Home > Belkin > Router > Belkin Router F5D8233-4 User Manual

Belkin Router F5D8233-4 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Belkin Router F5D8233-4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    Using the Web-Based Advanced User Interface
    48
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    IMPORTANT:
      Make  sure  your  wireless  computers  are  updated  to  work 
    with  WPA2  and  have  the  correct  settings  to  get  proper  connection  to 
    the  Router.
    
    Setting WPA Security
    
    Note:
      To  use  WPA  security,  your  wireless  network  cards  must  be 
    equipped  with  software  that  supports  WPA.  At  the  time  this  User  Manual 
    was  published,  a  security  patch  from  Microsoft  is  available  for  free 
    download.  This  patch  works  only  with  Windows  XP.
    
    Your  Router  supports  WPA-Personal  (PSK),  which  uses  what  is  known 
    as  a  pre-shared  key  (PSK)  as  the  security  key.  A  pre-shared  key  is 
    basically  a  password  that  is  between  eight  and  63  characters  long.  It 
    can  be  a  combination  of  letters,  numbers,  or  characters.  Each  client 
    uses  the  same  key  to  access  the  network.  Typically  this  is  the  mode 
    that  will  be  used  in  a  home  environment.  
    						
    							
    49
    
    Using the Web-Based Advanced User Interface
    Using the Web-Based Advanced User Interface
    
    Setting WPA-PSK
    
    1.
       
    From the “Security Mode” drop-down menu, select “WPA/WPA-Personal 
    (PSK)”.
    
    2.
        For  “Encryption  Technique”,  select  “TKIP”  or  “AES”.  This  setting 
    will  have  to  be  identical  on  the  clients  that  you  set  up.
    
    3.
        Enter  your  pre-shared  key.  This  can  be  from  eight  to  63 
    characters  and  can  be  letters,  numbers,  or  symbols.  This  same 
    key  must  be  used  on  all  of  the  clients  that  you  set  up.
    
    4. 
    Click  “Apply  Changes”  to  finish.  You  must  now  set  all  clients  to 
    match  these  settings. 
    						
    							
    Using the Web-Based Advanced User Interface
    50
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Setting WEP Encryption
    
    Note  to  Mac  users:
      The  “Passphrase”  option  will  not  operate  with 
    Apple
    ®
      AirPort
    ®
    .  To  configure  encryption  for  your  Mac  computer,  set  the 
    encryption  using  the  manual  method  described  in  the  next  section.
    
    1.
       
    Select “128-bit WEP” or “64-bit WEP” from the drop-down menu.
    
    2.
        After  selecting  your  WEP  encryption  mode,  you  can  enter  you 
    WEP  key  manually  by  typing  in  the  hex  WEP  key  manually,  or 
    you  can  type  a  passphrase  in  the  “PassPhrase”  field  and  click 
    “Generate”  to  create  a  WEP  key  from  the  passphrase.  Click 
    “Apply  Changes”  to  finish.  You  must  now  set  all  of  your  clients  to 
    match  these  settings.
    
    3.
        Encryption  in  the  Router  is  now  set.  Each  of  your  computers  on 
    your  wireless  network  will  now  need  to  be  configured  with  the 
    same  passphrase.  Refer  to  the  documentation  of  your  wireless 
    network  adapter  for  information  on  making  this  change. 
    						
    							
    51
    
    Using the Web-Based Advanced User Interface
    Using the Web-Based Advanced User Interface
    
    Using a Hexadecimal Key
    A hexadecimal key is a mixture of numbers and letters from A–F 
    and 0–9. 64-bit keys are 10 digits long and can be divided into five 
    two-digit numbers. 128-bit keys are 26 digits long and can be divided 
    into 13 two-digit numbers.
    
    For instance:
    
    AF 0F 4B C3 D4 
    = 64-bit key
    C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 
    = 128-bit key
    
    In the boxes below, make up your key by writing in two characters 
    between A–F and 0–9. You will use this key to program the encryption 
    settings on your Router and your wireless computers.
    
    Note to Mac users:
     Original Apple AirPort products support 64-bit 
    encryption only. Apple AirPort 2 products can support 64-bit or 128-bit 
    encryption. Please check your product to see which version you are 
    using. If you cannot configure your network with 128-bit encryption, 
    try 64-bit encryption. 
    						
    							
    Using the Web-Based Advanced User Interface
    52
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Using the Access Point Mode
    
    Note: 
    This  advanced  feature  should  be  employed  by  advanced  users 
    only.  The  Router  can  be  configured  to  work  as  a  wireless  network 
    access  point.  Using  this  mode  will  defeat  the  NAT  IP  sharing  feature 
    and  DHCP  server.  In  Access  Point  (AP)  mode,  the  Router  will  need  to 
    be  configured  with  an  IP  address  that  is  in  the  same  subnet  as  the 
    rest  of  the  network  that  you  will  bridge  to.  The  default  IP  address 
    is  192.168.2.254  and  subnet  mask  is  255.255.255.0.  These  can  be 
    customized  for  your  need.
    
    1.
      Enable  the  AP  mode  my  selecting  “Enable”  in  the  “Use  as  Access 
    Point  only”  page.  When  you  select  this  option,  you  will  be  able  to 
    change  the  IP  settings.
    
