D-Link DVG-G1402S manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of D-Link DVG-G1402S, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of D-Link DVG-G1402S one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of D-Link DVG-G1402S. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of D-Link DVG-G1402S should contain:
- informations concerning technical data of D-Link DVG-G1402S
- name of the manufacturer and a year of construction of the D-Link DVG-G1402S item
- rules of operation, control and maintenance of the D-Link DVG-G1402S item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of D-Link DVG-G1402S alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of D-Link DVG-G1402S, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the D-Link service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of D-Link DVG-G1402S.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the D-Link DVG-G1402S item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    D-Link DVG-G1402S Wireless + 2Voice + 4SW VoIP Router Manual Building Networks for People Version B.1[...]

  • Page 2

    Contents Package Contents ........................................................................................................... 3 Introduction ..................................................................................................................... 4 Rear Panel Connections ..........................................................[...]

  • Page 3

    2 Home > VoIP > Speed Dial ........................................................................................ 30 Home > VoIP > Misc. ................................................................................................. 31 Home > VoIP > Misc. > Ring Cadence ......................................................[...]

  • Page 4

    3 Package Contents • D-Link DVG-G1402S Router • Power Adapter - AC 12V, 1.2A • Manual and Warranty on CD • Quick Installation Guide • Ethernet Cable (All the Ethernet po rts on DVG-G1402S are Auto-MDIX) Note: Using a power supply with a different voltage ra ting than the one included with the DVG-G1402S will cause damage and void the warr[...]

  • Page 5

    Introduction The D-Link DVG-G1402S High-Speed VoIP Rout er Links traditional telephony networks to IP networks with conventional telephony devices such a s anal og phones or fax machines. It can reduce long distance p hone cha rg es and delive r toll-quality voice communication over the I P network. This gateway provides two loop start Forei gn Exc[...]

  • Page 6

    Rear Panel Connections 5 Phone Connections Connect to your phones using standard phone cabling. All Ethernet Ports (WAN and LAN) are auto MDI/MDIX, meaning you can use either a straight-through or a crossover Ethernet cable. Auto MDI/MDIX LAN Ports Connect the Ethernet cable from computers on your LAN to these ports. Factory Reset Button Pressing t[...]

  • Page 7

    Front Panel LEDs Power LED A solid light indicates a valid connection to the power supply. Status LED A blinking LED indicates the DVG-G1402S is functioning properly. WAN LED An active LED indicates a link has been established. A blinking LED indicates activity on the WAN port. Phone LEDs The Hook LED will light when a telephone is off the hook. A [...]

  • Page 8

    7 Features • 1 NWay 10/100BASE-TX Fast Ethernet port for WAN-connection • 4 NWay 10/100BASE-TX Fast Ethernet port for LAN-connection • 2 Foreign Exchange Subscriber (FXS) POTS ports (RJ-11 Jacks) • Voice Activity Detection (VAD) /Comfort Noise Generation (CNG) • Silence suppression to reduce bandwidt h con sumption. • Adaptive jitter bu[...]

  • Page 9

    8 Installation For a typical setup at hom e, please do the followi ng: 1. You will need broadband In ternet access (a Cable or DSL-subscriber line into your home or office) 2. Consult with your Cable or DSL pro vider for proper installation of the modem 3. Connect the Cable or DSL modem to the DVG-G1402S VoIP Router (se e the printed Quick Installa[...]

  • Page 10

    Using the Configuration Wizard 9 192.168.15.1 Whenever you want to configure your network or the DVG-G1402S, you can access the Config uration Menu by opening the web-bro w ser and typing in the IP Address of the DVG-G1402S. The DVG-G1402S default IP Address is shown to the right: • Open the web browser • Type in the IP Address of the Router (h[...]

  • Page 11

    Home > Wireless Wireless LAN Usage This drop-down menu allows you to enable or disabl e the Wireless LAN feature on the DVG-G140 2S. Wireless LAN Mode You can select between three IEEE WLAN standards − 802.11b/g, 802.11g, and 802.11b − de pending upon which type of Wireless LAN devices you have. Channel What channels are availab le for use b[...]

  • Page 12

    Home > Wireless > Wire less LAN Authorization Authentication This router employ s three basic types of Authentication fo r access to the router’s wireless network, WEP, WPA, and WPA-PSK, which can be selected by clicking the corresponding radio button. No Auth will disa ble Wirel ess LAN authentication. Each selection will alter the window [...]

