Product Manual
Page 8
... D-Link Gaming Router up-to-date Next Generation hardware with both Wi-Fi Protected Access (WPA) and 128-bit Wired Equivalent Privacy (WEP) Integrated Stateful Packet Inspection (SPI) firewall and Network Address Translation (NAT) firewall help protect against unauthorized access to your wireless network Supports Virtual Private Network (VPN) pass...
... D-Link Gaming Router up-to-date Next Generation hardware with both Wi-Fi Protected Access (WPA) and 128-bit Wired Equivalent Privacy (WEP) Integrated Stateful Packet Inspection (SPI) firewall and Network Address Translation (NAT) firewall help protect against unauthorized access to your wireless network Supports Virtual Private Network (VPN) pass...
Product Manual
Page 31
... the operation of such devices. Some VPN clients support traversal of the common applications using PPTP protocol. If you are some of IPSec through the router. 31 Using the Configuration Interface Advanced > Special Applications D-Link Systems, Inc. QuickTime and Real Player... are having trouble making VoIP calls, try turning this protocol. Allows all computers on your VPN client supports NAT traversal. Each...
... the operation of such devices. Some VPN clients support traversal of the common applications using PPTP protocol. If you are some of IPSec through the router. 31 Using the Configuration Interface Advanced > Special Applications D-Link Systems, Inc. QuickTime and Real Player... are having trouble making VoIP calls, try turning this protocol. Allows all computers on your VPN client supports NAT traversal. Each...
Product Manual
Page 61
...of 150 ft using a Frequency Hopping transmission method Hop - Internet Key Exchange is used to ensure security for VPN connections Infrastructure - The method of a wireless network, this is a WEB server and FTP server provided by Microsoft Internet Protocol - Half-duplex - Computer on...a shorter string with other products without much customer interaction Intranet - A private network 61 Appendix D-Link Systems, Inc. Data cannot be accessed from one computer to adjacent routers IIS - Networking over SSL is used to the network Internet - Transforming a string of worldwide ...
...of 150 ft using a Frequency Hopping transmission method Hop - Internet Key Exchange is used to ensure security for VPN connections Infrastructure - The method of a wireless network, this is a WEB server and FTP server provided by Microsoft Internet Protocol - Half-duplex - Computer on...a shorter string with other products without much customer interaction Intranet - A private network 61 Appendix D-Link Systems, Inc. Data cannot be accessed from one computer to adjacent routers IIS - Networking over SSL is used to the network Internet - Transforming a string of worldwide ...
Product Manual
Page 64
...QoS - Post Office Protocol 3 is used for encryption and authentication 64 Appendix D-Link Systems, Inc. Retransmits the signal of transmitting electricity over the Internet between devices on a...to access resources on a network Personal Area Network - P Password - A sequence of all the routers on a network to discover each over Ethernet is used for devices on a network RJ-11 - ...64257;gure any settings Repeater - Apple's version of UPnP, which allows for creating VPN tunnels over the unused pairs in order to synchronize the routing table of characters that...
...QoS - Post Office Protocol 3 is used for encryption and authentication 64 Appendix D-Link Systems, Inc. Retransmits the signal of transmitting electricity over the Internet between devices on a...to access resources on a network Personal Area Network - P Password - A sequence of all the routers on a network to discover each over Ethernet is used for devices on a network RJ-11 - ...64257;gure any settings Repeater - Apple's version of UPnP, which allows for creating VPN tunnels over the unused pairs in order to synchronize the routing table of characters that...