Page 91 / 190 Scroll up to view Page 86 - 90
D-Link DIR-818LW User Manual
86
Section 3 - Configuration
Wireless Security Mode: WPA-Personal
Wi-Fi Protected Access (WPA) is the most advanced and up to date
wireless encryption method used today. This is the recommended
wireless security option. WPA supports two authentication frameworks.
Personal (PSK) and Enterprise (EAP).
The following parameters will be available for configuration:
WPA Mode:
WPA is the older standard; select this
option if the clients that will be used with
the router only support the older
standard. WPA2 is the newer
implementation of the stronger IEEE
802.11i security standard. With the “WPA2”
option, the router tries WPA2 first, but falls
back to WPA if the client only supports
WPA. With the “WPA2 Only” option, the
router associates only with clients that
also support WPA2 security.
Cipher Type:
Select the appropriate cipher type to use
here. Options to choose from are Temporal
Key Integrity Protocol (
TKIP
), Advanced
Encryption Standard (
AES
), and Both (
TKIP
and AES
).
Group Key Update Interval:
Enter the amount of time before the group
key used for broadcast and multicast data
is changed.
Pre-Shared Key:
Enter the shared secret used here. This secret phrase needs to be the same on all of the wireless clients for them to
be able to connect to the wireless network successfully.
Page 92 / 190
D-Link DIR-818LW User Manual
87
Section 3 - Configuration
Wireless Security Mode: WPA-Enterprise
Wi-Fi Protected Access (WPA) is the most advanced and up to date
wireless encryption method used today. This is the recommended
wireless security option. WPA supports two authentication frameworks.
Personal (PSK) and Enterprise (EAP).
The following parameters will be available for configuration:
WPA Mode:
WPA is the older standard; select this op-
tion if the clients that will be used with the
router only support the older standard.
WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard.
With the “WPA2” option, the router tries
WPA2 first, but falls back to WPA if the
client only supports WPA. With the “WPA2
Only” option, the router associates only
with clients that also support WPA2 secu-
rity.
Cipher Type:
Select the appropriate cipher type to use
here. Options to choose from are Temporal
Key Integrity Protocol (
TKIP
), Advanced
Encryption Standard (
AES
), and Both (
TKIP
and AES
).
Group Key Update Interval:
Enter the amount of time before the group
key used for broadcast and multicast data
is changed.
RADIUS Server IP Address:
When the user chooses to use the EAP
authentication framework, the RADIUS
server’s IP address can be entered here.
RADIUS Server Port:
When the user chooses to use the EAP authentication framework, the RADIUS server’s port number can be entered
here.
RADIUS Server Shared
Secret:
Enter the shared secret used here. This secret phrase needs to be the same on all of the wireless clients for them to
be able to connect to the wireless network successfully.
Page 93 / 190
D-Link DIR-818LW User Manual
88
Section 3 - Configuration
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DIR-818LW offers the
following types of security:
• WPA2 (Wi-Fi Protected Access 2)
• WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)
• WPA-PSK (Pre-Shared Key)
What is WPA?
WPA (Wi-Fi Protected Access), is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing
algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is
based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP
regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple
to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized
network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between
8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your
wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public
key encryption system to ensure that only authorized network users can access the network.
Page 94 / 190
D-Link DIR-818LW User Manual
89
Section 3 - Configuration
This section will allow you to change the local network settings of the router and to configure the DHCP settings.
Network Settings
Enter the IP address of the router. The default IP address
If you change the IP address, once you click
Save.
Settings
, you will need to enter the new IP address in
your browser to get back into the configuration utility.
Enter the Subnet Mask. The default subnet mask is
255.255.255.0.
Enter a name for the router.
Enter the Domain name (Optional).
Uncheck the box to transfer the DNS server information
from your ISP to your computers. If checked, your
computers will use the router for a DNS server.
Router IP Address:
Subnet Mask:
Device Name:
Local Domain:
Enable DNS Relay:
Router Settings
Page 95 / 190
D-Link DIR-818LW User Manual
90
Section 3 - Configuration
DHCP Server Settings
DHCP stands for Dynamic Host Control Protocol. The DIR-818LW has a built-in DHCP server. The DHCP Server will automatically
assign an IP address to the computers on the LAN/private network. Be sure to set your computers to be DHCP clients by setting
their TCP/IP settings to “Obtain an IP Address Automatically.” When you turn your computers on, they will automatically load
the proper TCP/IP settings provided by the DIR-818LW. The DHCP Server will automatically allocate an unused IP address from
the IP address pool to the requesting computer. You must specify the starting and ending address of the IP address pool.
Check this box to enable the DHCP server on your router.
Uncheck to disable this function.
Enter the starting and ending IP addresses for the DHCP
server’s IP assignment.
Note:
If you statically (manually) assign IP addresses to your
computers or devices, make sure the IP addresses are outside of
this range or you may have an IP conflict.
The length of time for the IP address lease. Enter the Lease
time in minutes.
If all the computers on the LAN successfully obtain their IP
addresses from the router’s DHCP server as expected, this
option can remain disabled. However, if one of the computers
on the LAN fails to obtain an IP address from the router’s DHCP
server, it may have an old DHCP client that incorrectly turns
off the broadcast flag of DHCP packets. Enabling this option
will cause the router to always broadcast its responses to all
clients, thereby working around the problem, at the cost of
increased broadcast traffic on the LAN.
Check this box to allow the DHCP Server to offer NetBIOS
configuration settings to the LAN hosts. NetBIOS allow LAN
hosts to discover all other computers within the network, e.g.
within Network Neighborhood.
Enable DHCP
Server:
DHCP IP Address
Range:
DHCP Lease Time:
Always Broadcast:
NetBIOS
Announcement:

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top