Home > Belkin > Router > Belkin Router F5D7234-4user Manual

Belkin Router F5D7234-4user Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Belkin Router F5D7234-4user Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							49Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    s ecuring your Wi- fi
    ® n etwork
    Here are a few different ways you can maximize the security of your 
    wireless network and protect your data from prying eyes and ears. This 
    section is intended for the home, home office, and small office user. 
    At the time of this User Manual’s publication, there are four encryption 
    methods available.
    Name 64-Bit Wired 
    Equivalent 
    Privacy 128-Bit Wired 
    Equivalent 
    Privacy
    Wi-Fi Protected 
    Access-TKIP
    Wi-Fi Protected 
    Access 2
    Acronym 64-bit WEP 128-bit WEPWPA-TKIP/AES (or 
    ju s t  WPA ) WPA 2-AES (or just 
    WPA 2)
    Security Good BetterBest Best
    Features Static keys  Static keys Dynamic key 
    encr yption 
    and mutual 
    authentication Dynamic key 
    encr yption 
    and mutual 
    authentication
    Encr yption 
    keys based on 
    RC4 algorithm 
    (typically 
    40-bit keys) More secure 
    than 64-bit 
    WEP using a 
    key length of 
    104 bits plus 
    24 additional 
    bits of system-
    generated 
    dataTKIP ( Temporal 
    Key Integrity 
    Protocol) added 
    so that keys 
    are rotated and 
    encr yption is 
    strengthened
    AES (Advanced 
    Encr yption 
    Standard) does 
    not cause any 
    throughput loss
    Wired e
    quivalent Privacy (W eP)
    WEP is a common protocol that adds security to all Wi-Fi-compliant 
    wireless products. WEP was designed to give wireless networks the 
    equivalent level of privacy protection as a comparable wired network. 
    64-bit W eP
    64-bit WEP was first introduced with 64-bit encryption, which includes 
    a key length of 40 bits plus 24 additional bits of system-generated data 
    (64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit 
    encryption. Shortly after the technology was introduced, researchers 
    found that 64-bit encryption was too easy to decode. 
    128- bit W eP 
    As a result of 64-bit WEP’s potential security weaknesses, a more 
    secure method of 128-bit encryption was developed. 128-bit encryption 
    includes a key length of 104 bits plus 24 additional bits of system-
    generated data (128 bits total). Some hardware manufacturers refer to 
    128-bit as 104-bit encryption. 
    Most of the new wireless equipment in the market today supports both 
    64-bit and 128-bit WEP encryption, but you might have older equipment 
    that only supports 64-bit WEP. All Belkin wireless products will support 
    both 64-bit and 128-bit WEP. 
    						
    							50Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    encr yption Keys
    After selecting either the 64-bit or 128-bit WEP encryption mode, it is 
    critical that you generate an encryption key. If the encryption key is 
    not consistent throughout the entire wireless network, your wireless 
    networking devices will be unable to communicate with one another 
    on your network and you will not be able to successfully communicate 
    within your network. 
    You can enter your key by typing in the hex key manually, or you can 
    type in a passphrase in the “Passphrase” field and click “Generate” to 
    create a key. A hex (hexadecimal) key is a combination of numbers and 
    letters from A–F and 0 –9. For 64-bit WEP, you need to enter 10 hex 
    keys. For 128-bit WEP, you need to enter 26 hex keys. 
    For instance:
    af 0 f 4b C3  d4 = 64-bit WEP key
    C3 03 0 f af 0 f 4b b2 C3  d4 4 b C3  d4  e7 = 128-bit WEP key
    The WEP passphrase is NOT the same as a WEP key. Your Router uses 
    this passphrase to generate your WEP keys, but different hardware 
    manufacturers might have different methods on generating the keys. 
    If you have multiple vendors’ equipment in your network, the easiest 
    thing to do is to use the hex WEP key from your Router or access 
    point and enter it manually into the hex WEP key table in your Router’s 
    configuration screen. Wi-f
    i Protected  access™  ( WP a™)
    WPA is a new Wi-Fi standard that was designed to improve upon the 
    security features of WEP. To use WPA security, the drivers and software 
    of your wireless equipment must be upgraded to support WPA. These 
    updates will be found on the wireless vendor’s website. There are two 
    types of WPA security: WPA-PSK and WPA2. 
    WPA-PSK uses what is known as a pre-shared key as the network 
    key. A network key is basically a password that is between eight 
    and 63 characters long. It can be a combination of letters, numbers, 
    or characters. Each client uses the same network key to access 
    the network. Typically, this is the mode that will be used in a home 
    environment. 
    W PA 2
    ™ requires Advanced Encryption Standard (AES) for encryption 
    of data, which offers much greater security than WPA. WPA uses both 
    Temporal Key Integrity Protocol ( TKIP) and (AES) for encryption. 
    						
