Page 51 / 158 Scroll up to view Page 46 - 50
47
D-Link DIR-850L User Manual
Step 2:
After selecting Manual, the following page will appear. On this
page to user can view the wireless configuration of this router. The wire-
less clients should configure their wireless settings to be identical to the
settings displayed on this page for a successful connection. This option
is for wireless clients that can’t use the WPS method to connect to this
device.
Click on the
Prev
button to return to the previous page. Click on the
Next
button to continue to the next page. Click on the
Cancel
button to
discard the changes made and return to the main wireless page. Click
on the
Wireless Status
button to navigate to the Status > Wireless page
to view what wireless client are connected to this device.
End of Wizard.
Wireless Settings: Manual Wireless Network Setup
The manual wireless network setup option allows users to configure
the wireless settings of this device manually. This option is for the more
advanced user and includes all parameters that can be configured for
wireless connectivity.
To initiate the Manual Wireless
Setup page, click on the
Manual Wire-
less Connection Setup
button.
On this page the user can configure all the parameters related to the
wireless connectivity of this router.
Manual wireless network setup
Page 52 / 158
48
D-Link DIR-850L User Manual
The following parameters will be available for configuration:
Wireless Band:
Displays the wireless band being config-
ured. In this option we find that the fol-
lowing parameters will be regarding the
2.4GHz band.
Enable Wireless:
Check the box to enable the wireless func-
tion. If you do not want to use wireless,
uncheck the box to disable all the wireless
functions. Select the time frame that you
would like your wireless network enabled.
The schedule may be set to Always. Any
schedule you create will be available in
the drop-down menu. Click New Schedule
to create a new schedule.
Wireless Network Name:
The Service Set Identifier (SSID) is the name of your wireless network. Create a name using up to 32 characters. The
SSID is case-sensitive. Enable Auto Channel
802.11 Mode:
Here the user can manually select the preferred frequency band to use for this wireless network.
Enable Auto Channel Scan:
The auto channel selection setting can be selected to allow this device to choose the channel with the least
amount of interference.
Wireless Channel:
By default the channel is set to 1. The Channel can be changed to fit the channel setting for an existing wireless
network or to customize the wireless network. If you enable Auto Channel Selection, this option will be greyed out.
Transmission Rate:
Select the transmit rate. It is strongly suggested to select Best (Automatic) for best performance.
Channel Width:
When using the 802.11n frequency band, the user have an option to choose between a 20MHz or 20/40MHz band-
width.
Visibility Status:
The Invisible option allows you to hide your wireless network. When this option is set to Visible, your wireless
network name is broadcasted to anyone within the range of your signal. If you are not using encryption then they
could connect to your network. When Invisible mode is enabled, you must enter the Wireless Network Name (SSID)
on the client manually to connect to the network.
Page 53 / 158
49
D-Link DIR-850L User Manual
By default the wireless security of this router will be disabled. In this
next option the user can enabled or disable wireless security for the
frequency band 2.4GHz. There are two types of encryption that can be
used. WEP or WPA/WPA2.
Wireless Security Mode: WEP
Wired Equivalent Privacy (WEP) is the most basic form of encryption
that can be used for wireless networks. Even though it is known as a
‘weak’ security method, it is better than no security at all. Older wireless
adapter sometimes only supports WEP encryption and thus we still find
this encryption method used today.
The following parameters will be available for configuration:
WEP Key Length:
Here the user can specify to either use a
64Bit or a 128Bit encrypted key.
Authentication:
Authentication is a process by which the
router verifies the identity of a network
device that is attempting to join the wire-
less network. There are two types authen-
tication for this device when using WEP.
Open System
allows all wireless devices
to communicate with the router before
they are required to provide the encryp-
tion key needed to gain access to the
network.
Shared Key
requires any wire-
less device attempting to communicate
with the router to provide the encryption
key needed to access the network before
they are allowed to communicate with the
router.
WEP Key 1:
Enter the WEP key used here. For 64-bit keys you must enter 10 hex digits into each key box. For 128-bit keys you
must enter 26 hex digits into each key box. A hex digit is either a number from 0 to 9 or a letter from A to F. You
may also enter any text string into a WEP key box, in which case it will be converted into a hexadecimal key using
the ASCII values of the characters. A maximum of 5 text characters can be entered for 64-bit keys, and a maximum
of 13 characters for 128-bit keys.
Page 54 / 158
50
D-Link DIR-850L User Manual
Wireless Security Mode: WPA-Personal
Wi-Fi Protected Access (WPA) is the most advanced and up to date wire-
less encryption method used today. This is the recommended wireless
security option. WPA supports two authentication frameworks. Personal
(PSK) and Enterprise (EAP). Personal requires only the use of a pass-
phrase (Shared Secret) for security.
The following parameters will be available for configuration:
WPA Mode:
WPA is the older standard; select this op-
tion if the clients that will be used with the
router only support the older standard.
WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard.
With the “WPA2” option, the router tries
WPA2 first, but falls back to WPA if the
client only supports WPA. With the “WPA2
Only” option, the router associates only
with clients that also support WPA2 secu-
rity.
Cipher Type:
Select the appropriate cipher type to use
here. Options to choose from are Temporal
Key Integrity Protocol (
TKIP
), Advanced
Encryption Standard (
AES
), and Both (
TKIP
and AES
).
Group Key Update Interval:
Enter the amount of time before the group
key used for broadcast and multicast data
is changed.
Pre-Shared Key:
Enter the shared secret used here. This
secret phrase needs to be the same on all
of the wireless clients for them to be able
to connect to the wireless network suc-
cessfully.
Page 55 / 158
51
D-Link DIR-850L User Manual
Wireless Security Mode: WPA-Personal
Wi-Fi Protected Access (WPA) is the most advanced and up to date wire-
less encryption method used today. This is the recommended wireless
security option. WPA supports two authentication frameworks. Personal
(PSK) and Enterprise (EAP). Personal requires only the use of a pass-
phrase (Shared Secret) for security.
The following parameters will be available for configuration:
WPA Mode:
WPA is the older standard; select this op-
tion if the clients that will be used with the
router only support the older standard.
WPA2 is the newer implementation of the
stronger IEEE 802.11i security standard.
With the “WPA2” option, the router tries
WPA2 first, but falls back to WPA if the
client only supports WPA. With the “WPA2
Only” option, the router associates only
with clients that also support WPA2 secu-
rity.
Cipher Type:
Select the appropriate cipher type to use
here. Options to choose from are Temporal
Key Integrity Protocol (
TKIP
), Advanced
Encryption Standard (
AES
), and Both (
TKIP
and AES
).
Group Key Update Interval:
Enter the amount of time before the group
key used for broadcast and multicast data
is changed.
RADIUS Server IP Address:
When the user chooses to use the EAP
authentication framework, the RADIUS
server’s IP address can be entered here.
RADIUS Server Port:
When the user chooses to use the EAP authentication framework, the RADIUS server’s port number can be entered
here.
RADIUS Server Shared
Secret:
Enter the shared secret used here. This secret phrase needs to be the same on all of the wireless clients for them to
be able to connect to the wireless network successfully.

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top