EasyManua.ls Logo

D-Link DSR-500 User Manual

D-Link DSR-500
213 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #101 background imageLoading...
Page #101 background image
Unified Services Router User Manual
99
Guest (read only): The guest user gains read only access to the GUI to observe and
review configuration settings. The guest does not have SSL VPN access.
SSL VPN User: This user has access to the SSL VPN services as determined by the
group policies and authentication domain of which it is a member. The domain-
determined SSL VPN portal will be displayed when logging in with this user type.
XAuth User: This users authentication is performed by an externally configured
RADIUS or other Enterprise server. It is not part of the local user database.
L2TP User: These are L2TP VPN tunnel LAN users that can establish a tunnel with
the L2TP server on the WAN.
PPTP User: These are PPTP VPN tunnel LAN users that can establish a tunnel with
the PPTP server on the WAN.
Local User: This users authentication domain is located on the router itself.
Once the user type is determined, you can define/modify the password and idle login
timeout for the user. It is recommended that passwords contains no dictionary words
from any language, and is a mixture of letters (both uppercase and lowercase),
numbers, and symbols. The password can be up to 30 characters.

Table of Contents

Other manuals for D-Link DSR-500

Question and Answer IconNeed help?

Do you have a question about the D-Link DSR-500 and is the answer not in the manual?

D-Link DSR-500 Specifications

General IconGeneral
BrandD-Link
ModelDSR-500
CategoryNetwork Router
LanguageEnglish

Summary

Chapter 1. Introduction

1.1 About this User Manual

Provides a high-level manual for users to configure connectivity, VPN tunnels, firewall rules, and administrative tasks.

1.2 Typographical Conventions

Lists terms and examples of how they are represented in the document, such as product names and GUI paths.

Chapter 2. Configuring Your Network: LAN Setup

2.1 LAN Configuration

Configures the router's LAN settings, including DHCP server, IP addresses, subnet mask, and DNS/WINS servers.

2.1.1 LAN Configuration in an IPv6 Network

Details how to configure LAN settings specifically for IPv6 networks, including IPv6 addresses and prefix lengths.

2.1.2 Configuring IPv6 Router Advertisements

Explains how to configure Router Advertisements (RADVD) for stateless IPv6 auto-configuration on the LAN.

2.2 VLAN Configuration

Enables and configures Virtual LANs (VLANs) for network isolation and traffic management.

2.2.1 Associating VLANs to ports

Describes how to tag traffic with VLAN IDs by associating VLANs to physical LAN ports.

2.3 Configurable Port: DMZ Setup

Configures a physical port as a dedicated DMZ or secondary WAN port for enhanced security.

2.4 Universal Plug and Play (UPnP)

Enables UPnP for automatic device discovery and port configuration on the network.

2.5 Captive Portal

Configures captive portal for web portal authentication for LAN users, often used in web café scenarios.

Chapter 3. Connecting to the Internet: WAN Setup

3.1 Internet Setup Wizard

Guides users through common configuration tasks to set up WAN connections and enable internet access.

3.2 WAN Configuration

Configures WAN connection types like DHCP, Static IP, PPPoE, PPTP, L2TP, and 3G Internet.

3.2.1 WAN Port IP address

Specifies how the router obtains its WAN IP address, either dynamically or statically from the ISP.

3.2.2 WAN DNS Servers

Configures Domain Name System (DNS) servers for resolving internet addresses, either automatically or manually.

3.2.3 DHCP WAN

Configures DHCP client connections for WAN, including MAC address cloning or spoofing.

3.2.4 PPPoE

Sets up PPPoE connections, supporting standard username/password and Japanese Multiple PPPoE.

3.2.5 Russia L2TP and PPTP WAN

Configures L2TP and PPTP WAN connections, including IP address assignment and MAC address settings.

3.2.6 WAN Configuration in an IPv6 Network

Configures WAN connections using IPv6, including static IPv6 addresses or DHCPv6 client settings.

