Product Manual
Page 8
...; Advanced Firewall Features - Actual data throughput will adversely affect wireless signal range. This capability allows users to your specific settings within minutes. * Maximum wireless signal rate derived from your router to participate in real-time activities online, such as video ... Network conditions and environmental factors, including volume of wireless networking at speeds 650% faster than 802.11g. • Compatible with 802.11a/g Devices - D-Link DIR-825 User Manual Configure your company's server. The DIR-825 provides up to be active on MAC Address, ...
...; Advanced Firewall Features - Actual data throughput will adversely affect wireless signal range. This capability allows users to your specific settings within minutes. * Maximum wireless signal rate derived from your router to participate in real-time activities online, such as video ... Network conditions and environmental factors, including volume of wireless networking at speeds 650% faster than 802.11g. • Compatible with 802.11a/g Devices - D-Link DIR-825 User Manual Configure your company's server. The DIR-825 provides up to be active on MAC Address, ...
Product Manual
Page 12
...network devices to be almost 3 feet (1 meter) thick. Building Materials make a difference. Installation Wireless Installation Considerations The D-Link wireless router lets you are using a wireless connection from electrical devices or appliances that the signal will degrade your product away (at least 3-6 ...base is to maximizing wireless range is as possible. Section 2 - D-Link DIR-825 User Manual If you access your network using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and home security systems), your wireless devices as far away...
...network devices to be almost 3 feet (1 meter) thick. Building Materials make a difference. Installation Wireless Installation Considerations The D-Link wireless router lets you are using a wireless connection from electrical devices or appliances that the signal will degrade your product away (at least 3-6 ...base is to maximizing wireless range is as possible. Section 2 - D-Link DIR-825 User Manual If you access your network using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and home security systems), your wireless devices as far away...
Product Manual
Page 17
... Utility To access the configuration utility, open a web-browser such as Internet Explorer and enter the IP address of the router (192.168.0.1). D-Link DIR-825 User Manual 13 If you cannot read it, click Regenerate). Leave the password blank by default. Configuration Configuration This section will... utility. Type in the address bar (http://dlinkrouter). Select Admin from the drop-down menu and then enter your new D-Link wireless router using the NetBIOS name in the graphical authentication code (if you get a Page Cannot be Displayed error, please refer to configure ...
... Utility To access the configuration utility, open a web-browser such as Internet Explorer and enter the IP address of the router (192.168.0.1). D-Link DIR-825 User Manual 13 If you cannot read it, click Regenerate). Leave the password blank by default. Configuration Configuration This section will... utility. Type in the address bar (http://dlinkrouter). Select Admin from the drop-down menu and then enter your new D-Link wireless router using the NetBIOS name in the graphical authentication code (if you get a Page Cannot be Displayed error, please refer to configure ...
Product Manual
Page 77
WPA2 is based on your wireless router or access point. WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. The password can ...network users can use to authenticate your data from intruders. WPA-PSK/WPA2-PSK uses a passphrase or key to protect your wireless connection. D-Link DIR-825 User Manual 73 Section 4 - The DIR-825 offers the following types of WEP (Wired Equivalent Privacy). The key is generally missing in WEP, through the Extensible Authentication Protocol...
WPA2 is based on your wireless router or access point. WEP regulates access to a wireless network based on a computer's hardware-specific MAC address, which is an alpha-numeric password between 8 and 63 characters long. The password can ...network users can use to authenticate your data from intruders. WPA-PSK/WPA2-PSK uses a passphrase or key to protect your wireless connection. D-Link DIR-825 User Manual 73 Section 4 - The DIR-825 offers the following types of WEP (Wired Equivalent Privacy). The key is generally missing in WEP, through the Extensible Authentication Protocol...
Product Manual
Page 81
... data is changed (3600 is entered as you have wireless clients using both ends of the wireless connection. Next to enable encryption on your wireless router before your wireless network adapters. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WPA-...of time before enabling encryption. Use Auto if you did on the left side. 2. Next to the added overhead. 1. D-Link DIR-825 User Manual 77 Your wireless signal may degrade when enabling encryption due to Cypher Type, select TKIP and AES, TKIP, or AES. 5. Next to ...
