Page 81 / 215 Scroll up to view Page 76 - 80
76
D-Link DIR-866L User Manual
Section 3 - Configuration
The Port Forwarding option allows you to open a single port or a range of ports in your router.
Port Forwarding
Enter a
Name
for the rule or select an
Application Name
from
the drop-down menu. Select an
Application Name
and click
<<
to populate the
Name
field.
Enter the
IP Address
of the computer on your local network
that you want to allow the incoming service to. If your
computer is receiving an IP address automatically from the
router (DHCP), your computer will be listed in the
Computer
Name
drop-down menu. Select your
Computer Name
and
click
<<
.
Enter the
TCP
and/or
UDP
port or ports that you want to
open. You can enter a single port or a range of ports. Separate
ports with a comma.
Example: 24,1009,3000-4000
Select the schedule of time when the Virtual Server Rule
will be enabled. The schedule may be set to
Always
, which
will allow the particular service to always be enabled. You
can create your own schedules from the
Tools
>
Schedules
section.
Select
Allow All
(most common) or a created Inbound filter.
You may create your own inbound filters in the
Advanced >
Inbound Filter
page.
Click on
Save Settings
.
Name:
IP Address:
Ports to Open
TCP/UDP:
Schedule:
Inbound Filter:
Page 82 / 215
77
D-Link DIR-866L User Manual
Section 3 - Configuration
Enter a
Name
for the rule. You may select a pre-defined
Application Name
from the drop-down menu and click
<<
.
This is the port used to trigger the application. It can be either
a single port or a range of ports.
Select the protocol of the
Trigger
port (
TCP,
UDP
, or
Both
).
This is the port number on the Internet side that will be used
to access the application. You may define a single port or a
range of ports. You can use a comma to add multiple ports
or port ranges.
Select the protocol of the
Firewall
port (
TCP
,
UDP
, or
ALL
).
The schedule for when the Application Rule will be enabled.
The schedule may be set to
Always
, which will allow the
particular service to always be enabled. You can create your
own schedule in the
Tools
>
Schedules
section.
Click on
Save Settings
.
Name:
Trigger:
Traffic Type:
Firewall:
Traffic Type:
Schedule:
Application Rules
Some applications require multiple connections, such as Internet gaming, video conferencing, and Internet telephony. These
applications may have difficulty working through NAT (Network Address Translation). Special Application Rules make some
of these applications work with the DIR-866L. If you must run applications that require multiple connections, specify the
port normally associated with an application in the
Trigger Port
field, select the protocol type as
TCP
or
UDP
, then enter the
Firewall
(public) ports associated with the trigger port to open them for inbound traffic.
Page 83 / 215
78
D-Link DIR-866L User Manual
Section 3 - Configuration
QoS Engine
Check the box to
Enable Traffic Shaping
, which is a network
traffic management technique that uses rate limiting.
Check the box to enable
Automatic Uplink Speed
, which will be
the maximum speed your Internet Service Provider (ISP) will allow
data to be transferred from the router to the Internet.
Displays
Measured Uplink Speed
.
If you experience poor VoIP performance, you may want to use
this option. Disable
Automatic Uplink Speed
and enter a
Manual
Uplink Speed
to improve performance.
QoS Engine will be disabled by default. Check the box to enable
the QoS option for providing better performance with online
games and other interactive applications, such as VoIP.
Check the box to enable
Automatic Classification
, which allows
the router to automatically determine which applications should
receive network priority.
Check the box to enable
Dynamic Fragmentation
, which allows
the router to break large packets into smaller ones for smoother
performance.
The QoS Engine supports overlaps between rules, where more
than one rule can match for a specific message flow. If more than
one rule is found to match, the rule with the highest priority
will be used.
Enable Traffic
Shaping:
Automatic Uplink
Speed:
Measured Uplink
Speed:
Manual Uplink
Speed:
Enable QoS
Engine:
Automatic
Classification:
Dynamic
Fragmentation:
QOS Engine Rules:
Quality of Service (QoS) assigns priority to specified applications, providing better performance of a data flow. The QoS Engine
helps improve your online gaming experience by prioritizing your game traffic over other network traffic, like FTP.
Page 84 / 215
79
D-Link DIR-866L User Manual
Section 3 - Configuration
Create a
Name
for the rule that is meaningful to you.
The priority of the message flow is entered here --1 receives
the highest priority (most urgent) and 255 receives the lowest
priority (least urgent).
Select the
Protocol
to be used by the messages.
This rule applies to a flow of messages whose LAN-side IP
address falls within the range set here.
Enter a range of ports you want to assign to this rule.
The rule applies to a flow of messages whose WAN-side IP
address falls within the range set here.
Enter a range of ports you want to assign to this rule.
Click on
Save Settings
.
Name:
Priority:
Protocol:
Local IP Range:
Local Port Range:
Remote IP Range:
Remote Port
Range:
Page 85 / 215
80
D-Link DIR-866L User Manual
Section 3 - Configuration
Network (MAC) Filters
Select
Turn MAC Filtering Off
,
Allow MAC addresses listed
below
, or
Deny MAC addresses listed below
from the drop-
down menu.
Create a list of MAC addresses by entering the
MAC Address
of the computer you would like to filter, or select a
Computer
Name
from the drop-down list and click
<<
.
Note:
To find the MAC address on a computer, please refer to the
Networking Basics
section in this manual.
Computers that have obtained an IP address from the router’s
DHCP server will be in the
DHCP Client List
.
Click Clear to remove the MAC address from the MAC Filtering
Rules list.
Click
Save Settings
.
Configure MAC
Filtering:
MAC Address:
DHCP Client
List:
Clear:
Use MAC (Media Access Control) Filters to control access to LAN (Local Area Network) computers by using their MAC addresses.
You can create a list of MAC addresses and then choose to either deny them access or allow them access to your network.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top