3.2.7 Checking WAN Status

Displays the status and summary of configured WAN settings, including connection uptime and type.

3.3 Bandwidth Controls

Regulates traffic flow using bandwidth profiles to ensure fair usage and prioritize critical traffic.

3.4 Features with Multiple WAN Links

Utilizes multiple WAN links for failover and load balancing to ensure internet service continuity.

3.4.1 Auto Failover

Configures automatic failover between WAN ports to maintain internet connectivity during primary link failure.

3.4.2 Load Balancing

Distributes traffic across multiple WAN links using algorithms like Round Robin and Spill Over.

3.4.3 Protocol Bindings

Assigns specific traffic types or services to particular WAN ports when load balancing is active.

3.5 Routing Configuration

Configures how the router handles traffic flow between LAN and WAN interfaces.

3.5.1 Routing Mode

Sets the routing mode (NAT, Classic Routing, Transparent) to manage traffic flow between LAN and WAN.

3.5.2 Dynamic Routing (RIP)

Configures dynamic routing using RIP to exchange routing information and adapt to network changes.

3.5.3 Static Routing

Manually defines static routes to specify traffic paths between interfaces for custom routing configurations.

3.6 Configurable Port - WAN Option

Configures a physical port as a secondary WAN interface, enabling WAN2 setup options including 3G modem support.

3.7 WAN Port Settings

Defines physical port settings for WAN links, including MTU size, port speed, and duplex settings.

Chapter 4. Wireless Access Point Setup

4.1 Wireless Settings Wizard

Guides users through configuring a Wi-Fi network on the LAN and connecting 802.11 clients to the Access Point.

4.1.1 Wireless Network Setup Wizard

Assists in creating and securing a new access point, including SSID, security type, and network key generation.

4.1.2 Add Wireless Device with WPS

Enables WPS for easy joining of wireless devices, offering PIN or Push Button configuration options.

4.1.3 Manual Wireless Network Setup

Allows manual creation or modification of access points (APs) and their parameters via the GUI.

4.2 Wireless Profiles

Defines security, encryption, and authentication settings for wireless access points, grouped into profiles.

4.2.1 WEP Security

Configures WEP security with a static key for wireless network access, including authentication and encryption options.

4.2.2 WPA or WPA2 with PSK

Sets up WPA or WPA2 security using a pre-shared key (PSK) for stronger wireless network authentication.

4.2.3 RADIUS Authentication

Configures RADIUS authentication for WPA/WPA2 security, requiring a RADIUS server for wireless client authentication.

4.3 Creating and Using Access Points

Guides on creating new access points (APs) and assigning profiles to broadcast SSIDs for WLAN networks.

4.3.1 Primary benefits of Virtual APs:

Highlights benefits of Virtual APs (VAPs) for optimizing throughput and security by supporting multiple SSIDs.

4.4 Tuning Radio Specific Settings

Adjusts radio settings for the AP, including frequency bands (2.4/5 GHz), channels, and transmission power.

4.5 Advanced Wireless Settings

Modifies advanced 802.11 communication parameters for sophisticated wireless network administration.

4.6 Wi-Fi Protected Setup (WPS)

Configures WPS to simplify adding wireless clients to WPA/WPA2 secured networks.

Chapter 5. Securing the Private Network

5.1 Firewall Rules

Defines rules to selectively block or allow inbound/outbound Internet traffic based on services, zones, and schedules.

5.2 Defining Rule Schedules

Configures schedules to automatically enable or disable firewall rules based on specific days and times.

5.3 Configuring Firewall Rules

Guides on creating, editing, and managing firewall rules, including specifying source/destination zones and actions.

5.3.1 Firewall Rule Configuration Examples

Provides practical examples of configuring inbound and outbound firewall rules for common scenarios.

5.4 Security on Custom Services

Defines custom services with specific TCP/UDP ports to be used in firewall rule configurations.

5.5 ALG support

Enables Application Level Gateways (ALGs) to enhance firewall and NAT support for various application protocols.

