Username: Password: forgot password? All D-Link products. All Wireless Routers. Please use the Add Comment function below to review devices you have used please be descriptive. If you find an error in our database, or have additional information about the product, please.
I have been using the DI for about 3 years and have had good performance. I did discover that if you need additional ports beyond the 4 built-in, it works best with DLink switches as opposed to other brands.
All rights reserved. Broadband Forums General Discussions. Telefonica Incompetence, Xenophobia or Fraud? Wireless Networks and WEP. Tiny Software Personal Firewall v1. Linksys Instant GigaDrive. Why encrypt your online traffic with VPN?
Satellite Internet - What is it? Broadband Forums General Discussion Gallery. Console Gaming. Select Enabled or Disabled. Each IP address entered in the fields must be in the appropriate IP form, which are four octets separated by a dot x. The Router will not accept the IP address if. Your ISP will provide you with a username and password. This option is typically used for DSL services. The default IP address is: The subnet mask of the LAN interface.
The default subnet mask is You must specify the starting and ending. The default setting is Enabled. The DI can be configured as a virtual server so that remote users accessing Web or. The DI firewall feature filters out unrecognized packets to protect your LAN network so all computers networked with the DI are invisible to the outside world. Depending on the requested service, the DI redirects the external service.
The DI is also capable of port-redirection meaning incoming traffic to a particular port may be redirected to a different port on the server computer.
Each virtual service that is created will be listed at the bottom of the screen in the. Virtual Servers List. There are pre-defined virtual services already in the table. You may use them by enabling them and assigning the server IP to use that particular.
The schedule of time when the virtual service will be enabled. The schedule may be set to Always , which will allow the particular service to always be enabled. If it is set to Time , select the time frame for the service to be enabled. If the system time is outside of the scheduled time, the service will. Example 1: If you have a Web server that you wanted Internet users to access at all times, you would need to enable it. If you have an FTP server that you wanted Internet users to access by WAN port and only during the weekends, you would need to enable it as such.
This is an example of port redirection and can be useful in cases where there are many of the same servers on the LAN network. Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and others. Special Applications makes some of these applications work with the DI The DI provides some predefined applications in the table on the bottom of the web page.
Select the application you want to use and enable it. Only one PC can use each Special Application tunnel. Name: This is the name referencing the special application. Trigger Port: This is the port used to trigger the application. It can be either a single port or a range of ports. Trigger Type: This is the protocol used to trigger the special application. You may define a single port or a. Public Type: This is the protocol used for the special application. The DI can also block users from accessing restricted web sites.
You can deny specific port numbers or all ports. Port Range: The single port or port range that will be denied access to the Internet. Schedule: This is the schedule of time when the IP Filter will be enabled. A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display.
To use this feature, enter the text string to be blocked and click Apply. The text to be blocked will appear in the list. To delete the text, just. Select the filter you wish to use; in this case, URL Blocking. Select the filter you wish to use; in this case, MAC filters was chosen. Domain blocking will deny all requests to a specific domain such as http and ftp. It can also allow computers to access specific. Select the filter you wish to use; in this case, Domain Blocking was chosen.
Select Disabled to disable Domain Blocking. Allows users to access all domains except Blocked Domains. Firewall Rules is an advanced feature used to deny or allow traffic from passing through the DI It works in the same way as IP Filters with additional settings.
You can create more detailed access rules for the DI When virtual services are created and enabled, it will also display in Firewall Rules. Firewall Rules contain all network.
In the Firewall Rules List at the bottom of the screen, the priorities of the rules are from top highest priority to bottom lowest priority. Enable or disable the Firewall. Select Always or enter the Time Range.
Select from the list of DDNS servers available. If you have a client PC that cannot run Internet applications properly from behind the DI, then you can set the client up for unrestricted Internet access. It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. Adding a client to the DMZ Demilitarized Zone may expose your local network to a variety of security risks, so. Enable or Disable the DMZ. By default the DMZ is disabled. Beacons are packets sent by an Access Point to synchronize a wireless network.
Specify a value. This value should remain at its default setting of If inconsistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the byte setting will be fragmented before transmission. Delivery Traffic Indication Message 3 is the default setting.
My guess is the proprietry network management software of the laptop. They are notorious for disabling windows network services. All other cures mentioned certainly could have caused the issue and would be standard trouble shooting steps.
As for. Gyniolatry , Apr 21, Ok all is going well except my Printer hanging off the USB print server has decided to a holiday. Problem is: I can see it through my DI Browser and I have it set up according to DI instruction manual and Canon install guide, but since changing my network settings it can no longer communicate.
If however I plug the USB cable directly into the laptop no problems I can switch to the virtual usb print port and print away - but I specifically want a networked printer for all the family. For anyone else reading this I had a Linksys that had wireless connectivity issues with a laptop that had a Wireless G external card. It also had problems with other laptops.
What I ended up doing was uninstalling the Linksys software from the Wireless N router that was on the desktop used to set up the router. Once Windows Wireless Zero could run and connect through the router without interference from the OEM software, it has worked flawlessly since.
You must log in or sign up to reply here. Show Ignored Content. Your name or email address: Do you already have an account? No, create an account now. Yes, my password is: Forgot your password?
0コメント