Home > Belkin > Router > Belkin Router F5D8233-4 User Manual

Belkin Router F5D8233-4 User Manual

Here you can view all the pages of manual Belkin Router F5D8233-4 User Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 51

Using the Web-Based Advanced User Interface
48
s e c t i o n
2
1
3
4
5
6
7
8
9
10

IMPORTANT:
  Make  sure  your  wireless  computers  are  updated  to  work 
with  WPA2  and  have  the  correct  settings  to  get  proper  connection  to 
the  Router.

Setting WPA Security

Note:
  To  use  WPA  security,  your  wireless  network  cards  must  be 
equipped  with  software  that  supports  WPA.  At  the  time  this  User  Manual 
was  published,  a  security  patch  from  Microsoft  is  available  for...

Page 52

49

Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface

Setting WPA-PSK

1.
   
From the “Security Mode” drop-down menu, select “WPA/WPA-Personal 
(PSK)”.

2.
    For  “Encryption  Technique”,  select  “TKIP”  or  “AES”.  This  setting 
will  have  to  be  identical  on  the  clients  that  you  set  up.

3.
    Enter  your  pre-shared  key.  This  can  be  from  eight  to  63 
characters  and  can  be  letters,  numbers,  or  symbols.  This  same 
key  must  be...

Page 53

Using the Web-Based Advanced User Interface
50
s e c t i o n
2
1
3
4
5
6
7
8
9
10

Setting WEP Encryption

Note  to  Mac  users:
  The  “Passphrase”  option  will  not  operate  with 
Apple
®
  AirPort
®
.  To  configure  encryption  for  your  Mac  computer,  set  the 
encryption  using  the  manual  method  described  in  the  next  section.

1.
   
Select “128-bit WEP” or “64-bit WEP” from the drop-down menu.

2.
    After  selecting  your  WEP  encryption  mode,  you  can  enter  you 
WEP  key...

Page 54

51

Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface

Using a Hexadecimal Key
A hexadecimal key is a mixture of numbers and letters from A–F 
and 0–9. 64-bit keys are 10 digits long and can be divided into five 
two-digit numbers. 128-bit keys are 26 digits long and can be divided 
into 13 two-digit numbers.

For instance:

AF 0F 4B C3 D4 
= 64-bit key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 
= 128-bit key

In the boxes below, make up your key by writing in two...

Page 55

Using the Web-Based Advanced User Interface
52
s e c t i o n
2
1
3
4
5
6
7
8
9
10

Using the Access Point Mode

Note: 
This  advanced  feature  should  be  employed  by  advanced  users 
only.  The  Router  can  be  configured  to  work  as  a  wireless  network 
access  point.  Using  this  mode  will  defeat  the  NAT  IP  sharing  feature 
and  DHCP  server.  In  Access  Point  (AP)  mode,  the  Router  will  need  to 
be  configured  with  an  IP  address  that  is  in  the  same  subnet  as  the...

Page 56

53

Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface

Setting MAC Address Control 

The MAC address filter is a powerful security feature that allows you 
to specify which computers are allowed on the wireless network. 
Note:
 This list applies only to wireless computers. This list can be 
configured so any computer attempting to access the wireless network 
that is not specified in the filter list will be denied access. When you 
enable this feature, you must...

Page 57

Using the Web-Based Advanced User Interface
54
s e c t i o n
2
1
3
4
5
6
7
8
9
10

Setting up an Allow Access List
1.
  Select  the  “Allow”  radio  button 
(1)
  to  begin  setting  up  a  list  of 
computers  allowed  to  connect  to  the  wireless  network. 

2.
  Next,  in  the  “MAC  Address”  field  that  is  blank 
(3)
,  type  in  the 
MAC  address  of  the  wireless  computer  you  want  to  be  able  to 
access  the  wireless  network,  then  click  “

Page 58

55

Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface

Configuring the Firewall

Your Router is equipped with a firewall that will protect your network 
from a wide array of common hacker attacks including:

•  IP Spoofing

•  Land Attack Ping of Death (PoD)

•  Denial of Service (DoS)

•  IP with zero length

•  Smurf Attack

•  TCP Null Scan

•  SYN flood

•  UDP flooding

•  Tear Drop Attack

•  ICMP defect

•  RIP defect

•  Fragment flooding

The firewall also...

Page 59

Using the Web-Based Advanced User Interface
56
s e c t i o n
2
1
3
4
5
6
7
8
9
10

Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route exter nal (Inter net) 
calls for services such as a web server (port 80), FTP server (Port 21), 
or other applications through your Router to your inter nal network. 
Since your inter nal computers are protected by a firewall, computers 
outside your network (over the Inter net) cannot get to them because 
they cannot be “seen”....

Page 60

57

Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface

Setting Client IP Filters
The Router can be configured to restrict access to the Inter net, 
email, or other network services at specific days and times. Restriction 
can be set for a single computer, a range of computers, 
or multiple computers. 

To restrict Inter net access to a single computer for example, enter the 
IP address of the computer you wish to restrict access to in the IP 
fields 
(1)
. Next,...
Start reading Belkin Router F5D8233-4 User Manual

Related Manuals for Belkin Router F5D8233-4 User Manual

All Belkin manuals