D-Link DIR-455 manual Application Rules

Page 46

Section 3 - Configuration

Application Rules

Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and others. These applications have difficulties working through NAT (Network Address Translation). Applications Rules allow some of these applications work with the DIR-455.

APPLICATION RULES

Popular Applications: Select from a list of popular applications.

Copy to ID: Copies the predefined application rule to the line of the specified ID.

ID: Identifies the rule.

Trigger: The name of the trigger.

Incoming Ports: Specify the incoming port for the trigger rule.

Enable: Select this box to enable the rule.

Click Save Settings to save your changes, or click Don’t Save Settings to discard your changes.

D-Link DIR-455 User Manual

42

Image 46
Contents Page Preface TrademarksTable of Contents Troubleshooting Wireless Basics ProductPackageOverviewContents Introduction Rear Panel PowerHardware Overview LAN4 LAN3 LAN2 LAN1 WAN SIMWPS Front PanelWAN LAN1 LAN2 LAN3 LAN4 SMS WlanLEDs WANInstallation Connect to Your NetworkConnect a Telephone Wireless Installation Considerations Configuration Web-based Configuration UtilityClick Internet Connection Setup Wizard to begin Setup WizardInternet Connection Setup Wizard Manual Internet Connection Setup and skip toPage Page Page Manual Internet Connection Setup Click Manual Internet Connection Setup to beginInternet Connection Internet Connection TypeDynamic IP Dhcp PPPoE Pptp IP Address Address ModeReconnect Mode Pptp Subnet MaskL2TP IP Address L2TP Subnet MaskDialed Number AuthenticationKeep Alive Static IP GRE Settings GRE TunnelTunnels Information Wireless Network Settings Wireless SettingsMode Wireless Security Mode Network Settings Router SettingsDhcp Lease Time Dhcp Server SettingsEnable Dhcp Server Secondary Wins IP AddressVPN Settings Page Tunnel 1 IKE Encapsulation Protocol ESP, AH, or ESP+AHPage Page IKE Proposal Settings Ipsec Proposal SettingsTunnel 1 Manual Key Page Encapsulation Protocol ESP, AH, or ESP+AH Preshared Key XAuth Server ModePFS Group Remote IDIKE Proposal Settings SMS Inbox Message ServiceCreate Message Inbox CancelReceiver RefreshCopy to EnableVirtual Server Virtual Servers ListApplication Rules Application RulesLocal IP Ports QoS EngineQOS Packet Filter QoS PriorityMAC Address Filter MAC Filtering SettingsMAC Filtering Rules URL Filter URL Filtering RulesOutbound Filter Outbound Filter SettingOutbound Filter Rules List Inbound Filter Intbound Filter SettingInbound Filter Rules List Snmp Set CommunityRouting RIP SettingRouting Rules Advanced Wireless Dtim Interval WMM Capable TX RatesUpnp Advanced NetworkWAN Ping Administrator AdminRemote Management Time Zone ConfigurationTime Set the Time and DateSyslog Mail Settings System Firmware Dynamic DNS Username / E-mail Enter the Username for yourSystem Check Schedules Device Information Logs Statistics Wireless Support Wireless Security What is WEP?Configure WEP Next to Security Mode, select Enable WEP SecurityWhat is WPA? Configure WPA-PSK Configure WPA Radius Connect to a Wireless Network Using Windows VistaConfigure Wireless Security Page Using Windows XP Configure WEP Page Configure WPA-PSK Page Troubleshooting Why can’t I access the web-based configuration utility?What can I do if I forgot my password? Wireless Basics Wireless Local Area Network Wlan Wireless Personal Area Network WpanHome Small Office and Home OfficeEliminate Interference Centralize your Router or Access PointSecurity Wireless Modes Networking Basics Check your IP addressStatically Assign an IP address StepTechnical Specifications GSM Band GSM/GPRS/EDGEDimensions L x W x H