Tools Help
 
Admin
Admin Setting:
System Name:
This is the router identifier, and is displayed in the status summary pages.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

Remote Management:
Enable Remote Management
: By default, Remote management over the internet is disabled. Check this box to enable authorized users to access this GUI over the internet.

IMPORTANT: When remote management is enabled, the router is accessible to anyone who knows its IP address. Since a malicious WAN user can reconfigure the router and misuse it in many ways, it is HIGHLY RECOMMENDED that you change the default administrator and guest passwords before continuing.

Access Type: Permission for Remote Management can be given to a single PC, a range of IP addresses, or anyone on the WAN or LAN.

From: The starting IP address for the allowed range if IP address range is the access type.

To: the ending IP address for the allowed range if IP address range is the access type.

IP Address: IP Address of the PC given remote management permissions if only this PC is the access type.

Port Number: you can set the port number for remote management over HTTPS; the default is 443.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

SNMP:

SNMPv3 Users List

Name: the username of this SNMPv3 manager

Privilege: the user can be assigned read-only (ROUSER) or read-write (RWUSER) access to this router.

Security Level: the authentication and privacy settings for this user are summarized here.

(Check Box At First Column Header): Selects all the SNMPv3 users in the table.

Edit: The Edit button will link to the SNMPv3 User Configuration page, allowing you to make changes to the selected SNMP user.

Traps List

The table lists IP addresses of SNMP agents to which the router will send trap messages and allows several operations on the SNMP agents.

IP Address: The IP Address of the SNMP trap agent.

Port: The SNMP trap port of the IP address to which the trap messages will be sent.

Community: The community string to which the agent belongs. Most agents are configured to listen for traps in the Public community.

SNMP version: the SNMP version used by the trap agent.

The actions that can be taken on SNMP agents are:

(Check Box At First Column Header): Selects all the SNMP agents in the table.

Edit: The Edit button will link to the SNMP Trap Configuration page, allowing you to make changes to the selected SNMP trap.

Delete: Deletes the selected SNMP Trap(s)

Add: Clicking this button will link to the SNMP Trap Configuration page.

Access Control List

IP Address: The IP Address of the SNMP manager.

Subnet Mask: The network mask used to determine the list of allowed SNMP managers.

Community: The community string to which the agent belongs.

Access Type: Access will be either read only (ROcommunity) or read-write (RWcommunity).

(Check Box At First Column Header): Selects all the SNMP agents in the table.

Edit: The Edit button will link to the SNMP ACL Configuration page, allowing you to make changes to the selected SNMP ACL entry.

Delete: Deletes the selected SNMP ACL entry.

Add: Clicking this button will link to the SNMP ACL Configuration page.

SNMP Config:
IP Address: The IP address of the SNMP agent.

Subnet Mask: The network mask used to determine the list of allowed SNMP managers. To allow any IP on the network to manage the device, enter 255.255.255.0. For a specific host, enter 255.255.255.255. To allow global access, enter 0.0.0.0.
 
Port: The SNMP trap port to which the trap messages will be sent.

Community: The community string to which the agent belongs to. Most agents are configured to listen for traps in the public community.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

SNMPV3 User Config:
Username:
the username of this SNMPv3 manager

Access Privilege: the user can be assigned read-only (ROUSER) or read-write (RWUSER) access to this router.

Security Level: the authentication and privacy settings for this user are defined here.

- noAuthnoPriv: only requires a username match for authentication

- authNoPriv: Provides authentication based on the MD5 or SHA algorithms.

- authPriv: Provides authentication based on the MD5 or SHA algorithms as well as encryption privacy with the DES 56-bit standard.

Authentication Algorithm: choose between MD5 or SHA authentication if you choose to enable authentication security for this use.

Authentication Password: the shared authentication password with the SNMPv3 user.

Privacy Algorithm: DES-56 privacy is available for the authentication negotiation.

Privacy Password: the shared privacy password with the SNMPv3 user.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

SNMP Trap Config:
IP Address:
The IP address of the SNMP agent.

Subnet Mask: The network mask used to determine the list of allowed SNMP managers. To allow any IP on the network to manage the device, enter 255.255.255.0. For a specific host, enter 255.255.255.255. To allow global access, enter 0.0.0.0.

Port: The SNMP trap port to which the trap messages will be sent.

