Speedport w 701v manual


















Rufumleitung bei besetzter Leitung Tastaturbefehl Handlung Geben Sie die nebenstehende Tastenkombination ein. C91D Geben Sie die nebenstehende Tastenkombination ein. Tastaturbefehl Handlung Ihr Telefon klingelt. Das Telefon der Gegenstelle klingelt. Das Konfigurationsprogramm wird Proxyserver und automatisches Deaktivieren Sie das automatische nicht gestartet. Rufen Sie die folgende Adres- se auf: www.

Technische Daten Abmessungen: ca. Seite Stichwortverzeichnis Konfigurationshilfe Seite Stichwortverzeichnis Voraussetzungen Online Zeigt den Zustand der Internetverbindung an.

After correctly configuring your TKSSurf! Internet connection on your router, then proceed with setting-up a wireless network. Verify that all cords are undamaged and are firmly connected to the correct ports as depicted above. Click on the address field and delete all characters the address field must be blank then type in: NOTE: Always select the options that have been circled. Step 1 When the Speedport welcome screen appears click on: Konfiguration Starten. Step 5 In the menu options located in the center of the page, click on the first option listed: Internetzugang.

You will need the username and password that is found in your TKSSurf! Access Package. Internet Access Package in the corresponding fields: German text Benutzename: Kennwort: Kennwort Wiederholung: English username password password repeat Description 8-digits plus TKS domain name 6-digits reenter the same 6-digit password. Dauerverbindung: select Ein Then click on: Speichern to save the configuration. Step 8 After successfully testing the new Internet connection, confirm the popup message, click: OK, then exit the Speedport setup menu by clicking on Beenden.

The setup is completed. You will find the devices network name and network key on the product ID tag located on the back of the unit. Be sure to enter WLAN security key accurately to ensure a successful wireless connection, please note that the password key is case sensitive.

Open navigation menu. Close suggestions Search Search. User Settings. Skip carousel. Carousel Previous. Carousel Next. What is Scribd? Explore Ebooks. Bestsellers Editors' Picks All Ebooks. Explore Audiobooks. Bestsellers Editors' Picks All audiobooks. Explore Magazines. This is determined by your ISP. For example, 1.

Using this example, you would enter Alternatively you can test your uplink speed with a service such Connection as www. Choosing xDSL or Other Frame Relay Network causes the measured uplink speed to be reported slightly lower than before on such connections, Detected but gives much better results. Schedule: The schedule of time when the network filter will be enabled. If you have a client PC that cannot run Internet applications properly from behind the DIR, then you can set the client up for unrestricted Internet access.

It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. Adding a client to the DMZ Demilitarized Zone may expose your local network to a variety of security risks, so only use this option as a last resort.

Action: Select to Allow or Deny transport of the data packets according to the criteria defined in the rule. Schedule: Click New Schedule to access the Schedules window. Protocol: Select the transport protocol that will be used for the filter rule. Port Range: Enter the desired port range for the filter rule. Advanced Wireless This window allows you to change the behavior of the Please be aware that any changes to the factory default settings may adversely affect the behavior of your network.

Transmit Power: Set the transmit power of the antennas. Beacon interval: Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. RTS Threshold: This value should remain at its default setting of If inconsistent data flow is a problem, only a minor modification should be made.

Fragmentation: The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the byte setting will be fragmented before transmission. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. The Preamble defines the length of the CRC block Cyclic Redundancy Check is a common technique for detecting data transmission errors for communication between the wireless router and the roaming wireless network adapters.

Auto is the default setting. Note: High network traffic areas should use the shorter preamble type. CTS will make sure the wireless network is clear before a wireless client attempts to send wireless data.

Enabling CTS will add overhead and may lower wireless through put. None: CTS is typically used in a pure Auto: CTS will monitor the wireless network and automatically decide whether to implement CTS based on the amount of traffic and collisions that occurs on the wireless network. Mixed This is the default setting. Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. Please be aware that any changes to the factory default settings may affect the behavior of your network.

UPNP provides compatibility with networking equipment, software and peripherals. Blocking the Ping may provide some extra security from hackers. Some older cable or DSL modems may require you to set the port speed to 10Mbps.

