This document provides an overview of the hardware and software features of the D-Link DIR-615 wireless router. The key hardware components include connections for Ethernet and power, as well as LED indicators. The router supports wireless networking speeds of up to 300Mbps and can connect both 802.11n and older 802.11b/g wireless devices. It includes features such as firewall security, parental controls, VPN support, and a user-friendly setup wizard to guide initial device configuration.
A college class in Network Security Monitoring at CCSF, based on "The Practice of Network Security Monitoring: Understanding Incident Detection and Response" by Richard Bejtlich, No Starch Press; 1 edition (July 26, 2013), ASIN: B00E5REN34
Course website: https://samsclass.info/50/50_F17.shtml
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
Virtual private networks (VPNs) allow employees to securely access a company's intranet from remote locations over the public Internet. VPNs use encryption and tunneling protocols to create a private network through a public network by encapsulating data packets within normal Internet traffic. This allows employees to access the company network while saving costs by eliminating expenses associated with private leased lines or dial-up connections. Common VPN protocols include PPTP, L2TP, and IPsec. VPNs are widely used by businesses to allow remote access for employees and interconnect multiple office locations through secure site-to-site connections.
This presentation is based on the security and encryption measures adopted by Apple for its iPhones.
It was submitted to RTU, Kota during final year seminars.
Man in the middle attacks on IEC 60870-5-104pgmaynard
This document discusses man-in-the-middle attacks on the IEC 60870-5-104 protocol. It describes how an attacker could intercept communications between an operator workstation and programmable logic controller to modify values like the cause of transmission field or an "ON/OFF" status to hide issues like an earth fault from operators. The document advocates for better security practices in new industrial control systems, such as monitoring networks and logs and enabling mitigation techniques to prevent these types of attacks.
This user guide provides instructions for using the OBD Car Doctor Android application to view real-time vehicle parameters and diagnostic trouble codes from a smartphone. It discusses requirements like compatible OBD hardware, connecting the hardware to the vehicle, and downloading the app. The guide also explains the app's main interface and options for viewing single parameters, widgets, trouble codes, and saved logbook records. Advanced features of the paid PRO version like custom command combinations are also described.
Cisco Ironport WSA- Introduction and Guide in ShortPriyank Sharma
This is a presentation made by me for IRONPORT users, admins or new users who want to understand the terminology of Cisco IRONPORT and its usage. However this is not very elaborate but yes will give you a nice and clear understanding of IRONPORT.
An Introduction to Technical Cleanliness InspectionOlympus IMS
Technical cleanliness is an increasingly important process that affects major industries including aerospace, automotive, heavy equipment, and electrical engineering. Even the smallest particle contamination occurring during the manufacturing process can have lasting effects on product lifespan, reliability, and function.
This guide will also answer the following questions:
- What are the basics of technical cleanliness?
- How does technical cleanliness affect a product's reliability?
- In what application areas is technical cleanliness most important?
- What is the technical cleanliness inspection process?
- What kind of system is required to conduct technical cleanliness inspection?
For more information, visit: https://www.olympus-ims.com/en/microscope/cix100/
A college class in Network Security Monitoring at CCSF, based on "The Practice of Network Security Monitoring: Understanding Incident Detection and Response" by Richard Bejtlich, No Starch Press; 1 edition (July 26, 2013), ASIN: B00E5REN34
Course website: https://samsclass.info/50/50_F17.shtml
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
Virtual private networks (VPNs) allow employees to securely access a company's intranet from remote locations over the public Internet. VPNs use encryption and tunneling protocols to create a private network through a public network by encapsulating data packets within normal Internet traffic. This allows employees to access the company network while saving costs by eliminating expenses associated with private leased lines or dial-up connections. Common VPN protocols include PPTP, L2TP, and IPsec. VPNs are widely used by businesses to allow remote access for employees and interconnect multiple office locations through secure site-to-site connections.
This presentation is based on the security and encryption measures adopted by Apple for its iPhones.
It was submitted to RTU, Kota during final year seminars.
Man in the middle attacks on IEC 60870-5-104pgmaynard
This document discusses man-in-the-middle attacks on the IEC 60870-5-104 protocol. It describes how an attacker could intercept communications between an operator workstation and programmable logic controller to modify values like the cause of transmission field or an "ON/OFF" status to hide issues like an earth fault from operators. The document advocates for better security practices in new industrial control systems, such as monitoring networks and logs and enabling mitigation techniques to prevent these types of attacks.
This user guide provides instructions for using the OBD Car Doctor Android application to view real-time vehicle parameters and diagnostic trouble codes from a smartphone. It discusses requirements like compatible OBD hardware, connecting the hardware to the vehicle, and downloading the app. The guide also explains the app's main interface and options for viewing single parameters, widgets, trouble codes, and saved logbook records. Advanced features of the paid PRO version like custom command combinations are also described.
Cisco Ironport WSA- Introduction and Guide in ShortPriyank Sharma
This is a presentation made by me for IRONPORT users, admins or new users who want to understand the terminology of Cisco IRONPORT and its usage. However this is not very elaborate but yes will give you a nice and clear understanding of IRONPORT.
An Introduction to Technical Cleanliness InspectionOlympus IMS
Technical cleanliness is an increasingly important process that affects major industries including aerospace, automotive, heavy equipment, and electrical engineering. Even the smallest particle contamination occurring during the manufacturing process can have lasting effects on product lifespan, reliability, and function.
This guide will also answer the following questions:
- What are the basics of technical cleanliness?
- How does technical cleanliness affect a product's reliability?
- In what application areas is technical cleanliness most important?
- What is the technical cleanliness inspection process?
- What kind of system is required to conduct technical cleanliness inspection?
For more information, visit: https://www.olympus-ims.com/en/microscope/cix100/
JSON SQL Injection and the Lessons LearnedKazuho Oku
This document discusses JSON SQL injection and lessons learned from vulnerabilities in SQL query builders. It describes how user-supplied JSON input containing operators instead of scalar values could manipulate queries by injecting conditions like id!='-1' instead of a specific id value. This allows accessing unintended data. The document examines how SQL::QueryMaker and a strict mode in SQL::Maker address this by restricting query parameters to special operator objects or raising errors on non-scalar values. While helpful, strict mode may break existing code, requiring changes to parameter handling. The vulnerability also applies to other languages' frameworks that similarly convert arrays to SQL IN clauses.
A firewall protects a computer or network by allowing or blocking network traffic based on certain criteria. A Windows firewall can filter traffic by IP address, protocol, and port number. There are public, private, and domain profiles that apply different security levels depending on whether the network is public, private, or part of a domain. The Windows firewall advanced security console allows creating custom inbound and outbound rules to finely control network access.
This document discusses FlexRay, an automotive network communication protocol used for data communication in vehicles and other transportation systems. FlexRay uses a cluster of electronic control units (ECUs) connected to a physical bus to allow deterministic and asynchronous message transmission. Each ECU contains a FlexRay controller that handles framing, bus access, and error detection according to the FlexRay specification. The document also discusses how FlexRay supports fixed and dynamic scheduling and is used in aircraft through data bus systems like ARINC 629 which uses time division multiple access and a standardized data word format to enable communication between avionics equipment.
This document provides specifications for painting at work and site locations for above ground pipelines and plant installations. It outlines various terms, surface preparation requirements, paint systems, and procedures for painting ferrous and non-ferrous metals. The specifications cover new coatings, maintenance coatings, hot surface coatings, painting damp surfaces, low pressure gas holder maintenance, and initial non-ferrous coating systems. Requirements include abrasive blasting to certain standards, applying primers, intermediate coats, and finish coats to achieve specified dry film thicknesses tailored for different temperature ranges and conditions.
Vehicles could communicate with each other using vehicle-to-vehicle (V2V) communication networks. This would allow them to exchange information to provide safety warnings and traffic information without needing infrastructure. The document discusses research on V2V systems and applications, including extending driving vision, accident detection, and traffic management. It then describes a project to build a V2V communication platform using Raspberry Pi devices and an ad-hoc mesh network to enable applications like traffic flow management and group messaging between vehicles.
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
Advanced driver assistance systems are designed to increase car safety and road safety overall. They help the driver in the driving process to enable safe and relaxed driving. Some examples of driver assistance systems that maximize safety include antilock braking systems, adaptive cruise control, blind spot detection, driver drowsiness detection, electronic stability control, emergency braking systems, hill descent control, intelligent speed assistance, lane departure warning systems, pedestrian detection, rear cross traffic alert, and traffic sign recognition. These systems alert drivers to hazards, help maintain safe distances and speeds, and in some cases automatically apply brakes to avoid collisions.
Cyber security for Autonomous Vehicles.pdfDorleControls
An overview of Cyber security for Autonomous Vehicles will be given in this introduction, along with a focus on the significance of protecting these cutting-edge modes of transportation.
Can based collision aviodance system for automobilesPurnima Kurella
This document describes a collision avoidance system for automobiles that uses a CAN bus network. The system includes two nodes, each with an ATmega16 microcontroller, MCP2515 CAN controller, MCP2551 transceiver, and LCD. Node 1 interfaces with a GP2D12 obstacle sensor, while Node 2 controls a DC motor. The system is intended to warn drivers of dangers ahead by stopping the motor in Node 2 if an object is detected by Node 1, communicating over the CAN network. The document discusses the components, software, operation, advantages of increased safety, and applications for collision avoidance systems.
This document discusses intrusion detection systems (IDS). It defines intrusion, intrusion detection, and intrusion prevention. It explains the components of an IDS including audit data, detection models, and detection and decision engines. It describes misuse detection using signatures and anomaly detection using statistical analysis. It also discusses host-based and network-based IDS, their advantages and disadvantages, and limitations of exploit-based signatures. The document emphasizes the importance of selecting and properly deploying the right IDS for an organization's needs.
Cable Glands, Connectors and Accessories Exd/Exe
PX2K Flameproof Ex d, Increased Safety Ex e, Restricted Breathing Ex nR Compound Barrier Cable Gland
E1FW Globally Approved, Explosive
Atmosphere Cable Gland
For all types of Steel & Aluminium Wire
Armoured Cables
This document discusses port security on Cisco switches. It explains that by default all switch ports are open, allowing any device to connect. Port security allows restricting a port to only allow specific MAC addresses, preventing unauthorized access. It provides steps to configure port security by defining the port as an access port, enabling port security, and specifying allowed MAC addresses. It also describes optional settings like violation actions and maximum MAC addresses. An example configuration is given to demonstrate learning and blocking additional MACs on a port.
This document discusses bluejacking, which is sending unsolicited messages to Bluetooth devices. It provides an introduction to bluejacking and Bluetooth technology. The history of bluejacking is explained, originating from a comment on a mobile forum. Steps for bluejacking using mobile phones and computers are outlined. The document also lists software tools for bluejacking and common locations where it occurs. Potential harm from bluejacking and prevention methods are briefly mentioned before concluding.
Applying OWASP web security testing guide (OWSTG)Vandana Verma
This document provides an overview of the OWASP Web Security Testing Guide. It categorizes testing as either passive or active, and outlines 11 sections covering different types of security testing for web applications. Each section includes a summary, testing methodology, available tools, and references. Testing areas covered include information gathering, configuration management, identity and authentication, authorization, session management, input validation, error handling, cryptography, business logic, and client-side issues. The goal of the guide is to provide a standard methodology for performing security tests on web applications.
This document discusses using Bluetooth Low Energy (BLE) technology to securely store and sign private keys. BLE allows for small, low-cost devices that can securely communicate private keys via encryption. The document proposes using a BLE device to store a private key, and have it sign transactions when sent transaction details from a central device like a smartphone. Example applications mentioned include signing Bitcoin transactions and messages with GPG keys. The document provides an overview of BLE technical specifications and popular hardware and software options for implementing BLE devices.