5.6 VPN Passthrough for Firewall

Configures firewall settings to allow encrypted VPN traffic (IPsec, PPTP, L2TP) between LAN and Internet.

5.7 Application Rules

Configures port triggering to dynamically forward ports for applications requesting network access.

5.8 Web Content Filtering

Implements web filtering options to control internet access policies based on content, not just traffic types.

5.8.1 Content Filtering

Enables content filtering to block proxy servers, Java applets, ActiveX controls, and cookies.

5.8.2 Approved URLs

Creates an acceptance list of URL domain names that are permitted access from the LAN.

5.8.3 Blocked Keywords

Blocks website URLs or content containing specific keywords, with lower priority than Approved URLs.

5.9 IP/MAC Binding

Enhances security by binding IP addresses to MAC addresses to prevent IP address spoofing.

5.10 Intrusion Prevention (IPS)

Utilizes Intrusion Prevention System (IPS) to detect and prevent malicious internet attacks using static signatures.

5.11 Protecting from Internet Attacks

Configures attack checks for WAN security threats like ping requests, ARP scans, TCP/UDP floods, and DoS attacks.

Chapter 6. IPsec / PPTP / L2TP VPN

6.1 VPN Wizard

Quickly creates IKE and VPN policies for establishing VPN tunnels using a guided wizard.

6.2 Configuring IPsec Policies

Defines IPsec policies for tunnel or transport modes, enabling NetBIOS and DHCP over IPsec.

6.2.1 Extended Authentication (XAUTH)

Configures extended authentication (XAUTH) for VPN users via a local database or external servers like RADIUS.

6.2.2 Internet over IPSec tunnel

Routes all traffic through a VPN tunnel to the internet, with packets SNAT'ed on the remote gateway side.

6.3 Configuring VPN clients

Configures remote VPN clients with VPN policy parameters and populates the VPN client user database.

6.4 PPTP / L2TP Tunnels

Supports VPN tunnels from PPTP or L2TP ISP servers, acting as a broker for TCP connections.

6.4.1 PPTP Tunnel Support

Enables a PPTP server on the router for LAN and WAN PPTP client access to the network.

6.4.2 L2TP Tunnel Support

Enables an L2TP server on the router for LAN and WAN L2TP client access to the network.

Chapter 7. SSL VPN

7.1 Users, Groups, and Domains

Manages user authentication via local or external servers, defining users, groups, and domains for access control.

7.1.1 User Types and Passwords

Specifies user level policies and types (Administrator, Guest, SSL VPN User) and password configurations.

7.2 Using SSL VPN Policies

Creates SSL VPN policies at Global, Group, or User level to control access to network resources.

7.2.1 Using Network Resources

Defines network resources (IP addresses, ranges) to simplify creating and configuring SSL VPN policies.

7.3 Application Port Forwarding

Allows remote SSL users to access specific applications via port forwarding rules after logging into the User Portal.

7.4 SSL VPN Client Configuration

Configures the SSL VPN client, including tunnel type (full/split), DNS settings, and IP address ranges.

7.5 User Portal

Customizes the user portal for remote SSL VPN users, providing authentication fields and access to services.

7.5.1 Creating Portal Layouts

Designs custom portal pages for remote SSL VPN users, defining layout names, titles, and banner content.

Chapter 8. Advanced Configuration Tools

8.1 USB Device Setup

Configures USB devices like printers, file sharing, and 3G modems connected to the router.

8.2 Authentication Certificates

Manages digital certificates for IPsec VPN authentication and SSL validation (HTTPS).

8.3 Advanced Switch Configuration

Adjusts switch settings for power saving, Jumbo Frames support, and other advanced configurations.

Chapter 9. Administration & Management

9.1 Configuration Access Control

Controls access to the router's GUI and CLI, allowing configuration from LAN or WAN.

9.1.1 Remote Management

Restricts HTTPS and Telnet access to specific IP addresses for secure remote management.

9.1.2 CLI Access

Provides command-line interface (CLI) access via SSH and Telnet for administrator management.

