Page 41 / 83 Scroll up to view Page 36 - 40
³µ
D-L±nk DIR-451 User Manual
Sect±on ³ - Configurat±on
Device Information
This page displays the current information for the DIR-451. It will display the LAN, WAN, and Wireless information.
Displays the MAC address and the private
(local) IP settings for the router.
Displays the MAC address and the public IP
settings for the router.
Displays the wireless MAC address and your
wireless settings such as SSID, Channel, and
Encryption type.
LAN:
WAN:
Wireless:
Page 42 / 83
³¶
D-L±nk DIR-451 User Manual
Sect±on ³ - Configurat±on
Log
First Page:
Last Page:
Previous:
Next:
Clear:
View the first page of the log.
View the last page of the log.
View the previous page.
View the next page.
Clear the log.
Page 43 / 83
³·
D-L±nk DIR-451 User Manual
Sect±on ³ - Configurat±on
Stats
Wireless Stats
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-451 on
both the WAN and the LAN ports. The traffic counter will reset if the device is rebooted.
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless client.
Page 44 / 83
40
D-L±nk DIR-451 User Manual
Sect±on ³ - Configurat±on
Support
Page 45 / 83
41
D-L±nk DIR-451 User Manual
Sect±on 4 - Secur±ty
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-451 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption
requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format.
ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX
for use over the network. Four keys can be defined so that you can change keys easily.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top