  • Page 13

    Open Auth − Shared Key The Open Auth − Shared Key choic e for Authentication will produce the screen shown above for the user’s configuration. Th e Open Auth choice is for general use an d utilizes basic WEP encryption. The Shar ed Key choice is us ed bet ween cooperatin g devices that share a common encryption key. WEP (Wireless Encr yption [...]

  • Page 14

    Click Apply to set the information in the router’s memory. You will be prom pted to restar t the router to make the settings current. WPA WPA or Wireless Protection Access is a new an improved standar d of wireless security . WPA offers encryption keys of up to 256-bits that automatical ly change frequ ently. On this router, the WPA utilizes the [...]

  • Page 15

    WPA-PSK WPA-PSK (Pre-Shared Key) uses the same en cryption as the WPA but is implemented differently. All devices on the wireless netwo rk share the same key (Passphrase) to activate the WPA security. There are three choice s for the user to choose from. WPA-PSK, WPA2-PSK which uses the Ad vanced Encryption Standard (AES), and WPA-PSK-Auto which wi[...]

  • Page 16

    Home > WAN Dynamic Choose Dynamic IP Address to obtain IP Address information automatically from your ISP. This option shoul d be selected if your ISP has not supplied you with an IP address. T his option is commonly used for Cable modem service s. Host Name The Host Na me is optional but may be required by some ISPs. The default host name is th[...]

  • Page 17

    MAC Address” button to copy the MAC address of the Ethernet Card installed by your ISP and repla ce the WAN MAC address with the MAC address of the rout er. It is not recom mended that you change the default MAC add re ss unless required by your ISP. Enter a DNS Address if you wish not to use the address provided by your ISP. The upstream bandwid[...]

  • Page 18

    Home > WAN > Static IP Address Static IP Address Choose Static IP Address if a ll WAN IP information is provided to you by your ISP. You will nee d to enter in the IP addre ss, subnet mask, gateway address, and DNS address(es) provided to you by your ISP. Each IP address entered in the fields must be in the appropriate IP form, which are four[...]

  • Page 19

    18 DNS Fails. Upstream Bandwidth The upstream bandwidth can b e set for the type of packets that the will be sent. The bandwidth can be maximized for voice packets and limited for data that requires less thro ughput.[...]

  • Page 20

    Home > WAN > PPPoE Choose PPPoE (Point to Point Protocol over Ethernet) if your ISP uses a PPPoE connection. Your ISP will provide you with a username and password. This option is typically used for DSL services. PPPoE Choose this option if your ISP uses PPPoE. (Most DSL users will select this option. ) Password Enter The PPPoE user name prov[...]

  • Page 21

    Input the primary DNS (Domain Name Server) IP addres s provided by your ISP Primary DNS Address T h i s i s a n optional DNS Address entry to be used if the primary DNS fails. Secondary DNS Address The upstream bandwidth can be set to suit the type of packets that the connection will be se nding. The bandwidth can be maximized for voice packets and[...]

  • Page 22

    Home > LAN LAN is short for Local Area Network. This is co nsidered your internal netwo rk. These are the IP settings of the LAN interface fo r the DVG-G1402S and may be referred to as Private settings. You may change the LAN IP addre ss if needed. The LAN IP address is private to your internal network a nd can not be seen on the Internet. IP Ad[...]

  • Page 23

    Home > VoIP All of the screens necessary to setup and conf igure the route r to ha ndle VoIP traffic are accessed from the screen shown b elo w. To access any of the individual configur ation screens, click on the co rre sponding radio-button and that screen will appea r. 22[...]

  • Page 24

    Home > VoIP > Server Confi guration The Router can be configured to handle voice signals over the Internet Protocol (Voice over IP − VoIP). The screen shown to the right, along with those on the following pages are used to configure your router to communicate with the devices that will send and receive telephone call s over the Internet. 23[...]

  • Page 25

    24 Server FQDN Use this drop-down menu to Enable or Disable the Server Fully Qualified Domain Name (FQDN) function. This is disabled when the SIP URL domain na me is differe nt from the SIP proxy server domain name. The phone will the n use the domain name in Domain Name field as part of SIP URL but send and receive SIP messages through the SIP pro[...]

