Page 51 / 104 Scroll up to view Page 46 - 50
³1
D-Link DIR-300 User Manual
Section 3 - Configuration
Statistics
Active Session
The window below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-300 on both the
WAN and the LAN ports. The traffic counter will reset if the device is rebooted.
The NAPT Active Session table displays a list of all active conversations between WAN computers and LAN computers.
Page 52 / 104
³±
D-Link DIR-300 User Manual
Section 3 - Configuration
Wireless
The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC
address of the connected wireless client.
Page 53 / 104
³3
D-Link DIR-300 User Manual
Section 3 - Configuration
Help
Click the desired hyperlink to get more information about how to use the Router.
Page 54 / 104
³²
D-Link DIR-300 User Manual
Section ² - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-300 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 80±.11 standard and uses the RC² encryption algorithm. WEP
provides security by encrypting data over your wireless network so that it is protected as it is transmitted from one wireless device
to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you
must determine the level of encryption. The type of encryption determines the key length. 1±8-bit encryption requires a longer
key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII
(American Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is provided so you can
enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined
so that you can change keys easily.
Page 55 / 104
³³
D-Link DIR-300 User Manual
Section ² - Security
Configure WEP
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added
overhead.
1.
Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1).
Click
on
Wireless Setup
on the left side.
2.
Next to
Security Mode
, select
Enable WEP Wireless Security (basic)
.
3.
Next to
Authentication
, select either
Shared Key or Open
Open
.
Shared
Key
is recommended as it provides greater security when WEP is
enabled.
4.
Select either
64Bit
or
128Bit
encryption from the drop-down menu
next to
WEP Encryption
.
5.
Next to
Next to
Default Key Type
, select
WEP Key 1
and enter a WEP key that
you create. Make sure you enter this key exactly on all your wireless
devices. You may enter up to four different keys either using
Hex
or
ASCII
.
Hex
is recommended (letters A-F and numbers 0-9 are valid). In
ASCII
all numbers and letters are valid.
6.
Click
Save Settings
to save your settings. If you are configuring the
router with a wireless adapter, you will lose connectivity until you enable WEP on your adapter and enter the same WEP key
as you did on the router.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top