Home > Belkin > Router > Belkin Router F5D8236-4 User Manual

Belkin Router F5D8236-4 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Belkin Router F5D8236-4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							49N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    s etting M aC  address Control 
    The MAC address filter is a powerful security feature that allows you to 
    specify which computers are allowed on the wireless network.  Note: 
    This list applies only to wireless computers. This list can be configured 
    so any computer attempting to access the wireless network that is not 
    specified in the filter list will be denied access. When you enable this 
    feature, you must enter the MAC address of each client (computer) to 
    which you want to allow network access. The “Block” feature lets you 
    turn on and off access to the network easily for any computer without 
    having to add and remove the computer’s MAC address from the list.
    (a)(b)
    (c)
    (d)
    (e)
    s etting up an  allow  access  list  
    1�  Select the “Allow” radio button (a) to begin setting up a list 
    of computers allowed to connect to the wireless network.
    2 �  Next, in the “MAC Address” field that is blank (c), type in the 
    MAC address of the wireless computer you want to be able 
    to access the wireless network, then click “
    						
    							50N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    setting up a  deny  access  list  
    The “Deny Access” list lets you specify computers that you DO NOT 
    want to access the network. Any computer in the list will not be allowed 
    access to the wireless network. All others will. 
    1�  Select the “Deny” radio button (b) to begin setting up a list of 
    computers to be denied access to the wireless network.
    2 �  Next, in the “MAC Address” field that is blank (c), type in the 
    MAC address of the wireless computer you want to deny 
    access to the wireless network, then click “
    						
    							51N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    The firewall also masks common ports that are frequently used to 
    attack networks. These ports appear to be “stealth” meaning that for 
    all intents and purposes, they do not exist to a would-be hacker. You 
    can turn the firewall function off if needed; however, it is recommended 
    that you leave the firewall enabled. Disabling the firewall protection will 
    not leave your network completely vulnerable to hacker attacks, but it is 
    recommended that you leave the firewall enabled. Configuring Internal f
    orwarding settings
    The Virtual Servers function will allow you to route external (Internet) 
    calls for services such as a web server (port 80), FTP server (Port 21), or 
    other applications through your Router to your internal network. Since 
    your internal computers are protected by a firewall, computers outside 
    your network (over the Internet) cannot get to them because they cannot 
    be “seen”. A list of common applications has been provided in case you 
    need to configure the Virtual Server function for a specific application. 
    If your application is not listed, you will need to contact the application 
    vendor to find out which port settings you need. 
    						
    							52N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    Choosing an a pplication
    Select your application from the drop-down list. Click “Add”. The 
    settings will be transferred to the next available space in the screen. 
    Click “Apply Changes” to save the setting for that application. To remove 
    an application, select the number of the row that you want to remove 
    then click “Clear”.
    Manually e ntering settings into the Virtual s erver
    To manually enter settings, enter the IP address in the space provided 
    for the internal (server) machine, the port(s) required to pass (use a 
    comma between multiple ports), select the port type ( TCP or UDP), 
    and click “Apply Changes”. You can only pass one port per internal IP 
    address. Opening ports in your firewall can pose a security risk. You can 
    enable and disable settings very quickly. It is recommended that you 
    disable the settings when you are not using a specific application. s
    etting Client IP f ilters
    The Router can be configured to restrict access to the Internet, email, or 
    other network services at specific days and times. Restriction can be set 
    for a single computer, a range of computers, or multiple computers. 
    						
    							53N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    To restrict Internet access to a single computer for example, enter the 
    IP address of the computer you wish to restrict access to in the IP fields 
    (1). Next, enter “80” in both the port fields (2). Select “Both” (3). Select 
    “Block” (4). You can also select “Always” to block access all of the time. 
    Select the day to start on top (5), the time to start on top (6), the day to 
    end on the bottom (7), and the time to stop (8) on the bottom. Select 
    “Enable” (9). Click “Apply Changes”. The computer at the IP address 
    you specified will now be blocked from Internet access at the times you 
    specified.  Note: Be sure you have selected the correct time zone under 
    “Utilities> System Settings> Time Zone”.
    (1) (2)(3)(4) (7)
    (8)(9)
    (5)
    (6)
    e
    nabling the  demilitarized Zone ( dMZ)
    The DMZ feature allows you to specify one computer on your network 
    to be placed outside of the firewall. This may be necessary if the firewall 
    is causing problems with an application such as a game or video 
    conferencing application. Use this feature on a temporary basis. The 
    computer in the DMZ is  NoT  protected from hacker attacks.
    To put a computer in the DMZ, enter the last digits of its IP address in 
    the IP field and select “Enable”. Click “Apply Changes” for the change 
    to take effect. If you are using multiple static WAN IP addresses, it is 
    possible to select which WAN IP address the DMZ host will be directed 
    to. Type in the WAN IP address you wish the DMZ host to direct to, enter 
    the last two digits of the IP address of the DMZ host computer, select 
    “Enable” and click “Apply Changes”.  
    						