9.2 SNMP Configuration

Configures SNMP for network management, allowing monitoring and updating of router variables.

9.3 Configuring Time Zone and NTP

Sets the router's time zone, daylight saving, and synchronizes time with an NTP server.

9.4 Log Configuration

Configures logging to capture and monitor traffic, attacks, errors, and system events.

9.4.1 Defining What to Log

Determines the granularity of logs by selecting facilities (Kernel, System, Wireless) and severity levels.

9.4.2 Sending Logs to E-mail or Syslog

Configures logs to be sent to an email address or a remote Syslog server for centralized collection.

9.4.3 Event Log Viewer in GUI

Displays configured log messages with timestamps in the router's GUI, aiding in troubleshooting and monitoring.

9.5 Backing up and Restoring Configuration Settings

Saves router configurations to a file for backup and restores them, or reverts to factory default settings.

9.6 Upgrading Router Firmware

Upgrades the router's firmware to a newer version, improving functionality and security.

9.7 Dynamic DNS Setup

Configures Dynamic DNS (DDNS) to allow routers with varying public IP addresses to be located by domain names.

9.8 Using Diagnostic Tools

Utilizes built-in tools to evaluate communication status and overall network health.

9.8.1 Ping

Tests network connectivity between the router and another device by sending ICMP echo requests.

9.8.2 Trace Route

Displays intermediate routers between the destination IP address and the router, showing the network path.

9.8.3 DNS Lookup

Retrieves IP addresses of internet servers by typing their names, assisting with network troubleshooting.

9.8.4 Router Options

Shows static and dynamic routes, and captures traffic for debugging routing and traffic issues.

Chapter 10. Router Status and Statistics

10.1 System Overview

Provides a detailed overview of system configuration, interfaces, hardware resources, and router usage statistics.

10.1.1 Device Status

Displays a summary of router configuration settings, serial number, firmware version, and interface information.

10.1.2 Resource Utilization

Presents CPU and memory utilization, along with interface statistics like packets transmitted, received, and dropped.

10.2 Traffic Statistics

Shows detailed transmit and receive statistics for each physical port and wireless access point.

10.2.1 Wired Port Statistics

Provides port-specific packet level information for wired interfaces (WAN, LAN, VLANs) including uptime.

10.2.2 Wireless Statistics

Displays traffic statistics for each enabled wireless access point, showing transmitted and received data.

10.3 Active Connections

Lists active internet sessions through the firewall, showing protocol, state, and IP addresses.

10.3.1 Sessions through the Router

Displays active internet sessions through the firewall, including protocol, state, local and remote IP addresses.

10.3.2 Wireless Clients

Shows connected wireless clients sorted by MAC address, indicating security parameters and connection time.

10.3.3 LAN Clients

Identifies LAN clients using ARP scans, displaying NetBios name, IP address, and MAC address.

10.3.4 Active VPN Tunnels

Shows status of IPsec security associations, traffic details, and tunnel state, with options to connect or drop.

Chapter 11. Trouble Shooting

11.1 Internet connection

Troubleshoots issues preventing access to the router's web interface or the internet.

11.2 Date and time

Resolves issues with incorrect date/time settings, including NTP synchronization and Daylight Savings adjustments.

11.3 Pinging to Test LAN Connectivity

Uses ping utility to test LAN connectivity between the PC, router, and remote devices.

11.3.1 Testing the LAN path from your PC to your router

Tests the LAN path from a PC to the router using the ping utility and observing results.

11.3.2 Testing the LAN path from your PC to a remote device

Tests the LAN path to a remote device, such as an ISP's DNS server, using ping.

11.4 Restoring factory-default configuration settings

Restores the router to its factory default settings via the configuration interface or the reset button.

Chapter 12. Credits

Appendix A. Glossary

Appendix B. Factory Default Settings

Appendix C. Standard Services Available for Port Forwarding & Firewall Configuration

Appendix D. Log Output Reference

Related product manuals