Home > Belkin > Router > Belkin Router F5D8633-4 User Manual

Belkin Router F5D8633-4 User Manual

Here you can view all the pages of manual Belkin Router F5D8633-4 User Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 51

4948
4948
Using the Web-Based Advanced User Interface
s e c t i o n
1
9
2
3
4
5
6
7
8
10

802.11e/WMM  (Wi-Fi®  Multimedia)  QoS 
WMM,  based  on  802.11e  QoS  (Quality  of  Service),  prioritizes  important 
data  on  your  network,  such  as  multimedia  content  and  voice-over-IP 
(VoIP),  so  it  will  not  be  interfered  with  by  other  data  being  sent  over 
the  network.  This  feature  requires  other  wireless  devices,  such  as  Wi-Fi 
phones  or  wireless  laptops,  to  support  WMM...

Page 52

5150
Using the Web-Based Advanced User Interface

5150

Setting WPA/WPA2-Personal (PSK)
Like  WPA  security,  WPA2  is  available  in  both  WPA2-Personal  (PSK) 
mode  and  WPA2-Enterprise  (RADIUS)  mode.  Typically,  WPA2-
Personal  (PSK)  is  the  mode  that  will  be  used  in  a  home  environment, 
while  WPA2-Enterprise  (RADIUS)  is  implemented  in  a  business 
environment  where  an  external  radius  server  distributes  the  network 
key  to  the  clients  automatically.  This  guide  will...

Page 53

5150
5150
Using the Web-Based Advanced User Interface
s e c t i o n
1
9
2
3
4
5
6
7
8
10

IMPORTANT:  Make  sure  your  wireless  computers  are  updated  to  work 
with  WPA2  and  have  the  correct  settings  to  get  proper  connection  to 
the  Router.
Setting WPA Security
Note:  To  use  WPA  security,  your  wireless  network  cards  must  be 
equipped  with  software  that  supports  WPA.  At  the  time  this  User  Manual 
was  published,  a  security  patch  from  Microsoft  is  available  for...

Page 54

5352
Using the Web-Based Advanced User Interface

5352

Setting WPA-PSK
1.   From the “Security Mode” drop-down menu, select “WPA-PSK (no 
server)”.
2.    For  “Encryption  Technique”,  select  “TKIP”  or  “AES”.  This  setting 
will  have  to  be  identical  on  the  clients  that  you  set  up.
3.    Enter  your  pre-shared  key.  This  can  be  from  eight  to  39 characters  and  can  be  letters,  numbers,  or  symbols.  This  same 
key  must  be  used  on  all  of  the  clients  that  you  set...

Page 55

5352
5352
Using the Web-Based Advanced User Interface
s e c t i o n
1
9
2
3
4
5
6
7
8
10

Setting WEP Encryption
Note  to  Mac  users:  The  “Passphrase”  option  will  not  operate  with 
Apple®  AirPort®.  To  configure  encryption  for  your  Mac  computer,  set  the 
encryption  using  the  manual  method  described  in  the  next  section.
1.    Select “128-bit WEP” or “64-bit WEP” from the drop-down menu.
2.    After  selecting  your  WEP  encryption  mode,  you  can  enter  your 
WEP  key...

Page 56

5554
Using the Web-Based Advanced User Interface

5554

Using a Hexadecimal KeyA hexadecimal key is a mixture of numbers and letters from A–F and 
0–9. 64-bit keys are 10 digits long and can be divided into five two-
digit numbers. 128-bit keys are 26 digits long and can be divided into 
13 two-digit numbers.
For instance:
AF 0F 4B C3 D4 = 64-bit key
 
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7  = 128-bit key
In the boxes below, make up your key by writing in two characters 
between A–F and 0–9. You will...

Page 57

5554
5554
Using the Web-Based Advanced User Interface
s e c t i o n
1
9
2
3
4
5
6
7
8
10

Using the Access Point Mode
Note: This  advanced  feature  should  be  employed  by  advanced  users 
only.  The  Router  can  be  configured  to  work  as  a  wireless  network 
access  point.  Using  this  mode  will  defeat  the  NAT  IP  sharing  feature 
and  DHCP  server.  In  Access  Point  (AP)  mode,  the  Router  will  need 
to  be  configured  with  an  IP  address  that  is  in  the  same  subnet  as...

Page 58

5756
Using the Web-Based Advanced User Interface

5756

Setting MAC Address Control
The MAC address filter is a powerful security feature that allows you 
to specify which computers are allowed on the wireless network. 
Note: This list applies only to wireless computers. This list can be 
configured so any computer attempting to access the wireless network 
that is not specified in the filter list will be denied access. When you 
enable this feature, you must enter the MAC address of each client...

Page 59

5756
5756
Using the Web-Based Advanced User Interface
s e c t i o n
1
9
2
3
4
5
6
7
8
10

 
  Setting up a Deny Access List
 The  “Deny  Access”  list  lets  you  specify  computers  that  you  DO 
NOT  want  to  access  the  network.  Any  computer  in  the  list  will  not 
be  allowed  access  to  the  wireless  network.  All  others  will.
1.  Select  the  “Deny”  radio  button (1)  to  begin  setting  up  a  list  of 
computers  to  be  denied  access  to  the  wireless  network.
2.  Next,  in  the...

Page 60

5958
Using the Web-Based Advanced User Interface

5958

Configuring the Firewall
Your Router is equipped with a firewall that will protect your network 
from a wide array of common hacker attacks including:
•  IP Spoofing
•  Land Attack Ping of Death (PoD)
•  Denial of Service (DoS)
•  IP with zero length
•  Smurf Attack
•  TCP Null Scan
•  SYN flood
•  UDP flooding
•  Tear Drop Attack
•  ICMP defect
•  RIP defect
•  Fragment flooding
The firewall also masks common ports that are frequently used to...
Start reading Belkin Router F5D8633-4 User Manual

Related Manuals for Belkin Router F5D8633-4 User Manual

All Belkin manuals