Community: The community string to which the agent belongs to. Most agents are configured to listen for traps in the public community.

Authentication Type: Choose one of the supported SNMP versions: v1, v2c, v3.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

SNMP ACL Config:
IP Address:
The IP address of the SNMP manager.

Subnet Mask: The network mask used by the SNMP manager. For a specific host, enter 255.255.255.255. To allow global access, enter 0.0.0.0.

Port: The SNMP trap port to which the trap messages from the manager will be sent.

Access Type: Access can be either read only (ROcommunity) or read-write (RWcommunity).

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

SNMP Sytem Info:
SysContact: The name of the contact person for this router. Examples: admin, John Doe.

SysLocation: The physical location of the router: Example: Rack #2, 4th Floor.

SysName: A name given for easy identification of the router.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

 
Date and Time
Date and Time:
Date and Time

Current Router Time: this displays the current date and time set on the router.

Time Zone: Select the local time zone. This is required in order for the firewall schedules to work correctly.

If supported by the NTP servers for your region, you can check Enable Daylight Saving

Configure NTP Servers: select this option to enable NTP servers configuration.

Set Date and Time Manually: select this option to enable configuring set Date and Time manually.

NTP Servers Configuration
Default NTP Server: Choose this option if you want the RTC (Real-Time Clock) to be updated regularly by contacting the default NTP servers (0.us.pool.ntp.org, 1.us.pool.ntp.org) on the Internet.

Custom NTP Server: Choose this option to update the RTC from a server or servers that you specify. Then enter the IP addresses of the Custom NTP server in the Primary and Secondary NTP Server field.

Set Date and Time
With this option you need to enter Date and Time for manual configuration, and this will be set on the router's Real Time Clock (RTC).

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.
 
Log Setting
Logs Facility:
Facility:
There are three core components to the router's firmware and the granularity of logging within each can be set independently. Choose between Kernel, System, and Local-0 Wireless.

Kernel: This covers log messages that correspond to the Linux kernel such as logs generated by firewall or network stack traffic.

System: This covers application and management level features such as SSL VPN or administrator changes for managing the unit.

Wireless: This covers all AP related configuration and behavior logging.

Display and Send Logs
Each of the following type of logs can be sent to the Event Log viewer in the GUI and/or the Syslog server configured to capture remote logging.

When a particular severity level is selected, all events with severity equal to and greater than the chosen severity are captured. The severity levels available for logging are:

EMERGENCY: system is unusable
ALERT: action must be taken immediately
CRITICAL: critical conditions
ERROR: error conditions
WARNING: warning conditions
NOTIFICATION: normal but significant condition
INFORMATION: informational
DEBUGGING: debug-level messages

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

Logs Configuration:
Routing Logs

This section is used to configure the logging options for each network segment (for example, LAN-WAN).

Note: Enabling logging options may generate a significant volume of log messages and is recommended for debugging purposes only.

Accepted Packets: This logs packets that were successfully transferred through the segment. This option is useful when the Default Outbound Policy is "Block Always" (see the Firewall Rules page under the Firewall menu).

Example: If Accept Packets from LAN to WAN is enabled and there is a firewall rule to allow SSH traffic from LAN, then whenever a LAN machine tries to make an SSH connection, those packets will be accepted and a message will be logged. (Make sure the log option is set to allow for this firewall rule.)

Dropped Packets: Logs packets that were blocked from being transferred through the segment. This option is useful when the Default Outbound Policy is "Allow Always" (see the Firewall Rules page under the Firewall menu).

Example: If Drop Packets from LAN to WAN is enabled and there is a firewall rule to block SSH traffic from LAN, then whenever a LAN machine tries to make an SSH connection, those packets will be dropped and a message will be logged. (Make sure the log option is set to allow for this firewall rule.)

System Logs
Select the type of system events to be logged. The following system events can be recorded:

All Unicast Traffic: All unicast packets directed to the router are logged.

All Broadcast/Multicast Traffic: All broadcast or multicast packets directed to the router are logged.

Other Event Logs
Bandwidth Limit: If checked gives logs related to packets dropped due to Bandwidth Limiting.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

Remote Logging:

Log Options
Log Identifier: Every logged message will contain a prefix for easier identification of the source of the message. The log identifier will be prefixed to both e-mail and SysLog messages.