Improved Inspection of Composite Wind Turbine Blades with Accessible, Advanc...Olympus IMS
Ultrasonic phased array technology provides an effective way to inspect composite wind turbine blades for flaws during manufacturing. Phased array probes use multiple piezoelectric elements that can be electronically controlled to generate beams for scanning blades. This allows for high resolution inspection and detection of flaws like porosity, disbonds, delaminations, and wrinkles. Automated scanning systems can inspect large areas quickly, generating C-scan images to analyze bond quality and adhesive thickness. Ultrasonic phased array offers productivity advantages over conventional UT for the critical task of ensuring blade integrity.
Securing Electric Utility InfrastructureDragos, Inc.
A Case Study on Asset Baselining, Threat Detection, and Response - presented by Tim Watkins, Schweitzer Engineering Laboratories, and Matt Cowell, Dragos.
The webinar – now available on-demand at https://selinc.com/events/on-demand-webinar/126340/ – provides insights on baselining your operation, building cyber defense, and streamlining ongoing management. SEL and Dragos also shared a case study based on a recent joint effort to address key cybersecurity challenges at a mid-sized US electric utility.
Learn more about Dragos at https://dragos.com or follow us at https://twitter.com/dragosinc
Learn more about SEL cybersecurity at https://selinc.com/solutions/security-for-critical-infrastructure/ or follow us at https://twitter.com/SEL_news
Edge computing offloading: status & perspectivesIIT CNR
The document discusses edge computing offloading and perspectives. It presents a taxonomy of edge computing applications based on whether data originates from clients or the cloud, and the destination. Examples of offloading, caching, and aggregation are provided. Offloading reduces clients' energy consumption and increases privacy, while caching and aggregation provide significant benefits to network operators through reduced traffic. While computation offloading benefits may diminish as clients' processing power increases, future applications like smart glasses may rely on offloading as their only computational option. More research is needed on mechanisms for devices without on-board computation to access offloading services.
JSON SQL Injection and the Lessons LearnedKazuho Oku
This document discusses JSON SQL injection and lessons learned from vulnerabilities in SQL query builders. It describes how user-supplied JSON input containing operators instead of scalar values could manipulate queries by injecting conditions like id!='-1' instead of a specific id value. This allows accessing unintended data. The document examines how SQL::QueryMaker and a strict mode in SQL::Maker address this by restricting query parameters to special operator objects or raising errors on non-scalar values. While helpful, strict mode may break existing code, requiring changes to parameter handling. The vulnerability also applies to other languages' frameworks that similarly convert arrays to SQL IN clauses.
A firewall protects a computer or network by allowing or blocking network traffic based on certain criteria. A Windows firewall can filter traffic by IP address, protocol, and port number. There are public, private, and domain profiles that apply different security levels depending on whether the network is public, private, or part of a domain. The Windows firewall advanced security console allows creating custom inbound and outbound rules to finely control network access.
This document discusses FlexRay, an automotive network communication protocol used for data communication in vehicles and other transportation systems. FlexRay uses a cluster of electronic control units (ECUs) connected to a physical bus to allow deterministic and asynchronous message transmission. Each ECU contains a FlexRay controller that handles framing, bus access, and error detection according to the FlexRay specification. The document also discusses how FlexRay supports fixed and dynamic scheduling and is used in aircraft through data bus systems like ARINC 629 which uses time division multiple access and a standardized data word format to enable communication between avionics equipment.
This document provides specifications for painting at work and site locations for above ground pipelines and plant installations. It outlines various terms, surface preparation requirements, paint systems, and procedures for painting ferrous and non-ferrous metals. The specifications cover new coatings, maintenance coatings, hot surface coatings, painting damp surfaces, low pressure gas holder maintenance, and initial non-ferrous coating systems. Requirements include abrasive blasting to certain standards, applying primers, intermediate coats, and finish coats to achieve specified dry film thicknesses tailored for different temperature ranges and conditions.
Vehicles could communicate with each other using vehicle-to-vehicle (V2V) communication networks. This would allow them to exchange information to provide safety warnings and traffic information without needing infrastructure. The document discusses research on V2V systems and applications, including extending driving vision, accident detection, and traffic management. It then describes a project to build a V2V communication platform using Raspberry Pi devices and an ad-hoc mesh network to enable applications like traffic flow management and group messaging between vehicles.
Radio frequency identication (RFID) is a rapidly growing technology that
has the potential to make great economic impacts on many industries. While
RFID is a relatively old technology, more recent advancements in chip man-
ufacturing technology are making RFID practical for new applications and
settings. These advancements have the potential to revolutionize supply-
chain management, inventory control, and logistics
Advanced driver assistance systems are designed to increase car safety and road safety overall. They help the driver in the driving process to enable safe and relaxed driving. Some examples of driver assistance systems that maximize safety include antilock braking systems, adaptive cruise control, blind spot detection, driver drowsiness detection, electronic stability control, emergency braking systems, hill descent control, intelligent speed assistance, lane departure warning systems, pedestrian detection, rear cross traffic alert, and traffic sign recognition. These systems alert drivers to hazards, help maintain safe distances and speeds, and in some cases automatically apply brakes to avoid collisions.
Cyber security for Autonomous Vehicles.pdfDorleControls
An overview of Cyber security for Autonomous Vehicles will be given in this introduction, along with a focus on the significance of protecting these cutting-edge modes of transportation.
Can based collision aviodance system for automobilesPurnima Kurella
This document describes a collision avoidance system for automobiles that uses a CAN bus network. The system includes two nodes, each with an ATmega16 microcontroller, MCP2515 CAN controller, MCP2551 transceiver, and LCD. Node 1 interfaces with a GP2D12 obstacle sensor, while Node 2 controls a DC motor. The system is intended to warn drivers of dangers ahead by stopping the motor in Node 2 if an object is detected by Node 1, communicating over the CAN network. The document discusses the components, software, operation, advantages of increased safety, and applications for collision avoidance systems.
This document discusses intrusion detection systems (IDS). It defines intrusion, intrusion detection, and intrusion prevention. It explains the components of an IDS including audit data, detection models, and detection and decision engines. It describes misuse detection using signatures and anomaly detection using statistical analysis. It also discusses host-based and network-based IDS, their advantages and disadvantages, and limitations of exploit-based signatures. The document emphasizes the importance of selecting and properly deploying the right IDS for an organization's needs.
Cable Glands, Connectors and Accessories Exd/Exe
PX2K Flameproof Ex d, Increased Safety Ex e, Restricted Breathing Ex nR Compound Barrier Cable Gland
E1FW Globally Approved, Explosive
Atmosphere Cable Gland
For all types of Steel & Aluminium Wire
Armoured Cables
This document discusses port security on Cisco switches. It explains that by default all switch ports are open, allowing any device to connect. Port security allows restricting a port to only allow specific MAC addresses, preventing unauthorized access. It provides steps to configure port security by defining the port as an access port, enabling port security, and specifying allowed MAC addresses. It also describes optional settings like violation actions and maximum MAC addresses. An example configuration is given to demonstrate learning and blocking additional MACs on a port.
This document discusses bluejacking, which is sending unsolicited messages to Bluetooth devices. It provides an introduction to bluejacking and Bluetooth technology. The history of bluejacking is explained, originating from a comment on a mobile forum. Steps for bluejacking using mobile phones and computers are outlined. The document also lists software tools for bluejacking and common locations where it occurs. Potential harm from bluejacking and prevention methods are briefly mentioned before concluding.
Applying OWASP web security testing guide (OWSTG)Vandana Verma
This document provides an overview of the OWASP Web Security Testing Guide. It categorizes testing as either passive or active, and outlines 11 sections covering different types of security testing for web applications. Each section includes a summary, testing methodology, available tools, and references. Testing areas covered include information gathering, configuration management, identity and authentication, authorization, session management, input validation, error handling, cryptography, business logic, and client-side issues. The goal of the guide is to provide a standard methodology for performing security tests on web applications.
This document discusses using Bluetooth Low Energy (BLE) technology to securely store and sign private keys. BLE allows for small, low-cost devices that can securely communicate private keys via encryption. The document proposes using a BLE device to store a private key, and have it sign transactions when sent transaction details from a central device like a smartphone. Example applications mentioned include signing Bitcoin transactions and messages with GPG keys. The document provides an overview of BLE technical specifications and popular hardware and software options for implementing BLE devices.
Improved Inspection of Composite Wind Turbine Blades with Accessible, Advanc...Olympus IMS
Ultrasonic phased array technology provides an effective way to inspect composite wind turbine blades for flaws during manufacturing. Phased array probes use multiple piezoelectric elements that can be electronically controlled to generate beams for scanning blades. This allows for high resolution inspection and detection of flaws like porosity, disbonds, delaminations, and wrinkles. Automated scanning systems can inspect large areas quickly, generating C-scan images to analyze bond quality and adhesive thickness. Ultrasonic phased array offers productivity advantages over conventional UT for the critical task of ensuring blade integrity.
Securing Electric Utility InfrastructureDragos, Inc.
A Case Study on Asset Baselining, Threat Detection, and Response - presented by Tim Watkins, Schweitzer Engineering Laboratories, and Matt Cowell, Dragos.
The webinar – now available on-demand at https://selinc.com/events/on-demand-webinar/126340/ – provides insights on baselining your operation, building cyber defense, and streamlining ongoing management. SEL and Dragos also shared a case study based on a recent joint effort to address key cybersecurity challenges at a mid-sized US electric utility.
Learn more about Dragos at https://dragos.com or follow us at https://twitter.com/dragosinc
Learn more about SEL cybersecurity at https://selinc.com/solutions/security-for-critical-infrastructure/ or follow us at https://twitter.com/SEL_news
Edge computing offloading: status & perspectivesIIT CNR
The document discusses edge computing offloading and perspectives. It presents a taxonomy of edge computing applications based on whether data originates from clients or the cloud, and the destination. Examples of offloading, caching, and aggregation are provided. Offloading reduces clients' energy consumption and increases privacy, while caching and aggregation provide significant benefits to network operators through reduced traffic. While computation offloading benefits may diminish as clients' processing power increases, future applications like smart glasses may rely on offloading as their only computational option. More research is needed on mechanisms for devices without on-board computation to access offloading services.
El documento presenta los resultados de una encuesta realizada por la firma de consultoría Transearch a 371 ejecutivos de Lima sobre su remuneración. Muestra que la mayoría de los encuestados ocupan posiciones gerenciales en empresas nacionales y consideran que su remuneración no se ajusta a su desempeño. Asimismo, indica los rangos salariales mensuales brutos de los ejecutivos según su puesto.
Julio David Robles Vidal tiene 35 años de experiencia como ingeniero civil, habiendo trabajado en Perú, Venezuela y Panamá. Recientemente se desempeñó como Gerente de Ingeniería en Constructora Odebrecht en Panamá durante 18 años, liderando proyectos de infraestructura por valor de más de $100 millones. Tiene un sólido conocimiento del mercado de la construcción civil en Panamá.
Interactive Intelligence | Los Indicadores de los Contact Centers que sí impo...elcontact.com
Este documento discute nuevos indicadores de desempeño para los centros de contacto que están captando la atención de la industria. Estos incluyen la voz del cliente, la resolución en el primer contacto, ventas por contacto por hora, y transacciones por dotación. La voz del cliente y la resolución en el primer contacto son considerados dos de los indicadores más importantes. Mientras que la voz del cliente mide la satisfacción general del cliente, la resolución en el primer contacto alienta a los agentes a resolver problemas en una sola interacción.
Infografía que presenta los principales resultados de la 4º Oleada del Observatorio de redes sociales.
Puedes ver el informe:
http://www.tcanalysis.com/2012/04/10/las-marcas-empiezan-a-encontrar-limites-en-la-utilizacion-de-las-redes-sociales/
Este documento describe cómo las redes sociales y las herramientas web 2.0 pueden usarse para mejorar la educación. Explica conceptos como blogs, wikis y redes sociales y cómo proporcionan nuevas formas de compartir información y colaborar. También describe cómo los docentes pueden crear sus propias redes profesionales de aprendizaje usando estas herramientas para mantenerse actualizados y mejorar su enseñanza de forma continua.
