Professional Documents
Culture Documents
Repeater.
Step 1
Disconnect the modem from its power adapter. Connect an Ethernet cable to the modem.
Step 2
Plug the other end of the cable into the "Internet" port on the back of the wireless router.
Step 3
Connect the computer to a LAN port on the D-Link. Connect the modem and the router to a
power outlet.
Basic Configuration
Step 1
Know the default router IP address and default user name with password in a Web browser to
access the setup wizard.
Step 2
Choose your connection type from the options. Most Ethernet connections use DHCP. Click
"Connect."
Step 3
CPIC-CSS NC II Page 1 of 9
Enter the username and password for your Internet service into the appropriate fields or fill in the
IP Address, Subnet Mask, Gateway Address and Primary DNS Server fields, if applicable.
CPIC-CSS NC II Page 2 of 9
CPIC-CSS NC II Page 3 of 9
Step 4
Click "Connect" to set up the network on the D-Link.
Advanced Settings
Step 5
Choose "Configure" from under Wireless Settings. Click "Wireless Connection Setup Wizard."
Click "Next."
CPIC-CSS NC II Page 4 of 9
Step 6
Enter a name for the network into the Wireless Network Name (SSID) field and then choose
"Automatically Assign a Network Key" from the options.
Step 7
Select "Use WPA Encryption Instead of WEP," for the best security, and then click "Next." Write
down the security password shown on-screen and store the password in a secure location.
Step 8
Click "Save" to finish configuring the router. After the router automatically reboots, disconnect the
router's Ethernet connection from the computer if desired.
Router Other Functions:
1. DHCP IP Address Reservation:
CPIC-CSS NC II Page 5 of 9
2. MAC Filtering
CPIC-CSS NC II Page 6 of 9
4. Router Firewall Function
a. Application rules
b. Web Filtering
c. Application Filter
CPIC-CSS NC II Page 7 of 9
d. Port Filtering
CPIC-CSS NC II Page 8 of 9
a. translating the address or port number of a packet to a new
destinationpossibly accepting such packet(s) in a packet filter (firewall)
b. forwarding the packet according to the routing table
c. The destination may be a predetermined network port (assuming
protocols like TCP and UDP, though the process is not limited to these)
on a host within a NAT-masqueraded, typically private network, based on
the port number on which it was received at the gateway from the
originating host.
CPIC-CSS NC II Page 9 of 9