Enable E-Mail Logs

E-Mail Logs is disabled by default. Select the corresponding checkbox to enable e-mail logs.

E-mail Server Address: Enter the IP address or Internet Name of an SMTP server. The router will connect to this server to send e-mail logs when required.

SMTP Port: The SMTP port of the e-mail server

Return E-mail Address: Type the e-mail address where the replies from the SMTP server are to be sent (required for failure messages).

Send To E-mail Address: Type the e-mail address where the logs and alerts are to be sent. Up to three recipients can be defined.

Authentication with SMTP server: If the SMTP server requires authentication before accepting connections, select either Login Plain or CRAM-MD5 and enter the User Name and Password to be used for authentication. To disable authentication, select the No Authentication radio box.

Respond to Identd from SMTP Server: Check this radio box to configure the router to respond to an IDENT request from the SMTP server.

Send E-mail logs by Schedule
To receive e-mail logs according to a schedule, configure the appropriate schedule settings. The scheduling options are enabled when the Enable E-Mail Logs option is enabled in the prior section. To disable sending logs, select Never.

Unit: Select the period of time that you need to send the log: Hourly, Daily, or Weekly. To disable sending of logs, select Never. This option is useful when you do not want to receive logs by e-mail, but want to keep e-mail options configured so that you can use the Send Log function Event Log viewer pages.

Day: If logs are to be sent on a weekly basis, choose the day of the week.

Time: Select the time of day when logs should be sent.

Enable SysLog
If you want the router to send logs to a SysLog server, select the Yes radio box. Up to 8 Syslog servers can be configured and if needed used concurrently.

SysLog Server Name: Enter the IP address or Internet Name of the SysLog server.

Syslog Facility: Each syslog server can be assigned a unique facility for logging.

Syslog Severity: Select the appropriate SysLog severity. When a particular severity is selected, all the SysLogs with severity equal to and greater than the chosen severity are logged on the configured SysLog Server.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.

 
System
System:
IMPORTANT!

Restoring a saved configuration or resetting to defaults will remove your current settings. Firewall rules, VPN policies, LAN/WAN settings and all other settings will be lost. Please backup your settings. Settings cannot be retrieved unless they have been backed up.

When the settings restore operation or the firmware upgrade is in progress:

1. Do NOT close the browser window.

2. Do NOT go online.

3. Do NOT turn off or power-cycle the router.

4. Do NOT shutdown the computer.

Backup/Restore Settings

To take a backup of the current settings, click Backup. You will be prompted to save a file with the extension ".cfg". Select a safe location on your computer and save the file. The settings will be saved in this file.

To Restore Saved Settings from a backup file, click Choose File. On your computer, locate and select the backup file you saved previously. Click Restore to upload the saved settings. A progress bar indicating the status of the restore operation will appear. The router will automatically restart after the restore settings operation has completed.

To revert to the Factory Default Settings, click Default. The router will restart automatically after resetting to the factory default settings. The factory default settings are as follows:
 
User Name: admin

Password: password

LAN Port IP address: 192.168.1.1

DHCP server on LAN: Enabled

WAN Port Configuration: Get configuration via DHCP

To reboot the router, click on the Reboot button. The Login page is displayed after the devices reboots.
 
Firmware
Firmware:
Firmware
Information
Firmware Version: the current version of this router's firmware

Firmware Date: this is the date on which the current firmware version was installed on the router

Firmware
Upgrade
D-Link occasionally makes available new versions of firmware which include bugs fixes and updates.

IMPORTANT!
See the Release Notes which are included with the downloaded firmware file or go to the download page of the website for more information. Read the Release Notes for any information related to the upgrade before performing the upgrade operation.

Locate & select the upgrade file: To upgrade the router firmware, Choose File. On your computer, locate and select the firmware file from D-Link. Click Upgrade to upload the new firmware file to the router. A progress bar will appear displaying the status of the upload to the router.

The router will take several minutes to complete the upgrade. While the upgrade is in progress, the Test LED on the front panel of the router will be lit. Wait until the light goes off before accessing the router. Once the firmware upload is complete, the router will automatically restart.

After a successful upgrade, the Login page will display. After logging in the top right Firmware version field and Device Info page will both be updated with the new firmware version.