El documento resume cómo trabajan los empleados de Google (Googlers) y algunas de las herramientas y servicios de Google que utilizan. Los Googlers tienen acceso a comida gratis, herramientas sencillas como el navegador y editor de texto vi, y se divierten en el trabajo. El documento también describe atajos de teclado y funciones útiles de Gmail, Google Drive, Calendario, Contactos, Fotos y otros servicios de Google.
Moog Inc. announced financial results for fiscal year 2011, with sales up 10% to $2.33 billion and earnings per share up 25% to $2.95. For the fourth quarter, sales were up 8% to $619 million and earnings per share increased 17% to $0.83. Several of Moog's business segments saw double-digit sales growth for both the full year and fourth quarter, including commercial aircraft, space and defense, and medical devices. Moog also updated guidance for fiscal 2012, forecasting 8% sales growth and a 12% increase in earnings per share.
Multitud n°2 aporte del pensamiento marxista al anticapitalismo hoyrevistamultitud
Este documento presenta un resumen de un número de la revista Multitud de abril de 2009. Incluye artículos sobre historia de Chile, movimientos sociales y estudiantiles, literatura, medicina y sociedad. Aborda temas como la continuidad del neoliberalismo en Chile más allá de los cambios de gobierno, la contribución del pensamiento marxista y figuras como Gramsci, Trotsky y Recabarren.
Organic Greenhouse Vegetable Production; Gardening Guidebook ~ National Sustainable Ag ~ For more information, Please see websites below:
`
Organic Edible Schoolyards & Gardening with Children =
http://scribd.com/doc/239851214 ~
`
Double Food Production from your School Garden with Organic Tech =
http://scribd.com/doc/239851079 ~
`
Free School Gardening Art Posters =
http://scribd.com/doc/239851159 ~
`
Increase Food Production with Companion Planting in your School Garden =
http://scribd.com/doc/239851159 ~
`
Healthy Foods Dramatically Improves Student Academic Success =
http://scribd.com/doc/239851348 ~
`
City Chickens for your Organic School Garden =
http://scribd.com/doc/239850440 ~
`
Huerto Ecológico, Tecnologías Sostenibles, Agricultura Organica
http://scribd.com/doc/239850233
`
Simple Square Foot Gardening for Schools - Teacher Guide =
http://scribd.com/doc/239851110
XII Encuentro de Líderes 2012 Obra Kolping BoliviaKolping Bolivia
Este documento resume las actividades y logros de las familias Kolping en la región de Pando, Bolivia entre 2010-2012. Actualmente hay 350 asociados en 15 familias Kolping locales. Se ha incrementado la membresía un 50% y varios líderes ahora ocupan cargos de liderazgo en la iglesia y comunidad. Las familias Kolping se han vuelto más autosostenibles a través de capacitaciones, ferias y microempresas. También han apoyado a 150 familias afectadas por inundaciones.
This product catalog from E-Z UP showcases their line of instant shelters and canopies. They are known for developing the patented E-Z UP system in 1983 that allows shelters to be set up in seconds without loose parts. The catalog highlights their top-selling Eclipse II shelter, which features an instant one-piece frame, pull pin auto slider, and reinforced legs. It also shows other shelter models like the Hut II, Speed Shelter II, and Connector systems that allow shelters to be joined together. A variety of sidewall options are presented that provide branding, sun/wind protection, and privacy.
This document provides a report on the 8th South East Europe Networking Conference on Education for Democratic Citizenship and Human Rights, held in Sarajevo, Bosnia and Herzegovina from October 21-22, 2010. The conference was organized by the Ministry of Civil Affairs of Bosnia and Herzegovina, the Council of Europe, the Swiss State Secretariat for Education and Research, and IPE International Projects in Education.
Over the two days, participants discussed implementing the recently adopted Council of Europe Charter on Education for Democratic Citizenship and Human Rights Education. Six new manuals on teaching democratic citizenship and human rights were also launched. Participants attended model lessons in local schools and shared experiences implementing education for democratic citizenship and human
Here are the steps to set up the DAP-2360 in Access Point mode:
1. Connect the Ethernet cable from the LAN port on the DAP-2360 to your router or switch.
2. Log into the web-based configuration by inputting the IP address of the DAP-2360 (default: http://dlinkap.local) in the address bar of your web browser.
3. Under the Basic Settings menu, click the Wireless radio button and select "Access Point" as the Wireless Mode.
4. Configure the remaining wireless settings, security settings, and save your settings.
5. Connect wireless clients to the newly created wireless network using the SSID and
This document provides an overview of an access point and summarizes its key features:
- It includes the package contents, system requirements, and introduces the access point's features such as standards-based technology, four operational modes, and PoE support.
- The features section lists the access point's wireless capabilities, modes, authentication types, and advanced functions.
- The document is a user manual that provides setup and configuration instructions for the access point. It describes how to configure basic and advanced wireless settings.
The document provides an overview and instructions for a D-Link network camera. It includes:
1) A list of package contents and system requirements for using the camera.
2) An introduction describing the camera's features like day/night functionality, 0.5 lux light sensitivity, and H.264 video compression.
3) A table of contents organizing the manual's sections on configuration, setup, live video, and maintenance.
The document is a user manual for a wireless G router. It provides an overview of the router's features such as sharing an internet connection wirelessly between devices in a home network, integrated firewall protection, and a web-based interface for configuration. It also provides tips for optimal wireless performance, including placing the router centrally and avoiding obstacles that could interfere with the wireless signal. The manual contains sections that describe setup, configuration, security settings, and troubleshooting.
This document is the reference manual for the NETGEAR ProSafe Wireless-N Access Point WNAP320. It contains instructions for installing and configuring the access point, including connecting the device, logging in, configuring basic settings like the wireless network name and security settings, and mounting the access point. It also provides information on advanced configuration options and troubleshooting.
This document is the user manual for the NETGEAR Universal WiFi Range Extender WN3000RP. It describes the hardware features of the range extender including antennas, LED lights, buttons and ports. It explains how the range extender works by connecting to an existing wireless network and acting as an access point. It provides instructions on setup including connecting a PC via Ethernet, logging in, running the smart wizard and optimizing placement.
This document provides an overview and table of contents for a user manual for the D-Link DCS-910 Internet Camera. It includes a list of package contents, system requirements, features of the camera such as Ethernet support and remote access via web browser, and sections that will be covered in the manual such as setup, configuration, installation, and troubleshooting. The camera allows for remote monitoring via internet or intranet using a web interface without special hardware or software.
This document provides deployment guidelines for Websense Web Security and Web Filter 7.1. It includes recommendations for operating systems, VMware support, network considerations, system requirements, deployment configurations, component limits, and maximizing performance. The document also provides guidance for deploying the Network Agent, integrating various third-party systems, and remote filtering deployments.
The document is a user manual for the D-Link DIR-300 Wireless Router. It includes sections on package contents, system requirements, features, hardware overview, installation, configuration, wireless security, connecting to a wireless network, troubleshooting, wireless basics, and networking basics. The key features highlighted are wireless speeds of up to 54Mbps, four Ethernet ports, an advanced firewall, content filtering, and an easy-to-use configuration wizard.
This document provides instructions for evaluating the firewall and VPN capabilities of Juniper Networks devices. It guides the user through configurations like:
- Setting up basic firewalls on two Juniper devices
- Configuring deep packet inspection firewall rules
- Creating an IPSec VPN tunnel between the two devices
- Deploying one device in transparent firewall mode
The goal is to demonstrate how easily core security functions can be established in under 10 minutes using Juniper's graphical interface, and to expose deployment options for small office and home use cases.
This document is a user manual for the INTellINeT NeTWoRK SolUTIoNSTM dual WAN VPN Router, Model 524049. The 3 sentence summary is:
This user manual provides instructions for setup and use of the dual WAN VPN Router device, which combines a load-balancing router with firewall, VPN server, and 5-port switch capabilities. The router can connect to two different WAN connections simultaneously for efficient backup and load balancing. The manual describes the router's features and interfaces for configuration of networking, security, quality of service, load sharing/NAT, and VPN functions.
This document is the user manual for the D-Link DIR-615 wireless router. It provides instructions on setting up the router and configuring its various networking and security features through a web-based interface. The manual outlines hardware features of the router, diagrams for connecting it to a modem or other router, and procedures for initial setup and configuration of the router's wireless and wired network settings.
This document provides an overview and specifications for the D-Link DIR-456U Mobile Router. It includes information about package contents, system requirements, hardware features, installation instructions, and basic configuration procedures. The hardware overview section describes the ports and buttons on the rear and front panels, as well as the LED indicators. The document also covers wireless security settings, troubleshooting tips, wireless networking basics, and technical specifications.
This document provides step-by-step instructions for configuring the Kerio WinRoute Firewall version 6.7 to set up the local network and headquarters configuration for a company. It describes selecting IP addresses for the LAN, configuring the network interfaces for the internet gateway and LAN, installing WinRoute, setting up basic traffic policies, DHCP server, DNS, user accounts and groups, access rules, VPN connectivity between headquarters and branch offices, and more. The configuration guides a realistic network example and addresses all essential aspects for deploying WinRoute in a company network.
This document provides an overview of SAP BTP Connectivity for applications in the Cloud Foundry environment. It describes the Connectivity and Destination services that provide connectivity functionality, connectivity scenarios including connecting applications and HANA databases to on-premise systems, and user roles. The document also references sections on initial setup, developing applications, monitoring, security and the Cloud Connector component.
An Insight 360 Guide for IT Administrators.
I am the authorized K-12 representative in South Carolina for eInstruction by Turning Technologies
Bill McIntosh
SchoolVision Inc..
Authorized South Carolina K-12 Consultant for eInstruction / Turning Technologies
Phone :843-442-8888
Email :WKMcIntosh@Comcast.net
Twitter : @OtisTMcIntosh
SchoolVision Website on Facebook: https://www.facebook.com/WKMIII
Website : www.einstruction.com
For technical assistance on all eInstruction® or Turning Technologies products please call 866-746-3015
Turning Technologies | 255 West Federal Street | Youngstown, OH Main: 330-746-3015 | Toll Free: 866-746-3015 | Fax: 330-884-6065
www.TurningTechnologies.com
The document provides an implementation plan for a new network at WWTC's New York office. It details tasks for installing LAN equipment, security technologies like firewalls and intrusion prevention, Active Directory, configurations for routers, switches and VLANs, and a project timeline. The network will use Cisco equipment and include 87 workstations, file and application servers, firewalls, switches, routers, and connections to two ISPs for redundancy. Active Directory, group policies, and security measures like antivirus and access control will be configured.
The document provides step-by-step instructions for configuring a basic firewall using a Juniper Networks NetScreen-5XT device. It describes connecting two networks - a trusted internal network and an untrusted external network - and configuring firewall policies to allow traffic from the trusted to untrusted network only. The initial configuration is completed using the NetScreen device's wizard to quickly set up the firewall with minimal inputs.
The document provides step-by-step instructions for configuring a basic firewall using a Juniper Networks NetScreen-5XT device. It describes connecting two networks - a trusted internal network and an untrusted external network - and configuring firewall policies to allow traffic from the trusted to untrusted network only. The initial configuration is completed using the NetScreen device's wizard to quickly set up the firewall with minimal inputs.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Mind map of terminologies used in context of Generative AI
D link-dir-615-manual
1.