Routing This option allows you to define fixed routes to defined destinations. Enable: Tick this checkbox to enable or disable fixed routes to defined destinations. Destination: The IP address of the packets that will take this route. Subnet Mask: The subnet of the IP address of the packets that will take this route. Gateway: Specifies the next hop to be taken if this route is used. Device Administration This window will allow you to change the Administrator password.

You can also enable Remote Management. Administrator Enter a new password for the Administrator Login Name Password: and then retype the new password in the Confirm Password textbox. The administrator can make changes to the settings. A username and password is still required to access the Web-Management interface.

In general, only a member of your network can browse the built-in web pages to perform Administrator tasks. This feature enables you to perform Administrator tasks from the remote Internet host.

Port: The port number used to access the DIR Save Settings Use this option to save the current router to Local Hard configuration settings to a file on the hard disk of the Drive: computer you are using. First, click the Save button. You will then see a file dialog, where you can select a location and file name for the settings. Load Settings Use this option to load previously saved router from Local configuration settings.

First, use the Browse Hard Drive: control to find a previously save file of configuration settings. Then, click the Upload Settings button to transfer those settings to the Router. Restore to This option will restore all configuration settings Factory Default back to the settings that were in effect at the time Settings: the router was shipped from the factory.

Any settings that have not been saved will be lost, including any rules that you have created. If you want to save the current router configuration settings, use the Save button above. Reboots: Click the Reboots button on the left side of the window to restart the Router. Firmware Update You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to locate the firmware file to be used for the update.

You can download firmware upgrades to your hard drive from the D-Link support site. Firmware Click the Check Now button or the link at the top Upgrade: of the window to find out if there is an updated firmware; if so, download the new firmware to your hard drive. Browse: After you have downloaded the new firmware, click Browse in this window to locate the firmware update on your hard drive.

Click Save Settings to complete the firmware upgrade. The Dynamic DNS service allows a dynamic public IP address to be associated with a static host name in any of the many domains, allowing access to a specified host from various locations on the Internet. If for example you are running a public web server or VPN server on your LAN, this ensures that the host can be located from the Internet if the public IP address changes.

Available servers include dlinkddns. The Ping Test can be used to test the status of the Internet. Through the graphical user interface GUI , VCT can be used to remotely diagnose and report cable faults such as opens, shorts, swaps, and impedance mismatch. This feature significantly reduces service calls and returns by allowing users to easily troubleshoot their cable connections. Schedules The Router allows the user the ability to manage schedule rules for various firewall and parental control features on this window.

Once you have finished configuring the new schedule rule, click the Save Settings button at the top of the window. If the latter is selected, please use the checkboxes directly below to specify the individual days. All Day - 24 hrs: Tick this check box if the new schedule rule applies to the full hour period.

Log Settings The system log displays chronological event log data specified by the router user. You may also save a simple text file containing the log to your computer. Click the Save button and follow the prompts to save the file. Save Log File: Click on the Save button link on this window to save the log file to your local hard drive.

Syslog Server: click the checkbox to save the log in the log server in the LAN side. Wireless Displays the wireless MAC address and your Log This window allows you to view a log of activities on the Router. This is especially helpful detecting unauthorized network usage. First Page: View the first page of the log. Statistics The window below displays the Traffic Statistics. The traffic counter will reset if the device is rebooted.

Wireless The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless client.

Help Click the desired hyperlink to get more information about how to use the Router. Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR offers the following types of security:.

What is WEP? It is based on the IEEE WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted from one wireless device to another. To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length.

ASCII format is provided so you can enter a string that is easier to remember. Four keys can be defined so that you can change keys easily. Configure WEP It is recommended to enable encryption on your wireless router before your wireless network adapters.

Please establish wireless connectivity before enabling encryption. Log into the web-based configuration by opening a web browser and entering the IP address of the router Click on Wireless Setup on the left side. Next to Authentication, select either Shared Key or Open.

Shared Key is recommended as it provides greater security when WEP is enabled. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WEP on your adapter and enter the same WEP key as you did on the router. What is WPA? WPA2 is based on EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. This key must be the exact same key entered on your wireless router or access point.

EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. Next to Network Key, enter a key passphrase. Click on Wireless Settings on the left side. The following instructions are for Service Pack 2 users. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility. Select View Available Wireless Networks.

The utility will display any available wireless networks in your area. Refer to the Networking Basics section in this manual for more information. If you are joining an existing network, you will need to know the WEP key being used. The Wireless Network Connection box will appear. Enter the same WEP key that is on your router and click Connect. It may take seconds to connect to the wireless network. If the connection fails, please verify that the WEP settings are correct.

The WEP key must be exactly the same as on the wireless router. The instructions for setting this up depend on whether you are using Windows Vista to configure the Router or third party software. To enjoy the benefits of Wi-Fi protection, the Router must be both enabled and configured. If you are using third party software to set up Wi-Fi Protection, carefully follow the directions. When you are finished, proceed to the next section to set up the newly-configured Router.

Setting Up a Configured Router Once the Router has been configured, you can use the push button on the Router or third party software to invite a newcomer to join your Wi-Fi protected network. For maximum security, the software method is recommended. However, the push button method is ideal if there is no access to a GUI. Next click Finish. If you are using third party software, run the appropriate Wi-Fi Protected System utility.

You will be asked to either use the push button method or to manually enter the PIN. Follow the on-screen instructions. Changing the Computer Name and Joining a Workgroup The following are step-by-step directions to change the computer name and join a workgroup. Click the Computer Name tab in the System Properties window and enter a description of your computer in the textbox.

When you are finished, click the Change button. When you are finished, click the OK button. Right-click the Local Area Connection icon and then select Properties from the drop-down menu. Right-click the Local Area Connection icon and then select Status from the drop-down menu. Confirm your new settings on the Network Connection Status window. When you are finished, click the Done button. Setting Up a Connection or Network Wirelessly The following are step-by-step directions to set up a wireless connection.

Click on Set up a connection or network in the Network and Sharing Center section. Go to the Set up a connection or network window and choose the Set up a wireless router or access point Set up a new wireless network for your home or business option.

Click the Next button. Click the Next button on the Set up a wireless router or access point window. This window confirms that you want to create wireless network settings that are savable to a USB flash drive. Enter a network name on the Give your network a name window in the Set up a wireless router or access point wizard.

Enter a passphrase on the Help make your network more secure with a passphrase window in the Set up a wireless router or access point wizard.

Click the Show advanced network security options link. Select security method on the Choose advanced network security options window in the Set up a wireless router or access point wizard. Once you have selected the desired security method on the Choose advanced network security options window in the Set up a wireless router or access point wizard, click the Next button.

Select the desired file and printer sharing option on the Choose file and printer sharing options window in the Set up a wireless router or access point wizard. Once you have saved your network settings to USB, use the pull- down menu on the Insert the USB flash drive into this computer window in the Set up a wireless router or access point wizard to select a destination for your network settings.

Once you have saved your network settings to USB, the Copying settings to the USB drive window in the Set up a wireless router or access point wizard opens to indicate the system progress. Once you are finished, the To add a device or computer, follow these instructions window in the Set up a wireless router or access point wizard opens.

When you are finished, click the Close button. Click the Manage network connections link in the Network and Sharing Center window. Select a network to connect to in the Select a network to connect to window in the Connect to a network wizard and then click the Connect button. The following Connect to a network wizard window displays the system progress. Enter the network security key or passphrase for the Router in the textbox provided in the Type the network security key or passphrase for dlink window in the Connect a network wizard.

When you are finished, click the Connect button. The following Successfully connected to dlink window in the Connect to a network wizard is displayed. The successful connection is displayed at the bottom of the Windows start up menu. Confirm your new settings by calling up the command prompt and then entering the ipconfig command.

Connecting to an Unsecured Wireless Network The following are step-by-step directions to set up an unsecured wireless connection. Confirm your desire to connect anyway on the following Network Connection Status window. Troubleshooting This chapter provides solutions to problems that can occur during the installation and operation of the DIR Read the following descriptions if you are having problems. If you have a different operating system, the screenshots on your computer will look similar to the following examples.

When entering the IP address of the D-Link router The device has the utility built-in to a ROM chip in the device itself.



0コメント

  • 1000 / 1000