Jun 10

This article teaches you how to configure the D-Link GO-RT-N300 wireless network settings.

Step 1 – Open the web browser the IP of the D-Link GO-RT-N300 router (http://192.168.0.1)

gortn300configurewirelessnetworksettings2

Step 2 – In the Username field type Admin
Leave the Password field blank

gortn300configurewirelessnetworksettings3

Step 3 – Click on the Wireless option

gortn300configurewirelessnetworksettings4

Step 4 – In Wireless Basics, you must set the following:

Wireless Network
Enable SSID Broadcast: Enabled
Enable Wireless Isolation: Disabled
Name (SSID): Here you name your wifi network
Mode: 802.11b/g/n
Channel: Auto
Band Width: Auto
Max. Transmission Rate: Auto

Security Options
Security Options: WPA-PSK [TKIP]

Security Options (WPA-PSK)
Pre-Shared Key: This is your wifi password

Save the changes by clicking the “Apply” button

gortn300configurewirelessnetworksettings5

Step 5 – Connecting to a wireless network in Windows 8
• Step 5.1 – To join an existing network, locate the wireless network icon in the taskbar, next to the time display

gortn300configurewirelessnetworksettings6
Wireless Network Icon

• Step 5.2 – Clicking this icon, will show a list of wireless networks that are in range of your computer. Select the network you want by clicking on the name of the network.
gortn300configurewirelessnetworksettings7

• Step 5.3 – You will then be prompted to enter the WPA pre-shared key you entered in Step 4

gortn300configurewirelessnetworksettings8

• Step 5.4 – When you have successfully established a connection to the wireless network, the word “Connected” appears next to the name of the network.

gortn300configurewirelessnetworksettings9

Step 6 – Connecting to a wireless network in Windows 7
• Step 6.1 – To join an existing network, locate the wireless network icon in the taskbar, next to the time display.

gortn300configurewirelessnetworksettings10
Wireless Network Icon

• Step 6.2 – Click on the wireless network (SSID) that you want to connect to and click the Connect button.

gortn300configurewirelessnetworksettings14

• Step 6.3 – You will be prompted to enter the wifi security key.

gortn300configurewirelessnetworksettings15

• Step 6.4 – The following window appears while your computer tries to connect to the router.

gortn300configurewirelessnetworksettings16
• Step 6.5 – When you have successfully established a connection to the wireless network, the word “Connected” appears next to the name of the network.

gortn300configurewirelessnetworksettings17

Tags: ,

Jun 10

This article tell you how to recover the D-Link DSR-250N Wireless Router.

Note: – For the recovery process you will need the following:

• Console cable
• TFTP server
• Firmware – Download the latest version from the www.dlink.com
• PuTTy

Step 1
– Connect the serial port of the D-Link DSR-250N to your PC and an Ethernet cable between the DSR and your network (which is connected your PC)

Step 2 – Open the TFTP server and set the DSR firmware in the root folder.

For example: C: \ Program Files \ Tftpd64
dsr_250n_recovery_process0001

Step 3 – Open PuTTy and configure a COM port with the following: (The COM Port will be showing in Device Manager)

dsr_250n_recovery_process0002

Step 4 -Once configured, click “Open”

Step 5 -Once you see the boot process and the message – Complete the following:

Hit any key to stop autoboot: (“Press any key to stop autoboot”) press the Enter key to enter the bootloader

Step 6 – Enter the following command to set the IP address of the DSR

D-Link DSR-250N bootloader #setenv ipaddr 192.168.1.162

Step 7 -Enter the following command to set the host IP address where the TFTP resides

D-Link DSR-250N bootloader #setenv serverip 192.168.1.168

Step 8 -Enter the following command to set all the TFTP transfer of the LAN ports

D-Link DSR-250N bootloader #setenv ethact octeth0

Step 9 – Copy and paste the following command to overwrite the firmware

D-Link DSR-250N bootloader #setenv firm_flash ‘erase + 0x10080000 0x1d20000; cp.b $ (loadaddr) 0x10080000 0x1d20000’

