Aug 05

WPA is a more powerful security technology for Wi-Fi networks than WEP. It provides strong data protection by using encryption as well as strong access controls and user authentication. WPA utilizes 128-bit encryption keys and dynamic session keys to ensure your wireless network’s privacy and enterprise security.Read More about WPA-PSK.

Step 1: Log into the web-based configuration by opening up a web browser and typing in the IP address of the D-Link DWL-2100AP access point (

Step 2: The default username is admin (all lower case) and the password is blank (nothing). Click OK.

Step 3: Click on the Advanced tab and then click Encryption on the left hand side.

Step 4: Click on the WPA radio button and then click Apply.


Step 5: Select PSK and then enter a key (passphrase). The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. Make sure you enter this key exactly the same on all other wireless clients. Keep the Group Key Update Interval set to 1800.


Step 6: Click on the Apply button to save your settings.

Note: If you are configuring your access point from a wireless adapter, you will lose connectivity as soon as you click Apply. You must enable WPA-PSK on your adapter and enter the same exact key as you entered on your access point.

Tags: , ,

Jul 31

This article guide you how to set up the security of D-Link Draft 802.11n Wireless,DWA-142 as a example.

Step 1: Right click the Wireless status Icon in the task bar, to open the Wireless Manager.


Step 2: Select Wireless Manager.


Step 3: Click on My Wireless Networks.


Step 4: Select Modify on the right.


Step 5: Select your Network Type and Security Type for the selected network profile.


Step 6: Click OK.

Tags: , , ,

Jul 23

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a neutral zone between outside a private network and public network companies. It prevents outside users get direct access to a server, enterprise data. (The term comes from the geographic buffer zone between North Korea and South Korea after the action of the United Nations police in the 1950s.) Is a DMZ set up an optional and more secure approach to a server securely and effectively acts as a proxy server when.

In a typical configuration of a DMZ for a small company, a separate computer (or host in network terms) requests from users to access private network of web sites or other undertaking is open to the public. The DMZ host then initiates sessions for these requests on the public.
can, however, is the DMZ host does not log in to the private network. You can only packets that were requested.

The public network users outside the company can access the DMZ host. The DMZ usually include information on Web pages, so that it can be covered with the outside world. However, the zone does not allow access to data from another company. When an external user in the DMZ hosts security, Web pages can be damaged, but no information about the society of those suspended. D-Link, a leading manufacturer of routers, a company that sells products for the creation of a demilitarized zone.

Tags: , , ,