Product Manual
Page 3
If any of Package: n D-Link DI-804HV Broadband Hardware VPN Router n Power Adapter - 5V DC n Ethernet (CAT5-UTP/Straight-Through) Cable n Manual on CD n Quick Installation Guide Note: Using a power supply with a different voltage rating than the one included with JavaScript enabled 3 System Requirements For Configuration: n Ethernet-Based Cable or DSL Modem n Computer with Windows, Macintosh, or...
If any of Package: n D-Link DI-804HV Broadband Hardware VPN Router n Power Adapter - 5V DC n Ethernet (CAT5-UTP/Straight-Through) Cable n Manual on CD n Quick Installation Guide Note: Using a power supply with a different voltage rating than the one included with JavaScript enabled 3 System Requirements For Configuration: n Ethernet-Based Cable or DSL Modem n Computer with Windows, Macintosh, or...
Product Manual
Page 5
... All of the networked computers can retrieve TCP/IP settings automatically from the DI-804HV n Web-based configuration Configurable through or cross-over cable. Features & Benefits Pressing the Reset Button restores the router to Ethernetenabled devices. WAN port is the connection for the Ethernet cable to...for the Power Adapter COM port provides serial connection for dial-up to 40 VPN Tunnels n VPN Pass-Through supported Supports pass-through VPN sessions and allows you to setup VPN server and VPN clients n Firewall Unwanted packets from outside intruders can be blocked to surf ...
... All of the networked computers can retrieve TCP/IP settings automatically from the DI-804HV n Web-based configuration Configurable through or cross-over cable. Features & Benefits Pressing the Reset Button restores the router to Ethernetenabled devices. WAN port is the connection for the Ethernet cable to...for the Power Adapter COM port provides serial connection for dial-up to 40 VPN Tunnels n VPN Pass-Through supported Supports pass-through VPN sessions and allows you to setup VPN server and VPN clients n Firewall Unwanted packets from outside intruders can be blocked to surf ...
Product Manual
Page 29
...Create a name for optimal performance. For more in depth configuration to allow NetBIOS braodcast over the VPN tunnels. number of allowable tunnels. More- Select the maximum number of tunnelsTunnel NameMethod- IPSec VPN supports two kinds of both endpoint gateways will perform automatic Internet... virtual private tunnels to remote VPN gateways. It is best to keep VPN disabled. Using the Configuration Menu Home >VPN Settings VPN Settings are settings that are not using the VPN feature, it is recommended that the two endpoint VPN gateways require setting up authentication ...
...Create a name for optimal performance. For more in depth configuration to allow NetBIOS braodcast over the VPN tunnels. number of allowable tunnels. More- Select the maximum number of tunnelsTunnel NameMethod- IPSec VPN supports two kinds of both endpoint gateways will perform automatic Internet... virtual private tunnels to remote VPN gateways. It is best to keep VPN disabled. Using the Configuration Menu Home >VPN Settings VPN Settings are settings that are not using the VPN feature, it is recommended that the two endpoint VPN gateways require setting up authentication ...
Product Manual
Page 30
...or a whole subnet. IPSec Proposal index- Remote Subnet- It can be the same for both VPN gateways for negotiating further security keys. The WAN IP address of the VPN gateway's local network. The first key that supports IKE mechanism of both endpoint gateways. Local netmask ... IKE proposals and select from the set of IPSec proposals for the tunnel. The subnet of remote VPN gateway. Click the button to form a subnet domain. Using the Configuration Menu Home >VPN Settings > Tunnel > Method>IKE Tunnel Name- Remote Gateway- Aggressive Mode- It can be a host...
...or a whole subnet. IPSec Proposal index- Remote Subnet- It can be the same for both VPN gateways for negotiating further security keys. The WAN IP address of the VPN gateway's local network. The first key that supports IKE mechanism of both endpoint gateways. Local netmask ... IKE proposals and select from the set of IPSec proposals for the tunnel. The subnet of remote VPN gateway. Click the button to form a subnet domain. Using the Configuration Menu Home >VPN Settings > Tunnel > Method>IKE Tunnel Name- Remote Gateway- Aggressive Mode- It can be a host...
Product Manual
Page 31
Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index- A list of selected proposal indexes from the IKE proposal pool listed below. Auth algorithm- This is the name used to classify the IKE proposal. DH Group- There are three groups can be selected: SHA1 and MD5. 31 Encrypt algorithm- There are two algorithms that can be selected: 3DES and DES. There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Proposal Name-
Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal IKE Proposal index- A list of selected proposal indexes from the IKE proposal pool listed below. Auth algorithm- This is the name used to classify the IKE proposal. DH Group- There are three groups can be selected: SHA1 and MD5. 31 Encrypt algorithm- There are two algorithms that can be selected: 3DES and DES. There are two algorithms that can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). Proposal Name-
Product Manual
Page 32
Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB. Enter in the life time value. The identifier of IKE proposal can be chosen for adding corresponding proposal to the dedicated tunnel. Add to IKE Proposal index list. 32 Click it to add the chosen proposal indicated by proposal ID to - Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued...
Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB. Enter in the life time value. The identifier of IKE proposal can be chosen for adding corresponding proposal to the dedicated tunnel. Add to IKE Proposal index list. 32 Click it to add the chosen proposal indicated by proposal ID to - Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IKE Proposal Continued...
Product Manual
Page 33
... of selected proposal indexes from the IPSec proposal pool listed below. There are two algorithms that can be selected: ESP and AH. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal indexProposal Name- Encap protocol- Encrypt algorithm- This is the name used to classify the IPSec...
... of selected proposal indexes from the IPSec proposal pool listed below. There are two algorithms that can be selected: ESP and AH. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal IPSec Proposal indexProposal Name- Encap protocol- Encrypt algorithm- This is the name used to classify the IPSec...
Product Manual
Page 34
Click it to add the chosen proposal indicated by proposal ID to - Enter in a life time value. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. Add to IPSec Proposal index list. 34
Click it to add the chosen proposal indicated by proposal ID to - Enter in a life time value. Using the Configuration Menu Home >VPN Settings > Tunnel > Method > IKE > Select IPSEC Proposal Continued... Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB. The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. Add to IPSec Proposal index list. 34
Product Manual
Page 35
... in hex format. Local Subnet- It can be a host, a partial subnet or a whole subnet. The subnet of remote VPN gateway. Enabling this mode will accelerate establishing tunnel, but the device will have less security. Local netmask combined with local subnet to the... VPN gateway. The value of the local SPI should be a host, a partial subnet or a whole subnet. Remote NetmaskRemote GatewayMethod- Remote SPI- The WAN IP address of the remote VPN gateway's local network. Local SPI- Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Tunnel...
... in hex format. Local Subnet- It can be a host, a partial subnet or a whole subnet. The subnet of remote VPN gateway. Enabling this mode will accelerate establishing tunnel, but the device will have less security. Local netmask combined with local subnet to the... VPN gateway. The value of the local SPI should be a host, a partial subnet or a whole subnet. Remote NetmaskRemote GatewayMethod- Remote SPI- The WAN IP address of the remote VPN gateway's local network. Local SPI- Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Tunnel...
Product Manual
Page 36
... selected: 3DES and DES. Encryption Key- There are two algorithms that can be selected: SHA1 and MD5. Enter in the life time value. Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Continued... For DES, the encryption key is 8 bytes (16 alpha-numeric characters).
... selected: 3DES and DES. Encryption Key- There are two algorithms that can be selected: SHA1 and MD5. Enter in the life time value. Using the Configuration Menu Home >VPN Settings > Tunnel > Manual Continued... For DES, the encryption key is 8 bytes (16 alpha-numeric characters).
Product Manual
Page 37
... It can be a host, a partial subnet or a whole subnet. IKE- This feature works with a VPN software client so the DI-804HV does not need to setup the configuration of VPN setting. Enabling this mode will accelerate establishing the tunnel, but the device will have less security. Current tunnel ...name. The tunnel name is derived from the set of the VPN gateway's local network. ...
... It can be a host, a partial subnet or a whole subnet. IKE- This feature works with a VPN software client so the DI-804HV does not need to setup the configuration of VPN setting. Enabling this mode will accelerate establishing the tunnel, but the device will have less security. Current tunnel ...name. The tunnel name is derived from the set of the VPN gateway's local network. ...
Product Manual
Page 38
The preshared key must be the same for negotiating further security keys. The first key that supports IKE mechanism of both VPN gateways for both endpoint gateways. IKE Proposal index- Click the button to setup a set of frequent-used IKE proposals and select from the set of ... to setup a set of frequent-used IPSec proposals and select from the set of IKE proposals for the dedicated tunnel. 38 Preshared Key- Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel Continued... IPSec Proposal index-
The preshared key must be the same for negotiating further security keys. The first key that supports IKE mechanism of both VPN gateways for both endpoint gateways. IKE Proposal index- Click the button to setup a set of frequent-used IKE proposals and select from the set of ... to setup a set of frequent-used IPSec proposals and select from the set of IKE proposals for the dedicated tunnel. 38 Preshared Key- Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel Continued... IPSec Proposal index-
Product Manual
Page 39
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index- There are two algorithms that can be selected: 3DES and DES. There are two algorithms that can be selected: SHA1 and MD5. 39 This is the name used to classify the IKE proposal. Encrypt algorithm- Auth algorithm- DH Group- Proposal Name- There are three groups can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). A list of selected proposal indexes from the IKE proposal pool listed below.
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal IKE Proposal index- There are two algorithms that can be selected: 3DES and DES. There are two algorithms that can be selected: SHA1 and MD5. 39 This is the name used to classify the IKE proposal. Encrypt algorithm- Auth algorithm- DH Group- Proposal Name- There are three groups can be selected: group 1 (MODP768), group 2 (MODP1024), group 5 (MODP1536). A list of selected proposal indexes from the IKE proposal pool listed below.
