Product Manual
Page 13
... is default. Service Set Identifier (SSID) is a wireless security protocol for a specific wireless local area network (WLAN). The SSID can be established.) Select the level of encryption desired: 64-bit, or 128-bit. Select Enabled or Disabled. Key Type- Keys 1-4- select the one you enable encryption on the DI-624 make sure to...
... is default. Service Set Identifier (SSID) is a wireless security protocol for a specific wireless local area network (WLAN). The SSID can be established.) Select the level of encryption desired: 64-bit, or 128-bit. Select Enabled or Disabled. Key Type- Keys 1-4- select the one you enable encryption on the DI-624 make sure to...
Product Manual
Page 28
... DMZ. Enter the IP address of the internal computer that cannot run Internet applications properly from behind the DI-624, then you can set the client up for gaming purposes. Enter the IP Address of security risks, so only use this option as a last resort. It allows a computer to a variety of the computer to...
... DMZ. Enter the IP address of the internal computer that cannot run Internet applications properly from behind the DI-624, then you can set the client up for gaming purposes. Enter the IP Address of security risks, so only use this option as a last resort. It allows a computer to a variety of the computer to...
Product Manual
Page 31
... Menu (continued) Tools> Admin At this field would present a security risk and is the Administrator login name PasswordUser- admin is not recommended.... an asterisk (*) into this page, the DI-624 administrator can browse the built-in web pages to perform Administrator tasks. Remote management allows the DI-624 to access the Broadband Router. Admin has read/write access while user ...settings but cannot make any computer will be configured from the remote (Internet) host. If you to confirm user is the port used to be able to the Broadband Router...
... Menu (continued) Tools> Admin At this field would present a security risk and is the Administrator login name PasswordUser- admin is not recommended.... an asterisk (*) into this page, the DI-624 administrator can browse the built-in web pages to perform Administrator tasks. Remote management allows the DI-624 to access the Broadband Router. Admin has read/write access while user ...settings but cannot make any computer will be configured from the remote (Internet) host. If you to confirm user is the port used to be able to the Broadband Router...
Product Manual
Page 59
... Router and the Wireless Client. Make sure that generate RF noise, like microwaves, monitors, electric motors, etc. 6. Make sure that the encryption bit level is the same on all security settings. (WEP, MAC Address Control) 59 Try to avoid interference. Keep your environment will not be established. Move the DI-624 and the wireless...
... Router and the Wireless Client. Make sure that generate RF noise, like microwaves, monitors, electric motors, etc. 6. Make sure that the encryption bit level is the same on all security settings. (WEP, MAC Address Control) 59 Try to avoid interference. Keep your environment will not be established. Move the DI-624 and the wireless...
Product Manual
Page 67
Nothing should be checked. might block access to Start>Settings>Control Panel. Go to the configuration pages. From the Security tab, click the button to restore the settings to the desktop and close any Internet security software running on disabling or configuring it. Frequently Asked Questions (continued) Why can´t I access...
Nothing should be checked. might block access to Start>Settings>Control Panel. Go to the configuration pages. From the Security tab, click the button to restore the settings to the desktop and close any Internet security software running on disabling or configuring it. Frequently Asked Questions (continued) Why can´t I access...
Product Manual
Page 78
...systems please refer to initiate a session back into the private network. It can access only the DMZ host. It prevents outside world. D-Link, a leading maker of routers, is configured for access to a firewall and effectively acts as a proxy server as well. DMZ is DMZ? ...designed for these could be exposed to the Internet. The DMZ host then initiates sessions for setting up between a company´s private network and the outside user penetrated the DMZ hosts security, the Web pages might be corrupted but no other companies accessible on the local network....
...systems please refer to initiate a session back into the private network. It can access only the DMZ host. It prevents outside world. D-Link, a leading maker of routers, is configured for access to a firewall and effectively acts as a proxy server as well. DMZ is DMZ? ...designed for these could be exposed to the Internet. The DMZ host then initiates sessions for setting up between a company´s private network and the outside user penetrated the DMZ hosts security, the Web pages might be corrupted but no other companies accessible on the local network....