2. Table of Contents
Table of Contents
Product Overview ........................................................ 4 Port Forwarding ............................................... 28
Package Contents.................................................... 4 Application Rules ............................................. 29
System Requirements ............................................. 4 Network Filters ................................................. 30
Features................................................................... 5 Website Filters ................................................. 31
Hardware Overview ................................................. 6 Firewall Settings............................................... 32
Connections ....................................................... 6 Advanced Wireless Settings ............................ 33
LEDs .................................................................. 7 Advanced Network Settings ............................. 34
UPnP ............................................................ 34
Installation.................................................................... 8
Internet Ping Block ....................................... 34
Before you Begin ..................................................... 8
Internet Port Speed ...................................... 34
Wireless Installation Considerations ........................ 9
Multicast Streams ......................................... 34
Getting Started ...................................................... 10
Administrator Settings ...................................... 35
Configuration ............................................................. 11 Change Password ........................................ 35
Web-based Configuration Utility ............................ 11 Remote Management ................................... 35
Setup Wizard ................................................... 12 Time Settings ................................................... 36
Manual Configuration ....................................... 16 System Settings ............................................... 37
Dynamic (Cable)........................................... 16 Update Firmware ............................................. 38
PPPoE (DSL) ............................................... 17 DDNS ............................................................... 39
PPTP ............................................................ 18 System Check .................................................. 40
L2TP............................................................. 19 Schedules ........................................................ 41
Static (assigned by ISP) ............................... 20 Log Settings ..................................................... 42
Big Pond ....................................................... 21 Device Information ........................................... 43
Wireless Settings ............................................. 22 Log ................................................................... 44
Network Settings .............................................. 23 Stats ................................................................. 45
DHCP Server Settings ................................. 24 Wireless ........................................................... 46
DHCP Reservation ....................................... 25 Support ............................................................ 46
Virtual Server ................................................... 26
D-Link DIR-615 User Manual
3. Table of Contents
Wireless Security....................................................... 47
What is WEP? ........................................................ 47
What is WPA? ........................................................ 48
Wireless Security Setup Wizard ............................ 49
Configure WEP ...................................................... 52
Configure WPA-Personal (PSK) ............................. 53
Configure WPA-Enterprise (RADIUS) .................... 54
Connect to a Wireless Network ................................ 56
Using Windows® XP ............................................... 56
Configure WEP ...................................................... 57
Configure WPA-PSK .............................................. 59
Troubleshooting......................................................... 61
Wireless Basics ......................................................... 65
What is Wireless? .................................................. 66
Tips ........................................................................ 68
Wireless Modes ..................................................... 69
Networking Basics .................................................... 70
Check your IP address .......................................... 70
Statically Assign an IP address ............................. 71
Connect to Cable/DSL/Satellite Modem ................ 72
Connect to Another Router .................................... 73
Technical Specifications ........................................... 75
Contacting Technical Support .................................. 76
Warranty ..................................................................... 77
Registration................................................................ 83
D-Link DIR-615 User Manual
4. Section 1 - Product Overview
Product Overview
Package Contents
• D-Link DIR-615 Wireless Router
• 2 Detachable Antennas
• Power Adapter
• CAT5 Ethernet Cable
• CD-ROM with Installation Wizard, User Manual,
and Special Offers
Note: Using a power supply with a different voltage rating than the one included
with the DIR-615 will cause damage and void the warranty for this product.
System Requirements
• Ethernet-based Cable or DSL Modem
• Computers with Windows®, Macintosh®, or Linux-based operating systems with an installed Ethernet
adapter
• Internet Explorer Version 6.0, Mozilla 1.7.12 (5.0), or Firefox 1.5 and above (for configuration)
• Installation Wizard requires Windows® XP with Service Pack 2
D-Link DIR-615 User Manual
5. Section 1 - Product Overview
Features
• Faster Wireless Networking - The DIR-615 provides up to 300Mbps* wireless connection with other
802.11n wireless clients. This capability allows users to participate in real-time activities online, such as
video streaming, online gaming, and real-time audio.
• Compatible with 802.11b and 802.11g Devices - The DIR-615 is still fully compatible with the IEEE
802.11b and 802.11g standards, so it can connect with existing 802.11b/g PCI, USB and Cardbus
adapters.
• Advanced Firewall Features - The Web-based user interface displays a number of advanced network
management features including:
• Parental Controls - Easily applied content filtering based on MAC Address, URL, and/or
Domain Name.
• Filter Scheduling - These filters can be scheduled to be active on certain days or for a
duration of hours or minutes.
• Secure Multiple/Concurrent Sessions - The DIR-615 can pass through VPN sessions. It
supports multiple and concurrent IPSec and PPTP sessions, so users behind the DIR-615
can securely access corporate networks.
• User-friendly Setup Wizard - Through the easy-to-use Quick Router Setup on the included CD, the
DIR-615 allows you to control what information is accessible to those on the wireless network, whether
from the Internet or from your company’s server. Configure your router to your specific settings within
minutes.
* Maximum wireless signal rate derived from IEEE Standard 802.11g and Draft 802.11n specifications. Actual data throughput will vary. Network conditions and
environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. Environmental
conditions will adversely affect wireless signal range.
D-Link DIR-615 User Manual 5
6. Section 1 - Product Overview
Hardware Overview
Connections
Reset
Pressing the Reset button restores the router to
its original factory default settings.
LAN Ports (1-4) Internet Port Power Receptor
Connect Ethernet devices such as The auto MDI/MDIX Internet port is Receptor for the supplied power
computers, switches, and hubs. the connection for the Ethernet cable adapter.
to the cable or DSL modem.
D-Link DIR-615 User Manual 6
7. Section 1 - Product Overview
Hardware Overview
LEDs
WLAN LED
Status LED A solid light indicates that the wireless
A blinking light indicates that the segment is ready. This LED blinks
DIR-615 is ready. during wireless data transmission.
Power LED Local Network LEDs
Internet LED
A solid light indicates a A solid light indicates a connection to an
A solid light indicates connection on
proper connection to the Ethernet-enabled computer on ports 1-4.
the Internet port. This LED blinks
power supply. This LED blinks during data transmission.
during data transmission.
D-Link DIR-615 User Manual
8. Section - Installation
Installation
This section will walk you through the installation process. Placement of the router is very important. Do not place the
router in an enclosed area such as a closet, cabinet, or in the attic or garage.
Before you Begin
Please configure the router with the computer that was last connected directly to your modem. Also, you can only use
the Ethernet port on your modem. If you were using the USB connection before using the router, then you must turn off
your modem, disconnect the USB cable and connect an Ethernet cable to the Internet port on the router, and then turn
the modem back on. In some cases, you may need to call your ISP to change connection types (USB to Ethernet).
If you have DSL and are connecting via PPPoE, make sure you disable or uninstall any PPPoE software such as
WinPoet, Broadjump, or Enternet 300 from your computer or you will not be able to connect to the Internet.
D-Link DIR-615 User Manual
9. Section - Installation
Wireless Installation Considerations
The D-Link wireless router lets you access your network using a wireless connection from virtually anywhere within
the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls,
ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending
on the types of materials and background RF (radio frequency) noise in your home or business. The key to maximizing
wireless range is to follow these basic guidelines:
1. Keep the number of walls and ceilings between the D-Link router and other network devices to a minimum
- each wall or ceiling can reduce your adapter’s range from 3-90 feet (1-30 meters.) Position your devices
so that the number of walls or ceilings is minimized.
2. Be aware of the direct line between network devices. A wall that is 1.5 feet thick (.5 meters), at a
45-degree angle appears to be almost 3 feet (1 meter) thick. At a 2-degree angle it looks over 42 feet
(14 meters) thick! Position devices so that the signal will travel straight through a wall or ceiling (instead
of at an angle) for better reception.
3. Building Materials make a difference. A solid metal door or aluminum studs may have a negative effect on
range. Try to position access points, wireless routers, and computers so that the signal passes through
drywall or open doorways. Materials and objects such as glass, steel, metal, walls with insulation, water
(fish tanks), mirrors, file cabinets, brick, and concrete will degrade your wireless signal.
4. Keep your product away (at least 3-6 feet or 1-2 meters) from electrical devices or appliances that
generate RF noise.
5. If you are using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and
home security systems), your wireless connection may degrade dramatically or drop completely. Make
sure your 2.4GHz phone base is as far away from your wireless devices as possible. The base transmits
a signal even if the phone in not in use.
D-Link DIR-615 User Manual
10. Section - Installation
Getting Started
The DIR-615 includes a Quick Router Setup Wizard CD. Follow the simple steps below to run the Setup Wizard to
guide you quickly through the installation process.
Insert the Quick Router Setup Wizard CD in the CD-ROM drive. The step-by-step instructions that follow are shown
in Windows® XP. The steps and screens are similar for the other Windows operating systems.
If the CD Autorun function does not automatically start on your computer, click on Start Run. In the run box type
“D:DIR615.exe” (where D: represents the drive letter of your CD-ROM drive).
When the autorun screen appears, click Install Router.
Click Install Router
Note: It is reccomended to write down the login password on the provided CD holder.
D-Link DIR-615 User Manual 10
11. Section - Configuration
Configuration
This section will show you how to configure your new D-Link wireless router using the web-based configuration
utility.
Web-based Configuration Utility
To access the configuration utility, open a web-browser
such as Internet Explorer and enter the IP address of
the router (192.168.0.1).
Select Admin from the drop-down menu and then enter
your password. Leave the password blank by default.
If you get a Page Cannot be Displayed error, please
refer to the Troubleshooting section for assistance.
D-Link DIR-615 User Manual 11
12. Section - Configuration
Setup Wizard
You may click Setup Wizard to quickly configure your router.
If you want to enter your settings without running the wizard, click
Manual Configuration and skip to page 16.
Click Launch Internet Connection Setup Wizard to begin.
If you want to configure your wireless settings, click Launch Wireless
Security Setup Wizard and skip to page 49.
D-Link DIR-615 User Manual 1
13. Section - Configuration
Click Next to continue.
Create a new password and then click Next to continue.
Select your time zone from the drop-down menu and then click Next
to continue.
Select the type of Internet connection you use and then click Next
to continue.
D-Link DIR-615 User Manual 1
14. Section - Configuration
If you selected Dynamic, you may need to enter the MAC address of the
computer that was last connected directly to your modem. If you are currently
using that computer, click Clone Your PC’s MAC Address and then click
Next to continue.
The Host Name is optional but may be required by some ISPs. The default
host name is the device name of the Router and may be changed.
If you selected PPPoE, enter your PPPoE username and password. Click
Next to continue.
Select Static if your ISP assigned you the IP address, subnet mask, gateway,
and DNS server addresses.
Note: Make sure to remove your PPPoE software from your computer. The
software is no longer needed and will not work through a router.
If you selected PPTP, enter your PPTP username and password. Click Next
to continue.
D-Link DIR-615 User Manual 1
15. Section - Configuration
If you selected L2TP, enter your L2TP username and password. Click Next
to continue.
If you selected Static, enter your network settings supplied by your Internet
provider. Click Next to continue.
If you selected Big Pond, select your authentication server from the drop
down menu. You will also need to enter your Big Pond username and
password. Click Next to continue.
Click Connect to save your settings. Once the router is finished rebooting,
click Continue. Please allow 1-2 minutes to connect.
Close your browser window and reopen it to test your Internet connection.
It may take a few tries to initially connect to the Internet.
D-Link DIR-615 User Manual 15
16. Section - Configuration
Manual Configuration
Dynamic (Cable)
My Internet Select Dynamic IP (DHCP) to obtain IP Address
Connection: information automatically from your ISP. Select
this option if your ISP does not give you any IP
numbers to use. This option is commonly used
for Cable modem services.
Host Name: The Host Name is optional but may be required
by some ISPs.
MAC Address: The default MAC Address is set to the Internet
port’s physical interface MAC address on the
Broadband Router. It is not recommended that
you change the default MAC address unless
required by your ISP. You can use the Clone
Your PC’s MAC Address button to replace
the Internet port’s MAC address with the MAC
address of your Ethernet card.
DNS Addresses: Enter the Primary DNS server IP address
assigned by your ISP.