Step 10 –Enter the following commands to boot firmware

D-Link DSR-250N bootloader #setenv boot_firm ‘0x10080000 cp.b $ (loadaddr) 500000; go 0x4000200’

D-Link DSR-250N bootloader #setenv bootcmd ‘run boot_firm’

Step 11 -Enter the following command to register

D-Link DSR-250N bootloader# saveenv

Step 12 -Enter the following command to transfer the firmware

D-Link DSR-250N bootloader#
 tftp $(loadaddr) DSR-250N_A2_FW2.11_WW

(The full name of the firmware as indicated below)

dsr_250n_recovery_process0003
You should also notice the transfer from TFTP server (if not, make sure the firewall is turned off or an antivirus program does not block)

dsr_250n_recovery_process0004


Step 13
-Enter the following command to flash the firmware

D-Link DSR-250N bootloader# run firm_flash

Step 14
-Enter the following command to run the firmware at boot

D-Link DSR-250N bootloader# run boot_firm

Once the operation is completed, the DSR will ask you to log in again.

DSR-250N login: admin
Password: admin

Tags: , ,

Apr 02

How to Setup VPN IPsec Between D-Link DSR-Series FW.2.x

Step 1 – Setup WAN port setup DSR1

Network > WAN1 Settings

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_1-1

Step 2 – Here you will need to select the ISP Connection Type

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_2

Wan1 Setup:

Connection Type: Static IP (In our example it was set as static)

IP Address: 1.1.1.1

IP Subnet Mask: 255.0.0.0

Domain Name System (DNS) Servers

Primary DNS Server: 8.8.8.8 (Google DNS)

Secondary DNS Server: 8.8.4.4 (Google DNS)

Click on “Save

Step 3 – Setup LAN Configuration DSR1

Network > LAN Settings

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_3

Step 4 – Enter an IP address for the LAN interface and DHCP Server

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_4

In our example we have given the IP: 192.168.10.1

IP Address Setup:

IP Address: 192.168.10.1

Subnet Mask: 255.255.255.0

DHCP Setup:

DHCP Mode: DHCP Server

Starting IP Address: 192.168.10.2

Ending IP Address: 192.168.10.254

Default Gateway: 192.168.10.1

Click on “Save

Step 4 – Setup WAN port setup DSR2

Network > WAN1 Settings

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_1

Step 5 – Here you will need to select the ISP Connection Type

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_2-1

Wan1 Setup:

Connection Type: Static IP (In our example it was set as static)

IP Address: 1.1.1.1

IP Subnet Mask: 255.0.0.0

Domain Name System (DNS) Servers

Primary DNS Server: 8.8.8.8 (Google DNS)

Secondary DNS Server: 8.8.4.4 (Google DNS)

Click on “Save

Step 6 – Setup LAN Configuration DSR2

Network > LAN Settings

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_5

Step 7 – Enter an IP address for the LAN interface and DHCP Server

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_6

In our example we have given the IP: 192.168.10.1

IP Address Setup:

IP Address: 192.168.20.1

Subnet Mask: 255.255.255.0

DHCP Setup:

DHCP Mode: DHCP Server

Starting IP Address: 192.168.20.2

Ending IP Address: 192.168.20.254

Default Gateway: 192.168.20.1

Click on “Save

VPN IPsec Setup – DSR1:

Step 8 – You will now need to setup an IPsec Policy

VPN > Policies

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_7

Step 9 – Click “Add New IPSec Policy” to configure a new IPsec Policy

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_8

IPSec Policy Configuration

General

Policy Name: VPN1

Policy Name: Auto Policy

IP Protocol Version: IPv4

IKE Version: IKEv1

L2TP Version: None

IPSec Model        Tunnel Model

Select Local Gateway: Dedicated WAN

Remote Endpoint: 2.2.2.2

Enable DHCP: Off

Local IP: Subnet

Local Start IP Address: 192.168.10.1 (LAN IP Address of DSR1)

Local Subnet Mask: 255.255.255.0

Remote IP: Subnet

Remote Start IP Address: 192.168.20.1

Remote Subnet Mask: 255.255.255.0

Enable Keepalive: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_9

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_10
Phase 1 (IKE SA Parameters)