  • Page 26

    Home > VoIP > Provisioning Provisioning is a function that automatically updates your DVG-G1402S’s VoIP configuration by using a TFTP server located on the Internet. If you have accesses to s uch a service, you will need to know the URL and Proxy Address of the Provisioning Server. Provisioning Function Use this drop-down m enu to Enable or[...]

  • Page 27

    Home > VoIP > STUN Configuration Simple Traversal of UDP over NAT (STUN) − is a protocol which enabl es a VoIP device, such as this router or an IP phone, to detect the presence and type of NAT behind which the phone is placed. This router supports STUN and can intelligently modify the private IP address and port in its SIP/SDP message by u[...]

  • Page 28

    proper interval, leave the default setting here. STUN NAT Type Displays the result of the STUN NAT examination. Home > VoIP > User Agent The Router can be configured to handle voice signals over the Internet Protocol (Voice Over IP − VOIP). Same Phone Number Use this field to Enable or Disable the use of the same telephone number for the Us[...]

  • Page 29

    Home > VoIP > Peer to Peer The Router can be configured to handle voice signals over the Internet Protocol (Voice Over IP − VOIP). Phone Number The telephone number assigned to this entry . User IP Address Enter the IP address of the remote peer in this field. Port Enter the UDP port number the rem ote peer will use to make the connection i[...]

  • Page 30

    Home > VoIP > Telephony The Router can be configured to handle voice signals over the Internet Protocol (Voice Over IP − VoIP). Index Use this field to assign line 1 or line 2 telephone sockets (on the back of the router) to the information entered in the User Agent. DTMF Method Out-of band Dual Tone Multi-fre quency -The Dual Tone Multi-fr[...]

  • Page 31

    Home > VoIP > Speed Dial The Router can be configured to dial a specified telephone number when you enter a numerical dial code. For example, you could assign 22 to the telephone number 555-1234. Then you can dial that telephone number by entering 22. Index A number used to identify the cu rrent speed dial tabl e entry. Dial Code A numerical [...]

  • Page 32

    Home > VoIP > Misc. Instead of adding additional lines to handl e different telephone numbers, distin ctive rings can be set to allow more than one telephone number to reach the sam e line. Calls coming in on different numbe rs on the same line can be identif ied by their distinctive ring pattern. For example, you could set a “short -short?[...]

  • Page 33

    Home > VoIP > Misc. > Ring Cadence By using the Ring Cadence window, you can set up to 8 distinct ring patterns. The ring pattern of each distinct ring can be configured by setting the On and Off time. The amount of times that the ring pattern will repeat itself can also be set. Duration This field is used to limit the amount of times that[...]

  • Page 34

    set at 12, 12, 8, 4, 10, 50, 0, 0. While some of the On and Off times are not multiples of 8, their sum of 96 meets the requirement so this would be a valid ring pattern. Home > VoIP > Misc. > Ring Default Rule The Ring Default Rule is set for inbound callers that are not defined by the Ring Rule. One Ring Default Rule can be set for each [...]

  • Page 35

    Home > VoIP > Misc. > Ring Rule You can use the Ring Rule window to assign Caller IDs to frequently received inbound calls. Any call that has been assigned a caller ID will have its ID number displayed on the receiver’s caller display. This way, the receiver knows whi ch department the inbound call is attempting to reach by the ring cade[...]

  • Page 36

    Home > VoIP > Manage Feat ures > Reject Incoming Call You can configure the router to reje ct in co ming calls from particular telephone nu mbers by entering the telephone number in the screen sho wn below. Name Enter a nam e to identify the current entry. PhoneNum Enter the telephone number you wa nt to block incoming call s from. 35[...]

  • Page 37

    Home > VoIP > Manage Feat ures > Block Outgoi ng Call You can configure the router to reje ct ou tgoing calls from parti cular telephone numbers by entering the telephone number in the screen sho wn below. Name Enter a nam e to identify the current entry. PhoneNum Enter the telephone number you wa nt to block outgoing calls to. 36[...]

  • Page 38

    Home > DHCP Dynamic Host Configuration Protocol (DHCP) allows the gateway to automatically obtain the IP address from a DHCP server on the service provider’s network. The service provider as signs a global IP address from a pool of addresses available to the service provider. Typically the IP address assigned has a long lease time, so it will [...]

