Solved

D-Link Router

Posted on 2010-09-13
3
685 Views
Last Modified: 2012-05-10
I just bought [another] Wireless-N router. A D-Link DIR-655 Xtreme N Gigabit
Router.  It is working but I have some questions...

The new D-Link has a "DHCP Reservations" feature where you can say "if
    MAC address x requests an IP address from DHCP server, always give it
    192.168.0.n" where you specify x, n, and optional "Name".  It is somewhat
    like a static IP from DHCP server (or a DHCP IP addr that never expires).
    An additional advantage to using reservations is that router's DHCP display
    shows names for devices which otherwise do not have name (such as Blu-Ray
    player, and Palm PDA).

QUESTIONS:

    1) The Wireless-N devices only connect at Wireless-G speeds. I set up wireless
    part to use WEP because that is only security mode handled by old Palm TX.
    Is this why all connections are at G speeds?  WEP only works for b/g not n.

    2) The router's log files fills up very quickly with 5 to 10 connections per
    min to  174.78.110.160:443.  It appears to be a server owned by cox.net and
    port 443 appears to be https.  Why?  How do I figure out who is doing this?
    I am assuming this is not good. ???  The log file below is from several days
    ago but it is still ocurring.
      re-phased:
            Is this normal behaviour maybe part of DNS server operation or is this bad?
            How do I find process that is generating this activity?
            Is there a way to determine what server is doing?


Thanks!
0
Comment
Question by:willsherwood
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
Kevin Aleshire earned 500 total points
ID: 33667751
1 ) This is normal. The maximum transfer rate for 802.11n using WEP or WPA (TKIP) authentication is 54 Mbps, as specified in the IEEE 802.11n standard.
So because of this standard, most routers will only connect using 802.11g.

2 ) This may help explain a little bit, something to do with the SecureSport network monitoring feature of that router.
http://forums.dlink.com/index.php?topic=12244.0
0
 

Author Closing Comment

by:willsherwood
ID: 33671559
perfect many thanks!
0
 
LVL 3

Expert Comment

by:Kevin Aleshire
ID: 33672727
Happy to help :)
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now