Page 41 / 93 Scroll up to view Page 36 - 40
²1
D-Link DIR-635 User Manual
Section 3 - Configuration
Enter the keywords or URLs that you want to
block (or allow). Any URL with the keyword in it
will be blocked.
Website URL/
Domain:
Website Filters are used to deny LAN computers from accessing specific web sites by the URL or domain. A URL is a
specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word,
the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked
and click
Save Settings
. The text to be blocked will appear in the list. To delete the text, click
Clear the List Below
.
Website Filters
Page 42 / 93
²±
D-Link DIR-635 User Manual
Section 3 - Configuration
Enter a name for the inbound filter rule.
Select
Allow
or
Deny
.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 if
you do not want to specify an IP range.
Enter the ending IP address. Enter
255.255.255.255 if you do not want to specify
and IP range.
Click the
Save
button to apply your settings.
You must click Save Settings at the top to save
the settings.
This section will list any rules that are created.
You may click the
Edit
icon to change the
settings or enable/disable the rule, or click the
Delete
icon to remove the rule.
Name:
Action:
Enable:
Source IP Start:
Source IP End:
Save:
Inbound Filter
Rules List:
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you
can configure inbound data filtering rules that control data based on an IP address range.
Inbound Filters can be used
with Virtual Server, Port Forwarding, or Remote Administration features.
Inbound Filters
Page 43 / 93
²3
D-Link DIR-635 User Manual
Section 3 - Configuration
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint Independent
- Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port
will close if idle for 5 minutes.
Address Restricted
- Incoming traffic must match the IP address
of the outgoing connection.
Address + Port Restriction
- Incoming traffic must match the IP
address and port of the outgoing connection.
If an application has trouble working from behind the router, you
can expose one computer to the Internet and run the application
on that computer.
Note:
Placing a computer in the DMZ may expose that computer to
a variety of security risks. Use of this option is only recommended
as a last resort.
Specify the IP address of the computer on the LAN that you want to
have unrestricted Internet communication. If this computer obtains
it’s IP address automatically using DHCP, be sure to make a static
reservation on the Basic > DHCP page so that the IP address of
the DMZ machine does not change.
Enable SPI:
NAT Endpoint
Filtering:
Enable DMZ Host:
IP Address:
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-635 offers a firewall type functionality. The SPI
feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain
types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone.
This option will expose the chosen computer completely to the outside world.
Page 44 / 93
²²
D-Link DIR-635 User Manual
Section 3 - Configuration
VPN Pa
sthrough
RTSP
H.323
SIP (VoIP)
MS
Application Level Gateway (ALG) Configuration
Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to
make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol
or application. A number of ALGs for common applications are enabled by default.
Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec
through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your
corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether
your VPN client supports NAT traversal.
Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and
Real Player are some of the common applications using this protocol.
Allows all of the Windows/MSN Messenger functions to work properly through the router.
Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced > Virtual Server page if you want to
host an FTP server.
Allows Microsoft NetMeeting clients to communicate across NAT. Note that if you want your buddies to call you, you should
also set up a virtual server for NetMeeting. Refer to the Advanced > Virtual Server page for information on how to set up
a virtual server.
Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices
have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices.
If you are having trouble making VoIP calls, try turning this ALG off.
Allows Ethernet network adapters with Wake-On-LAN (WOL) to function.
Allows Windows Media Player, using MMS protocol, to receive streaming media from the internet.
PPTP:
IPSEC (VPN):
RTSP:
MSN Messenger:
FTP:
H.323
(Netmeeting):
SIP:
Wake-On-LAN:
MMS:
Page 45 / 93
²5
D-Link DIR-635 User Manual
Section 3 - Configuration
Transmit Power
802.
1d Mode
W
M Mode
WDS Mode
Set the transmit power of the antennas.
Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only
a minor modification should be made.
The fragmentation threshold, which is specified
in bytes, determines whether packets will be
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission.
2346 is the default setting.
(Delivery Traffic Indication Message) 3 is the
default setting. A DTIM is a countdown informing
clients of the next window for listening to
broadcast and multicast messages.
This enables 802.11d opration. 802.11d is a wireless specification developed to allow implementation of wireless networks in
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
WMM is QoS for your wireless network. Enable this option to improve the quality of video and voice applications for your
wireless clients.
Check this box to reduce the guard interval time therefore increasing the data capacity.
However, it’s less reliable and may
create higher data loss.
When WDS is enabled, this router functions as a wireless bridge and is able to wirelessly communicate with other AP’s via
WDS links.
Note:
WDS is incompatible with WPA. Both features cannot be used at the same time. A WDS link is bidirectional so this AP must know the MAC
address (creates the WDS link) of the other AP, and the other AP must have a WDS link back to this AP (the router).
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation
Threshold:
DTIM Interval:
802.11d:
WMM Function:
Short GI:
WDS Enabled:
Advanced Wireless Settings

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top