Exchange Mode: Main

Direction Type: Both

Nat traversal: On

NAT Keep Alive Frequency: 20

Remote Identifier Type: Local Wan IP

Remote Identifier Type: Remote Wan IP

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_11

Encryption Algorithm

DES: On                                 3DES: On

AES-128: On                        AES-192: On

AES-256: On

BLOWFISH: Off

CAST128: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_12

Authentication Algorithm

MD5: On                                SHA-1: On

SHA2-256: Off                     SHA2-384: Off

SHA2-512: Off

Authentication Method: Pre-Shared Key

Pre-Shared Key: sharedkey

Diffie-Hellman (DH) Group: Group: Group 2 (1024 bit)

SA-Lifetime: 28800

Enable Dead Peer Detection: Off

Extended Authentication: None

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_13

Phase2 – (Auto Policy Parameters)

SA Lifetime: 3600  Seconds

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_14

Encryption Algorithm

DES: On                                 None: Off

3DES: On                              AES-128: On

AES-192: On                        AES-256: On

TWOFISH (128): Off          TWOFISH (192): Off

TWOFISH (256): Off

BLOWFISH: Off

CAST128: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_12-1

Integrity Algorithm

MD5: On                                SHA1: On

SHA2-224: Off                     SHA2-256: Off

SHA2-384: Off                     SHA2-512: Off

PFS Key Group: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_15

Click “Save
VPN IPsec Setup – DSR2:

Step 10 – You will now need to setup an IPsec Policy for the second DSR

VPN > Policies

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_7-1
Step 11 – Click “Add New IPSec Policy” to configure a new IPsec Policy
DSR_Series_FW2_How_to_setup_VPN_IPsec_between_17

IPSec Policy Configuration

General

Policy Name: VPN2

Policy Name: Auto Policy

IP Protocol Version: IPv4

IKE Version: IKEv1

L2TP Version: None

IPSec Model        Tunnel Model

Select Local Gateway: Dedicated WAN

Remote Endpoint: 2.2.2.2

Enable DHCP: Off

Local IP: Subnet

Local Start IP Address: 192.168.10.1 (LAN IP Address of DSR1)

Local Subnet Mask: 255.255.255.0

Remote IP: Subnet

Remote Start IP Address: 192.168.20.1

Remote Subnet Mask: 255.255.255.0

Enable Keepalive: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_18

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_19

Phase 1 (IKE SA Parameters)

Exchange Mode: Main

Direction Type: Both

Nat traversal: On

NAT Keep Alive Frequency: 20

Remote Identifier Type: Local Wan IP

Remote Identifier Type: Remote Wan IP

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_11-1

Encryption Algorithm

DES: On                                 3DES: On

AES-128: On                        AES-192: On

AES-256: On

BLOWFISH: Off

CAST128: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_12-3

Authentication Algorithm

MD5: On                                SHA-1: On

SHA2-256: Off                     SHA2-384: Off

SHA2-512: Off

Authentication Method: Pre-Shared Key

Pre-Shared Key: sharedkey

Diffie-Hellman (DH) Group: Group: Group 2 (1024 bit)

SA-Lifetime: 28800

Enable Dead Peer Detection: Off

Extended Authentication: None

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_12-2

Phase2 – (Auto Policy Parameters)

SA Lifetime: 3600  Seconds

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_14-1

Encryption Algorithm

DES: On                                 None: Off

3DES: On                              AES-128: On

AES-192: On                        AES-256: On

TWOFISH (128): Off          TWOFISH (192): Off

TWOFISH (256): Off

BLOWFISH: Off

CAST128: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_12-4

Integrity Algorithm

MD5: On                                SHA1: On

SHA2-224: Off                     SHA2-256: Off

SHA2-384: Off                     SHA2-512: Off

PFS Key Group: Off

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_15-1

Click “Save

Step 12 – To view if the VPN connection has been established

STATUS > Active VPNs

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_20

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_21
Step 13 – If you see “IPsec SA Not Established”, Right-Click on a record then click “Connect

DSR_Series_FW2_How_to_setup_VPN_IPsec_between_22

Tags: ,

Apr 02

Information:                       

The use of load balancing with multiple WAN links can provide simultaneous outbound traffic efficiency and optimizing bandwidth. The following is a typical scenario of load balancing that involves all Internet traffic and can dynamically share the WAN links RoundRobin Algorithm.

