Feb 08

There are several connection types to choose from: Auto Detection, Static IPv6, Autoconfiguration (SLAAC/DHCPv6), PPPoE,IPv6 in IPv4 Tunnel, 6to4, 6rd, and Link-local. If you are unsure of your connection method, please contact your IPv6 Internet Service Provider.

Note: If using the PPPoE option, you will need to ensure that any PPPoE client software on your computers has been removed or disabled.

Auto Detection

DIR-826L-IPv6a

Select Auto Detection to have the router detect and automatically configure your IPv6 setting from your ISP.

Static IPv6

DIR-826L-IPv6b

My IPv6 Connection:
Select Static IPv6 from the drop-down menu.

WAN IPv6 Address Settings:
Enter the address settings supplied by your Internet provider (ISP).

LAN IPv6 Address:
Enter the LAN (local) IPv6 address for the router.

LAN Link-Local Address:
Displays the Router’s LAN Link-Local Address.

Enable Autoconfiguration:
Check to enable the Autoconfiguration feature.

Autoconfiguration Type:
Select Stateful (DHCPv6), SLAAC + RDNSS or SLAAC + Stateless DHCPv6.

IPv6 Address Range Start:
Enter the start IPv6 Address for the DHCPv6 range for your local computers.

IPv6 Address Range End:
Enter the end IPv6 Address for the DHCPv6 range for your local computers.

IPv6 Address Lifetime:
Enter the IPv6 Address Lifetime (in minutes).

Autoconfiguration

DIR-826L-IPv6c

My IPv6 Connection:
Select Autoconfiguration (Stateless/DHCPv6) from the drop-down menu.

IPv6 DNS Settings:
Select either Obtain DNS server address automatically or Use the following DNS Address.

Primary/Secondary DNS Address:
Enter the primary and secondary DNS server addresses.

LAN IPv6 Address:
Enter the LAN (local) IPv6 address for the router.

LAN Link-Local Address:
Displays the Router’s LAN Link-Local Address.

Enable Autoconfiguration:
Check to enable the Autoconfiguration feature.

Autoconfiguration Type:
Select Stateful (DHCPv6), SLAAC + RDNSS or SLAAC + Stateless DHCPv6.

IPv6 Address Range Start:
Enter the start IPv6 Address for the DHCPv6 range for your local computers.

IPv6 Address Range End:
Enter the end IPv6 Address for the DHCPv6 range for your local computers.

IPv6 Address Lifetime:
Enter the IPv6 Address Lifetime (in minutes).

Tags: , , , ,

Aug 13

The Domain Name System Security Extensions (DNSSEC) is a suite of Internet Engineering Task Force (IETF) specifications for securing certain kinds of information provided by the Domain Name System (DNS) as used on Internet Protocol (IP) networks. It is a set of extensions to DNS which provide to DNS clients (resolvers) origin authentication of DNS data, authenticated denial of existence, and data integrity, but not availability or confidentiality.

The original design of the Domain Name System (DNS) did not include security; instead it was designed to be a scalable distributed system. The Domain Name System Security Extensions (DNSSEC) attempts to add security, while maintaining backwards compatibility. RFC 3833 attempts to document some of the known threats to the DNS and how DNSSEC responds to those threats.

DNSSEC was designed to protect Internet resolvers (clients) from forged DNS data, such as that created by DNS cache poisoning. All answers in DNSSEC are digitally signed. By checking the digital signature, a DNS resolver is able to check if the information is identical (correct and complete) to the information on the authoritative DNS server. While protecting IP addresses is the immediate concern for many users, DNSSEC can protect other information such as general-purpose cryptographic certificates stored in CERT records in the DNS. RFC 4398 describes how to distribute these certificates, including those for email, making it possible to use DNSSEC as a worldwide public key infrastructure for email.

What is the vulnerability in the DNS?

The efficient work of storing a response that functions as a mid-way point between an end user’s computer and an authoritative server is performed by a caching name server, usually operated by an ISP (Internet Service Provider). The DNS was designed to allow this caching server to accept the first response it receives. It is possible, without the verification provided by DNSSEC authentication, for a malicious user to flood this caching name server with a spoofed response that is, most often, intended to dupe the end user into providing personal and or financial information to what appears to be his or her intended destination.

How does DNSSEC work?

DNSSEC works through a system of keys. At each stage in supplying a DNS query response through the chain that takes it back to the initiator’s machine, a known key and a private key must be matched. In this way, the response to the query is authenticated and the response validated.

Tags: , , ,

Aug 05

This FAQ is for the DWL-2100AP and DWL-7100AP access points about DHCP Server Configure.

Step 1: Open a web browser and type the IP address of the access point in the address bar (default is 192.168.0.50). Press Enter

Step 2: The default username is admin (all lower case) and the default password is blank (nothing). Click OK.

Step 3: Click the Advanced tab and then click DHCP on the left side.

Note: If you are connecting to a router or a DHCP server, the DHCP server on the access point should be disabled.

Step 4: By default, DHCP Server is set to Disabled. To enable it, select Enabled using the drop-down list next to Function Enable/Disable. To disable it, select disabled using the drop-down list.

Step 5: Next to Starting IP Address enter the beginning IP address of your range. Next to Ending IP Address enter the ending IP address of your range. By default, the range is 100-199, meaning your clients will receive an IP address between 192.168.0.100 and 192.168.0.199.

Step 6: Enter a DNS server to assign to your clients. If you are behind a router or gateway, enter it´s IP address here.

Step 7: Select a lease time from the drop-down list.

Step 8: Click Apply and then click Continue to save the new settings.

Tags: , , ,

css.php