Firmware Upgrade Notification Options
Check Now: Click the Check Now button to connect the router to a D-Link server to determine if a more recent version of firmware for this router is available.

Status: The firmware check results will be displayed here.
Firmware Via Usb:
Firmare Via Usb:
Help Content Here 
 
Dynamic DNS
Dynamic DNS:
The router firmware includes software that notifies dynamic DNS servers of changes in the WAN IP Address, so that the services running on this network can be accessed by others on the Internet.
 
WAN Mode
WAN Mode: This section displays the currently configured WAN mode as Single WAN Port, Load Balancing or Auto Rollover.

DDNS Status: Dynamic DNS Status of dedicated WAN / Configurable WAN is displayed in the respective sections.

Select the Dynamic DNS Service: Choose between none, DynDNS, DlinnkDDNS, or Oray for the Dynamic DNS service that this WAN port should use.

Host and Domain Name: Specify the complete Host Name and Domain Name for the DDNS service.

User Name: The DynDNS account User Name.

Password: The password for the DynDNS account.

Use Wildcards: The wildcards feature will allow all subdomains of your DynDNS Host Name to share the same public IP as the Host Name. This option can be enabled here if not done on the DynDNS Web site.

Update every 30 days: Checking this would configure the router to update the host information on DynDNS and keep the subscription active after the 30 day trial.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.
 
System Check
System Check:
Ping or Trace an IP Address

These utilities can be used to test connectivity between this router and another device on the network connected to this router.

IP Address / Domain Name: Enter an IP address or domain name and click Ping to send an ICMP echo request packet to the destination. If the destination IP address is active, you can see a response similar to "64 bytes from IP_Address: icmp". A "response timed out" message indicates that the destination is either not active or is blocking ping requests.

Click Traceroute to display all the routers present between the destination IP address and this router. Up to 30 "hops" (intermediate routers) between this router and the destination will be displayed. An asterisk (*) is displayed for each intermediate device where there was no response.

The results of the ping or traceroute operations will be displayed on a new Command Output page. To return to the System Check page, click on the back button of your browser.

Perform a DNS Lookup
To retrieve the IP address of a Web, FTP, Mail or any other Server on the Internet, type the Internet Name in the text box and click Lookup. If the host or domain entry exists, you will see a response with the IP address. A message stating "Unknown Host" indicates that the specified Internet Name does not exist.

The results of the DNS lookup operations will be displayed on a new Command Output page. To return to the System Check page, click on the back button of your browser.

Router Options
To display the router's static and dynamic routes, use the Display button next to Display the IPv4 / IPv6 Routing Table.

Capture Packets: Allows you to capture all packets that pass through the selected interface (LAN, dedicated WAN, configurable WAN, or DMZ). To capture packets, click the Packet Trace button and a new Capture Packets page will appear. Select the interface and click Start. To stop the packet capture click Stop. You have the option to Download the packet capture to the host machine managing the router as well.

Note: The packet trace is limited to 1MB of data per capture session. When the capture file size exceeds 1MB, it will be deleted automatically and a new capture file will be created.

 
Schedules
Schedules:
List of Available Schedules


Schedules define the timeframes under which firewall rules may be applied.

Name: Name of the schedule for identification and management purposes

Days: The days when the schedule is active.

Start Time: The start time for the schedule

End Time: The end time for the schedule.

The actions that can be taken on schedules are:

(Check Box At First Column Header): Selects all the schedules in the table.

Edit: Opens the Schedule Configuration page, to edit the selected schedule.

Delete: Deletes the selected schedule or schedules.

Add: Opens the Schedule Configuration page to add a new schedule.

Schedule Config:
Name:
Enter a unique name to identify the schedule. This name will be available in the Firewall Rule Configuration page in the "Select Schedule" dropdown list.

Scheduled Days

Select one of the following options:
All Days: The schedule applies to all days. This option is the default selection.

Specific Days: The schedule applies to the specified days. Check the box for each day to include in this schedule.

Schedule Time of Day
Select one of the following options:

All Day: The schedule applies to the entire day.

Specific Times: The schedule applies to the range of hours that are specified in the Start Time and End Time fields.

Start Time: Enter the hour and minute, and select AM or PM.

End Time: Enter the hour and minute, and select AM or PM.

Click Save Settings to save your changes.

Click Don't Save Settings to revert to the previous settings.