Nov 18

Step 1: Log into the DSR interface. The default IP address is (eg.



Step 2: Click the Tools Tab on the top, Click Admin > Remote Management on the left side



Step 3: Enable Remote Management and Click Save Settings



Step 4: Click the Advanced Tab on the top, click Users on the left side and select Groups

Step 5: Click Add


Step 6: Configure your group:

  • Name: The Name of the group (ie. Tech Support)
  • Domain: SSLVPN
  • Idle Timeout: The Timeout value of the group (eg. 10)

Step 7: Select Users on the left and click Users


Step 8: Click Add


Step 9: Create User

  • Username: username for login (eg. tsmith)
  • First Name: Users Name (eg. Tom)
  • Last Name: Users Last Name (eg. Smith)
  • User Type: SSLVPN
  • Select Group: created group (ie. Tech Support)
  • Password: password for VPN login
  • Confirm Password:
  • Idle Timeout: The timeout value of the user (eg. 5)A10120_image9

Step 10: Click Setup on the top and VPN Settings>SSL VPN Server>Resources on the left side


Step 11: Place a Check next to the SSL VPN Resource and click Configure


Step 12: Configure:

  • Object Type: Select the Access for SSL User (ie. Single IP or Network)
  • Object Address: Single IP address or Network (eg.
  • Mask Length: Netmask of network (eg. 24)
  • Port Range: Ports that can be accessed by SSL Users
    • Begin: 0
    • End: 65535

Note: In this example, SSL VPN users can access the entire 192.168.10.x network and have access to all ports.

Step 13:Click Setup on the top and VPN Settings>SSL VPN Server>SSL VPN Policies on the left side

Step 14: Click Add



Step 15: Configure VPN Policy:

  • Policy For: Select who the policy is for (eg. Group)
  • Available Groups: Select the Group to apply this policy (eg. Tech Support)
  • Apply Policy to: Network Resource
  • Policy Name: Enter name for Policy (eg. SSL VPN)
  • Define Resources: Your SSL Resource (Eg. SSL) (From Step 9)
  • Permission: Permit

Connecting to the SSL VPN:

Step 1: Open an internet browser
Step 2: Enter the DSR’s public/WAN address into the address bar and click Go (eg.
Step 3: At the DSR Login Screen, enter your SSL Username and Password and click login



Step 4: Click on the VPN Tunnel Tab at the top
Step 5: Click the SSL VPN Icon to launch the installer


Once the installer launches it will automatically connect to your SSL VPN.


Tags: , ,

Nov 12

Note: This FAQ is applicable to all D-Link DI Series Routers

Step 1 Open a web browser and enter the IP address of the D-Link wireless router in the address bar (default is Press Enter.

Step 2 The username is admin and the default password is blank (nothing). Click OK.

Step 3 Click the Tools tab and then click Admin to the left.

Step 4 To change the administrative password, enter a new password in the Admin section.


To change the user password, enter a new password in the User section.

Step 5 Click Apply then click Continue to save the settings.

Tags: , ,

Aug 13

To find the proper MTU Size, you’ll have to do a special ping of the destination you’re trying to go to. A destination could be another computer, or a URL.

Step 1 Click on Start and then click Run.

Step 2 Windows NT, 2000, and XP users type in cmd and press Enter (or click OK).

Step 3 Once the window opens, you’ll need to do a special ping. Use the following syntax:

ping [url] [-f] [-l] [MTU value]

Example: ping -f -l 1472


You should start at 1472 and work your way down by 10 each time. Once you get a reply, go up by 2 until you get a fragmented packet. Take that value and add 28 to the value to account for the various TCP/IP headers. For example, lets say that 1452 was the proper value, the actual MTU size would be 1480, which is the optimum for the network we’re working with (1452+28=1480).

Once you find your MTU, you can now configure your router with the proper MTU size.

Tags: , ,

Aug 03

The recent very hot weather, if your home router crashes occurred, or disconnection, you can try the following method.

1. Check the router’s fan and radiator, if broken, re-bar to buy a new router.

2. To place the router into the air circulation.

3. Reduce the surface temperature of the router, you can get some ice on the surrounding.

Tags: , ,

Jul 23

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a neutral zone between outside a private network and public network companies. It prevents outside users get direct access to a server, enterprise data. (The term comes from the geographic buffer zone between North Korea and South Korea after the action of the United Nations police in the 1950s.) Is a DMZ set up an optional and more secure approach to a server securely and effectively acts as a proxy server when.

In a typical configuration of a DMZ for a small company, a separate computer (or host in network terms) requests from users to access private network of web sites or other undertaking is open to the public. The DMZ host then initiates sessions for these requests on the public.
can, however, is the DMZ host does not log in to the private network. You can only packets that were requested.

The public network users outside the company can access the DMZ host. The DMZ usually include information on Web pages, so that it can be covered with the outside world. However, the zone does not allow access to data from another company. When an external user in the DMZ hosts security, Web pages can be damaged, but no information about the society of those suspended. D-Link, a leading manufacturer of routers, a company that sells products for the creation of a demilitarized zone.

Tags: , , ,

1 2 3 4 Next