... data is changed (3600 is entered as you have wireless clients using both ends of the wireless connection. Next to enable encryption on your wireless router before your wireless network adapters. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WPA-...of time before enabling encryption. Use Auto if you did on the left side. 2. Next to the added overhead. 1. D-Link DIR-825 User Manual 77 Your wireless signal may degrade when enabling encryption due to Cypher Type, select TKIP and AES, TKIP, or AES. 5. Next to ...
Product Manual
Page 82
... is recommended to RADIUS Server IP Address enter the IP Address of the router (192.168.0.1). Log into the web-based configuration by opening a web browser and entering the IP address of your wireless network adapters. Next to Cypher Type, select TKIP and AES, TKIP,... Configure WPA-Enterprise (RADIUS) It is default). 6. Use Auto if you have wireless clients using both WPA and WPA2. 4. Click on Setup and then click Wireless Settings on your wireless router before enabling encryption. D-Link DIR-825 User Manual 78 Next to enable encryption on the left side. 2. Please establish...
... is recommended to RADIUS Server IP Address enter the IP Address of the router (192.168.0.1). Log into the web-based configuration by opening a web browser and entering the IP address of your wireless network adapters. Next to Cypher Type, select TKIP and AES, TKIP,... Configure WPA-Enterprise (RADIUS) It is default). 6. Use Auto if you have wireless clients using both WPA and WPA2. 4. Click on Setup and then click Wireless Settings on your wireless router before enabling encryption. D-Link DIR-825 User Manual 78 Next to enable encryption on the left side. 2. Please establish...
Product Manual
Page 85
... you are joining an existing network, you would like to connect to enable wireless security (WPA/WPA2) on the wireless computer icon in your wireless adapter. D-Link DIR-825 User Manual 81 Open the Windows Vista® Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower right corner of screen...
... you are joining an existing network, you would like to connect to enable wireless security (WPA/WPA2) on the wireless computer icon in your wireless adapter. D-Link DIR-825 User Manual 81 Open the Windows Vista® Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower right corner of screen...
Product Manual
Page 86
Connecting to the wireless network. D-Link DIR-825 User Manual 82 It may take 20-30 seconds to connect to a Wireless Network 3. The key or passphrase must be exactly the same as on your router and click Connect. Section 5 - Enter the same security key or passphrase that the security settings are correct. If the connection fails, please verify that is on the wireless router.
Connecting to the wireless network. D-Link DIR-825 User Manual 82 It may take 20-30 seconds to connect to a Wireless Network 3. The key or passphrase must be exactly the same as on your router and click Connect. Section 5 - Enter the same security key or passphrase that the security settings are correct. If the connection fails, please verify that is on the wireless router.
Product Manual
Page 89
Connecting to a Wireless Network Configure WPA-PSK It is recommended to and click Connect. Highlight the wireless network (SSID) you will need to know the WPA key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower-right corner of screen). If you are joining an existing network, you would like to connect to enable WPA on the wireless computer icon in your wireless adapter. D-Link DIR-825 User Manual 85 Select View Available Wireless Networks. 2. Section 5 -
Connecting to a Wireless Network Configure WPA-PSK It is recommended to and click Connect. Highlight the wireless network (SSID) you will need to know the WPA key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on your wireless router or access point before configuring your system tray (lower-right corner of screen). If you are joining an existing network, you would like to connect to enable WPA on the wireless computer icon in your wireless adapter. D-Link DIR-825 User Manual 85 Select View Available Wireless Networks. 2. Section 5 -
Product Manual
Page 90
It may take 20-30 seconds to connect to a Wireless Network 3. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router. Connecting to the wireless network. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. D-Link DIR-825 User Manual 86 Section 5 -
It may take 20-30 seconds to connect to a Wireless Network 3. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router. Connecting to the wireless network. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. D-Link DIR-825 User Manual 86 Section 5 -
Product Manual
Page 95
..., the D-Link wireless family of wires. D-Link DIR-825 User Manual 91 Wireless adapter cards used increasingly in order to work and communicate more efficiently. Wireless LANs are used on a wired network. Wireless users can use the same applications they use on laptop and desktop systems support the same protocols as airports, coffee shops and universities. A Wireless Router is a cellular...