    							54N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    Using  dynamic  dN s   
    The Dynamic DNS service allows you to alias a dynamic IP address 
    to a static host name in any of the many domains DynDNS.org offers, 
    allowing your network computers to be more easily accessed from 
    various locations on the Internet. DynDNS.org provides this service, for 
    up to five host names, free to the Internet community.
    The Dynamic DNS
    SM service is ideal for a home website, file server, or 
    to make it easy to access your home PC and stored files while you’re at 
    work. Using the service can ensure that your host name always points to 
    your IP address, no matter how often your ISP changes it. When your IP 
    address changes, your friends and associates can always locate you by 
    visiting yourname.dyndns.org instead! s
    etting up the Router’s d ynamic dNs Update Client   
    You must register with DynDNS.org’s free update service before using 
    this feature. Once you have your registration, follow the directions below. 
    1�  Select DynDNS as the “DDNS Service” (1).
    2 �  Enter your DynDNS.org user name in the “User Name” field (2). 
    3 �  Enter your DynDNS.org password in the “Password” field (3). 
    4 �  Enter the DynDNS.org domain name you set up with 
    DynDNS.org in the “Domain Name” field (4). 
    5 �  Click “Update Dynamic DNS” (5) to update your IP address. 
    Whenever your IP address assigned by your ISP changes, the Router will 
    automatically update DynDNS.org’s servers with your new IP address. 
    You can also do this manually by clicking the “Update Dynamic DNS” 
    button (5). 
    (1)
    (4)
    (2)(3)
    (5)
    To register free for your Dynamic DNS host name, please visit 
    http://www.dyndns.org. 
    						
    							55N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    blocking an ICMP Ping    
    Computer hackers use what is known as “pinging” to find potential 
    victims on the Internet. By pinging a specific IP address and receiving a 
    response from the IP address, a hacker can determine that something of 
    interest might be there. The Router can be set up so it will not respond 
    to an ICMP ping from the outside. This heightens your Router’s 
    security level.
    (1)
    To turn off the ping response, select “Block ICMP Ping” (1) and click 
    “Apply Changes”. The Router will not respond to an ICMP ping. 
    Utilities
    The “Utilities” screen lets you manage different parameters of the Router 
    and perform certain administrative functions.  
    						
    							56N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    Restarting the Router
    Sometimes it may be necessary to restart or reboot the Router if it begins working improperly. 
    Restarting or rebooting the Router will NOT delete any of your configuration settings. 2�  The following message will appear. Click “OK”.
    Restarting the Router to Restore Normal o
    peration 
    1�  Click the “Restart Router” button. 
    						
    							57N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    3�   The following message will appear. Restarting the Router can take 
    up to 60 seconds. It is important not to turn off the power to the 
    Router during the restart.
    4�  A 60-second countdown will appear on the screen. When the 
    countdown reaches zero, the Router will be restarted. The Router 
    home page should appear automatically. If not, type in the 
    Router’s address (default = 192.168.2.1) into the navigation bar of 
    your browser. Restoring f
    actory default settings
    Using this option will restore all of the settings in the Router to the 
    factory (default) settings. It is recommended that you back up your 
    settings before you restore all of the defaults.
    1�  Click the “Restore Defaults” button. 
    						
    							58N Wireless Router
    sectionstable of c ontents1 2345 789106
    UsINg TH e Web- based  ad Va NC ed Use R INT eR fa Ce 
    2�  The following message will appear. Click “OK”.
    3�  The following message will appear. Restoring the defaults includes 
    restarting the Router. It can take up to 60 seconds. It is important 
    not to turn the power to the Router off during the restart. 
    4�  A 60-second countdown will appear on the screen. When the 
    countdown reaches zero, the Router’s defaults will be restored. 
    The Router home page should appear automatically. If it does 
    not, type in the Router’s address (default = 192.168.2.1) into the 
    navigation bar of your browser. 
    						
    All Belkin manuals Comments (0)

    Related Manuals for Belkin Router F5D8236-4 User Manual