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_21

Step 1 – Login to the DSR using its IP address

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_22

Network > WAN Mode

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_23

Step 2 – Select “Load Balancing” from the drop-down list and select “Round Robin

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_24

Round Robin:

This is when the new Internet connections alternate between WANs available.

Spillover:

This will use a single WAN link for all connections up until the maximum bandwidth limit (pre-configured) has been reached. After that the other WAN link is used for the new connections

Step 3 – For the DSR to check the status of connections WANs have three options to configure WAN health check. They are as follows:

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_25

  • WAN DNS Servers (This will use the DNS servers configured in the WAN)
  • DNS Servers (This allows you to enter the addresses you want to use)
  • PingThese IP Addresses (This allows you to enter the public IP address you want)

Once you have selected the verification mode, click “Save

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_26

Note:

Binding Protocol – Network > Routing > Protocol Binding

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_27

This is a key component with regards to “Load Balancing”.

This protocol allows a specific service to be associated with one of the available WAN links.

A description of this can be seen below:

  • Service: The user specifies the service name (choosing from the list of predefined or custom services). Custom services can be configured in the Firewall Menu – Security > Firewall > Custom Services

DSR_how_to_setup_load_balancing_with_multiple_wan_links_FW_28

 

  • Local Gateway: You can assign a specific WAN link to the service configured above
  • Source Network: The user specifies the LAN hosts assigned to the Protocol-Binding rule. Only those hosts that are linked to the protocol can therefore transmit or receive traffic through the WAN selected, meanwhile the other hosts will transmit traffic via the other WAN port(s). The user may choose to assign the rule for any host or a single machine within the LAN and / or alongside hosts within an IP pool.
  • Destination Network: The user specifies the LAN hosts assigned to the Protocol Binding Rule. The user can choose to assign the rule to any host, a single machine on the LAN or set of hosts within a pools of IP addresses

When a user adds a rule, the device updates the new entry and displays it in the Protocol Bindings List table. The table shows information about the service, the network source and destination and also if the link-up is enabled or not. The user can enable, disable and or edit a binding standard and also remove configured links if and when needed.

Tags: ,

Feb 17

Network Configuration:

This setup consists of two networks separated by two VLANS. This example will use the following setup:

Network 1 – 192.168.10.0 /24 – SSID: NET – Corporate Wireless Network
Network 2 – 172.16.0.0 /16 – SSID: Guest – Wireless Guest Network

DSR_Series_How_to_setup_captive_portal0001

Step 1
– Enter the web GUI interface of the DSR using its IP address in a web browser. In our example we have used the IP address of 192.168.10.1

DSR_Series_How_to_setup_captive_portal0012

Accept any certificate warnings you may see, this is perfectly normal and safe

Step 2 – We first now need to create VLANs to separate the traffic

Network > VLAN Settings

DSR_Series_How_to_setup_captive_portal0023

Step 3 – Click on “Add New VLAN”

DSR_Series_How_to_setup_captive_portal0029

VLAN ID: 100
Name: Guest
Captive Portal: ON
Multi VLAN Subnet
IP Address: 172.16.0.1
Subnet: 255.255.0.0
Use the scroll bar to the left to scroll down…

DSR_Series_How_to_setup_captive_portal0030

DHCP Mode: DHCP
Domain Name: Guest
Starting IP Address: 172.16.0.2
Ending IP Address: 172.16.0.1
Primary DNS Server: 172.16.0.1
Lease Time: 24
Click “Save”

Step 4 – We should see the following summary for our VLANS

DSR_Series_How_to_setup_captive_portal0031

Step 5 – We need to create our two profiles, “NET” and “Guest”

Wireless > Profiles

DSR_Series_How_to_setup_captive_portal0032

Step 6 – Right-click on “default1” and click “Edit”

DSR_Series_How_to_setup_captive_portal0033

Step 7 – Change the default values to your SSID. In our example we are using “NET” as our corporative wireless SSID

