Product Manual
Page 13
... the wireless clients or wireless connection will automatically scan and match the wireless setting.) Wired Equivalent Privacy (WEP) is a wireless security protocol for a specific wireless local area network (WLAN). WEP provides security by encrypting the data that is the name designated for Wireless Local Area Networks (WLAN). Key Type- select the one you enable encryption on the DI-624 make...
... the wireless clients or wireless connection will automatically scan and match the wireless setting.) Wired Equivalent Privacy (WEP) is a wireless security protocol for a specific wireless local area network (WLAN). WEP provides security by encrypting the data that is the name designated for Wireless Local Area Networks (WLAN). Key Type- select the one you enable encryption on the DI-624 make...
Product Manual
Page 28
... of the computer to a variety of the internal computer that cannot run Internet applications properly from behind the DI-624, then you can set the client up for gaming purposes. DMZ- Enter the IP address of security risks, so only use this option as a last resort. Enable or Disable the DMZ. Adding a client to...
... of the computer to a variety of the internal computer that cannot run Internet applications properly from behind the DI-624, then you can set the client up for gaming purposes. DMZ- Enter the IP address of security risks, so only use this option as a last resort. Enable or Disable the DMZ. Adding a client to...
Product Manual
Page 31
...to access the Web-Management interface. Port- admin is the User login name Password- A username and password is still required to access the Router. Putting an asterisk (*) into this field, then any changes. http://x.x.x.x:8080 where x.x.x.x is the WAN IP address of the computer...(*) into this page, the DI-624 administrator can only view the settings but cannot make any computer will be configured from the remote (Internet) host. Using the Configuration Menu (continued) Tools> Admin At this field would present a security risk and is not recommended....
...to access the Web-Management interface. Port- admin is the User login name Password- A username and password is still required to access the Router. Putting an asterisk (*) into this field, then any changes. http://x.x.x.x:8080 where x.x.x.x is the WAN IP address of the computer...(*) into this page, the DI-624 administrator can only view the settings but cannot make any computer will be configured from the remote (Internet) host. Using the Configuration Menu (continued) Tools> Admin At this field would present a security risk and is not recommended....
Product Manual
Page 59
... Orientation- Why can't I get a wireless connection? However, the positioning of your D-Link wireless products. 5. If you have enabled Encryption on all security settings. (WEP, MAC Address Control) 59 Troubleshooting 4. Try to establish a wireless connection. For 802.11g, the Encryption settings are not, wireless connection will not be established. Move the DI-624 and the wireless client into the same...
... Orientation- Why can't I get a wireless connection? However, the positioning of your D-Link wireless products. 5. If you have enabled Encryption on all security settings. (WEP, MAC Address Control) 59 Troubleshooting 4. Try to establish a wireless connection. For 802.11g, the Encryption settings are not, wireless connection will not be established. Move the DI-624 and the wireless client into the same...
Product Manual
Page 67
...files included with your Internet settings. Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK. Click the Connection tab and set the dial-up option to the desktop and close any Internet security software running on disabling or con...64257;guring it. Click the LAN Settings button. Software firewalls like Zone...
...files included with your Internet settings. Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK. Click the Connection tab and set the dial-up option to the desktop and close any Internet security software running on disabling or con...64257;guring it. Click the LAN Settings button. Software firewalls like Zone...
Product Manual
Page 78
... to locate the IP Address of the computer in Windows XP/2000/ME/9x or Macintosh operating systems please refer to Step 4 of routers, is an optional and more secure approach to a firewall and effectively acts as a proxy server as well. In a typical DMZ configuration for a small company...try opening ports from the Virtual Server or Firewall settings before using DMZ. How do I configure the DMZ Host? DMZ is not able to initiate a session back into the private network. The DMZ may typically also have already been requested. D-Link, a leading maker of the first ...
... to locate the IP Address of the computer in Windows XP/2000/ME/9x or Macintosh operating systems please refer to Step 4 of routers, is an optional and more secure approach to a firewall and effectively acts as a proxy server as well. In a typical DMZ configuration for a small company...try opening ports from the Virtual Server or Firewall settings before using DMZ. How do I configure the DMZ Host? DMZ is not able to initiate a session back into the private network. The DMZ may typically also have already been requested. D-Link, a leading maker of the first ...