPTP)
PPTP uses proprietary means of connecting two private networks over the Internet.
PPTP is a way of securing the information that is communicated between networks.
PPTP secures information by encrypting the data inside of a packet.
IP Security (IPSec)
IPSec provides a more secure network-to-network connection across the Internet or a
Wide Area Network (WAN). IPSec encrypts all communication between the client and
server whereas PPTP only encrypts the data packets.
Both of these VPN implementations are used because there is not a standard for VPN
server software. Because of this, each ISP or business can implement its own VPN
network making interoperability a challenge.
Page 9 / 145
9
LEDS
LED
stands for
L
ight-
E
mitting
D
iode.
The
DI-804HV
has the following LEDs
as described below:
LED
LED Activity
Power
A steady light indicates
a connection to a power source
a power source
M2 LED
Lights up when the device has an Internet
connection
WAN
A solid light indicates connection on the
WAN port.
This LED blinks during data
transmission
COM
A solid light indicates a connection to an
external dial-up analog modem
Flashes once per second to indicate an
active system
LOCAL
NETWORK
(Ports 1-4)
A solid light indicates a connection to an
Ethernet-enabled computer on ports 1-4.
This
LED blinks during data transmission
M1 LED
Page 10 / 145
10
For a typical network setup in a home or small office
(as shown above)
,
please do the following:
4
5
Getting Started
For additional information
about setting up a network,
see:
Networking Basics
Using the Configuration
Menu
Consult with your Cable or DSL provider for proper installation of the modem.
1
3
2
You will need
broadband Internet access (a Cable or DSL subscription line into
your home or office).
Connect the Cable or DSL modem to the DI-804HV wireless broadband router (
see
the Quick Installation Guide included with the DI-804HV.
)
If you are connecting a desktop computer to your network and you need an Ethernet
connection, you can install the D-Link
DFE-530TX+
Ethernet adapter into an
available PCI slot.
(See the Quick Installation Guide included with the DFE-530TX+.)
If you are connecting a laptop computer to your network, install the drivers for the
Ethernet Cardbus adapter (e.g., D-Link DFE-690TXD) into a laptop computer.(See
the Quick Installation Guide included with the DFE-690TXD.)
6
You may connect an analog modem (optional) to function as a backup to the DI-
804HV. To use a backup modem, you must have dial-up service.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top