DSR_Series_How_to_setup_captive_portal0034

SSID: NET
Broadcast SSID: ON
Security: WPA+WPA2
Encryption: TKIP+CCMP
Authentication: PSK
WPA Password: (enter a password for this SSID)
Click “Save”

Step 8 – Click on “Add New Profile” to create a profile for our Guest SSID

DSR_Series_How_to_setup_captive_portal0002

Profile Name: Guest
SSID: Guest
Broadcast SSID: ON
Security: OPEN (Due to our Guest users will need to authenticate with a user and password we will define later)
Click “Save”

Step 9 – You should have two Wireless Profiles (as per our example)

DSR_Series_How_to_setup_captive_portal0003

Step 10 – We now need to add an extra access-point to our configuration to deal with the profile “Guest”

Wireless > Access Points

DSR_Series_How_to_setup_captive_portal0004

Step 11 – Click on “Add New Access Point”

DSR_Series_How_to_setup_captive_portal0005

AP Name: ap2
Profile Name: Guest (Drop down box to display profiles available)
WLAN Partition: ON
*Active Time: Here you can set a time for from and to you would like the access-point to be available.

DSR_Series_How_to_setup_captive_portal0006

In our example, we have chosen not to use this feature

Click “Save”

Step 12 – We now need to associate the Guest SSID to VLAN100

Network > Port VLAN

DSR_Series_How_to_setup_captive_portal0007

Step 13 – Right-click on “Guest” and enter for PVID 100 (The VLAN we created in step 3)

DSR_Series_How_to_setup_captive_portal0008

DSR_Series_How_to_setup_captive_portal0009

Click “Save”

Step 14 – So that our guest users are able to login and authenticate against the local database, we need to add a new Group – Security > Internal User Database > Groups

DSR_Series_How_to_setup_captive_portal0010

DSR_Series_How_to_setup_captive_portal0011

Step 15 – Click on “Add New Group”

DSR_Series_How_to_setup_captive_portal0013

Group Name: CP
Description: Captive Portal
User Type: Network  Captive Portal User: ON
Idle Timeout: 10

Click “Save”

Group List Summary:

DSR_Series_How_to_setup_captive_portal0014

Step 16 – We now need to a associate a User to our new Group – Security > Internal User Database > Users

DSR_Series_How_to_setup_captive_portal0015

Step 17
– Click on “Add New User”

DSR_Series_How_to_setup_captive_portal0016

User Name
: CP
First Name: CP
Last Name: CP
Select Group: CP
MultiLogin: ON
Password: (Enter the password the guest will need to use for authentication)

Click “Save”

Users List Summary:

DSR_Series_How_to_setup_captive_portal0017

Login from a Laptop with Window 7:

Step 18 – Open your wireless card adapter and now search for SSID “Guest”

DSR_Series_How_to_setup_captive_portal0018

Step 19 – Once connected, open a web browser and try to go to a web site, for example dlink.com

DSR_Series_How_to_setup_captive_portal0019

Username: CP (User created in Step 17)

Password: (Password created in Step 17)

Click “Login”

DSR_Series_How_to_setup_captive_portal0020

Login from a Windows Phone:

DSR_Series_How_to_setup_captive_portal0021

Login from an iPad:

DSR_Series_How_to_setup_captive_portal0025DSR_Series_How_to_setup_captive_portal0024DSR_Series_How_to_setup_captive_portal0022

Step 20 – To see the clients connected – Status > Network Information > CaptivePortal Sessions

DSR_Series_How_to_setup_captive_portal0026

Step 21 – Within this section you are able to manage ALL connected devices by right-clicking over the session and choose between; “Disconnect” or “Blocking Device”

DSR_Series_How_to_setup_captive_portal0027

Disconnect – This will simply disconnect the wireless device from the session and will be forced to login via the portal

Block Device – This will block the wireless device and will automatically be placed into the Firewall Blocked Client List

DSR_Series_How_to_setup_captive_portal0028

Tags: ,



 
1 2 3 4 5 6 7 8 9 10 ... 45 46 47 Next
css.php