Page 41 / 83 Scroll up to view Page 36 - 40
D-L±nk DIR-130 User Manual
Sect±on 3 - Configurat±on
If an application has trouble working from
behind the router, you can expose one
computer to the Internet and run the application
on that computer.
Note:
Placing a computer in the DMZ may
expose that computer to a variety of security
risks. This option is only recommended as a
last resort.
Specify the IP address of the computer on the
LAN that you want to have unrestricted Internet
communication. If this computer obtains its IP
address automatically using DHCP, be sure
to make a static reservation on the
Internet
>
DHCP
page so that the IP address of the DMZ
machine does not change.
The schedule of time when the DMZ will
be enabled. The schedule may be set to
Always, which will allow the DMZ to always be
enabled. You can create your own times in the
Maintenance
>
Schedules
section.
Enable DMZ Host:
DMZ IP Address:
Schedule:
Firewall Settings
A firewall protects your network from the outside work. The D-Link DIR-130 offers a firewall protection such as SPI
(Stateful Packet Inspection) and NAT/PAT (Network Address Translation/Port Address Translation). Sometimes you may
want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you
can enable DMZ (Demilitarized Zone). This option will expose the chose computer completely to the outside world.
DMZ
Page 42 / 83
D-L±nk DIR-130 User Manual
Sect±on 3 - Configurat±on
Enter a name for your Firewall Rule.
Select a schedule from the drop-down menu. In
order to apply a schedule to a Firewall Rule, you
must first define a schedule on the
Maintenance
>
Schedules
page.
This setting controls the direction of traffic. To control
incoming traffic, set the Source Interface to WAN
and the Dest Interface to LAN. To control outgoing
traffic, set the Source Interface to LAN and the Dest
Interface to WAN.
Enter the IP Address Range for both the Source
Interface and Dest Interface. These IP Address
Ranges will be either allowed or denied, depending
on the selected action.
Select a protocol from the drop-down menu. The
protocol that is selected will be either allowed or
denied, depending on the selected action.
Enter a Port Range. The Port Range that is entered
will be either allowed, or denied, depending on the
selected action.
Name:
Schedule:
Source/Dest:
IP Address Range:
Protocol:
Port Range:
Firewall Settings
Up to 75 Firewall Rules can be created to control the incoming and outgoing traffic on your router. For each rule you
can create a name and control the direction of traffic. You can also allow or deny a range of IP Addresses, protocol and
a port range. In order to apply a schedule to a Firewall Rule, you must first define a schedule on the
Maintenance
>
Schedules
page. The first 2 Firewall Rules are default and cannot be changed.
Firewall Rules
Page 43 / 83
D-L±nk DIR-130 User Manual
Sect±on 3 - Configurat±on
Click on the checkbox to enable Universal Plug
and Play (UPnP
). UPnP provides compatibility
with networking equipment, software and
peripherals.
Unchecking the box will not allow the DIR-130
to respond to pings. Blocking pings may provide
some extra security from hackers. Check the box
to allow the Internet port to be “pinged”.
You may set the port speed of the Internet port to
10Mbps
,
100Mbps
, or
Auto
. Some older cable
or DSL modems may require you to set the port
speed to
10Mbps
.
UPnP:
Enable WAN Ping
Respond:
WAN Port Speed:
Advanced Network Settings
Page 44 / 83
D-L±nk DIR-130 User Manual
Sect±on 3 - Configurat±on
Select
WAN
or
WAN_Physical
from the drop
down menu. Only select
WAN_Physical
if your
Internet connection type is
Russian PPPoE
or
Russian PPTP
.
Enter the destination address for the static routing
rule.
Enter the subnet mask for the static routing rule.
Enter the gateway for the static routing rule.
Enter the metric for the static routing rule.
Interface:
Destination
Address:
Subnet Mask:
Gateway:
Metric:
Routing
This section allows you to define static routes for the WAN types of Static IP, Dynamic IP, Russian PPPoE, and Russian
PPTP with ISPs that require these parameters. Up to 50 Static Routing Rules can be defined.
Page 45 / 83
³0
D-L±nk DIR-130 User Manual
Sect±on 3 - Configurat±on
Select this option from the drop-down menu to
configure your local certificates. Enter a name
for the certificate. Click the browse button to look
for the Private Key and the certificate on your
computer.
Select this option from the drop-down menu to
configure the certificates of remote peers. Enter
a name for the certificate. Click the browse button
on your computer to look the Private Key on your
computer.
Select this option from the drop-down menu to
configure Certificate Authority (CA) files to be
used with your router. Enter a name for the CA
file. Click the browse button to look for the CA file
on your computer.
Local Certificate
& Private Key:
Certificate of
Remote Peers:
Certificate
Authorities:
Certificates
This section is used to configure Certificates that are used with an IPSec based VPN. You can configure local certificates
and the certificates of remote peers. Select one of the three options from the drop-down menu:
Local Certificate &
Private key
,
Certificate of Remote Peers
, or
Certificate Authorities
.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top