D-Link DVG-G1402S manual Open Auth − Shared Key

Page 13

Open Auth − Shared Key

The Open Auth − Shared Key choice for Authentication will produce the screen shown above for the user’s configuration. The Open Auth choice is for general use and utilizes basic WEP encryption. The Shared Key choice is used between cooperating devices that share a common encryption key. WEP (Wireless Encryption Protocol or Wired Equivalent Privacy) encryption can be enabled for security and privacy. WEP encrypts the data portion of each frame transmitted from the wireless adapter using one of the predefined keys. Decryption of the data contained in each packet can only be done if the both the receiver and transmitter have the correct shared key.

WEP – Click the Enabled radio button to employ WEP encryption on the router.

Auth Method – Select Open Auth, Shared Auth, or Auto.

Encryption Type – Use the pull-down menu to select the type of Key to be used for encryption. The user may choose HEX (Hexadecimal) or ASCII (American Standard Code for Information Interchange). Both will require the user to enter a key in the following field.

Key field drop-down menu - Use the drop down menu to select the type of WEP encryption. Select 64 Bit to enable 64 bit Hexadecimal encryption, 128 Bit to enable 128 bit Hexadecimal encryption, 152 Bit to enable 152 bit Hexadecimal encryption.

Key – The user may enter up to four keys to be used for encryption. Only the key selected using the corresponding radio button will be used for encryption.

12

Image 13
Contents Link DVG-G1402S Contents Page Package Contents Introduction LAN Ports Button Rear Panel ConnectionsWAN LED Front Panel LEDsFeatures For a typical setup at home, please do the following Installation192.168.15.1 Using the Configuration WizardHome Wireless Authentication Home Wireless Wireless LAN AuthorizationOpen Auth − Shared Key WPA WPA-PSK Dynamic Home WANHost Name MAC AddressUpstream Bandwidth ISPHome WAN Static IP Address Page Home WAN PPPoE Primary DNS Address Secondary DNS Address Upstream Bandwidth Subnet Mask Home LANHome VoIP Home VoIP Server Configuration Timer T2 Service DomainDomain Name PortProvisioning Function Home VoIP ProvisioningServer URL Proxy AddressStun State Home VoIP Stun ConfigurationStun Server Port Stun ReqIntervalHome VoIP User Agent User IP Address Home VoIP Peer to PeerIndex Dtmf Method Payload Type Home VoIP TelephonyDial Code Home VoIP Speed DialHome VoIP Misc Duration Home VoIP Misc. Ring CadenceRing on Ring off Ring Cadence Home VoIP Misc. Ring Default RuleProfile ID From Port Ring Cadence Profile ID Caller ID Home VoIP Misc. Ring RuleName Home VoIP Manage Features Reject Incoming CallPhoneNum Home VoIP Manage Features Block Outgoing Call Home Dhcp Page Home Proxy DNS Advanced Virtual Server Protocol Type Private IPStart/End Global Port Start/End Local PortAdvanced Filters Advanced Filters IP Filters Start Port/End Port ProtocolState Advanced Filters MAC FiltersPass or Block Advanced FirewallSource DestinationMay also be chosen by using the pull-down menu. The user LAN RIPv1 Advanced Routing RIP ConfigurationLAN RIPv2 WAN RIPv1Gateway Advanced Routing Static RouteInterface MetricNAT Interface Netmask Advanced NAT NAT ConfigurationNAT Function Index Global IP Start/End Advanced NAT Dynamic NATLocal IP Start/End Local IP Address Advanced NAT Static NATGlobal IP Address Web Port Number WAN Access Control Administrator Password Tools AdminTools System Firmware Update Software UpdateTools Firmware File NameSnmp Trap Management Tools SnmpTools Time WAN Status Device InfoStatus Stats Network Status Stats Phone Call Status Diagnostics Help „ Pptp Technical Specifications„ WAN Technical Support
Related manuals
Manual 24 pages 38.08 Kb

DVG-G1402S specifications

The D-Link DVG-G1402S is a robust VoIP gateway designed to bridge traditional telephone services with internet-based communication, catering to both home and small office environments. It combines multiple technologies and functionalities to deliver seamless voice and data transmission over IP networks. This versatile device supports up to four simultaneous VoIP calls, making it an ideal solution for businesses that rely on efficient communication.

One of the standout features of the DVG-G1402S is its two FXS ports, which allow users to connect traditional analog phones directly, enabling the use of existing phone systems without requiring significant infrastructure changes. This makes it economical and practical for users who want to leverage VoIP technology while maintaining their conventional telephones.

The DVG-G1402S also supports various voice codecs, including G.711, G.729, and G.723, providing flexibility and optimal sound quality depending on bandwidth availability. This adaptability ensures that calls remain clear and reliable, even in fluctuating network conditions.

Security is a crucial aspect of modern communications, and the DVG-G1402S does not disappoint. It features integrated firewall capabilities, including NAT (Network Address Translation) and various security protocols to safeguard sensitive voice data against potential threats. Additionally, it supports SIP (Session Initiation Protocol), which enhances compatibility with various VoIP service providers.

Managing the DVG-G1402S is made easy through its user-friendly web interface, allowing users to configure settings, monitor call status, and manage contacts effortlessly. The gateway also offers Quality of Service (QoS) features, prioritizing voice traffic to ensure that calls are not disrupted by other network activities.

Another noteworthy characteristic is its built-in DHCP server functionality, which simplifies network management by automatically assigning IP addresses to connected devices. This enhances the device's usability in dynamic environments where devices frequently connect and disconnect.

In conclusion, the D-Link DVG-G1402S stands out as a reliable VoIP gateway that amalgamates traditional and internet telephony. Its feature-rich design, emphasis on security, and ease of use make it an excellent choice for anyone looking to modernize their communication infrastructure without sacrificing the familiarity of their existing equipment.