    							51Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    sharing the s ame network Keys
    Most Wi-Fi products ship with security turned off. So once you have 
    your network working, you need to activate WEP or WPA and make sure 
    your wireless networking devices are sharing the same network key. 
    The following diagram shows the effect of not having the correct 
    network key throughout your network. Using a Hexadecimal Key
    A hexadecimal key is a combination of numbers and letters from A–F 
    and 0 –9. 64-bit keys are five two-digit numbers. 128-bit keys are 13 
    two-digit numbers.
    For instance:
    af 0
    f 4b C3  d4 = 64-bit key
    C3 03 0 f af 0 f 4b b2 C3  d4 4 b C3  d4  e7 = 128-bit key
    In the boxes below, make up your key by writing in two characters 
    between A–F and 0 –9 in each box. You will use this key to program the 
    encryption settings on your Router and your wireless computers.
     
    n ote to Mac users:  Original Apple
    ® AirPort® products support 64-bit 
    encryption only. Apple AirPort 2 products can support 64-bit or 128-bit 
    encryption. Please check your product to see which version you are 
    using. If you cannot configure your network with 128-bit encryption, try 
    64-bit encryption. 
    G Wireless Router
    Network key=
    MyPassword Network key=
    MyPassword
    Network key=
    MyPassword
    Network key=
    WRONG Password
    G Wireless USB 
    Network Adapter
    G Wireless USB 
    Network Adapter
    G Wireless USB 
    Network Adapter
    The network adapter cannot access the network because it uses a 
    different network key than the one configured on the wireless router.    
    						
    							52Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    W eP  setup
    64- bit W eP  encryption
    1�  Select “WEP” from the “Security” menu’s “Allowed Client Type”.
    2 �  Select “64 bit” from the drop-down menu in “WEP Mode”.
    3 �  After selecting your WEP encryption mode, you can enter your 
    key by typing in the hex key manually, or you can type in your 
    passphrase. Click “Generate” to generate four different hex keys.
    A hex (hexadecimal) key is a combination of numbers and letters from 
    A–F and 0 –9. For 64-bit WEP, you need to enter 10 hex keys. 
    For instance: 
    af 0 f 4b C3  d4 = 64-bit WEP key
    W aRn InG:  If you are configuring the G Wireless Router or access point 
    from a computer with a wireless client, you will need to reconnect to the 
    Router and set up the connection with the security key you’ve set up. 
    						
    							53Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    128- bit W eP  encr yption
    n ote to Mac users:  The passphrase option will not operate with Apple AirPort. To configure encryption for your Mac computer, set the encryption 
    using the manual method described in the next section.
    W aRn InG:  If you are configuring the G Wireless Router or access point 
    from a computer with a wireless client, you will need to reconnect to the 
    Router and set up the connection with the security key you’ve set up.
    1� 
    Select “WEP” from the “Security” menu’s “Allowed Client Type”.
    2 �  Select “128 bit” from the drop-down menu in “WEP Mode”.
    3 �  After selecting your WEP encryption mode, you can enter your 
    key by typing in the hex key manually, or you can put a check 
    mark in “Passphrase”, then type in your passphrase. Click “Apply 
    Changes” to generate four different hex keys.
    A hex (hexadecimal) key is a combination of numbers and letters from 
    A–F and 0 –9. For 128-bit WEP, you need to enter 26 hex keys. 
    For instance:
    C3 03 0 f af 0 f 4b b2 C3  d4 4 b C3  d4  e7 = 128-bit WEP key 
    						
    							54Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    Changing the Wireless s ecurity settings
    Your Router is equipped with the latest security standard called Wi-Fi 
    Protected Access 2 (WPA2) and the legacy security standard called 
    Wired Equivalent Privacy (WEP). Your Router also supports the Wi-Fi 
    Protected Setup (WPS) specification, which simplifies the setup of a 
    wireless network. WPS uses familiar methodologies, such as typing in 
    a Personal Identification Number (PIN) or pushing a button, to enable 
    users to automatically configure network names and strong WPA / WPA2 
    data encryption and authentication. By default, wireless security is 
    disabled. To enable security, you will need to determine which standard 
    you want to use. To access the security settings, click “Security” on the 
    “Wireless” tab.
    Using Wi- fi Protected s etup
    WPS uses WPA2 (described below) for encryption. It does not provide 
    additional security, but rather, standardizes the method for securing your 
    wireless network. You may use either the Push Button Configuration 
    (PBC) method or PIN method to allow a device access to your wireless 
    network. Conceptually, the two methods work as follows:
    PBC: Click the “Start PBC” button located on the Wi-Fi Protected Setup 
    page. Then, initiate the WPS procedure on the client device within 
    two minutes. Refer to your client’s documentation on this procedure. 
    Clicking the “Start PBC” button will automatically enable WPS. The 
    client has now been securely added to your wireless network.
    PIN: The client device has a PIN number (either four or eight digits) that 
    is associated with WPS. Enable WPS through the GUI. Enter the client’s 
    PIN into the Router’s internal registrar (accessed through this GUI). The 
    client will be automatically enrolled into your wireless network within 
    two  minutes. 
    						