  • Page 39

    correspondin g Enabled radio button. Next the user must enter the host name and the IP address for that computer by entering the last numbers into the space provided in the IP Address field. Next, the user is to enter t he MAC address of the com puter into the space provided. Click Apply to implement these static settings. The DHCP Client field wil[...]

  • Page 40

    Home > Proxy DNS State Use this drop down menu to enable or disable the Proxy DNS. Proxy DNS IP Address Enter the IP Address of the Proxy DNS. 39[...]

  • Page 41

    Advanced > Virtual Server To view the following window, cli ck o n the Advanced tab at the top of the window and then click the Virtual Serv er button to the left. The Virtual Server will allow remote users access to various se rvices o utside of their LAN through a publ ic IP address, such as FTP (File Transfer Protocol ) or HTTPS (Secure Web )[...]

  • Page 42

    41 and set the Status fields to Enabled by clicking the radio button. To configure other virtual servers for the Router, conf igure the following fields and click Apply . Index This is an index number used to identify the Virtual Server entry. Private IP Enter the IP address of the Virtual Server. Protocol Type The protocol type used for the Virtua[...]

  • Page 43

    Advanced > Filters Packet filtering is a basic security measure that shoul d be used on any network that is exposed to a security risk. A packet filter system examine s data packets and scrutini zes them in order to control network acce ss. F iltering rules determine whether packets are 42[...]

  • Page 44

    43 passed through the Router from either si de of the gateway. T he rules are created and controlled by the network a dmini strator and can be p re cisely defined. These rules are used to block access to the LAN from outside the network and/or to deny access to the WAN from within the network. The Route r uses filtering rules to examine data packet[...]

  • Page 45

    This window will aid the use in configuring filters for IP addresses. This will deny specified LAN IP addresses or specific ports associated with these LAN IP address from accessing th e Internet. Well known ports have already been previously set in the IP Filters List and can be modified by clicking their correspondi n g edit icon, and simple addi[...]

  • Page 46

    Internet. If no port is entered, a ll ports in this IP range will be denied access to the Internet. Advanced > Filters > M A C Filters All computers are uniquely identified by their MAC (Media Access Control) address. The following window will allow users to deny computers access to the Internet or only allow certain computers a c cess to the[...]

  • Page 47

    Advanced > Firewall This Router comes equipp ed with a firewall. The Firewall configuration screen allows the Router to enforce specific predefined policies intended to protect against certain common types of attacks. To configure the Router’s firewall, click the Advanced tab at the top of the screen and then the Firewall tab to the left. Pass[...]

  • Page 48

    47 may also be chosen by using the pull-do wn menu. The user may choose between TCP , UDP, ICMP or (*) Any . The user may also select a range of ports of the destination IP addresses by entering the range under the Port Ra nge heading. Subnet Mask The subnet mask that corresponds to the IP address above.[...]

  • Page 49

    Advanced > Routi ng > RIP Configuration RIP − Routing Information Protocol − specifies how routers exchange information. With RIP, routers occasionally exchange entire routing tables. You can sele ct RIPv1 or RIPv2 by clicking the radio button under the Version heading, and then select On or Off by clicking the radio button under the Stat[...]

  • Page 50

    Advanced > Routi ng > Static Route The Routing table, shown to the right, allows you to enter static routes between computers on both the WAN (Internet) and your LAN. IP Address Enter the IP Address of the sub net or device where packet s are to be routed. Subnet Mask Enter the subnet mask co rresp onding to the IP address ente red above . Ga[...]

  • Page 51

    Advanced > NAT > NAT C onfiguration Network Address Translation (NAT) is a method by which the router translates between the IP address your ISP assigns to your account and the IP addresses assign ed to the PCs on your LAN. NAT Interface IP Address This field displays the current IP address of the LAN side of the router. All IP address that a[...]

  • Page 52

    Advanced > NAT > Dynamic NAT Network Address Translation (NAT) is a method by which the router translates between the IP address your ISP assigns to your account and the IP addresses assigned to the PCs on your LAN. The Dynamic NAT entries are displayed below the Dynamic NAT configuration fields. To edit or delete an entry, find it on the lis[...]