MTU: Maximum Transmission Unit - you may need to
change the MTU for optimal performance with
your specific ISP. 1500 is the default MTU.
D-Link DIR-615 User Manual 16
17. Section - Configuration
Internet Setup
PPPoE (DSL)
Choose PPPoE (Point to Point Protocol over Ethernet) if your ISP uses a PPPoE connection. Your ISP will provide
you with a username and password. This option is typically used for DSL services. Make sure to remove your PPPoE
software from your computer. The software is no longer needed and will not work through a router.
My Internet Select PPPoE (Username/Password) from the drop-down menu.
Connection:
Address Mode: Select Static if your ISP assigned you the IP address, subnet mask,
gateway, and DNS server addresses. In most cases, select Dynamic.
User Name: Enter your PPPoE user name.
Password: Enter your PPPoE password and then retype the password in the next
box.
Service Name: Enter the ISP Service Name (optional).
IP Address: Enter the IP address (Static PPPoE only).
MAC Address: The default MAC Address is set to the Internet port’s physical interface
MAC address on the Broadband Router. It is not recommended that you
change the default MAC address unless required by your ISP. You can
use the Clone Your PC’s MAC Address button to replace the Internet
port’s MAC address with the MAC address of your Ethernet card.
DNS Addresses: Enter the Primary and Secondary DNS Server Addresses (Static PPPoE only).
Maximum Idle Time: Enter a maximum idle time during which the Internet connection is maintained during inactivity. To disable this feature,
enable Auto-reconnect.
MTU: Maximum Transmission Unit - you may need to change the MTU for optimal performance with your specific ISP. 1492 is
the default MTU.
Connect Mode: Select either Always-on, On-Demand, or Manual.
D-Link DIR-615 User Manual 1
18. Section - Configuration
Internet Setup
PPTP
Choose PPTP (Point-to-Point-Tunneling Protocol ) if your ISP uses a PPTP connection. Your ISP will provide you with
a username and password. This option is typically used for DSL services.
Address Mode: Select Static if your ISP assigned you the IP address, subnet
mask, gateway, and DNS server addresses. In most cases, select
Dynamic.
PPTP IP Address: Enter the IP address (Static PPTP only).
PPTP Subnet Enter the Primary and Secondary DNS Server Addresses (Static
Mask: PPTP only).
PPTP Gateway: Enter the Gateway IP Address provided by your ISP.
DNS Servers: The DNS server information will be supplied by your ISP (Internet
Service Provider.)
PPTP Server IP: Enter the Server IP provided by your ISP (optional).
Account: Enter your PPTP account (username).
Password: Enter your PPTP password and then retype the password in the
next box.
Maximum Idle Enter a maximum idle time during which the Internet connection is
Time: maintained during inactivity. To disable this feature, enable Auto-
reconnect.
MTU: Maximum Transmission Unit - you may need to change the MTU for optimal performance with your specific ISP. 1400 is the
default MTU.
Connect Mode: Select either Always-on, On-Demand, or Manual.
D-Link DIR-615 User Manual 1
19. Section - Configuration
Internet Setup
L2TP
Choose L2TP (Layer 2 Tunneling Protocol) if your ISP uses a L2TP connection. Your ISP will provide you with a username
and password. This option is typically used for DSL services.
Address Mode: Select Static if your ISP assigned you the IP address, subnet
mask, gateway, and DNS server addresses. In most cases,
select Dynamic.
L2TP IP Address: Enter the L2TP IP address supplied by your ISP (Static only).
L2TP Subnet Mask: Enter the Subnet Mask supplied by your ISP (Static only).
L2TP Gateway: Enter the Gateway IP Address provided by your ISP.
DNS Servers: Enter the Primary and Secondary DNS Server Addresses (Static
L2TP only).
L2TP Server IP: Enter the Server IP provided by your ISP (optional).
Account: Enter your L2TP account (username).
Password: Enter your L2TP password and then retype the password in the
next box.
Maximum Idle Time: Enter a maximum idle time during which the Internet connection
is maintained during inactivity. To disable this feature, enable
Auto-reconnect.
MTU: Maximum Transmission Unit - you may need to change the MTU for optimal performance with your specific ISP. 1400 is
the default MTU.
Connect Mode: Select either Always-on, On-Demand, or Manual.
D-Link DIR-615 User Manual 1
20. Section - Configuration
Internet Setup
Static (assigned by ISP)
Select Static IP Address if all the Internet port’s IP information is provided to you by your ISP. You will need to enter in the IP address,
subnet mask, gateway address, and DNS address(es) provided to you by your ISP. Each IP address entered in the fields must be in the
appropriate IP form, which are four octets separated by a dot (x.x.x.x). The router will not accept the IP address if it is not in this format.
IP Address: Enter the IP address assigned by your ISP.
Subnet Mask: Enter the Subnet Mask assigned by your ISP.
ISP Gateway: Enter the Gateway assigned by your ISP.
MAC Address: The default MAC Address is set to the Internet port’s
physical interface MAC address on the Broadband
Router. It is not recommended that you change the
default MAC address unless required by your ISP.
You can use the Clone Your PC’s MAC Address
button to replace the Internet port’s MAC address
with the MAC address of your Ethernet card.
DNS Servers: The DNS server information will be supplied by your
ISP (Internet Service Provider.)
MTU: Maximum Transmission Unit - you may need to
change the MTU for optimal performance with your
specific ISP. 1500 is the default MTU.
D-Link DIR-615 User Manual 0
21. Section - Configuration
Internet Setup
Big Pond
BigPond Server: Enter the IP address of the login server.
BigPond Username: Enter your BigPond username.
BigPond Password: Enter your BigPond password and then retype
the password in the next box.
Auth Server: Select the type of authentication server being
used.
MAC Address: The default MAC Address is set to the
Internet’s physical interface MAC address on
the Broadband Router. It is not recommended
that you change the default MAC address
unless required by your ISP. You can use the
Clone Your PC’s MAC Address button to
replace the Internet port’s MAC address with
the MAC address of your Ethernet card.
D-Link DIR-615 User Manual 1
22. Section - Configuration
Wireless Settings
Enable Wireless: Check the box to enable the wireless function. If you do not
want to use wireless, uncheck the box to disable all the wireless
functions.
Wireless Network Service Set Identifier (SSID) is the name of your wireless network.
Name: Create a name using up to 32 characters. The SSID is case-
sensitive.
Wireless Channel: Indicates the channel setting for the DIR-615. The Channel can be
changed to fit the channel setting for an existing wireless network
or to customize the wireless network. If you enable Auto Channel
Scan, this option will be greyed out.
Enable Auto The Auto Channel Scan setting can be selected to allow the
Channel Scan: DIR-615 to choose the channel with the least amount of interference.
This feature is enabled by default.
802.11 Mode: Select one of the following:
802.11g only - Select if all of your wireless clients are 802.11g.
Mixed 802.11b/g - Select if you are using both 802.11b and 802.11g wireless clients.
802.11n Only - Select only if all of your wireless clients are 802.11n.
Mixed 802.11b/g/n - Select if you are using a mix of 802.11b, 11g, and 11n wireless clients.
Visibility Status: Select Invisible if you do not want the SSID of your wireless network to be broadcasted by the router. If Invisible is selected
the SSID will not be seen by site survey utilities so your wireless clients must have the SSID manually entered to connect to
the router.
Wireless Security: Refer to page 47 for more information regarding wireless security.
D-Link DIR-615 User Manual
23. Section - Configuration
Network Settings
This section will allow you to change the local network settings of the router and to configure the DHCP settings.
IP Address: Enter the IP address of the router. The default IP
address is 192.168.0.1.
If you change the IP address, once you click Apply,
you will need to enter the new IP address in your
browser to get back into the configuration utility.
Subnet Mask: Enter the Subnet Mask. The default subnet mask is
255.255.255.0.
Local Domain: Enter the Domain name (Optional).
Enable DNS Relay: Uncheck the box to transfer the DNS server
information from your ISP to your computers. If
checked, your computers will use the router for a
DNS server.
D-Link DIR-615 User Manual
24. Section - Configuration
DHCP Server Settings
DHCP stands for Dynamic Host Control Protocol. The DIR-615 has a built-in DHCP server. The DHCP Server will
automatically assign an IP address to the computers on the LAN/private network. Be sure to set your computers to be
DHCP clients by setting their TCP/IP settings to “Obtain an IP Address Automatically.” When you turn your computers
on, they will automatically load the proper TCP/IP settings provided by the DIR-615. The DHCP Server will automatically
allocate an unused IP address from the IP address pool to the requesting computer. You must specify the starting and
ending address of the IP address pool.
Enable DHCP Check this box to enable the DHCP server on
Server: your router. Uncheck to disable this function.
DHCP IP Address Enter the starting and ending IP addresses for
Range: the DHCP server’s IP assignment.
Note: If you statically (manually) assign IP
addresses to your computers or devices, make
sure the IP addresses are outside of this range
or you may have an IP conflict.
Lease Time: The length of time for the IP address lease.
Enter the Lease time in minutes.
Add DHCP Refer to the next page for the DHCP Reservation
Reservation: function.
D-Link DIR-615 User Manual
25. Section - Configuration
DHCP Reservation
If you want a computer or device to always have the same IP address assigned, you can create a DHCP reservation.
The router will assign the IP address only to that computer or device.
Note: This IP address must be within the DHCP IP Address Range.
Enable: Check this box to enable the reservation.
Computer Name: Enter the computer name or select from the
drop-down menu and click .
IP Address: Enter the IP address you want to assign to the
computer or device. This IP Address must be
within the DHCP IP Address Range.
MAC Address: Enter the MAC address of the computer or
device.
Copy Your PC’s If you want to assign an IP address to the
MAC Address: computer you are currently on, click this button
to populate the fields.
Save: Click Save to save your entry. You must click
Save Settings at the top to activate your
reservations.
D-Link DIR-615 User Manual 5
26. Section - Configuration
Virtual Server
The DIR-615 can be configured as a virtual server so that remote users accessing Web or FTP services via the public
IP address can be automatically redirected to local servers in the LAN (Local Area Network).
The DIR-615 firewall feature filters out unrecognized packets to protect your LAN network so all computers networked
with the DIR-615 are invisible to the outside world. If you wish, you can make some of the LAN computers accessible
from the Internet by enabling Virtual Server. Depending on the requested service, the DIR-615 redirects the external
service request to the appropriate server within the LAN network.
The DIR-615 is also capable of port-redirection meaning incoming traffic to a particular port may be redirected to a
different port on the server computer.
Each virtual service that is created will be listed at the bottom of the screen in the Virtual Servers List. There are
pre-defined virtual services already in the table. You may use them by enabling them and assigning the server IP to
use that particular virtual service.
For a list of ports for common applications, please visit http://support.dlink.com/faq/view.asp?prod_id=1191.
D-Link DIR-615 User Manual 6
27. Section - Configuration
This will allow you to open a single port. If you would like to open a range of ports, refer to page 28.
Name: Enter a name for the rule or select an application
from the drop-down menu. Select an application
and click to populate the fields.
IP Address: Enter the IP address of the computer on your
local network that you want to allow the incoming
service to. If your computer is receiving an IP
address automatically from the router (DHCP),
you computer will be listed in the “Computer
Name” drop-down menu. Select your computer
and click .
Private Port/ Enter the port that you want to open next to Private
Public Port: Port and Public Port. The private and public ports
are usually the same. The public port is the port
seen from the Internet side, and the private port
is the port being used by the application on the
computer within your local network.
Traffic Type: Select the type of protocol you would like to use
for the selected rule.
Schedule: The schedule of time when the Virtual Server
Rule will be enabled. The schedule may be set to
Always, which will allow the particular service to
always be enabled. You can create your own times
in the Tools Schedules section.
D-Link DIR-615 User Manual
28. Section - Configuration
Port Forwarding
This will allow you to open a single port or a range of ports.
