D-Link DRO-210i manual Ping Test, Remote Access

Page 68

Administration

10.8 Ping Test

The Ping Test feature allows the user to ping to any network device from the router. This helps in checking network connectivity from the router.

Select Tools Ping Test to configure Ping Test as explained below.

Web UI

Ping Test

Set Type

Select IP address or Domain Name to use for the ping test.

 

 

IP address

Enter the IP address of the end host, if Set Type selection was IP address.

 

 

Domain Name

Enter the Domain Name of the end host, if Set Type selection was

 

Domain Name.

 

 

Count Number

Enter the number of packets to send for the ping test. The value should be

 

always less than or equal to 10 (four is recommended).

 

 

Press the Apply button to start the ping test. When the test is over the results are shown in the text box below.

10.9 Remote Access

Remote Access enables the Administrator to remotely provision the router over a secure SSL-based Web User Interface. He can also perform remote software upgrades and remote monitoring to ensure smooth operation of the network. In case of external attacks, the administrator can use the logging provided by the router to locate what kind of attack has happened, when it has taken place and which device may have played a role in it. The administrator can then decide on what firewall policies to add to prevent future attacks (or take necessary steps to correct any internal device problem). Once the problem is corrected, the logs can be used to verify the smooth and correct operation of the router.

Select Tools Remote Access to configure Remote Access as explained below.

Web UI

Remote Access

Remote Access

Select Enable or Disable to activate or deactivate this feature.

Status

 

 

 

Remote IP address

Enter the IP address of the host(s), which can configure the router

 

remotely.

 

 

If Firewall feature is enabled, only these selected IP addresses will be able to access the router remotely. However if there is no firewall configured then anyone can access the device from an external host.

Dlink DRO-210i User Guide

68

Image 68
Contents DRO-210i Table Of Contents Virtual Private Network About This Manual BoldDlink DRO-210i User Guide Product OverviewProduct Overview DRO-210i Package Contents Hardware DetailsFront Panel Rear Panel Software Features RoutingVPN Tools Port Configuration Optional Port ConfigurationDisabled WAN2/DMZ InterfacesLAN Settings LAN InterfaceDMZ Interface Forgot LAN IP ?Maximum Transmission Unit DMZ SettingsWAN Interface Static Mode Dynamic ModeIP Settings for WAN1 Interface Dhcp Settings for WAN1 InterfacePPPoE Mode Unnumbered InterfacesPPPoE Settings for WAN1 Interface DHCP, DNS and Time DhcpDhcp Server DHCP, DNS and TimeDhcp Static Mapping Dhcp Static MappingDhcp Relay Dhcp RelayDNS Proxy Settings DNS ProxySystem Time Settings TimeRouting RoutingStatic Routing Static RoutingDynamic Routing RIP Settings Routing Table Policy Based RoutingRouting Table Policy Based RoutingTo the same destination Auto Backup Backup ConfigurationHigh Availability High AvailabilityEthernet Link Detection Load Balancing ConfigurationLoad Balancing Ethernet WAN Link Detection NAT Interface Configuration NAT Interface ConfigurationNetwork Address Translation NATNAT Exception NAT ConfigurationNAT Configuration Virtual Server/NAPT Virtual ServerNAT Exception SIP ALG Configuration SIP-ALGNAT Table NAT Session TableInterface Configuration Firewall Interface ConfigurationFirewall Firewall PoliciesPolicy Rules Policy RulesPermitted Services Inbound Policies Permitted ServicesInbound Policies Inbound PoliciesAdd Permitted IP Rule Outbound PoliciesIP Permitted Rules Outbound Policies Outbound PoliciesBlocked Services Outbound Policies Service Blocked RuleIP Blocked Rules Add Blocked IP RuleDomain Filter Untrusted DomainOutbound Policies Untrusted Domain Trusted DomainWeb Filter Java FilterCookie Filter ActiveX FilterFile Extension Filter Keyword FilterKeyword Exception MAC Filter Blocking LogAdd Blocked MAC Address Blocking Log TableIDS Configuration Intrusion DetectionIDS Configuration Intrusion Log Black ListIntrusion Log Table Black List TableVirtual Private Network Virtual Private NetworkIPSec Tunnel or Passthrough Peer-To-PeerIPSec Passthrough IPSec TunnelVirtual Private Network Same IKE Encryption algorithm on both ends of a VPN tunnel IPSec Server Configurations IPSec ServerMaximum life duration is 86400 seconds Limitation Tunnel Remote ID ConfigurationTunnel Table IPSec Status IPSec StatusIPSec Log IPSec Log TableQuality of Service Class ConfigurationQuality of Service HTB QoS ConfigurationsQuality of Service Filter Configuration QoS Filter ConfigurationsType Of Service/DiffServ TOS/DiffServQuality of Service Administration AdministrationDevice Information Device InfoTraffic Statistics Traffic StatisticsSession Log Password Change SysLog Session Log System LogChange Password Password RecoverySystem SystemUpdate Firmware/Configuration Upload/DownloadRemote Access Remote AccessPing Test Ping TestAdministration Dlink DRO-210i User Guide General Frequently Asked QuestionsFrequently Asked Questions Q6. What is the purpose of Dhcp Server Auto Configuration? DHCP, DNSRouting High AvailabilityFirewall Frequently Asked Questions 11.6 NAT Q21. What are the call features supported by SIP-ALG? 11.7 VPN11.8 QoS Frequently Asked Questions