Page 41 / 98 Scroll up to view Page 36 - 40
³1
D-Link DIR-660 User Manual
Section ² - Configuration
Enter a name for the inbound filter rule.
Select
Allow
or
Deny
.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 if
you do not want to specify an IP range.
Enter the ending IP address. Enter
255.255.255.255 if you do not want to specify
and IP range.
Click the
Save
button to apply your settings.
You must click Save Settings at the top to save
the settings.
This section will list any rules that are created.
You may click the
Edit
icon to change the
settings or enable/disable the rule, or click the
Delete
icon to remove the rule.
Name:
Action:
Enable:
Source IP Start:
Source IP End:
Save:
Inbound Filter
Rules List:
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you
can configure inbound data filtering rules that control data based on an IP address range.
Inbound Filters can be used
with Virtual Server, Port Forwarding, or Remote Administration features.
Inbound Filters
Downloaded from
www.Manualslib.com
manuals search engine
Page 42 / 98
³±
D-Link DIR-660 User Manual
Section ² - Configuration
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint Independent
- Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port
will close if idle for 5 minutes.
Address Restricted
- Incoming traffic must match the IP address
of the outgoing connection.
Address and Port Restriction
- Incoming traffic must match the
IP address and port of the outgoing connection.
Enable this feature to protect your network from certain kinds of
“spoofing” attacks.
If an application has trouble working from behind the router, you
can expose one computer to the Internet and run the application on
that computer.
Note:
Placing a computer in the DMZ may expose
that computer to a variety of security risks. Use of this option is only
recommended as a last resort.
Specify the IP address of the computer on the LAN that you want to
have unrestricted Internet communication. If this computer obtains
it’s IP address automatically using DHCP, be sure to make a static
reservation on the Basic > DHCP page so that the IP address of
the DMZ machine does not change.
Enable this feature to allow the router’ NAT to track application that uses protocols other than UDP, TCP or ICMP.
Enable SPI:
NAT Endpoint
Filtering:
Anti-Spoof
Checking:
Enable DMZ Host:
IP Address:
Non-UDP/TCP/ICMP
LAN Sessions:
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-660 offers a firewall type functionality.
Downloaded from
www.Manualslib.com
manuals search engine
Page 43 / 98
³²
D-Link DIR-660 User Manual
Section ² - Configuration
Application Level Gateway (ALG) Configuration
Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to
make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol
or application. A number of ALGs for common applications are enabled by default.
Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec
through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your
corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether
your VPN client supports NAT traversal.
Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and
Real Player are some of the common applications using this protocol.
Allows all of the Windows/MSN Messenger functions to work properly through the router.
Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced > Virtual Server page if you want to
host an FTP server.
Allows Microsoft NetMeeting clients to communicate across NAT. Note that if you want your buddies to call you, you should
also set up a virtual server for NetMeeting. Refer to the
Advanced
>
Virtual Server
page for information on how to set up
a virtual server.
Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices
have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices.
If you are having trouble making VoIP calls, try turning this ALG off.
Allows Ethernet network adapters with Wake-On-LAN (WOL) to function.
Allows Windows Media Player, using MMS protocol, to receive streaming media from the Internet.
PPTP:
IPSEC (VPN):
RTSP:
MSN Messenger:
FTP:
H.323
(Netmeeting):
SIP:
Wake-On-LAN:
MMS:
Downloaded from
www.Manualslib.com
manuals search engine
Page 44 / 98
³³
D-Link DIR-660 User Manual
Section ² - Configuration
Enter the IP address of packets that will take
this route.
Enter the netmask of the route, please note
that the octets must match your destination
IP address.
Enter your next hop gateway to be taken if this
route is used.
The route metric is a value from 1 to 16 that
indicates the cost of using this route. A value 1
is the lowest cost and 15 is the highest cost.
Select the interface that the IP packet must
use to transit out of the router when this route
is used.
Destination IP:
Netmask:
Gateway:
Metric:
Interface:
Router Settings
The Routing option is an advanced method of customizing specific routes of data through your network.
Downloaded from
www.Manualslib.com
manuals search engine
Page 45 / 98
³´
D-Link DIR-660 User Manual
Section ² - Configuration
Set the transmit power of the antennas.
Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
This value should remain at its default setting of
2346. If inconsistent data flow is a problem, only
a minor modification should be made.
The fragmentation threshold, which is specified
in bytes, determines whether packets will be
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission.
2346 is the default setting.
(Delivery Traffic Indication Message) 3 is the
default setting. A DTIM is a countdown informing
clients of the next window for listening to
broadcast and multicast messages.
This enables 802.11d opration. 802.11d is a wireless specification developed to allow implementation of wireless networks in
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless
clients.
Check this box to reduce the guard interval time therefore increasing the data capacity.
However, it’s less reliable and may
create higher data loss.
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation
Threshold:
DTIM Interval:
802.11d:
WMM Function:
Short GI:
Advanced Wireless Settings
Downloaded from
www.Manualslib.com
manuals search engine

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top