Name: Enter a name for the rule or select an application
from the drop-down menu. Select an application and
click to populate the fields.
IP Address: Enter the IP address of the computer on your local
network that you want to allow the incoming service
to. If your computer is receiving an IP address
automatically from the router (DHCP), you computer
will be listed in the “Computer Name” drop-down
menu. Select your computer and click .
Start Port/End Enter the port or ports that you want to open. You
Port: can enter a single port or a range of ports. Seperate
ports with a common.
Example: 24,1009,3000-4000
Traffic Type: Select the type of protocol you would like to assign to the rule.
Schedule: The schedule of time when the Virtual Server Rule will be enabled. The schedule may be set to Always, which will allow the
particular service to always be enabled. You can create your own times in the Tools Schedules section.
D-Link DIR-615 User Manual
29. Section - Configuration
Application Rules
Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and
others. These applications have difficulties working through NAT (Network Address Translation). Special Applications
makes some of these applications work with the DIR-615. If you need to run applications that require multiple connections,
specify the port normally associated with an application in the “Trigger Port” field, select the protocol type as TCP or
UDP, then enter the firewall (public) ports associated with the trigger port to open them for inbound traffic.
The DIR-615 provides some predefined applications in the table on the bottom of the web page. Select the application
you want to use and enable it.
Name: Enter a name for the rule. You may select a
pre-defined application from the drop-down
menu and click .
Trigger: This is the port used to trigger the application. It
can be either a single port or a range of ports.
Firewall: This is the port number on the Internet side
that will be used to access the application. You
may define a single port or a range of ports.
You can use a comma to add multiple ports or
port ranges.
Traffic Type: Select the protocol of the firewall port (TCP,
UDP, or Both).
Schedule: The schedule of time when the Application Rule
will be enabled. The schedule may be set to Always, which will allow the particular service to always be enabled. You can
create your own times in the Tools Schedules section.
D-Link DIR-615 User Manual
30. Section - Configuration
Network Filters
Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses
from accessing the Network. You can either manually add a MAC address or select the MAC address from the list of
clients that are currently connected to the Broadband Router.
Configure MAC Select Turn MAC Filtering Off, allow MAC
Filtering: addresses listed below, or deny MAC addresses
listed below from the drop-down menu.
MAC Address: Enter the MAC address you would like to filter.
To find the MAC address on a computer, please
refer to the Networking Basics section in this
manual.
DHCP Client: Select a DHCP client from the drop-down menu
and click to copy that MAC Address.
D-Link DIR-615 User Manual 0
31. Section - Configuration
Website Filters
Website Filters are used to deny LAN computers from accessing specific web sites by the URL or domain. A URL is a
specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word,
the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked
and click Save Settings. The text to be blocked will appear in the list. To delete the text, click Clear the List Below.
Website URL/ Enter the keywords or URLs that you want to
Domain: block (or allow). Any URL with the keyword in it
will be blocked.
Schedule: The schedule of time when the selected rule
will be enabled. The schedule may be set to
Always, which will allow the filter to always be
enabled. You can create your own times in the
Tools Schedules section.
D-Link DIR-615 User Manual 1
32. Section - Configuration
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-615 offers a firewall type functionality. Sometimes
you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a
computer, you cam enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer
completely to the outside world.
Enable DMZ Host: If an application has trouble working from behind the router, you
can expose one computer to the Internet and run the application
on that computer.
Note: Placing a computer in the DMZ may expose that computer to
a variety of security risks. Use of this option is only recommended
as a last resort.
IP Address: Specify the IP address of the computer on the LAN that you want to
have unrestricted Internet communication. If this computer obtains
it’s IP address automatically using DHCP, be sure to make a static
reservation on the Basic DHCP page so that the IP address of
the DMZ machine does not change.
VPN Passthrough: You may enable or disable the following listed VPN protocols.
D-Link DIR-615 User Manual
33. Section - Configuration
Advanced Wireless Settings
802.11 b/g/n Fixed Select Auto (strongly recommended) or Fixed to
Tx Rates: manually set the TX rate.
Beacon Period: Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
RTS Threshold: This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only a
minor modification should be made.
DTIM Interval: (Delivery Traffic Indication Message) 3 is the default
setting. A DTIM is a countdown informing clients
of the next window for listening to broadcast and
multicast messages.
Preamble Type: Select Short Preamble or Long Preamble. Short
preamble is recommended for a large amount of network traffic such as transferring files or streaming audio or video.
Protection: Protection is for neighboring 802.11b wireless networks. Select Disable to reduce the adverse affect of legacy wireless
networks 802.11n performance. This option is available only when 802.11 mode is set to 802.11n only.
D-Link DIR-615 User Manual
34. Section - Configuration
Advanced Network Settings
UPnP: To use the Universal Plug and Play (UPnP™)
feature click on the checkbox to enable. UPNP
provides compatibility with networking equipment,
software and peripherals.
WAN Ping: Unchecking the box will not allow the DIR-615 to
respond to pings. Blocking the Ping may provide
some extra security from hackers. Check the box
to allow the Internet port to be “pinged”.
WAN Port Speed: You may set the port speed of the Internet port to
UPnP
Internet Ping Block
Internet Port Speed
Multicast Streams
10Mbps, 100Mbps, or Auto. Some older cable
or DSL modems may require you to set the port
speed to 10Mbps.
Multicast Check the box to allow multicast traffic to pass
streams: through the router from the Internet.
D-Link DIR-615 User Manual
35. Section - Configuration
Administrator Settings
This page will allow you to change the Administrator and User names and passwords. You can also enable Remote
Management. There are two accounts that can access the management interface through the web browser. The
accounts are admin and user. Admin has read/write access while user has read-only access. User can only view the
settings but cannot make any changes. Only the admin account has the ability to change both admin and user account
passwords.
Admin Password: Enter a new login name and a new password for the
administrator login. Only the administrator can make changes
to the settings.
User Password: Enter a new login name and a new password for the user
login. If you login as user, you will only be able to see the
settings and not be able to make changes.
Remote Remote management allows the DIR-615 to be configured
Management: from the Internet by a web browser. A username and
password is still required to access the Web-Management
interface. In general, only a member of your network can
browse the built-in web pages to perform Administrator tasks.
This feature enables you to perform Administrator tasks from
the remote (Internet) host.
Remote Admin IP: Enter the IP address of the remote computer. You may enter
* to allow a connection from any internet address.
Port: The port number used to access the DIR-615.
Example: http://x.x.x.x:8080 whereas x.x.x.x is the Internet
IP address of the DIR-615 and 8080 is the port used for the
Web Management interface.
D-Link DIR-615 User Manual 5
36. Section - Configuration
Time Settings
The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system
clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also
be configured to automatically adjust the time when needed.
Time Zone: Select the Time Zone from the drop-down
menu.
Daylight Saving: To select Daylight Saving time manually, select
enabled or disabled, and enter a start date and
an end date for daylight saving time.
Enable NTP NTP is short for Network Time Protocol. NTP
Server: synchronizes computer clock times in a network
of computers. Check this box to use a NTP
server. This will only connect to a server on the
Internet, not a local server.
NTP Server Used: Enter the NTP server or select one from the
drop-down menu.
Manual: To manually input the time, enter the values
in these fields for the Year, Month, Day, Hour,
Minute, and Second and then click Set Time.
You can also click Copy Your Computer’s Time
Settings.
D-Link DIR-615 User Manual 6
37. Section - Configuration
System Settings
Save Settings to Use this option to save the current router
Local Hard Drive: configuration settings to a file on the hard disk
of the computer you are using. First, click the
Save button. You will then see a file dialog,
where you can select a location and file name
for the settings.
Load Settings Use this option to load previously saved
from Local Hard router configuration settings. First, use the
Drive: Browse control to find a previously save file
of configuration settings. Then, click the Load
button to transfer those settings to the router.
Restore to Factory This option will restore all configuration settings
Default Settings: back to the settings that were in effect at the
time the router was shipped from the factory.
Any settings that have not been saved will be
lost, including any rules that you have created. If
you want to save the current router configuration
settings, use the Save button above.
Reboot Device: Click to reboot the router.
D-Link DIR-615 User Manual
38. Section - Configuration
Update Firmware
You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of
the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support
site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the
D-Link support site.
Browse: After you have downloaded the new firmware,
click Browse to locate the firmware update on
your hard drive. Click Upload to complete the
firmware upgrade.
D-Link DIR-615 User Manual
39. Section - Configuration
DDNS
The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have
purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet
Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in
your domain name to connect to your server no matter what your IP address is.
DDNS: Dynamic Domain Name System is a method of
keeping a domain name linked to a changing IP
Address. Check the box to enable DDNS.
Server Address: Choose your DDNS provider from the drop
down menu and click the button.
Host Name: Enter the Host Name that you registered with
your DDNS service provider.
Username or Key: Enter the Username for your DDNS account.
Password or Key: Enter the Password for your DDNS account.
D-Link DIR-615 User Manual
40. Section - Configuration
System Check
Ping Test: The Ping Test is used to send Ping packets to test if a
computer is on the Internet. Enter the IP Address that you
wish to Ping, and click Ping.
Ping Results: The results of your ping attempts will be displayed here.
D-Link DIR-615 User Manual 0
41. Section - Configuration
Schedules
Name: Enter a name for your new schedule.
Days: Select a day, a range of days, or All Week to
include every day.
Time: Check All Day - 24hrs or enter a start and end
time for your schedule.
Save: Click Save to save your schedule. You must click
Save Settings at the top for your schedules to go
into effect.
Schedule Rules The list of schedules will be listed here. Click the
List: Edit icon to make changes or click the Delete
icon to remove the schedule.
Log Settings: You can select the types of logs to save to a local
hard drive.
Save: Click the Save button to save the current logs to
your local hard drive.
Log Type: Select the type of logs you would like to have view
through your DIR-615.
D-Link DIR-615 User Manual 1
42. Section - Configuration
Log Settings
Log Settings: You can select the types of logs to save to a local
hard drive.
Save: Click the Save button to save the current logs to
your local hard drive.
Log Type: Select the type of logs you would like to have view
through your DIR-615.
D-Link DIR-615 User Manual
43. Section - Configuration
Device Information
This page displays the current information for the DIR-615. It will display the LAN, WAN (Internet), Wireless information,
and the firmware version of the router.
If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be
displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP.
If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use
Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.
LAN: Displays the MAC address and the private (local)
IP settings for the router.
WAN: Displays the MAC address and the public IP
settings for the router.
Wireless LAN: Displays the wireless MAC address and your
wireless settings such as SSID and Channel.
D-Link DIR-615 User Manual
44. Section - Configuration
Log
This page displays the log events of the DIR-615. Here you can view the logs of the router.
First Page: This option will direct you to the current first page
of the logs.
Last Page: This option will direct you to the current last page
of the logs.
Clear: Clears all current log content.
D-Link DIR-615 User Manual
45. Section - Configuration
Stats
The screen below displays the current statistics of the DIR-615. Here you can view the amount of packets that pass through
the router.
D-Link DIR-615 User Manual 5
46. Section - Configuration
Wireless
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless clients.
Support
D-Link DIR-615 User Manual 6
47. Section - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-615 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2) • WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption
algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted
from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using
WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption
requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using
characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format.
ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX
for use over the network. Four keys can be defined so that you can change keys easily.
D-Link DIR-615 User Manual
48. Section - Security
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.
D-Link DIR-615 User Manual
49. Section - Security
Wireless Security Setup Wizard
To run the security wizard, click on Setup at the top and then
click Launch Wireless Security Setup Wizard.
Click Next to continue.
D-Link DIR-615 User Manual
50. Section - Security
Enter the SSID (Service Set Identifier). The SSID is the
name of your wireless network. Create a name using up to
32 characters. The SSID is case-sensitive.
