Page 51 / 97
Scroll up to view Page 46 - 50
51
D-Link DIR-600 User Manual
Section 3 - Con±guration
Log
st Page:
Last Page:
Previous:
Next:
Clear:
Link to Log
Settings:
View the ±rst page of the log.
View the last page of the log.
View the previous page.
View the next page.
Clear the log.
Click this button to go directly to the Log Settings
window (
Maintenance
>
Log Settings
).
This window allows you to view a log of activities on the Router. This is especially helpful detecting unauthorized
network usage.
Page 52 / 97
52
D-Link DIR-600 User Manual
Section 3 - Con±guration
Statistics
ActiveSession
The window below displays the Tra³c Statistics. Here you can view the amount of packets that pass through the DIR-600
on both the WAN and the LAN ports. The tra³c counter will reset if the device is rebooted.
The NAPT Active Session table displays a list of all active conversations between WAN computers and LAN
computers.
Page 53 / 97
53
D-Link DIR-600 User Manual
Section 3 - Con±guration
Wireless
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless client.
Page 54 / 97
54
D-Link DIR-600 User Manual
Section 3 - Con±guration
Help
Click the desired hyperlink to get more information about how to use the Router.
Page 55 / 97
55
D-Link DIR-600 User Manual
Section 4 - Security
Wireless Security
This section will show you the di²erent levels of security you can use to protect your data from intruders. The
DIR-600 o²ers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When
using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit
encryption requires a longer key than 64-bit encryption. Keys are de±ned by entering in a string in HEX (hexadecimal -
using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to
HEX for use over the network. Four keys can be de±ned so that you can change keys easily.