    2.
      Set  your  IP  settings  to  match  your  network.  Click
    “Apply  Changes”.
    
    3.
      Connect  a  cable  from  the  “Modem”  port  on  the  Router  to  your 
    existing  network.
    
    The  Router  is  now  acting  as  an  access  point.  To  access  the  Router’s 
    Web-Based  Advanced  User  Interface  again,  type  the  IP  address 
    you  specified  into  your  browser’s  navigation  bar.  You  can  set  the 
    encryption  settings,  MAC  address  filtering,  SSID,  and 
    channel  normally. 
    						
    							
    53
    
    Using the Web-Based Advanced User Interface
    Using the Web-Based Advanced User Interface
    
    Setting MAC Address Control 
    
    The MAC address filter is a powerful security feature that allows you 
    to specify which computers are allowed on the wireless network. 
    Note:
     This list applies only to wireless computers. This list can be 
    configured so any computer attempting to access the wireless network 
    that is not specified in the filter list will be denied access. When you 
    enable this feature, you must enter the MAC address of each client 
    (computer) to which you want to allow network access. The “Block” 
    feature lets you tur n on and off access to the network easily for any 
    computer without having to add and remove the computer’s MAC 
    address from the list.
    
    (1)
    (2)
    
    (3)
    
    (4)
    
    (5) 
    						
    							
    Using the Web-Based Advanced User Interface
    54
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Setting up an Allow Access List
    1.
      Select  the  “Allow”  radio  button 
    (1)
      to  begin  setting  up  a  list  of 
    computers  allowed  to  connect  to  the  wireless  network. 
    
    2.
      Next,  in  the  “MAC  Address”  field  that  is  blank 
    (3)
    ,  type  in  the 
    MAC  address  of  the  wireless  computer  you  want  to  be  able  to 
    access  the  wireless  network,  then  click  “
    						
    							
    55
    
    Using the Web-Based Advanced User Interface
    Using the Web-Based Advanced User Interface
    
    Configuring the Firewall
    
    Your Router is equipped with a firewall that will protect your network 
    from a wide array of common hacker attacks including:
    
    •  IP Spoofing
    
    •  Land Attack Ping of Death (PoD)
    
    •  Denial of Service (DoS)
    
    •  IP with zero length
    
    •  Smurf Attack
    
    •  TCP Null Scan
    
    •  SYN flood
    
    •  UDP flooding
    
    •  Tear Drop Attack
    
    •  ICMP defect
    
    •  RIP defect
    
    •  Fragment flooding
    
    The firewall also masks common ports that are frequently used 
    to attack networks. These ports appear to be “stealth” meaning 
    that for all intents and purposes, they do not exist to a would-be 
    hacker. You can tur n the firewall function off if needed; however, it 
    is recommended that you leave the firewall enabled. Disabling the 
    firewall protection will not leave your network completely vulnerable
    to hacker attacks, but it is recommended that you leave the
    firewall enabled. 
    						
    							
    Using the Web-Based Advanced User Interface
    56
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Configuring Internal Forwarding Settings
    The Virtual Servers function will allow you to route exter nal (Inter net) 
    calls for services such as a web server (port 80), FTP server (Port 21), 
    or other applications through your Router to your inter nal network. 
    Since your inter nal computers are protected by a firewall, computers 
    outside your network (over the Inter net) cannot get to them because 
    they cannot be “seen”. A list of common applications has been 
    provided in case you need to configure the Virtual Server function 
    for a specific application. If your application is not listed, you will 
    need to contact the application vendor to find out which port settings 
    you need.
    
    Choosing an Application
    Select your application from the drop-down list. Click “Add”. The 
    settings will be transferred to the next available space in the screen. 
    Click “Apply Changes” to save the setting for that application. To 
    remove an application, select the number of the row that you want to 
    remove then click “Clear”.
    
    Manually Entering Settings into the Virtual Server
    To manually enter settings, enter the IP address in the space provided 
    for the inter nal (server) machine, the port(s) required to pass (use a 
    comma between multiple ports), select the port type (TCP or UDP), 
    and click “Apply Changes”. You can only pass one port per inter nal IP 
    address. Opening ports in your firewall can pose a security risk. You 
    can enable and disable settings very quickly. It is recommended that 
    you disable the settings when you are not using a specific application. 
    						
    							
    57
    
    Using the Web-Based Advanced User Interface
    Using the Web-Based Advanced User Interface
    
    Setting Client IP Filters
    The Router can be configured to restrict access to the Inter net, 
    email, or other network services at specific days and times. Restriction 
    can be set for a single computer, a range of computers, 
    or multiple computers. 
    
    To restrict Inter net access to a single computer for example, enter the 
    IP address of the computer you wish to restrict access to in the IP 
    fields 
    (1)
    . Next, enter “80” in both the port fields 
    (2)
    . Select “Both” 
    (3)
    . 
    Select “Block” 
    (4)
    . You can also select “Always” to block access all 
    of the time. Select the day to start on top 
    (5)
    , the time to start on top 
    (6)
    , the day to end on the bottom 
    (7)
    , and the time to stop 
    (8)
     on the 
    bottom. Select “Enable” 
    (9)
    .
     Click “Apply Changes”. The computer at 
    the IP address you specified will now be blocked from Inter net access 
    at the times you specified. 
    Note:
     Be sure you have selected the 
    correct time zone under “Utilities> System Settings> Time Zone”.
    
    (1)
    (2)
    (3)
    (4)
    (7)
    (8)
    (9)
    
    (5)
    (6) 
    						
    All Belkin manuals Comments (0)

    Related Manuals for Belkin Router F5D8233-4 User Manual