Select the level of security for your wireless network:
• Best - WPA2 Authentication
• Better - WPA Authentication
• Good - WEP Encryption
• None - No security
Click Next to continue.
If you selected Good, enter a WEP encryption key (13
characters or 26 Hex (A-F, 0-9) characters).
Click Next to continue.
If you selected Best or Better, enter a password between
8-63 characters.
Click Next to continue.
D-Link DIR-615 User Manual 50
51. Section - Security
If you selected Good, the following screen will show you your
WEP Key to enter on your wireless clients.
Click Save to finish the Security Wizard.
If you selected Better, the following screen will show you your
Pre-Shared Key to enter on your wireless clients.
Click Save to finish the Security Wizard.
If you selected Best, the following screen will show you your
Pre-Shared Key to enter on your wireless clients.
Click Save to finish the Security Wizard.
D-Link DIR-615 User Manual 51
52. Section - Security
Configure WEP
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to
the added overhead.
1. Log into the web-based configuration by opening a
web browser and entering the IP address of the router
(192.168.0.1). Click on Setup and then click Wireless
Settings on the left side.
2. Next to Security Mode, select WEP.
3. Next to Authentication, select Shared Key or Open.
4. Next to WEP Key Encryption, select the level of ecryption
(64 or 128-bit).
5. Next to Key Type, select the type of WEP key (Hex or
ASCII).
6. Next to WEP Key 1, enter a WEP key that you create.
Make sure you enter this key exactly on all your wireless
devices. You may enter up to 4 different keys.
7. Click Save Settings to save your settings. If you are
configuring the router with a wireless adapter, you will
lose connectivity until you enable WEP on your adapter
and enter the same WEP key as you did on the router.
D-Link DIR-615 User Manual 5
53. Section - Security
Configure WPA-Personal (PSK)
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to
the added overhead.
1. Log into the web-based configuration by opening a
web browser and entering the IP address of the router
(192.168.0.1). Click on Setup and then click Wireless
Settings on the left side.
2. Next to Security Mode, select WPA-Personal.
3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only.
Use Auto if you have wireless clients using both WPA and
WPA2.
4. Next to Pre-Shared Key, enter a key (passphrase). The key
is entered as a pass-phrase in ASCII format at both ends of
the wireless connection. The pass-phrase must be between
8-63 characters.
5. Click Save Settings to save your settings. If you are
configuring the router with a wireless adapter, you will lose
connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router.
D-Link DIR-615 User Manual 5
54. Section - Security
Configure WPA-Enterprise (RADIUS)
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to
the added overhead.
1. Log into the web-based configuration by opening a web browser
and entering the IP address of the router (192.168.0.1). Click on
Setup and then click Wireless Settings on the left side.
2. Next to Security Mode, select WPA-Enterprise.
3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use
Auto if you have wireless clients using both WPA and WPA2.
4. Next to Authentication Timeout, enter the amount of time before
a client is required to re-authenticate (60 minutes is default).
5. Next to RADIUS Server IP Address enter the IP Address of your
RADIUS server.
6. Next to RADIUS Server Port, enter the port you are using with
your RADIUS server. 1812 is the default port.
7. Next to RADIUS Server Shared Secret, enter the security key.
8. If the MAC Address Authentication box is selected then the user
will need to connect from the same computer whenever logging
into the wireless network.
D-Link DIR-615 User Manual 5
55. Section - Security
9. Click Advanced to enter settings for a secondary RADIUS
Server.
10. Click Apply Settings to save your settings.
D-Link DIR-615 User Manual 55
56. Section 5 - Connecting to a Wireless Network
Connect to a Wireless Network
Using Windows® XP
Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for
Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual
of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option
similar to the Windows® XP utility as seen below.
If you receive the Wireless Networks Detected bubble, click
on the center of the bubble to access the utility.
or
Right-click on the wireless computer icon in your system tray
(lower-right corner next to the time). Select View Available
Wireless Networks.
The utility will display any available wireless networks in your
area. Click on a network (displayed using the SSID) and click
the Connect button.
If you get a good signal but cannot access the Internet, check you
TCP/IP settings for your wireless adapter. Refer to the Networking
Basics section in this manual for more information.
D-Link DIR-615 User Manual 56
57. Section 5 - Connecting to a Wireless Network
Configure WEP
It is recommended to enable WEP on your wireless router or access point before configuring your wireless adapter. If
you are joining an existing network, you will need to know the WEP key being used.
1. Open the Windows® XP Wireless Utility by right-clicking
on the wireless computer icon in your system tray
(lower-right corner of screen). Select View Available
Wireless Networks.
2. Highlight the wireless network (SSID) you would like to
connect to and click Connect.
D-Link DIR-615 User Manual 5
58. Section 5 - Connecting to a Wireless Network
3. The Wireless Network Connection box will appear. Enter the
same WEP key that is on your router and click Connect.
It may take 20-30 seconds to connect to the wireless network. If the
connection fails, please verify that the WEP settings are correct. The
WEP key must be exactly the same as on the wireless router.
D-Link DIR-615 User Manual 5
59. Section 5 - Connecting to a Wireless Network
Configure WPA-PSK
It is recommended to enable WEP on your wireless router or access point before configuring your wireless adapter. If
you are joining an existing network, you will need to know the WEP key being used.
1. Open the Windows® XP Wireless Utility by right-clicking
on the wireless computer icon in your system tray
(lower-right corner of screen). Select View Available
Wireless Networks.
2. Highlight the wireless network (SSID) you would like to
connect to and click Connect.
D-Link DIR-615 User Manual 5
60. Section 5 - Connecting to a Wireless Network
3. The Wireless Network Connection box will appear. Enter the
WPA-PSK passphrase and click Connect.
It may take 20-30 seconds to connect to the wireless network. If the
connection fails, please verify that the WPA-PSK settings are correct.
The WPA-PSK passphrase must be exactly the same as on the
wireless router.
D-Link DIR-615 User Manual 60
61. Section 6 - Troubleshooting
Troubleshooting
This chapter provides solutions to problems that can occur during the installation and operation of the DIR-615. Read
the following descriptions if you are having problems. (The examples below are illustrated in Windows® XP. If you have
a different operating system, the screenshots on your computer will look similar to the following examples.)
1. Why can’t I access the web-based configuration utility?
When entering the IP address of the D-Link router (192.168.0.1 for example), you are not connecting to a website on
the Internet or have to be connected to the Internet. The device has the utility built-in to a ROM chip in the device itself.
Your computer must be on the same IP subnet to connect to the web-based utility.
• Make sure you have an updated Java-enabled web browser. We recommend the following:
• Internet Explorer 6.0 or higher
• Firefox 1.5 or higher
• Netscape 8 or higher
• Mozilla 1.7.12 (5.0) or higher
• Opera 8.5 or higher
• Safari 1.2 or higher (with Java 1.3.1 or higher)
• Camino 0.8.4 or higher
• Verify physical connectivity by checking for solid link lights on the device. If you do not get a solid link light, try using
a different cable or connect to a different port on the device if possible. If the computer is turned off, the link light may
not be on.
• Disable any Internet security software running on the computer. Software firewalls such as Zone Alarm, Black Ice,
Sygate, Norton Personal Firewall, and Windows® XP firewall may block access to the configuration pages. Check the
help files included with your firewall software for more information on disabling or configuring it.
D-Link DIR-615 User Manual 61
62. Section 6 - Troubleshooting
• Configure your Internet settings:
• Go to Start Settings Control Panel. Double-click the Internet Options Icon. From the Security tab,
click the button to restore the settings to their defaults.
• Click the Connection tab and set the dial-up option to Never Dial a Connection. Click the LAN Settings
button. Make sure nothing is checked. Click OK.
• Go to the Advanced tab and click the button to restore these settings to their defaults. Click OK three
times.
• Close your web browser (if open) and open it.
• Access the web management. Open your web browser and enter the IP address of your D-Link router in the address
bar. This should open the login page for your the web management.
• If you still cannot access the configuration, unplug the power to the router for 10 seconds and plug back in. Wait
about 30 seconds and try accessing the configuration. If you have multiple computers, try connecting using a different
computer.
2. What can I do if I forgot my password?
If you forgot your password, you must reset your router. Unfortunately this process will change all your settings back
to the factory defaults.
To reset the router, locate the reset button (hole) on the rear panel of the unit. With the router powered on, use a
paperclip to hold the button down for 10 seconds. Release the button and the router will go through its reboot process.
Wait about 30 seconds to access the router. The default IP address is 192.168.0.1. When logging in, the username is
admin and leave the password box empty.
D-Link DIR-615 User Manual 6
63. Section 6 - Troubleshooting
3. Why can’t I connect to certain sites or send and receive emails when connecting through my router?
If you are having a problem sending or receiving email, or connecting to secure sites such as eBay, banking sites, and
Hotmail, we suggest lowering the MTU in increments of ten (Ex. 1492, 1482, 1472, etc).
Note: AOL DSL+ users must use MTU of 1400.
To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to. A destination could
be another computer, or a URL.
• Click on Start and then click Run.
• Windows® 95, 98, and Me users type in command (Windows® NT, 2000, and XP users type in cmd) and
press Enter (or click OK).
• Once the window opens, you’ll need to do a special ping. Use the following syntax:
ping [url] [-f] [-l] [MTU value]
Example: ping yahoo.com -f -l 1472
D-Link DIR-615 User Manual 6
64. Section 6 - Troubleshooting
You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a
fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example,
lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network
we’re working with (1452+28=1480).
Once you find your MTU, you can now configure your router with the proper MTU size.
To change the MTU rate on your router follow the steps below:
• Open your browser, enter the IP address of your router (192.168.0.1) and click OK.
• Enter your username (admin) and password (blank by default). Click OK to enter the web configuration
page for the device.
• Click on Setup and then click Manual Configure.
• To change the MTU enter the number in the MTU field and click Save Settings to save your settings.
• Test your email. If changing the MTU does not resolve the problem, continue changing the MTU in
increments of ten.
D-Link DIR-615 User Manual 6
65. Appendix A - Wireless Basics
Wireless Basics
D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless
connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard,
the D-Link wireless family of products will allow you to securely access the data you want, when and where you want
it. You will be able to enjoy the freedom that wireless networking delivers.
A wireless local area network (WLAN) is a cellular computer network that transmits and receives data with radio signals
instead of wires. Wireless LANs are used increasingly in both home and office environments, and public areas such
as airports, coffee shops and universities. Innovative ways to utilize WLAN technology are helping people to work and
communicate more efficiently. Increased mobility and the absence of cabling and other fixed infrastructure have proven
to be beneficial for many users.
Wireless users can use the same applications they use on a wired network. Wireless adapter cards used on laptop
and desktop systems support the same protocols as Ethernet adapter cards.
Under many circumstances, it may be desirable for mobile network devices to link to a conventional Ethernet LAN in
order to use servers, printers or an Internet connection supplied through the wired LAN. A Wireless Router is a device
used to provide this link.
D-Link DIR-615 User Manual 65
66. Appendix A - Wireless Basics
What is Wireless?
Wireless or Wi-Fi technology is another way of connecting your computer to the network without using wires. Wi-Fi
uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or
office network.
Why D-Link Wireless?
D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products.
D-Link delivers the performance you need at a price you can afford. D-Link has all the products you need to build your
network.
How does wireless work?
Wireless works similar to how cordless phone work, through radio signals to transmit data from one point A to point
B. But wireless technology has restrictions as to how you can access the network. You must be within the wireless
network range area to be able to connect your computer. There are two different types of wireless networks Wireless
Local Area Network (WLAN), and Wireless Personal Area Network (WPAN).
Wireless Local Area Network (WLAN)
In a wireless local area network, a device called an Access Point (AP) connects computers to the network. The access
point has a small antenna attached to it, which allows it to transmit data back and forth over radio signals. With an
indoor access point as seen in the picture, the signal can travel up to 300 feet. With an outdoor access point the signal
can reach out up to 30 miles to serve places like manufacturing plants, industrial locations, college and high school
campuses, airports, golf courses, and many other outdoor venues.