Product Manual
Page 40
The identifier of IKE proposal can be chosen for adding corresponding proposal to IKE Proposal index list. 40 Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued... There are two units that can be selected: second and KB. Life TimeLife Time UnitProposal ID- Enter in the life time value. Add to-
The identifier of IKE proposal can be chosen for adding corresponding proposal to IKE Proposal index list. 40 Click it to add the chosen proposal indicated by proposal ID to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal Continued... There are two units that can be selected: second and KB. Life TimeLife Time UnitProposal ID- Enter in the life time value. Add to-
Product Manual
Page 41
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index- Encrypt algorithm- Encap protocol- This is the name used to classify the IPSec proposal. Auth algorithm- A list of ...
Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal IPSec Proposal index- Encrypt algorithm- Encap protocol- This is the name used to classify the IPSec proposal. Auth algorithm- A list of ...
Product Manual
Page 42
Click it to add the chosen proposal indicated by proposal ID to - The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued... Enter in a life time value. Add to IPSec Proposal index list. 42 Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB.
Click it to add the chosen proposal indicated by proposal ID to - The identifier of IPSec proposal can be chosen for adding the proposal to the dedicated tunnel. Using the Configuration Menu Home >VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal Continued... Enter in a life time value. Add to IPSec Proposal index list. 42 Life TimeLife Time UnitProposal ID- There are two units that can be selected: second and KB.
Product Manual
Page 43
User Name- Server- Enter in the password for the L2TP account. Using the Configuration Menu Home >VPN Settings > L2TP Server Setting Enable L2TP Server- Click to access the L2TP server. Current tunnel name. Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP. Password- Enter in the username for the L2TP account. 43 Authentication Protocol- Tunnel Name- Select one of L2TP Enter your Virtual IP address to enable the L2TP Server function.
User Name- Server- Enter in the password for the L2TP account. Using the Configuration Menu Home >VPN Settings > L2TP Server Setting Enable L2TP Server- Click to access the L2TP server. Current tunnel name. Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP. Password- Enter in the username for the L2TP account. 43 Authentication Protocol- Tunnel Name- Select one of L2TP Enter your Virtual IP address to enable the L2TP Server function.
Product Manual
Page 44
Current tunnel name. Server- Tunnel Name- Enter in the password for the PPTP account. User Name- Password- Authentication Protocol- Using the Configuration Menu Home >VPN Settings >PPTP Server Setting Enable PPTP Server- Click to access the PPTP server. Select one of PPTP Enter your Virtual IP address to enable the PPTP Server function. Enter in the username for the PPTP account. 44 Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP.
Current tunnel name. Server- Tunnel Name- Enter in the password for the PPTP account. User Name- Password- Authentication Protocol- Using the Configuration Menu Home >VPN Settings >PPTP Server Setting Enable PPTP Server- Click to access the PPTP server. Select one of PPTP Enter your Virtual IP address to enable the PPTP Server function. Enter in the username for the PPTP account. 44 Virtual IP of the following authentication protocols: PAP, CHAP, MSCHAP.
Product Manual
Page 55
RIP v1- The RIP protocol is applied, and broadcasts the routing information to enable (RIPv1 / RIPv2) protocol. Enhanced version of RIP v1with added features such as Authentication, Routing Domain, Next Hop Fowarding, and Subnetmask Exchange. 55 Check to other routers on the network regularly. By default, it is routed through the internet. RIP v2- Protocol in which the IP address is set to another network automatically. Dynamic Routing Settings allow the VPN Router to route IP packets to disable. Using the Configuration Menu Advanced > Routing Dynamic Routing-
RIP v1- The RIP protocol is applied, and broadcasts the routing information to enable (RIPv1 / RIPv2) protocol. Enhanced version of RIP v1with added features such as Authentication, Routing Domain, Next Hop Fowarding, and Subnetmask Exchange. 55 Check to other routers on the network regularly. By default, it is routed through the internet. RIP v2- Protocol in which the IP address is set to another network automatically. Dynamic Routing Settings allow the VPN Router to route IP packets to disable. Using the Configuration Menu Advanced > Routing Dynamic Routing-
Product Manual
Page 62
... on the LAN. If an FTP server you want to open up virtual services. VPN PassThrough- The DI-804HV is no need to use the UPnP Functionality, it can be disabled by selecting "Disabled". This is useful when you do not want to -... can be made through the device. UPnP- The device supports VPN (Virtual Private Network) pass-through is enabled, there is a UPnP enabled router and will only work with other UPnP devices/softwares. Using the Configuration Menu Tools > Misc Continued... Once VPN pass-through for Universal Plug and Play which is a networking architecture that ...
... on the LAN. If an FTP server you want to open up virtual services. VPN PassThrough- The DI-804HV is no need to use the UPnP Functionality, it can be disabled by selecting "Disabled". This is useful when you do not want to -... can be made through the device. UPnP- The device supports VPN (Virtual Private Network) pass-through is enabled, there is a UPnP enabled router and will only work with other UPnP devices/softwares. Using the Configuration Menu Tools > Misc Continued... Once VPN pass-through for Universal Plug and Play which is a networking architecture that ...