Configuration - Unitymedia
Configuration - Unitymedia Configuration - Unitymedia
Section 3 - Configuration A firewall protects your network from the outside world. The D-Link DIR-655 offers a firewall type functionality. Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. NAT Endpoint Filtering: Anti-Spoof Checking: Enable DMZ Host: IP Address: Firewall Settings Select one of the following for TCP and UDP ports: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes. Address Restricted - Incoming traffic must match the IP address of the outgoing connection. Address and Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection. Enable this feature to protect your network from certain kinds of “spoofing” attacks. If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change. Non-UDP/TCP/ Enable this feature to allow the router’ NAT to track application that uses protocols other than UDP, TCP or ICMP. ICMP LAN Sessions: D-Link DIR-655 User Manual 42
VPN Passthrough RTSP H.323 SIP (VoIP) MMS Section 3 - Configuration Application Level Gateway (ALG) Configuration Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. PPTP: Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol. IPSEC (VPN): RTSP: Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether your VPN client supports NAT traversal. Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and Real Player are some of the common applications using this protocol. MSN Messenger: Allows all of the Windows/MSN Messenger functions to work properly through the router. FTP: H.323 (Netmeeting): SIP: Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced > Virtual Server page if you want to host an FTP server. Allows Microsoft NetMeeting clients to communicate across NAT. Note that if you want your buddies to call you, you should also set up a virtual server for NetMeeting. Refer to the Advanced > Virtual Server page for information on how to set up a virtual server. Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices. If you are having trouble making VoIP calls, try turning this ALG off. Wake-On-LAN: Allows Ethernet network adapters with Wake-On-LAN (WOL) to function. MMS: Allows Windows Media Player, using MMS protocol, to receive streaming media from the Internet. D-Link DIR-655 User Manual 43
- Page 2 and 3: Table of Contents Product Overview.
- Page 4 and 5: Section 1 - Product Overview Produc
- Page 6 and 7: Section 1 - Product Overview Featur
- Page 8 and 9: Section 1 - Product Overview Hardwa
- Page 10 and 11: Section 2 - Installation Wireless I
- Page 12 and 13: Section 3 - Configuration Configura
- Page 14 and 15: Section 3 - Configuration Create a
- Page 16 and 17: Section 3 - Configuration If you se
- Page 18 and 19: Section 3 - Configuration My Intern
- Page 20 and 21: Section 3 - Configuration MTU: MAC
- Page 22 and 23: Section 3 - Configuration MTU: Clon
- Page 24 and 25: Section 3 - Configuration Internet
- Page 26 and 27: Section 3 - Configuration Channel W
- Page 28 and 29: Section 3 - Configuration Enable DH
- Page 30 and 31: Section 3 - Configuration Virtual S
- Page 32 and 33: Section 3 - Configuration Port Forw
- Page 34 and 35: Section 3 - Configuration QoS Engin
- Page 36 and 37: Section 3 - Configuration Network F
- Page 38 and 39: Section 3 - Configuration Enter a n
- Page 40 and 41: Section 3 - Configuration Website U
- Page 44 and 45: Section 3 - Configuration Router Se
- Page 46 and 47: Section 3 - Configuration WISH Sett
- Page 48 and 49: Section 3 - Configuration Wi-Fi Pro
- Page 50 and 51: UPnP Internet Ping Block Internet P
- Page 52 and 53: Section 3 - Configuration Time Sett
- Page 54 and 55: Section 3 - Configuration Email Set
- Page 56 and 57: Section 3 - Configuration Update Fi
- Page 58 and 59: Section 3 - Configuration System Ch
- Page 60 and 61: Section 3 - Configuration Device In
- Page 62 and 63: Section 3 - Configuration Statistic
- Page 64 and 65: Section 3 - Configuration Support D
- Page 66 and 67: Section 4 - Security What is WPA? W
- Page 68 and 69: Section 4 - Security Enter the SSID
- Page 70 and 71: Section 4 - Security Configure WEP
- Page 72 and 73: Section 4 - Security Configure WPA-
- Page 74 and 75: Section 5 - Connecting to a Wireles
- Page 76 and 77: Section 5 - Connecting to a Wireles
- Page 78 and 79: Section 5 - Connecting to a Wireles
- Page 80 and 81: Section 6 - Troubleshooting • Con
- Page 82 and 83: Section 6 - Troubleshooting You sho
- Page 84 and 85: Appendix A - Wireless Basics What i
- Page 86 and 87: Appendix A - Wireless Basics Where
- Page 88 and 89: Appendix B - Networking Basics Netw
- Page 90: Appendix C - Technical Specificatio
Section 3 - <strong>Configuration</strong><br />
A firewall protects your network from the outside world. The D-Link DIR-655 offers a firewall type functionality.<br />
Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet<br />
filtering) helps to prevent cyber attacks by tracking more state per<br />
session. It validates that the traffic passing through the session<br />
conforms to the protocol.<br />
NAT Endpoint<br />
Filtering:<br />
Anti-Spoof<br />
Checking:<br />
Enable DMZ<br />
Host:<br />
IP Address:<br />
Firewall Settings<br />
Select one of the following for TCP and UDP ports:<br />
Endpoint Independent - Any incoming traffic sent to an open port<br />
will be forwarded to the application that opened the port. The port<br />
will close if idle for 5 minutes.<br />
Address Restricted - Incoming traffic must match the IP address<br />
of the outgoing connection.<br />
Address and Port Restriction - Incoming traffic must match the<br />
IP address and port of the outgoing connection.<br />
Enable this feature to protect your network from certain kinds of<br />
“spoofing” attacks.<br />
If an application has trouble working from behind the router, you<br />
can expose one computer to the Internet and run the application on<br />
that computer. Note: Placing a computer in the DMZ may expose<br />
that computer to a variety of security risks. Use of this option is only<br />
recommended as a last resort.<br />
Specify the IP address of the computer on the LAN that you want to<br />
have unrestricted Internet communication. If this computer obtains<br />
it’s IP address automatically using DHCP, be sure to make a static<br />
reservation on the Basic > DHCP page so that the IP address of<br />
the DMZ machine does not change.<br />
Non-UDP/TCP/ Enable this feature to allow the router’ NAT to track application that uses protocols other than UDP, TCP or ICMP.<br />
ICMP LAN<br />
Sessions:<br />
D-Link DIR-655 User Manual<br />
42