Page 61 / 98 Scroll up to view Page 56 - 60
61
D-Link DIR-660 User Manual
Section ² - Configuration
Logs
What to View:
View Levels:
Apply Log
Settings:
Refresh:
Clear:
Email Now:
Save Log:
You can select the types of messages that you want
to display from the log. Firewall & Security, System,
and Router Status messages can be selected.
There are three levels of message importance:
Informational, Warning, and Critical. Select the levels
that you want displayed in the log.
Will filter the log results so that only the selected
options appear.
Updates the log details on the screen so it displays
any recent activity.
Clears all of the log contents.
This option will send a copy of the router log to
the email address configured in the Tools > Email
screen.
This option will save the router to a log file on your
computer.
The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal
memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows
you to view the router logs. You can define what types of events you want to view and the level of the events to view.
This router also has external Syslog Server support so you can send the log files to a computer on your network that
is running a Syslog utility.
Downloaded from
www.Manualslib.com
manuals search engine
Page 62 / 98
D-Link DIR-660 User Manual
Section ² - Configuration
Statistics
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-660 on
both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
Internet Sessions
Downloaded from
www.Manualslib.com
manuals search engine
Page 63 / 98
D-Link DIR-660 User Manual
Section ² - Configuration
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless clients.
Wireless
The WISH Sessions page displays full details of wireless clients that are connected when WISH is enabled.
WISH Sessions
Downloaded from
www.Manualslib.com
manuals search engine
Page 64 / 98
D-Link DIR-660 User Manual
Section ² - Configuration
Support
Downloaded from
www.Manualslib.com
manuals search engine
Page 65 / 98
D-Link DIR-660 User Manual
Section ³ - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-660 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption
requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format.
ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX
for use over the network. Four keys can be defined so that you can change keys easily.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top