Page 21 / 45 Scroll up to view Page 16 - 20
DVG-N5402SP
User’s Manual
MAINTENANCE
D-Link Systems, Inc.
18
3-2-1-5 DHCP Filtering
DHCP Filtering is used to control network access based on the IP address of the network device. It is used
to deny network or Internet access.
ADVANCED
Parental Control
DHCP Filtering
Enable DHCP Filter:
Enable or disable the DHCP filtering function.
ADVANCED
Firewall and DMZ
DHCP Filtering
WHITE LIST:
Bind the static IP address with the specified MAC address. If the MAC address of the device
on the LAN consists with the specified MAC address, the VoIP Router assigns the binding IP address.
IP:
Enter the binding IP address.
MAC:
Enter the binding MAC address.
Page 22 / 45
DVG-N5402SP
User’s Manual
MAINTENANCE
D-Link Systems, Inc.
19
ADVANCED
Firewall and DMZ
DHCP Filtering
BLACK LIST:
If the MAC address of the device on the LAN, the VoIP Router does not assign the IP
address.
MAC:
Enter the MAC address of the device on the LAN.
3-2-2 Firewall and DMZ
3-2-2-1 DMZ
DMZ (Demilitarized Zone) allows the server on the LAN site to be directly exposed to the Internet for
accessing data and to forward all incoming ports to the DMZ Host. Adding a client to the DMZ may expose
that computer to a variety of security risks; so only use this option as a last resort.
ADVANCED
Firewall and DMZ
DMZ
Page 23 / 45
DVG-N5402SP
User’s Manual
MAINTENANCE
D-Link Systems, Inc.
20
Enable DMZ:
Check the box to enable DMZ feature.
WAN Connection:
Select the WAN port that enables DMZ from the drop-down list. Users can access the
DMZ host that is provided by this WAN connection through Internet access.
DMZ Host IP Address:
Enter the IP address of that computer as a DMZ Host with unrestricted Internet
access.
Note:
Either this function or virtual server can be selected for use in accessing external services.
3-2-2-2 Dos Protection
ADVANCED
Firewall and DMZ
Dos Protection
Enable Attack Prevent:
Check the box to prevent DoS attacks from WAN or LAN. There are various types
of DoS attacking. Leave settings in this field to the default if you are not familiar with it.
Page 24 / 45
DVG-N5402SP
User’s Manual
MAINTENANCE
D-Link Systems, Inc.
21
3-2-2-3 Virtual Server
Enable users on Internet to access the WWW, FTP and other services from your NAT. It is also known as
port forwarding. When remote users are accessing Web or FTP servers through WAN IP address, it will be
routed to the server with LAN IP address.
ADVANCED
Firewall and DMZ
Virtual Server
WAN Connection (s):
Select the WAN interface for the Internet connection. Users can access the virtual
server through the WAN connection.
WAN Port Range:
Enter the port range for the WAN side.
TCP/UDP:
Select the communication protocols used by the server,
TCP
,
UDP
or
Both
.
LAN Host IP Address:
Enter the IP address of the device that provides various services.
Server Port Range:
Enter comments.
Remark:
Enter comments.
Page 25 / 45
DVG-N5402SP
User’s Manual
MAINTENANCE
D-Link Systems, Inc.
22
3-2-3 Advanced Wireless
3-2-3-1 Advanced
This section introduces advanced configuration of the wireless access point. If you are not familiar with the
following functions, keep the default parameters. In some cases, incorrect settings may reduce wireless
performance.
ADVANCED
Advanced Wireless
Advanced
Transmission Rate:
You can select it from the drop-down list. Auto rate changes automatically to get
better throughput depending on the range and environment of
the
wireless network.
Transmit Power:
You can adjust the percentage of power 100, 80, 60, 40, 20 of your VoIP Router to
change the coverage of wireless network. Keep the default value, 100% to reach full range.
Beacon Period:
It
indicates the frequency interval of target beacon transmission time which can be found
in a packet body. The VoIP Router transmits the beacon packet to help a wireless client to identify the
existence of nearby AP (Access Point). If the beacon intervals are too long, it would be hard to access the
network. If the beacon intervals are too short, the resources would be wasted. The default value is
100
.
RTS Threshold:
It is a mechanism to implement in collision avoidance. In a large wireless network, two
stations do not hear each other but can hear wireless access point. When the two send data to AP (Access
Point) at the same time, it may result in data collision and a loss of messages for both wireless stations. In
most case, it is recommended to keep the default value:2347.
Fragmentation Threshold:
A packet can be fragmented into small units to pass over a network medium
that can not support the original packet size. If you encounter a busy network, a lower value of fragment
threshold could improve performance. If the traffic flows are not very busy, a higher fragment threshold
provides good network performance. In most case, it is recommended to keep the default value: 2346.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top