Page 66 / 123 Scroll up to view Page 61 - 65
61
D-Link DIR-857 User Manual
Section 3 - Configuration
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state
per session. It validates that the traffic passing through the
session conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint Independent
- Any incoming traffic sent to an open
port will be forwarded to the application that opened the port.
The port will close if idle for 5 minutes.
Address Restricted
- Incoming traffic must match the IP
address of the outgoing connection.
Address + Port Restriction
- Incoming traffic must match the
IP address and port of the outgoing connection.
If an application has trouble working from behind the router,
you can expose one computer to the Internet and run the
application on that computer.
Note:
Placing a computer in the DMZ may expose that computer
to a variety of security risks. Use of this option is only recommended
as a last resort.
Specify the IP address of the computer on the LAN that you want
to have unrestricted Internet communication. If this computer
obtains it’s IP address automatically using DHCP, be sure to make
a static reservation on the
Basic
>
DHCP
page so that the IP
address of the DMZ machine does not change.
Enable SPI:
NAT Endpoint
Filtering:
Enable DMZ Host:
IP Address:
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-857 offers a firewall type functionality. The SPI feature helps prevent cyber
attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer,
you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
Page 67 / 123
62
D-Link DIR-857 User Manual
Section 3 - Configuration
Application Level Gateway Configuration
Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network
address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications
are enabled by default.
Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec through NAT. This ALG may interfere
with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off. Please check with the
system adminstrator of your corporate network whether your VPN client supports NAT traversal.
Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common
applications using this protocol.
Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices have the ability to discover NAT
devices and work around them. This ALG may interfere with the operation of such devices. If you are having trouble making VoIP calls, try turning this ALG
off.
PPTP:
IPSEC (VPN):
RTSP:
SIP:
Page 68 / 123
63
D-Link DIR-857 User Manual
Section 3 - Configuration
Enter the IP address of packets that will take this route.
Enter the netmask of the route, please note that the octets
must match your destination IP address.
Enter your next hop gateway to be taken if this route is
used.
The route metric is a value from 1 to 16 that indicates the
cost of using this route. A value 1 is the lowest cost and 15
is the highest cost.
Select the interface that the IP packet must use to transit
out of the router when this route is used.
Destination IP:
Netmask:
Gateway:
Metric:
Interface:
Routing
The Routing option is an advanced method of customizing specific routes of data through your network.
Page 69 / 123
64
D-Link DIR-857 User Manual
Section 3 - Configuration
Set the transmit power of the antennas.
Beacons are packets sent by a Router to synchronize a
wireless network. Specify a value. 100 is the default setting
and is recommended.
This value should remain at its default setting of 2432. If
inconsistent data flow is a problem, only a minor modification
should be made.
The fragmentation threshold, which is specified in bytes,
determines whether packets will be fragmented. Packets
exceeding the 2346 byte setting will be fragmented before
transmission. 2346 is the default setting.
(Delivery Traffic Indication Message) 3 is the default setting.
A DTIM is a countdown informing clients of the next window
for listening to broadcast and multicast messages.
WMM is QoS for your wireless network. This will improve
the quality of video and voice applications for your wireless
clients.
Check this box to reduce the guard interval time therefore
increasing the data capacity. However, it’s less reliable and
may create higher data loss.
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation
Threshold:
DTIM Interval:
WMM Function:
Short GI:
Advanced Wireless Settings
Page 70 / 123
65
D-Link DIR-857 User Manual
Section 3 - Configuration
WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing
the traffic of different applications.
Enable this option if you want to allow WISH to prioritize
your traffic.
Enable WISH:
Allows the router to recognize HTTP transfers for many
common audio and video streams and prioritize them
above other traffic. Such streams are frequently used by
digital media players.
HTTP:
Enables the router to recognize certain audio and video
streams generated by a Windows Media Center PC and to
prioritize these above other traffic. Such streams are used
by systems known as Windows Media Extenders, such as
the Xbox 360.
Windows Media
Center:
When enabled, this option causes the router to automatically
attempt to prioritize traffic streams that it doesn’t otherwise
recognize, based on the behavior that the streams exhibit.
This acts to deprioritize streams that exhibit bulk transfer
characteristics, such as file transfers, while leaving interactive
traffic, such as gaming or VoIP, running at a normal priority.
Automatic:
WISH Rules:
A WISH Rule identifies a specific message flow and assigns
a priority to that flow. For most applications, the priority
classifiers ensure the right priorities and specific WISH Rules
are not required.
WISH supports overlaps between rules. If more than one
rule matches for a specific message flow, the rule with the
highest priority will be used.
WISH Settings

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top