  • Page 53

    Advanced > NAT > Static NAT Network Address Translation (NAT) is a method by which the router translates between the IP address you r I SP assigns to your account and the IP addresses assign ed to the PCs on your LAN. Index This is an index number that will be used to identify this NAT table entry . Local IP Address Enter the IP address of th[...]

  • Page 54

    Tools > Admin At this page, the DVG-G1402S administrator can change the syste m password. There are two accounts that can access the Broadband Router’s Web-Manageme nt interface. They are admin and user. Admin has read/write acce ss while user has read-onl y access. User can only view the settings but cannot make any changes. Web Port Number T[...]

  • Page 55

    Tools > System Backup Click Backup to backup the configuration file to your local hard drive. To restore the configu ration file click on Browse to search the local hard drive and locate the configuration file to be used for the configuration restorati on. Once the file has been located, click Open in the browser window and then Upload on the Sy[...]

  • Page 56

    Tools > Firmware You can update both the software and firm wa re of the Router. Please check the D-Link Support site fo r firmware updates at http://support.dlink.com . You can download firmware upgrades to your hard drive fro m the D-Link support site. Software Update Enter the TFTP server address. Firmware Update Click Enabled to begin the fir[...]

  • Page 57

    Tools > SNMP This menu can be accessed directly by clicking on the SNMP button or hyperlink in the Tools setup menu. Simple Network Management Protocol (SNMP) is an OSI Layer 7 Application designed specifically for managing and monitoring network devices. SNMP enables netwo rk management stations to read and modify the settings of gateways, rout[...]

  • Page 58

    Tools > Time The system time is the time used by the DVG-G1402S for scheduling services. You can manually set the time, connect to a NTP (network time protocol) server or synchronize the time on the router with your PC. If an NTP server is set, you will only need to set the time zone (in the set up wizard). 57[...]

  • Page 59

    Status > Device Info This page displays the current information for the DVG-G1402S. It will display the LAN, WAN, Disk Information statistics. This window will show the DVG-G1402S’s worki ng status: WAN IP Address : WAN/Public IP Address Subnet Mask : WAN/Public Subnet Mask Default Gateway : WAN/Public Gateway IP Address LAN LAN MAC Address : [...]

  • Page 60

    Status > Stats > Network The Broadband Router ke eps a running log of events and activities occurring on the Router. If the device is rebooted, the logs ar e automatically cleared. You may save the lo g fil es un der Log Se ttin gs . The screen above displays the Network Statistics. Here you can vi ew t he a mo un t o f p a ck ets that pass t[...]

  • Page 61

    Status > Stats > Phone Call 60[...]

  • Page 62

    The Broadband Router ke eps a running log of events and activities occurring on the Router. If the device is rebooted, the logs ar e automatically cleared. You may save the lo g fil es un der Log Se ttin gs . The screen above displays the Phone Statistics. Here you can vi ew t he a mo un t o f p a ck ets that pass through the DVG-G1402S on both Pho[...]

  • Page 63

    Help The Help tab will give basic information referring to various screens locted in the Router. To view a specific section, click on its h yperlinked name. A new wi ndo w of information will appear. 62[...]

  • Page 64

    Technical Specifications Standards  IEEE 802.3  IEEE 802.3u VPN Pass Through/ Multi-Sessions  PPTP  L2TP  I PSec Device Management  Web-Based- Internet Explorer v6 or later; Netscape Navigator v6 or later; or other Java-enabled browsers  DHCP Server and Client Advanced Firewall Features  NAT with VPN Passthrough (Network Add[...]

  • Page 65

    Technical Specifications LEDs:  Power  WAN  LAN (10/100)  Phone  Status Physical Dimensions:  L = 7.56 inches (192mm)  W = 4.65 inches (118mm)  H = 1.22 inches (31 mm) Power Input:  Ext. Power Supply DC 12V, 1.5A  Weight: 10.8 oz. (0.3kg) Warranty:  3 year (depends on D-Link global warranty policy) 64 63[...]

  • Page 66

    Technical Support You can find software updates an d user documentation on the D-Link website. D-Link provides free technical supp ort for customers within the Uni t ed States and within Canada for the duration of t he warra nty period o n this product. U.S. and Canadian custom ers can contact D- Link technical suppo rt throu gh ou r website, or by[...]