    							55Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    1�  Wi-Fi Protected Setup (WPS): Enabled or Disabled.
    2 �  Personal Identification Number (PIN) Method: In this method, a 
    wireless client wishing to access your network must supply an 
    8-digit PIN to the Router. After clicking “Enroll”, you must start the 
    WPS handshaking procedure from the client within two minutes.
    3 �  Router PIN: If an external registrar is available, you may enter in the 
    Router’s PIN to the registrar. Click “Generate New PIN” to change 
    the PIN from the default value. Click “Restore Default PIN” to reset 
    the PIN value.
    4 �  Push Button Configuration (PBC) Method: PBC is an alternate 
    method to connect to a WPS network. Click the “Start PBC” button 
    to start this process. After clicking “Start PBC”, you must start the 
    WPS handshaking procedure from the client within two minutes.
    5 �  Manual Configuration Method: This section lists the current 
    security settings to set up in your client devices.
    The Router features WPA2, which is the second generation of the 
    WPA-based 802.11i standard. It offers a higher level of wireless security 
    by combining advanced network authentication and stronger Advanced 
    Encryption Standard (AES) encryption methods. WP
    a s etup
    note:  To use WPA security, all your clients must be upgraded to 
    drivers and software that support it. At the time of this User Manual’s 
    publication, a security patch download is available, for free, from 
    Microsoft
    ®. This patch works only with the Windows XP operating 
    system. You also need to download the latest driver for your Belkin 
    Wireless G Desktop or Notebook Network Card from the Belkin support 
    site. Other operating systems are not supported at this time. Microsoft’s 
    patch only supports devices with WPA-enabled drivers such as Belkin 
    802.11g products.
    WPA uses a so-called pre-shared key as the security key. A pre-shared 
    key is a password that is between eight and 63 characters long. It can 
    be a combination of letters, numbers, and other characters. Each client 
    uses the same key to access the network. Typically, this mode will be 
    used in a home environment.
    WPA2 is the second generation of WPA, offering a more advanced 
    encryption technique over WPA.   
    						
    							56Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    setting WP a/WP a2   Guest access ( optional) 
    The guest pre-shared key allows guest users Internet-only access to 
    restrict them from entering your network and having access to files on 
    your PCs. Enter your pre-shared key for guest access. This can be from 
    eight to 63 characters and can be letters, numbers, or symbols. Click 
    “Apply Changes” to finish.
    1� 
    Select “WPA / WPA2” from the “Allowed Client Type” 
    drop-down  box.
    2 �  Select “Password(PSK )” from the “Authentication” drop-down 
    box. Then, select “Passphrase(8~63 characters)” from the 
    “Password(PSK ) type” drop-down box.
    3 �  Enter your pre-shared key. This can be from eight to 63 characters 
    and can be letters, numbers, or symbols. This same key must 
    be used on all of the clients that you set up. This pre-shared key 
    will allow users full access to your network including shared files 
    and  printers.
    4 �  Click “Apply Changes” to finish. You must now set all clients to 
    match these settings. 
    						
    							57Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    setting up WP a for Wireless  desktop and Wireless  notebook Cards 
    that are no T Manufactured by belkin 
    If you do NOT have a Belkin WPA Wireless Desktop or Wireless 
    Notebook Card and it is not equipped with WPA-enabled software, 
    a file from Microsoft called “Windows XP Support Patch for Wireless 
    Protected Access” is available for free download. 
    Please  note:  The file that Microsoft has made available works only with 
    Windows XP. Other operating systems are not supported at this time. 
    Important:  You also need to ensure that the wireless card manufacturer 
    supports WPA and that you have downloaded and installed the latest 
    driver from their support site.
    Supported Operating Systems: 
    •	 Windows XP Professional
    •	 	 Windows XP Home Edition  s
    etting up Windows XP Wireless network Utility to use WP a-P sK
    In order to use WPA-PSK, ensure you are using the Windows Wireless 
    Network Utility by doing the following:
    1�  Under Windows XP, click “Start > Control Panel > 
    Network  Connections”.
    2 �  Right-click on “Wireless Network Connection Properties” and 
    select “Properties”.
    3�  Clicking on the “Wireless 
    Networks” tab will display 
    the following screen. 
    Ensure the “Use Windows 
    to configure my wireless 
    network settings” box 
    is checked.  
    						
    							58Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    4�  Under the “Wireless 
    Networks” tab, click the 
    “Configure” button and you 
    will see the following  screen.
    5�  For a home or small business user, select “WPA-PSK” under 
    “Network Authentication”. 
    note:  Select “WPA” if you are using this computer to connect to 
    a corporate network that supports an authentication server such 
    as a radius server. Please consult your network administrator for 
    further  information. 6
    �  Select “TKIP” or “AES” under “Data Encryption”. This setting will 
    have to be identical to the Router that you set up.
    7�   Type in your encryption key in the “Network key” box. 
    Important:  Enter your pre-shared key. This can be from eight to 63 
    characters and can be letters, numbers, or symbols. This same key 
    must be used on all of the clients that you set up.
    8 �  Click “OK” to apply settings. 
    						
    All Belkin manuals Comments (0)

    Related Manuals for Belkin Router F5D7234-4user Manual