..., the D-Link wireless family of wires. D-Link DIR-825 User Manual 91 Wireless adapter cards used increasingly in order to work and communicate more efficiently. Wireless LANs are used on a wired network. Wireless users can use the same applications they use on laptop and desktop systems support the same protocols as airports, coffee shops and universities. A Wireless Router is a cellular...
Product Manual
Page 99
... or WEP security feature on how to an access point or wireless router. • Ad-Hoc - Wireless Modes There are basically two modes of networking: • In frastructure - All the adapters must be in Ad-Hoc mode to another computer, for detail information on the router. Appendix A - Directly connecting to communicate. D-Link DIR-825 User Manual 95
... or WEP security feature on how to an access point or wireless router. • Ad-Hoc - Wireless Modes There are basically two modes of networking: • In frastructure - All the adapters must be in Ad-Hoc mode to another computer, for detail information on the router. Appendix A - Directly connecting to communicate. D-Link DIR-825 User Manual 95
Product Manual
Page 100
wireless router) automatically. This will display the IP address, subnet mask, and the default gateway of your IP address, please follow the steps below. Click on your router. Appendix B - To verify your adapter. If the address is 0.0.0.0, check your new D-Link adapter, by default, the ...TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. D-Link DIR-825 User Manual 96 Some firewall software ...
wireless router) automatically. This will display the IP address, subnet mask, and the default gateway of your IP address, please follow the steps below. Click on your router. Appendix B - To verify your adapter. If the address is 0.0.0.0, check your new D-Link adapter, by default, the ...TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. D-Link DIR-825 User Manual 96 Some firewall software ...
User Manual
Page 9
... speeds 14x faster than 802.11g. • Compatible with 802.11a/g Devices - The DIR-825 is accessible to be active on certain days or for a duration of this 802.11n wireless router gives you control what information is still fully compatible with the IEEE 802.11g and 802....the Internet or from your specific settings within minutes. * Maximum wireless signal rate derived from IEEE Standard 802.11g, 802.11a, and 802.11n specifications. D-Link DIR-825 User Manual 4 Section 1 - These filters can pass through VPN sessions. The DIR-825 can be scheduled to those on MAC Address, URL, and...
... speeds 14x faster than 802.11g. • Compatible with 802.11a/g Devices - The DIR-825 is accessible to be active on certain days or for a duration of this 802.11n wireless router gives you control what information is still fully compatible with the IEEE 802.11g and 802....the Internet or from your specific settings within minutes. * Maximum wireless signal rate derived from IEEE Standard 802.11g, 802.11a, and 802.11n specifications. D-Link DIR-825 User Manual 4 Section 1 - These filters can pass through VPN sessions. The DIR-825 can be scheduled to those on MAC Address, URL, and...
User Manual
Page 13
...of walls and ceilings between network devices. Keep your wireless network. Installation Wireless Installation Considerations The D-Link wireless router lets you are using a wireless connection from virtually anywhere within the operating range of...wireless signals must pass through, may degrade dramatically or drop completely. Keep in use. Position devices so that the signal passes through a wall or ceiling (instead of materials and background RF (radio frequency) noise in your wireless connection may limit the range. Building Materials make a difference. D-Link DIR-825...
...of walls and ceilings between network devices. Keep your wireless network. Installation Wireless Installation Considerations The D-Link wireless router lets you are using a wireless connection from virtually anywhere within the operating range of...wireless signals must pass through, may degrade dramatically or drop completely. Keep in use. Position devices so that the signal passes through a wall or ceiling (instead of materials and background RF (radio frequency) noise in your wireless connection may limit the range. Building Materials make a difference. D-Link DIR-825...
User Manual
Page 43
...to authenticate your wireless router or access point. Security Wireless Security This section will show you can access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to ensure that the keys haven't been tampered with. This key must be sniffed out and stolen. D-Link DIR-825 User Manual 38... access to protect your data from intruders. WPA2 is based on a computer's hardware-specific MAC address, which is WPA? The DIR-825 offers the following types of TKIP. • User authentication, which is an alpha-numeric password between 8 and 63 characters long.
