Product Manual
Page 3
Special Applications 22 Application Level Gateway (ALG) Configurations 22 Add/Edit Special Applications Rule 23 Special Applications Rules List 23 Gaming ...24 Add/Edit Game Rule 24 Game Rules List 24 GameFuel 25 GameFuel™ Setup 25 Add/Edit GameFuel™ Rule 26 GameFuel Rules List 26 Routing...27...Web Site 29 Allowed Web Site List 29 Mac Address Filters 30 Filter Settings 30 Add MAC Address 30 MAC Address List 30 Firewall ...31 Firewall Settings 31 Inbound Filters 32 Add/Edit Inbound Filter Rule 32 Inbound Filter Rules List 32 Configuring an Inbound Filter Rule 33 3...
Special Applications 22 Application Level Gateway (ALG) Configurations 22 Add/Edit Special Applications Rule 23 Special Applications Rules List 23 Gaming ...24 Add/Edit Game Rule 24 Game Rules List 24 GameFuel 25 GameFuel™ Setup 25 Add/Edit GameFuel™ Rule 26 GameFuel Rules List 26 Routing...27...Web Site 29 Allowed Web Site List 29 Mac Address Filters 30 Filter Settings 30 Add MAC Address 30 MAC Address List 30 Firewall ...31 Firewall Settings 31 Inbound Filters 32 Add/Edit Inbound Filter Rule 32 Inbound Filter Rules List 32 Configuring an Inbound Filter Rule 33 3...
Product Manual
Page 8
... Address Translation (NAT) firewall help protect against hackers, wardrivers, and other applications without degradation in game connection Pre-configured ports to accommodate up to 256 policies for games and applications Customizable settings to add or modify new applications or game configurations New firmware upgrade notification keeps your D-Link Gaming Router up-to-date ...
... Address Translation (NAT) firewall help protect against hackers, wardrivers, and other applications without degradation in game connection Pre-configured ports to accommodate up to 256 policies for games and applications Customizable settings to add or modify new applications or game configurations New firmware upgrade notification keeps your D-Link Gaming Router up-to-date ...
Product Manual
Page 31
...or deletions, you must reboot before new settings will take effect.You will be reported on the Status > Active sessions page. The router must click the Save Settings button at the top of the computer on the LAN that you may expose that computer to make a... conforms to prevent cyber attacks by tracking more state per session. Using the Configuration Interface Advanced > Firewall 31 D-Link Systems, Inc. If you need to a variety of applications. The D-Link Gaming Router offers a firewall type functionality. Use of the DMZ machine does not change. If this computer obtains it's IP ...
...or deletions, you must reboot before new settings will take effect.You will be reported on the Status > Active sessions page. The router must click the Save Settings button at the top of the computer on the LAN that you may expose that computer to make a... conforms to prevent cyber attacks by tracking more state per session. Using the Configuration Interface Advanced > Firewall 31 D-Link Systems, Inc. If you need to a variety of applications. The D-Link Gaming Router offers a firewall type functionality. Use of the DMZ machine does not change. If this computer obtains it's IP ...
Product Manual
Page 42
... Logs option allows you want displayed in it displays any recent activity. This router also has external Syslog Server support so you want to display from the log. Firewall & Security, System, and Router Status messages can define what types of events you can select the types of message ...: Clear: Email Now: Save Log: Updates the log details on your computer. Using the Configuration Interface Status > Routing Status > Logs 42 D-Link Systems, Inc. The IP address is directly connected to view and the level of the log contents. You can be selected. Clears all events...
... Logs option allows you want displayed in it displays any recent activity. This router also has external Syslog Server support so you want to display from the log. Firewall & Security, System, and Router Status messages can define what types of events you can select the types of message ...: Clear: Email Now: Save Log: Updates the log details on your computer. Using the Configuration Interface Status > Routing Status > Logs 42 D-Link Systems, Inc. The IP address is directly connected to view and the level of the log contents. You can be selected. Clears all events...
Product Manual
Page 49
... it easier to store FTP - F Fiber optic - Allowing data from unauthorized users outside of 1 billion bits per second Gigabit Ethernet - Programming that is inserted into a hardware device that may change. A device that provides consistency of voice and video... Protocol Email - The most widely used technology for videoconferencing devices 49 Appendix D-Link Systems, Inc. A way of access rights Firewall - The amount an amplifier boosts the wireless signal Gateway - Gigabits per second Graphical user interface - Transmission technology that is transmitted over glass or...
... it easier to store FTP - F Fiber optic - Allowing data from unauthorized users outside of 1 billion bits per second Gigabit Ethernet - Programming that is inserted into a hardware device that may change. A device that provides consistency of voice and video... Protocol Email - The most widely used technology for videoconferencing devices 49 Appendix D-Link Systems, Inc. A way of access rights Firewall - The amount an amplifier boosts the wireless signal Gateway - Gigabits per second Graphical user interface - Transmission technology that is transmitted over glass or...
Product Manual
Page 54
...Protocol TFTP - A utility displays the routes between applications on 54 Appendix D-Link Systems, Inc. An encryption and decryption key that is generated for a wireless network Stateful inspection - A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses ...to outgoing requests for transferring files that is simpler to pass though the firewall Subnet mask - Trivial File Transfer Protocol is a command line interface that can be identified without having to other computers on...
...Protocol TFTP - A utility displays the routes between applications on 54 Appendix D-Link Systems, Inc. An encryption and decryption key that is generated for a wireless network Stateful inspection - A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses ...to outgoing requests for transferring files that is simpler to pass though the firewall Subnet mask - Trivial File Transfer Protocol is a command line interface that can be identified without having to other computers on...