D-Link DWL-3150 Router Manual PDF (Setup & Configuration Guide)
Given below is full router user manual of D-Link DWL-3150 router model. You can also download this manual in PDF Format to read later on your computer.
Product user manuals come handy in case you want to know all functionalities of your device, troubleshooting, fist time configuration & setup and in many other situations.
If any of the above items are missing, please contact your reseller.
Minimum System Requirements
• Computers with Windows
®
, Macintosh, or Linux-based operating systems with an installed Ethernet
Adapter.
• Internet Explorer version 6.0 or Mozilla Firefox version 1.5 and above.
Product Overview
Package Contents
Page 5 / 71
5
D-Link DWL-3150 User Manual
Section 1 - Product Overview
Introduction
At up to fifteen times the speed* of previous wireless devices you can work faster and more efficiently, increasing
productivity. With the DWL-3150, bandwidth-intensive applications like graphics or multimedia will benefit significantly
because large files are able to move across the network quickly.
Inclusion of all three standards (802.11b and 802.11g) means that the DWL-3150
is versatile enough to allow
connection to almost any 802.11 network or device.
The DWL-3150 is capable of operating in one of 3 different modes to meet your wireless networking needs.
The DWL-3150
can operate as a Wireless Bridge, a Wireless Workgroup Bridge
, or a Wireless WAN.
An ideal solution for quickly creating and extending a wireless local area network
(WLAN) in offices or other workplaces,
trade shows and special events, the DWL-3150
provides data transfers at up to 54Mbps* when used with other D-Link
Air Premier
®
or Air Premier AG
®
products (The 802.11g standard is backwards compatible with 802.11b devices).
WPA is offered in two flavors: Enterprise (used for corporations), and Personal (used for home users).
WPA-Personal and WPA2-Personal is directed at home users who do not have the server based equipment required
for user authentication. The method of authentication is similar to WEP because you define a “Pre-Shared Key” on
the wireless router/AP. Once the pre-shared key is confirmed and satisfied on both the client and access point, then
access is granted. The encryption method used is referred to as the Temporal Key Integrity Protocol (TKIP), which offers
per-packet dynamic hashing. It also includes an integrity checking feature which ensures that the packets were not
tampered with during wireless transmission. WPA2-Personal is far superior to WPA-Personal, because the encryption
of data is upgraded with the Advanced Encryption Standard (AES).
*Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building
materials and construction, and network overhead lower actual data throughput rate.