Aug 08

How to view log on D-Link DAP-2553

The AP’s embedded memory displays system and network messages including a time stamp and message type. The log information includes but is not limited to the following items: cold start AP, upgrading firmware, client associate and disassociate with AP, and web login. The web page holds up to 500 logs.


Log Settings on DAP-2553


Log Server/IP Address:Enter the IP address of the server you would like to send the D-Link DAP-2553 log to.

Log Type:Check the box for the type of activity you want to log. There are three types: System Activity, Wireless Activity, and Notice.

Email Notification:Check to enable Email notification.

Outgoing Mail Server (SMTP):Select the SMTP server from the drop-down menu.

Authentication:Check to enable authentication.

SSL / TLS:Check to enable SSL/TLS authentication.

From Email Address:Enter the “From” email address.

To Email Address:Enter the destination email address.

Email Server Address:Enter the Email Server Address.

SMTP Port:Enter the SMTP port.

Username:Enter your email username.

Password:Enter your email password.

Confirm Password:Enter your email password again.

Schedule:Select when to send the log to your email (in hours). You will receive an email when the log is full too.

Tags: , ,

Aug 06

Device Information on D-Link DIR-628

This page displays the current information for the DIR-628. It will display the LAN, WAN (Internet), and Wireless information.

If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP.

If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.


General:Displays the D-Link router’s time and firmware version.

WAN:Displays the MAC address and the public IP settings for the router.

LAN:Displays the MAC address and the private (local) IP settings for the router.

Wireless LAN:Displays the wireless MAC address and your wireless settings such as SSID and Channel.

LAN Computers:Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP).

Find Log on D-Link DIR-628 Wireless Router


The D-Link router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This D-Link router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.

What to View:You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected.

View Levels:There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log.

Apply Log Settings:Will filter the log results so that only the selected options appear.

Refresh:Updates the log details on the screen so it displays any recent activity.

Clear:Clears all of the log contents.

Email Now:This option will send a copy of the D-Link router log to the email address configured in the Tools > Email screen.

Save Log:This option will save the router to a log file on your computer.

Tags: , ,

Jul 23

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a neutral zone between outside a private network and public network companies. It prevents outside users get direct access to a server, enterprise data. (The term comes from the geographic buffer zone between North Korea and South Korea after the action of the United Nations police in the 1950s.) Is a DMZ set up an optional and more secure approach to a server securely and effectively acts as a proxy server when.

In a typical configuration of a DMZ for a small company, a separate computer (or host in network terms) requests from users to access private network of web sites or other undertaking is open to the public. The DMZ host then initiates sessions for these requests on the public.
can, however, is the DMZ host does not log in to the private network. You can only packets that were requested.

The public network users outside the company can access the DMZ host. The DMZ usually include information on Web pages, so that it can be covered with the outside world. However, the zone does not allow access to data from another company. When an external user in the DMZ hosts security, Web pages can be damaged, but no information about the society of those suspended. D-Link, a leading manufacturer of routers, a company that sells products for the creation of a demilitarized zone.

Tags: , , ,

Jul 21

View D-Link DWL-G730AP log is very simple. As long as the following sub-steps on it:

Step 1: Open a web browser and type the IP address of the D-Link DWL-G730AP in the address bar (default is Press Enter.

Step 2: The default username is admin and the default password is blank (nothing). Click OK.

Step 3: Click the Status tab and then click Log to the left.


Step 4: This displays the activity log for your access point. The buttons located above the log can be used to perform certain actions.

First Page: View the first page of the log.

Last Page: View the last page of the log.

Previous: View the previous page of the log.

Next: View the next page of the log.

Clear: Clear (delete) the entire log.

Log Settings: Configure advanced settings for the log such as email notifications.

Tags: , ,