D-Link DIR-615 User Manual 66
67. Appendix A - Wireless Basics
Wireless Personal Area Network (WPAN)
Bluetooth is the industry standard wireless technology used for WPAN. Bluetooth devices in WPAN operate in a range
up to 30 feet away.
Compared to WLAN the speed and wireless operation range are both less than WLAN, but in return it doesn’t use
nearly as much power which makes it ideal for personal devices, such as mobile phones, PDAs, headphones, laptops,
speakers, and other devices that operate on batteries.
Who uses wireless?
Wireless technology as become so popular in recent years that almost everyone is using it, whether it’s for home, office,
business, D-Link has a wireless solution for it.
Home
• Gives everyone at home broadband access
• Surf the web, check email, instant message, and etc
• Gets rid of the cables around the house
• Simple and easy to use
Small Office and Home Office
• Stay on top of everything at home as you would at office
• Remotely access your office network from home
• Share Internet connection and printer with multiple computers
• No need to dedicate office space
D-Link DIR-615 User Manual 6
68. Appendix A - Wireless Basics
Where is wireless used?
Wireless technology is expanding everywhere not just at home or office. People like the freedom of mobility and it’s
becoming so popular that more and more public facilities now provide wireless access to attract people. The wireless
connection in public places is usually called “hotspots”.
Using a D-Link Cardbus Adapter with your laptop, you can access the hotspot to connect to Internet from remote
locations like: Airports, Hotels, Coffee Shops, Libraries, Restaurants, and Convention Centers.
Wireless network is easy to setup, but if you’re installing it for the first time it could be quite a task not knowing where to
start. That’s why we’ve put together a few setup steps and tips to help you through the process of setting up a wireless
network.
Tips
Here are a few things to keep in mind, when you install a wireless network.
Centralize your router or Access Point
Make sure you place the router/access point in a centralized location within your network for the best performance. Try
to place the router/access point as high as possible in the room, so the signal gets dispersed throughout your home.
If you have a two-story home, you may need a repeater to boost the signal to extend the range.
Eliminate Interference
Place home appliances such as cordless telephones, microwaves, and televisions as far away as possible from the
router/access point. This would significantly reduce any interference that the appliances might cause since they operate
on same frequency.
D-Link DIR-615 User Manual 6
69. Appendix A - Wireless Basics
Security
Don’t let you next-door neighbors or intruders connect to your wireless network. Secure your wireless network by turning
on the WPA or WEP security feature on the router. Refer to product manual for detail information on how to set it up.
Wireless Modes
There are basically two modes of networking:
• Infrastructure – All wireless clients will connect to an access point or wireless router.
• Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network
adapters on each computer, such as two or more DIR-615 wireless network Cardbus adapters.
An Infrastructure network contains an Access Point or wireless router. All the wireless devices, or clients, will connect
to the wireless router or access point.
An Ad-Hoc network contains only clients, such as laptops with wireless cardbus adapters. All the adapters must be in
Ad-Hoc mode to communicate.
D-Link DIR-615 User Manual 6
70. Appendix B - Networking Basics
Networking Basics
Check your IP address
After you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a
DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below.
Click on Start Run. In the run box type cmd and click OK.
At the prompt, type ipconfig and press Enter.
This will display the IP address, subnet mask, and
the default gateway of your adapter.
If the address is 0.0.0.0, check your adapter
installation, security settings, and the settings
on your router. Some firewall software programs
may block a DHCP request on newly installed
adapters.
If you are connecting to a wireless network at a hotspot (e.g. hotel, coffee shop, airport), please contact an employee
or administrator to verify their wireless network settings.
D-Link DIR-615 User Manual 0
71. Appendix B - Networking Basics
Statically Assign an IP address
If you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps
below:
Step 1
Windows® XP - Click on Start Control Panel Network Connections.
Windows® 2000 - From the desktop, right-click My Network Places Properties.
Step 2
Right-click on the Local Area Connection which represents your D-Link network adapter and select Properties.
Step 3
Highlight Internet Protocol (TCP/IP) and click Properties.
Step 4
Click Use the following IP address and enter an IP address that is on the same subnet as your network or the LAN
IP address on your router.
Example: If the router´s LAN IP address is 192.168.0.1, make your IP address
192.168.0.X where X is a number between 2 and 99. Make sure that the number
you choose is not in use on the network. Set Default Gateway the same as the LAN
IP address of your router (192.168.0.1).
Set Primary DNS the same as the LAN IP address of your router (192.168.0.1). The
Secondary DNS is not needed or you may enter a DNS server from your ISP.
Step 5
Click OK twice to save your settings.
D-Link DIR-615 User Manual 1
72. Appendix B - Networking Basics
Connect to Cable/DSL/Satellite Modem
If you are connecting the router to a cable/DSL/satellite modem, please follow the steps below:
1. Place the router in an open and central location. Do not plug the power adapter into the router.
2. Turn the power off on your modem. If there is no on/off switch, then unplug the modem’s power adapter. Shut down
your computer.
3. Unplug the Ethernet cable (that connects your computer to your modem) from your computer and place it into the
Internet port on the router.
4. Plug an Ethernet cable into one of the four LAN ports on the router. Plug the other end into the Ethernet port on your
computer.
5. Turn on or plug in your modem. Wait for the modem to boot (about 30 seconds).
6. Plug the power adapter to the router and connect to an outlet or power strip. Wait about 30 seconds for the router
to boot.
7. Turn on your computer.
8. Verify the link lights on the router. The power light, Internet light, and the LAN light (the port that your computer is
plugged into) should be lit. If not, make sure your computer, modem, and router are powered on and verify the cable
connections are correct.
9. Refer to page 11 to configure your router.
D-Link DIR-615 User Manual
73. Appendix B - Networking Basics
Connect to Another Router
If you are connecting the D-Link router to another router to use as a wireless access point and/or switch, you will have
to do the following before connecting the router to your network:
• Disable UPnP™
• Disable DHCP
• Change the LAN IP address to an available address on your network. The LAN ports on the router cannot
accept a DHCP address from your other router.
To connect to another router, please follow the steps below:
1. Plug the power into the router. Connect one of your computers to the router (LAN port) using an Ethernet cable.
Make sure your IP address on the computer is 192.168.0.xxx (where xxx is between 2 and 254). Please see the
Networking Basics section for more information. If you need to change the settings, write down your existing settings
before making any changes. In most cases, your computer should be set to receive an IP address automatically in
which case you will not have to do anything to your computer.
2. Open a web browser and enter http://192.168.0.1 and press Enter. When the login window appears, set the user
name to Admin and leave the password box empty. Click Log In to continue.
3. Click on Advanced and then click Advanced Network. Uncheck the Enable UPnP checkbox. Click Save Settings
to continue.
4. Click Setup and then click Network Settings. Uncheck the Enable DHCP Server server checkbox. Click Save
Settings to continue.
5. Under Router Settings, enter an available IP address and the subnet mask of your network. Click Save Settings to
save your settings. Use this new IP address to access the configuration utility of the router in the future. Close the
browser and change your computer’s IP settings back to the original values as in Step 1.
D-Link DIR-615 User Manual
74. Appendix B - Networking Basics
6. Disconnect the Ethernet cable from the router and reconnect your computer to your network.
7. Connect an Ethernet cable in one of the LAN ports of the router and connect it to your other router. Do not plug
anything into the Internet port of the D-Link router.
8. You may now use the other 3 LAN ports to connect other Ethernet devices and computers. To configure your wireless
network, open a web browser and enter the IP address you assigned to the router. Refer to the Configuration and
Wireless Security sections for more information on setting up your wireless network.
D-Link DIR-615 User Manual
75. Appendix C - Technical Specifications
Technical Specifications
Standards Frequency Range
• IEEE 802.11n (draft) 2.4GHz to 2.483GHz
• IEEE 802.11g
• IEEE 802.11b Transmitter Output Power
• IEEE 802.3 15dBm ± 2dB
• IEEE 802.3u
External Antenna Type
Security Two (2) detachable reverse SMA Antennas
• WPA-Personal
• WPA2-Personal LEDs
• WPA-Enterprise • Power • Internet • Status
• WPA2-Enterprise • WLAN • LAN (10/100)
• 64/128-bit WEP
Operating Temperature
Wireless Signal Rates* 32°F to 131°F ( 0°C to 55°C)
• 108Mbps • 48Mbps
• 54Mbps • 24Mbps Humidity
• 36Mbps • 12Mbps 95% maximum (non-condensing)
• 18Mbps • 9Mbps
• 11Mbps • 5.5Mbps Safety Emissions
• 6Mbps • 1Mbps • FCC
• 2Mbps • CE
MSC (0-15) Dimensions
• 130Mbps (270) • 117Mbps (243) • L = 7.6 inches
• 104Mbps (216) • 78Mbps (162) • W = 4.6 inches
• 66Mbps (135) • 58.5Mbps (121.5) • H = 1.2inches
• 52Mbps (108) • 39Mbps (81)
• 26Mbps (54) • 19.5Mbps (40.5) Warranty
• 12Mbps (27) • 6.5Mbps (13.5) 1 Year
* Maximum wireless signal rate derived from IEEE Standard 802.11g and Draft 802.11n specifications. Actual data throughput will vary. Network conditions and
environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate. Environmental
factors will adversely affect wireless signal range.
D-Link DIR-615 User Manual 5
76. Appendix D - Contacting Technical Support
Contacting Technical Support
U.S. and Canadian customers can contact D-Link technical support through our web site or by phone.
Before you contact technical support, please have the following ready:
• Model number of the product (e.g. DIR-615)
• Hardware Revision (located on the label on the bottom of the router (e.g. rev A1))
• Serial Number (s/n number located on the label on the bottom of the router).
You can find software updates and user documentation on the D-Link website as well as frequently asked questions
and answers to technical issues.
For customers within the United States: For customers within Canada:
Phone Support: Phone Support:
(877) 453-5465 (800) 361-5265
Internet Support: Internet Support:
http://support.dlink.com http://support.dlink.com
D-Link DIR-615 User Manual 6
77. Appendix E - Warranty
Warranty
Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty:
• Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and
• Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions
or Protectorates, U.S. Military Installations, or addresses with an APO or FPO.
Limited Warranty:
D-Link warrants that the hardware portion of the D-Link product described below (“Hardware”) will be free from material defects in
workmanship and materials under normal use from the date of original retail purchase of the product, for the period set forth below
(“Warranty Period”), except as otherwise stated herein.
• Hardware (excluding power supplies and fans): One (1) year
• Power supplies and fans: One (1) year
• Spare parts and spare kits: Ninety (90) days
The customer’s sole and exclusive remedy and the entire liability of D-Link and its suppliers under this Limited Warranty will be, at
D-Link’s option, to repair or replace the defective Hardware during the Warranty Period at no charge to the original owner or to refund the
actual purchase price paid. Any repair or replacement will be rendered by D-Link at an Authorized D-Link Service Office. The replacement
hardware need not be new or have an identical make, model or part. D-Link may, at its option, replace the defective Hardware or any part
thereof with any reconditioned product that D-Link reasonably determines is substantially equivalent (or superior) in all material respects
to the defective Hardware. Repaired or replacement hardware will be warranted for the remainder of the original Warranty Period or ninety
(90) days, whichever is longer, and is subject to the same limitations and exclusions. If a material defect is incapable of correction, or if
D-Link determines that it is not practical to repair or replace the defective Hardware, the actual price paid by the original purchaser for the
defective Hardware will be refunded by D-Link upon return to D-Link of the defective Hardware. All Hardware or part thereof that is replaced
by D-Link, or for which the purchase price is refunded, shall become the property of D-Link upon replacement or refund.
D-Link DIR-615 User Manual