D-link di-524 setup manual


















You can download firmware up- grades to your hard drive from the D-Link support site. Page 34 IP Security. Once VPN pass-through is enabled, there is no need to open up virtual services. If the device is rebooted, the logs are automatically cleared. You may save the log files under Log Settings. View Log- First Page - The first page of the log. Email Address - The email address to which the logs will be sent.

The traffic counter will reset if the device is rebooted. Page 40 Networking Basics Please follow all the instructions in this window: Click Next In the following window, select the best description of your computer. Click Next Click Next Enter a Workgroup name. All computers on your network should have the same Workgroup name. When the changes are complete, click Next. Please wait while the Network Setup Wizard configures the computer. This may take a few minutes. Page 43 Networking Basics In the window below, select the option that fits your needs.

In this example, Create a Network Setup Disk has been selected. You will run this disk on each of the computers on your network. Click Next. Insert a disk into the Floppy Disk Drive, in this case drive A. The new settings will take effect when you restart the computer. Click Yes to restart the computer. You have completed configuring this computer. Next, you will need to run the Network Setup Disk on all the other computers on your network. Page Getting Started Naming your Computer In this window, enter the Computer name Select Workgroup and enter the name of the Workgroup All computers on your network must have the same Workgroup name.

To check on the IP Address of the adapter, please do the following: Right-click on the The IP Addresses on your network must be within the same range.

For example, if one computer has an IP Address of A window similar to this one will appear. Type ping xxx. The computer used to configure the DI cannot access the Configuration menu. Each device must have a unique IP Address; Page 56 Troubleshooting 3. Check that the drivers for the network adapters are installed properly.

You may be using different network adapters than those illustrated here, but this procedure will remain the same, regardless of the type of network adapters you are using. Click OK. Page 58 RF noise, like microwaves, Monitors, electric motors, etc. If you have enabled Encryption on the DI, you must also enable encryption on all wireless clients in order to establish a wireless connection.

Premere Enter o Invio. Cliccare su Next Selezionare il fuso orario menu a cascata. Cliccare su Next Page 54 Utilizzo del programma Setup Wizard continua A questo punto, il programma setup wizard tenta di individuare a u t o m a t i c a m e n t e i l t i p o d i connessione Internet. Se si dispone di connessioni di tipo Dynamic o PPPoE, il programma accede automaticamente alla pagina Cliccare su Next Passare a Wireless Setup.

Page 56 Se la rete Cliccare su Exit Rilanciare il browser per esempio Internet Explorer o Netscape Navigator , per connettersi al proprio sito Web preferito e testare la connessione Internet. Cliccare su Impostazioni e su Connessioni di rete. Page Supporto Tecnico Supporto tecnico Gli ultimi aggiornamenti e la documentazione sono disponibili sul sito D-Link. Via N.

Page 62 Sluit eerst het ene uiteinde van de kabel van de voedingsadapter aan op de aansluiting op de achterzijde van de DI en steek het andere uiteinde van het snoer in een wandcontactdoos of stekkerdoos. Druk vervolgens op Enter of Return. Er verschijnt een aanmeldingsscherm. Klik op Als u bent aangemeld, verschijnt het beginscherm Home. Klik op Run Wizard Wizard uitvoeren Page 65 De installatiewizard uitvoeren vervolg De volgende schermen worden weergegeven. Klik op Next Volgende Stel het nieuwe wachtwoord U hebt de mogelijkheid een wachtwoord in te stellen.

Klik op Next Volgende Kies uw tijdzone in de vervolgkeuzelijst. Klik op Next Volgende Page 66 De installatiewizard uitvoeren vervolg De wizard probeert nu automatisch het type internetverbinding vast te stellen. Als u een dynamische of PPPoE-verbinding gebruikt, wordt de bijbehorende pagina weergegeven. Anders wordt het volgende scherm weergegeven: Selecteer uw internetverbinding. U wordt gevraagd het type internetverbinding voor de router te selecteren. Page 67 De installatiewizard uitvoeren vervolg Als de internetprovider met statische IP-adressen werkt, en deze optie is ingeschakeld, ziet u het volgende scherm: Voer de IP-adresgegevens in die u hebt ontvangen van de internetprovider.

U moet alle verplichte velden invullen. Klik op Next Volgende Ga verder met Draadloos netwerk installeren. Page 68 U kunt deze instellingen aanpassen voor een bestaand draadloos netwerk. Als u encryptie wilt gebruiken voor het Encryptie is standaard uitgeschakeld. U kunt de encryptie-instellingen aanpassen voor een veiligere draadloze communicatie. Page 69 De installatie is voltooid! Learn more. With a purpose-built network, world-class expertise and solutions, and Australia-based customer support, you can trust Vocus to deliver.

Trusted by leading organisations. Read case studies. Our network and expertise. We connect people, businesses, governments, and communities across Australia and New Zealand, to the world. Select the application you want to use and enable it. Only one PC can use each Special Application tunnel. Name: This is the name referencing the special application.

Trigger Port: This is the port used to trigger the application. It can be either a single port or a range of ports. Trigger Type: This is the protocol used to trigger the special application.

You may define a single port or a. Public Type: This is the protocol used for the special application. The DI can also block users from accessing restricted web sites. You can deny specific port numbers or all ports. Port Range: The single port or port range that will be denied access to the Internet. Schedule: This is the schedule of time when the IP Filter will be enabled. A URL is a specially formatted text string that defines a location on the Internet.

If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked and click Apply. The text to be blocked will appear in the list. To delete the text, just. Select the filter you wish to use; in this case, URL Blocking. Select the filter you wish to use; in this case, MAC filters was chosen. Domain blocking will deny all requests to a specific domain such as http and ftp.

It can also allow computers to access specific. Select the filter you wish to use; in this case, Domain Blocking was chosen. Select Disabled to disable Domain Blocking. Allows users to access all domains except Blocked Domains. Firewall Rules is an advanced feature used to deny or allow traffic from passing through the DI It works in the same way as IP Filters with additional settings. You can create more detailed access rules for the DI When virtual services are created and enabled, it will also display in Firewall Rules.

Firewall Rules contain all network. In the Firewall Rules List at the bottom of the screen, the priorities of the rules are from top highest priority to bottom lowest priority. Enable or disable the Firewall. Select Always or enter the Time Range.

Select from the list of DDNS servers available. If you have a client PC that cannot run Internet applications properly from behind the DI, then you can set the client up for unrestricted Internet access. It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. Adding a client to the DMZ Demilitarized Zone may expose your local network to a variety of security risks, so. Enable or Disable the DMZ.

By default the DMZ is disabled. Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. This value should remain at its default setting of If inconsistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the byte setting will be fragmented before transmission. Delivery Traffic Indication Message 3 is the default setting.

A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. Select Short or Long Preamble.

The Preamble defines the length of the CRC block Cyclic Redundancy Check is a common technique for detecting data transmission errors for communication between the wireless router and the roaming wireless network adapters. Note: High network traffic areas should use the shorter preamble type.

Auto is the default selection. Selct from the drop down menu. Set Identifier to establish communication. Welcome to ManualMachine. We have sent a verification link to to complete your registration.



0コメント

  • 1000 / 1000