Aug 04

1.D-LINK DIR-825 Firewall Settings

A firewall protects your network from the outside world. The D-Link DIR-825 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.


● Enable SPI:

SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol.

● NAT Endpoint Filtering:

Select one of the following for TCP and UDP ports:
Endpoint Independent – Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes.

Address Restricted – Incoming traffic must match the IP address of the outgoing connection.

Address + Port Restriction – Incoming traffic must match the IP address and port of the outgoing connection.

● Anti-Spoof Check:

Enable this feature to protect your network from certain kinds of “spoofing” attacks.

● Enable DMZ:

If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer.

Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.

● DMZ IP Address:

Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Setup > Network Settings page so that the IP address of the DMZ machine does not change.

2.D-LINK DIR-825 Routing configuration

The Routing option is an advanced method of customizing specific routes of data through your network.


Destination IP:Enter the IP address of packets that will take this route.

Netmask:Enter the netmask of the route, please note that the octets must match your destination IP address.

Gateway:Enter your next hop gateway to be taken if this route is used.

Metric:The route metric is a value from 1 to 16 that indicates the cost of using this route. A value 1 is the lowest cost and 15 is the highest cost.

Interface:Select the interface that the IP packet must use to transit out of the router when this route is used.

Tags: , ,

Aug 04

The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games.


Add Policy:Click the Add Policy button to start the Access Control Wizard.

Access Control Wizard:

Click Next to continue with the wizard.


Enter a name for the policy and then click Next to continue.


Select a schedule (I.E. Always) from the drop-down menu and then click Next to continue.


Enter the following information and then click Next to continue.

• Address Type – Select IP address, MAC address, or Other Machines.
• IP Address – Enter the IP address of the computer you want to apply the rule to.


Select the filtering method and then click Next to continue.


Enter the rule:

Enable – Check to enable the rule.
Name – Enter a name for your rule.
Dest IP Start – Enter the starting IP address.
Dest IP End – Enter the ending IP address.
Protocol – Select the protocol.
Dest Port Start – Enter the starting port number.
Dest Port End – Enter the ending port number.


To enable web logging, click Enable.

Click Save to save the access control rule.

Your newly created policy will now show up under Policy Table.


Tags: , ,

Jul 05

It is recommended to enable encryption on your wireless router D-Link DIR-825 before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead.

1. Log into the web-based configuration by opening a web browser and entering the IP address of the D-Link DIR-825 router ( Click on Setup and then click Wireless Settings on the left side.

2. Next to Security Mode, select WPA-Enterprise.

3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2.

4. Next to Cypher Type, select TKIP and AES, TKIP, or AES.

5. Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default).


6. Next to Authentication Timeout, enter the amount of time before a client is required to re-authenticate (60 minutes is default).

7. Next to Radius Server IP Address enter the IP Address of your Radius server.

8. Next to RADIUS Server Port, enter the port you are using with your RADIUS server. 1812 is the default port.

9. Next to RADIUS Server Shared Secret, enter the security key.

10. If the MAC Address Authentication box is selected then the user will need to connect from the same computer whenever logging into the wireless network.


11. Click Advanced to enter settings for a secondary Radius Server.

12. Click Apply Settings to save your settings.

Tags: , , ,

May 27

The D-Link DIR-825 can be configured as a virtual server so that remote users accessing Web or FTP services via the public IP address can be automatically redirected to local servers in the LAN (Local Area Network).

The DIR-825 firewall feature filters out unrecognized packets to protect your LAN network so all computers networked with the DIR-825 are invisible to the outside world. If you wish, you can make some of the LAN computers accessible from the Internet by enabling Virtual Server. Depending on the requested service, the DIR-825 redirects the external service request to the appropriate server within the LAN network.

The D-Link DIR-825 is also capable of port-redirection meaning incoming traffic to a particular port may be redirected to a different port on the server computer.

Each virtual service that is created will be listed at the bottom of the screen in the Virtual Servers List. There are
pre-defined virtual services already in the table. You may use them by enabling them and assigning the server IP to use that particular virtual service.


Name:Enter a name for the rule or select an application from the drop-down menu. Select an application and click << to populate the fields.

IP Address:Enter the IP address of the computer on your local network that you want to allow the incoming service to. If your computer is receiving an IP address automatically from the router (DHCP), you computer will be listed in the “Computer Name” drop-down menu. Select your computer and click <<.

Private Port/ Public Port:Enter the port that you want to open next to Private Port and Public Port. The private and public ports are usually the same. The public port is the port seen from the Internet side, and the private port is the port being used by the application on the computer within your local network.

Protocol Type:Select TCP, UDP, or Both from the drop-down menu.

Schedule:The schedule of time when the Virtual Server Rule will be enabled. The schedule may be set to Always, which will allow the particular service to always be enabled. You can create your own times in the Tools > Schedules section.

Inbound Filter:Select Allow All (most common) or a created Inbound filter. You may create your own inbound filters in the Advanced > Inbound Filter page.

Tags: , ,

Aug 06

D-Link DIR-825 Xtreme N Dual Band Gigabit Router,It’s like two routers in one. This Xtreme N® router operates on dual band Wi-Fi signals, making it easy to stream HD content while browsing the Internet without bogging down your network.



The D-Link® Xtreme N™ Dual Band Gigabit Router (DIR-825) uses dual band technology to support 2.4GHz & 5GHz wireless signals at the same time. This allows you to check e-mail and browse the Internet using the 2.4GHz band while simultaneously streaming High-Definition (HD) movies and other media on the 5GHz band. The DIR-825 is designed for users looking to get a true HD wireless connection that can handle multiple HD video streams throughout the house, while being backward compatible with existing 802.11g and 802.11a products.


D-Link has created SharePort™ technology to bring more flexibility to your network. With SharePort technology, you can connect a USB printer and share it throughout your network. You can also share a USB storage device, providing network storage for everyone to share*.


  • Automatically powers down ports that have no link
  • Budgets power output for different Ethernet cable lengths
  • Includes wireless LAN scheduling, which can shut down your wireless network when not in use for further power savings
  • Reduces energy consumption by using an Energy Star® qualified power adapter


  • Complies with the European Union’s RoHS directive that restricts the use of certain hazardous materials
  • Uses recyclable packaging to help reduce waste that goes into the environment

Firmware: 1.13NA

Date: 1/28/2010

Revision Info: ¤ Fixed: Correct HNAP issue.

¤ Fixed: DNS relay issue ( WAN Slowdown )

¤ Added: Advanced DNS descriptions

Download site:

Tags: , , ,

Prev 1 2 3 Next