Jan 22

When useing D-Link DGS-1016D switch,if the link speed is not 1.0 Gbps, than the cabling between the two endpoints should be examined. If using Gigabit over Copper (1000 Base-T) than you can use Ethernet cable Cat 5 or better (Cat5E, Cat6 or Cat6E). If the cable is pinned improperly, than the network connection will not run at gigabit speeds. Gigabit over copper uses all 8 wires of the Ethernet cable.

If you are using a store bought/factory pinned cable, and the connection speed is still not connecting at 1.0 Gbps, there may be a bent/broken pin on either the NIC, or the switch port. Isolate each portion of the possible problem, until you are able to find the defective port on the network. This can be done by using known good gigabit ports, and cabling.

Tags: ,

Jan 21

1. If you want Ping command to open external network, internal network Ban Ping on D-Link Firewall:

Rules → IP Rules → Address Filter → Networks

Sourse:all-nets

Destination:lannet

About Ping command on the D-Link Firewall settings

2.If you want to open the intranet Ping :

Sourse:all-nets

Destination:all-nets

About Ping command on the D-Link Firewall settings

Tags: ,

Jan 21

DUBAI, UAE, January 21 /PRNewswire/ — D-Link Middle East, the end-to-end computer network solutions provider for consumers and businesses, today announced the release of the company’s new DWA-525, a wireless N 150 desktop adapter.

The DWA-525 is a single-antenna wireless N desktop adapter that delivers abstracts at speeds up to 150 Mbps*. Compatible with IEEE 802.11b/g/n standards, this accessory provides continued advantage and accession in allegory to 802.11b/g standards, accouterment bigger ambit to abate wireless asleep spots. The DWA-525 also includes Wi-Fi Multimedia and Power Save QoS support to prioritize media traffic while conserving battery power in smaller devices.

“Higher transmission speeds have become essential for smooth operation in a number of today’s newest multimedia applications and devices,” said Harrison Albert, Regional Sales Director at D-Link Middle East. “The D-Link DWA-525 allows consumers to utilize the high speed that wireless N provides all at an affordable price.”

For added convenience, the DWA-525 supports Wi-Fi Protected Setup (WPS) to bound defended and set up a wireless network. This accessory includes 64/128-bit WEP encryption and WPA/WPA2 aegis to assure user networks and wireless data. The DWA-525 aswell offers complete interoperability in the 802.11b/g standard.

Tags: ,

Jan 16

This article teaches you VPN config about D-Link Firewall and DI-804HV,With the DFL-800 as an example.

1. Go to “System” → “DNS” and enter a working DNS server IP, here we use our ISP’s DNS server.

DFL-800a

2. Go to “System” → “Misc. Clients” → “Add” to add a DDNS client, here we choose dyndns.org DDNS client.

DFL-800b

3. Then enter the full domain name and your account info.

DFL-800c

4. Go to “Objects” → “Address book”, previously, we use an IP on the remote gateway, here, just change the IP to the domain name, here we assume the other side (DI-804HV also uses DDNS and has the domain test1.dyndns.org setup). Click on the “remote-gw” object, and modify the IP to “dns:test1.dyndns.org”. Make sure “dns:” is entered before the domain name.

DFL-800d

5. In DI-804HV, just replace the remote gateway IP to the DDNS domain name we set up in D-Link DFL-800 (test.dyndns.org)

DI-804HV

Tags: , ,

Jan 16

Router architect D-Link accepted Friday that some of its routers accept a vulnerability that could allow hackers access to a device’s authoritative settings, but it has issued patches.

According to a Jan. 9 blog post from SourceSec Security Research, some D-Link routers have an insecure implementation of the Home Network Administration Protocol (HNAP), which could allow an unauthorized person to change a router’s settings.

SourceSec appear a proof-of-concept software apparatus called HNAP0wn that would enable the drudge — a move that D-Link criticized.

“By publicizing their apparatus and giving specific instructions, the authors of the address accept about categorical how the security can be breached, which could accept had serious repercussions for our customers,” D-Link said in a statement.

D-Link said it only appeared possible to hack the routers using the software tool and not just with stand-alone code.

D-Link and SourceSec differed over which models were vulnerable. SourceSec wrote that it suspected that all D-Link routers made since 2006 with HNAP support were affected, but they said they had not tested all of them.

D-Link said the models affected are the DIR-855 (version A2), DIR-655 (versions A1 to A4) and DIR-635 (version B). Three discontinued models — DIR-615 (versions B1, B2 and B3), DIR-635 (version A) and DI-634M (version B1) — are also affected.

The company said new firmware updates are being made available across its Web sites.

Tags: , ,

css.php