Home > Belkin > Router > Belkin Router F5D7234-4user Manual

Belkin Router F5D7234-4user Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Belkin Router F5D7234-4user Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							59Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    Using the  access Point Mode
    note:  This advanced feature should be employed by advanced users 
    only. The Router can be configured to work as a wireless network 
    access point. Using this mode will defeat the NAT IP sharing feature 
    and DHCP server. In Access Point (AP) mode, the Router will need 
    to be configured with an IP address that is in the same subnet as 
    the rest of the network that you will bridge to. The default IP address 
    is 192.168.2.254 and subnet mask is 255.255.255.0. These can be 
    customized for your need.
    1�  Enable the AP mode my selecting “Enable” in the “Use as Access 
    Point only” page. When you select this option, you will be able to 
    change the IP settings.
    2 �  Set your IP settings to match your network. Click “Apply Changes”.
    3 �  Connect a cable from the “Modem” port on the Router to your 
    existing network.
    The Router is now acting as an access point. To access the Router’s 
    Web-Based Advanced User Interface again, type the IP address you 
    specified into your browser’s navigation bar. You can set the encryption 
    settings, MAC address filtering, SSID, and channel normally. 
    						
    							60Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    Configuring the  firewall
    Your Router is equipped with a firewall that will protect your network 
    from a wide array of common hacker attacks including:
    •	 IP Spoofing
    •	 SYN flood
    •	 Land Attack
    •	 UDP flooding
    •	 Ping of Death (PoD)
    •	 Tear Drop Attack
    •	 Denial of Service (DoS) 
    •	 ICMP defect
    •	 IP with zero length 
    •	 RIP defect
    •	 Smurf Attack
    •	 Fragment flooding
    •	 TCP Null Scan The firewall also masks common ports that are frequently used to 
    attack networks. These ports appear to be “Stealth”, meaning that for 
    all intents and purposes, they do not exist to a would-be hacker. You 
    can turn the firewall function off if needed; however, while disabling the 
    firewall protection will not leave your network completely vulnerable to 
    hacker attacks, it is recommended that you leave the firewall enabled. 
    						
    							61Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    Configuring Internal f orwarding settings
    The “Virtual Servers” function will allow you to route external (Internet) 
    calls for services such as a web server (port 80), FTP server (Port 21), or 
    other applications through your Router to your internal network. Since 
    your internal computers are protected by a firewall, computers outside 
    your network (over the Internet) cannot get to them because they cannot 
    be “seen.” You will need to contact the application vendor to find out 
    which port settings you need. e
    ntering s ettings into the Virtual s erver
    To enter settings, enter the IP address in the space provided for the 
    internal (server) machine, and the port(s) required to pass. Then select 
    the port type ( TCP or UDP), port number, check the “Enable” box, and 
    click “Set”. Opening ports in your firewall can pose a security risk. You 
    can enable and disable settings very quickly. It is recommended that 
    you disable the settings when you are not using a specific application.  
    						
    							62Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    setting Client IP f ilters
    The Router can be configured to restrict access to the Internet, email, or 
    other network services at specific days and times. Restriction can be set 
    for a single computer, a range of computers, or multiple computers.
    To restrict Internet access to a single computer, for example, enter the 
    IP address of the computer to which you wish to restrict access in the 
    IP fields. Next, enter “80” in both the port fields. Select “Both”. Select 
    “Block”. You can also select “Always” to block access all of the time. 
    Select the day to start on top, the time to start on top, the day to end on 
    the bottom, and the time to stop on the bottom. Select “Enable”. Click 
    “Apply Changes”. The computer at the IP address you specified will now 
    be blocked from Internet access at the times you specified. Note: Be 
    sure you have selected the correct time zone under “Utilities > System 
    Settings > Time Zone”. 
    						
