Our network and expertise. We connect people, businesses, governments, and communities across Australia and New Zealand, to the world.
Enterprise From network and collaboration services, to data centre and cloud solutions, you can count on us to meet your needs.
Government As a critical infrastructure provider, we're experts in secure, reliable, and high-performance solutions for government. Wholesale Across Australia, New Zealand, and into Asia Pacific, we provide wholesale connectivity, voice, and data centre solutions you can depend on. What's going on at Vocus.
Company news. Legal Legal contracts Privacy policy Privacy collection statement Reducing scam calls. About us. Review the preparation steps and click Next. Please disregard the note to install the network adapters and turn on all peripherals. That will be done in a later step.
If the disconnected network hardware window displays, select Ignore disconnected network hardware and click Next. Select Other as the Internet connection method and click Next. Select This computer connects directly to the Internet. I do not have a network yet as the specific Internet connection method and click Next. Enter a description in the Computer description field for the computer you are connecting to the gateway. It should be a description that differentiates it from the other computers that will be on the network For example, office desktop.
Enter a name for this computer in the Computer name field. The name cannot contain any spaces or special characters. Enter a name for your network workgroup in the Workgroup name field and click Next. All computers connected to your network must be assigned to the same workgroup. Note : The workgroup name cannot contain any spaces or special characters. Verify the network settings you have entered and click Next.
Select the drive where you want to save the information from the options displayed and click Next. Follow the directions for the type of drive you selected and click Next. Remove the disk from the drive and click Next. Click Finish. You will use this setup disk later if you add other computers to your network.
If you are prompted to restart your computer, click Yes. Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible for hackers to intercept this information.
Taking advantage of the security features built into your D-Link router can make it much more difficult for hackers to access your personal information. The level of protection required for your home network is dependent on the type of information stored on your home network. You have to decide what level of protection you need and how you are going to provide that protection.
This section provides information on the most basic steps to increase the security of your home network. It is not intended to include a description of all the possible security features provided by the D-Link router.
Take a few minutes now to improve the security of your home network by changing the initial settings of your D-Link router to provide the level of protection you need.
Note : You may have already completed some of the initial security updates listed below during installation. Simply skip the steps that you have already completed. Initial Security Settings Change the wireless settings. Download the complete instructions for printing. Enter your router user name and password. If you haven't changed your router user name and password, enter admin in the User Name field and leave the Password field blank. When the D-Link Configuration screen displays, confirm that the Home tab is selected and click Wireless.
Your D-Link router's default values of "admin" as the user name and no entry in the Password field are well-known to hackers. If these values are not changed, it's easier for hackers to access your network and information.
It's important that you not only change your user name and password from the default, but that you continue to change it regularly. There are two accounts set up on your router: the User and Administrator accounts.
Because the Administrator account can make changes to your network settings, it's very important to change the Administrator user name and password. You can limit access to your home network to increase the security of the information stored on it. MAC address filtering allows you to specify the computers that can access the network.
This makes it much more difficult for hackers to break into your home network. Each computer is assigned a MAC address. You will use this MAC address to specify the only computers allowed to connect to your home network.
Select the Advanced tab and select Filters in the left pane. Enter a name for the computer you're allowing access to your network in the Name field. You may want to give it a descriptive name like Dad's notebook or Family Room Desktop. Enter the computer's MAC Address. When you have entered the MAC address of each computer that will be connected to your network, select Only allow computers with MAC address listed below to access the network.
Click Apply. Now, only computers included in this list will be allowed to access your home network. If you have additional computers you want to connect to your wireless network, please follow the directions below. If you have no additional computers to connect, you can skip to Step 6.
The instructions for adding a computer to your wireless network depends on whether the computer you're adding has a wireless network adapter already installed. If your computer has a wireless adapter built in or you have previously installed a wireless network adapter , you only need to set up the connection to the wireless network. The directions are much simpler and generally take less than five minutes to complete. If you're unsure about whether you have a wireless network adapter, you can use Windows Device Manager to determine whether you have one installed.
If you don't have a wireless network adapter installed , connecting an additional computer will require two major steps:. Note : If you're creating a wireless network for a single laptop computer, you can skip this step and continue with Step 6. Review the advantages that each type of connection provides to determine the best solution for your situation.
Connect additional computers by selecting either a completely wireless or a combination network. The final step is to test your Internet connection on each computer on your home network.
The browser-based tool itself includes a five-step setup wizard that automatically detects your Internet connection and configures security for your wireless network. The explanations and instructions in the printed quick-installation guide seamlessly complement the wizard, addressing each step in the process. The router also comes with a removable antenna, so you can expand your coverage area by adding an antenna. The router also features parental controls that include URL filtering, domain blocking, and access scheduling by day of the week and time of day.
If you play games over the Internet, you can use the DI's special gaming mode, which adjusts the firewall to allow for network entertainment. For connections that demand even less restrictive access, such as videoconferencing, you can use the router's DMZ feature, which lets you place a single computer outside the router's firewall. With a firewall that is more configurable than most we've seen, the DI's security is top-notch for a consumer router.
You can turn the firewall on and off, a feature missing from the Microsoft MN and one that can be important for troubleshooting and allowing certain types of connections. You can also create a list of rules that let you allow or deny specific types of traffic between your internal network and the Internet.
For example, you can block UDP traffic from the Internet targeted for a specific port on one of your computers. The DI heaps on wireless security features.
If you already have a DI, you can upgrade the router's firmware to the latest version to take advantage of the new performance enhancements.
At close range, the DI clocked in at That's about twice as fast as a typical We were less impressed with the DI's performance in a mixed environment with
0コメント