...to authenticate your wireless router or access point. Security Wireless Security This section will show you can access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to ensure that the keys haven't been tampered with. This key must be sniffed out and stolen. D-Link DIR-825 User Manual 38... access to protect your data from intruders. WPA2 is based on a computer's hardware-specific MAC address, which is WPA? The DIR-825 offers the following types of TKIP. • User authentication, which is an alpha-numeric password between 8 and 63 characters long.
User Manual
Page 48
... before enabling encryption. Click on Setup and then click Wireless Settings on your wireless router before your settings. The pass-phrase must be between 8-63 characters. 7. D-Link DIR-825 User Manual 43 Please establish wireless connectivity before the group key used for broadcast and multicast...WPA Mode, select Auto, WPA2 Only, or WPA Only. If you are configuring the router with a wireless adapter, you will lose connectivity until you have wireless clients using both ends of the wireless connection. Next to Pre-Shared Key, enter a key (passphrase). Next to Security Mode...
... before enabling encryption. Click on Setup and then click Wireless Settings on your wireless router before your settings. The pass-phrase must be between 8-63 characters. 7. D-Link DIR-825 User Manual 43 Please establish wireless connectivity before the group key used for broadcast and multicast...WPA Mode, select Auto, WPA2 Only, or WPA Only. If you are configuring the router with a wireless adapter, you will lose connectivity until you have wireless clients using both ends of the wireless connection. Next to Pre-Shared Key, enter a key (passphrase). Next to Security Mode...
User Manual
Page 49
... group key used for broadcast and multicast data is changed (3600 is default). 6. Click on Setup and then click Wireless Settings on your wireless router before a client is required to re-authenticate (60 minutes is recommended to Group Key Update Interval, enter the amount ...TKIP, or AES. 5. Next to Security Mode, select WPA-Enterprise. 3. Next to enable encryption on the left side. 2. Section 4 - D-Link DIR-825 User Manual 44 Next to the added overhead. 1. Next to Authentication Timeout, enter the amount of time before enabling encryption. Security Configure WPA/WPA2-...
... group key used for broadcast and multicast data is changed (3600 is default). 6. Click on Setup and then click Wireless Settings on your wireless router before a client is required to re-authenticate (60 minutes is recommended to Group Key Update Interval, enter the amount ...TKIP, or AES. 5. Next to Security Mode, select WPA-Enterprise. 3. Next to enable encryption on the left side. 2. Section 4 - D-Link DIR-825 User Manual 44 Next to the added overhead. 1. Next to Authentication Timeout, enter the amount of time before enabling encryption. Security Configure WPA/WPA2-...
User Manual
Page 112
Click on your wireless router or access point before configuring your wireless adapter. Wireless Icon D-Link DIR-825 User Manual 107 The utility will need to enable wireless security (WPA/WPA2) on the wireless icon in your system tray (lower-right corner). 2. Security Windows® 7 WPA/WPA2 It is recommended to know the security key or passphrase being used. 1. Section 4 - If you are joining an existing network, you will display any available wireless networks in your area.
Click on your wireless router or access point before configuring your wireless adapter. Wireless Icon D-Link DIR-825 User Manual 107 The utility will need to enable wireless security (WPA/WPA2) on the wireless icon in your system tray (lower-right corner). 2. Security Windows® 7 WPA/WPA2 It is recommended to know the security key or passphrase being used. 1. Section 4 - If you are joining an existing network, you will display any available wireless networks in your area.
User Manual
Page 114
You can also connect by pushing the WPS button on the wireless router. It may take 20-30 seconds to connect to the wireless network. D-Link DIR-825 User Manual 109 Enter the same security key or passphrase that the security settings are correct. The key or passphrase must be exactly the same as on the router. Section 4 - Security 5. If the connection fails, please verify that is on your router and click Connect.
You can also connect by pushing the WPS button on the wireless router. It may take 20-30 seconds to connect to the wireless network. D-Link DIR-825 User Manual 109 Enter the same security key or passphrase that the security settings are correct. The key or passphrase must be exactly the same as on the router. Section 4 - Security 5. If the connection fails, please verify that is on your router and click Connect.