Page 71 / 101 Scroll up to view Page 66 - 70
67
D-Link DIR-412 User Manual
Section 3 - Configuration
Internet Sessions
The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is
a conversation between a program or application on a LAN-side computer and a program or application on a WAN-
side computer.
NAPT Sessions:
NAPT Active
Sessions:
Displays information about the NAPT Sessions
on the router. Including the number of TCP
Sessions, the number of UDP Sessions, and
the combined number TCP and UDP NAPT
Sessions.
Displays the IP address of the local application
and the TCP/UDP packets being sent by
the source IP address for each NAPT Active
Session.
Page 72 / 101
68
D-Link DIR-412 User Manual
Section 3 - Configuration
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless clients.
Wireless
Page 73 / 101
69
D-Link DIR-412 User Manual
Section 3 - Configuration
Support
Page 74 / 101
70
D-Link DIR-412 User Manual
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DIR-412
offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK(Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.
Page 75 / 101
71
D-Link DIR-412 User Manual
Section 4 - Security
Wireless Connection Setup Wizard
To run the security wizard, browse to the Setup page and then click the
Wireless Network Setup Wizard
button.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top