    							63Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    s etting Ma C address  filtering
    The MAC address filter is a powerful security feature that allows you 
    to specify which computers are allowed on the network. Any computer 
    attempting to access the network that is not specified in the filter list 
    will be denied access. When you enable this feature, you must enter 
    the MAC address of each client (computer) on your network to allow 
    network access to each.
    To enable this feature, select “MAC Address Filtering” and click “Enable” 
    (1) . Next, select the MAC address you would like to add to the list from 
    the drop-down menu of currently connected computers, click “Copy to”, 
    and select the slot to which to add the MAC address  (2). You can also 
    manually enter the MAC address in the space provided  (3). Click “Apply 
    Changes” to save the settings. You can have a MAC-address-filtering list 
    of up to 32 computers.
    (1)
    (3) (2) 
    						
    							64Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    e nabling the  demilitarized Zone ( dMZ)
    The DMZ feature allows you to specify one computer on your network 
    to be placed outside of the firewall. This may be necessary if the 
    firewall is causing problems with an application such as a game or 
    video conferencing application. Use this feature on a temporary basis. 
    The computer in the DMZ is NOT protected from hacker attacks. Note: 
    If your ISP subscription provides you with additional public (WAN) IP 
    addresses, additional computers can be placed outside the firewall 
    provided each computer uses a different public (WAN) IP.
    To put a computer in the DMZ, enter the last digits of its IP address in 
    the IP field and select “Enable”. Click “Apply Changes” for the change to 
    take effect. 
    To put a computer in the DMZ, enter the last digits of its IP address in 
    the IP field and select “Enable”. Click “Apply Changes” for the change to 
    take effect. 
    						
    							65Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    Using  dynamic  dns
    The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS.org offers, allowing 
    your network computers to be more easily accessed from various locations on the Internet. DynDNS.org provides this service, for up to five host 
    names, free to the Internet community.
    The Dynamic DNS
    SM service is ideal for a home website, file server, or to make it easy to access your home PC and stored files while you’re at work. 
    Using the service can ensure that your host name always points to your IP address, no matter how often your ISP changes it. When your IP address 
    changes, your friends and associates can always locate you by visiting yourname.dyndns.org instead!
    setting up the Router’s d ynamic dns Update Client
    You must register with DynDNS.org’s free update service before using 
    this feature. Once you have your registration, follow the directions below.
    1�   Select DynDNS as the “DDNS Service”  (1).
    2�   Enter your DynDNS.org user name in the “User Name” field  (2).
    3�   Enter your DynDNS.org password in the “Password” field  (3).
    4�   Enter the DynDNS.org domain name you set up with DynDNS.org 
      in the “Domain Name” field  (4).
    5�   Click “Update Dynamic DNS” (5) to update your IP address.    
      Whenever your IP address assigned by your ISP changes, the   
      Router will automatically update DynDNS.org’s servers with your   
      new IP address. You can also do this manually by clicking the   
      “Update Dynamic DNS” button  (5).
    (1)
    (2)
    (3)
    (4)
    (5) 
    						
    							66Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    W an  Ping b locking
    Computer hackers use what is known as “pinging” to find potential 
    victims on the Internet. By pinging a specific IP address and receiving a 
    response from the IP address, a hacker can determine that something of 
    interest might be there. The Router can be set up so it will not respond 
    to an ICMP ping from the outside. This heightens the level of security of 
    your Router. Utilities Tab
    This screen lets you manage different parameters of the Router and 
    perform certain administrative functions. 
    To turn off the ping response, select “Block ICMP Ping” and click “Apply 
    Changes”. The Router will not respond to an ICMP ping.  
    						
    							67Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    Restarting the Router
    Sometimes it may be necessary to restart or reboot the Router if it 
    begins working improperly. Restarting or rebooting the Router will NOT 
    delete any of your configuration settings.Restoring f actory default settings
    Using this option will restore all of the settings in the Router to the 
    factory (default) settings. It is recommended that you back up your 
    settings before you restore all of the defaults. 
    						
    							68Wireless G Router
    sectionstable of c ontents1 2345 78910
    6
    Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
    saving a Current Configuration
    You can save your current configuration by using this feature. Saving 
    your configuration will allow you to restore it later if your settings are lost 
    or changed.
    1�  Click “Save”. A window 
    called “File Download” will 
    open. Click “Save”. 
    2�  A window will open that allows you to select the location where 
    you want to save the configuration file. Select a location. You can 
    name the file anything you want, or use the default name. Be sure 
    to name the file so you can locate it yourself later. When you have 
    selected the location and name of the file, click “Save”. 
    						
    All Belkin manuals Comments (0)

    Related Manuals for Belkin Router F5D7234-4user Manual