Home > Belkin > Router > Belkin Router F5D8633-4 User Manual

Belkin Router F5D8633-4 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Belkin Router F5D8633-4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 606
    							
    4948
    4948
    Using the Web-Based Advanced User Interface
    s e c t i o n
    1
    9
    2
    3
    4
    5
    6
    7
    8
    10
    
    802.11e/WMM  (Wi-Fi®  Multimedia)  QoS 
    WMM,  based  on  802.11e  QoS  (Quality  of  Service),  prioritizes  important 
    data  on  your  network,  such  as  multimedia  content  and  voice-over-IP 
    (VoIP),  so  it  will  not  be  interfered  with  by  other  data  being  sent  over 
    the  network.  This  feature  requires  other  wireless  devices,  such  as  Wi-Fi 
    phones  or  wireless  laptops,  to  support  WMM  for  best  results.
    Changing the Wireless Security Settings 
    Your  Router  is  equipped  with  the  latest  security  standard  called  Wi-
    Fi  Protected  Access  2  (WPA2).  It  also  supports  the  legacy  security 
    standard  called  Wired  Equivalent  Privacy  (WEP).  By  default,  wireless 
    security  is  disabled.  To  enable  security,  you  will  need  to  determine 
    which  standard  you  want  to  use.  To  access  the  security  settings,  click 
    “Security”  on  the  “Wireless”  tab.
    The  Router  features  WPA2,  which  is  the  second  generation  of  the 
    WPA-based  802.11i  standard.  It  offers  a  higher  level  of  wireless 
    security  by  combining  advanced  network  authentication  and  stronger 
    Advanced  Encryption  Standard  (AES)  encryption  methods.
    WPA2 Requirements
    IMPORTANT:  In  order  to  use  WPA2  security,  all  your  computers  and 
    wireless  client  adapters  must  be  upgraded  with  patches,  driver, 
    and  client  utility  software  that  supported  WPA2.  At  the  time  of  this 
    User  Manual’s  publication,  a  couple  security  patches  are  available, 
    for  free  download,  from  Microsoft
    ®.  These  patches  work  only  with 
    the  Windows  XP  operating  system.  Other  operating  systems  are  not 
    supported  at  this  time.
    For  Windows  XP  computers  that  do  not  have  Service  Pack  2 
    (SP2),  a  file  from  Microsoft  called  “Windows  XP  Support  Patch 
    for  Wireless  Protected  Access  (KB  826942)”  is  available  for  free 
    download  at  http://support.microsoft.com/kb/826942
    For  Windows  XP  with  Service  Pack  2,  Microsoft  has  released 
    a  free  download  to  update  the  wireless  client  components  to 
    support  WPA2  (KB971021).  The  update  is  available  from:
     
    http://support.microsoft.com/kb/917021
    IMPORTANT:  You  also  need  to  ensure  that  all  your  wireless  client 
    cards/adapters  support  WPA2,  and  that  you  have  downloaded  and 
    installed  the  latest  driver.  Most  of  the  Belkin  wireless  cards  have 
    driver  updates  available  for  download  from  the  Belkin  support  site: 
    www.belkin.com/networking. 
    						
    							
    5150
    Using the Web-Based Advanced User Interface
    
    5150
    
    Setting WPA/WPA2-Personal (PSK)
    Like  WPA  security,  WPA2  is  available  in  both  WPA2-Personal  (PSK) 
    mode  and  WPA2-Enterprise  (RADIUS)  mode.  Typically,  WPA2-
    Personal  (PSK)  is  the  mode  that  will  be  used  in  a  home  environment, 
    while  WPA2-Enterprise  (RADIUS)  is  implemented  in  a  business 
    environment  where  an  external  radius  server  distributes  the  network 
    key  to  the  clients  automatically.  This  guide  will  focus  on  WPA2-
    Personal  (PSK)  usage.  Please  refer  to  the  User  Manual  for  more 
    information  about  wireless  security  and  different  types  of  wireless 
    security.
    1. After  you’ve  set  up  your  Router,  go  to  the  “Security”  page  under 
    “Wireless”  and  select  “WPA/WPA2-Personal  (PSK)”  from  the 
    “Security  Mode”  drop-down  menu.
    2.  For  “Authentication”,  select  “WPA-PSK”,  “WPA2-PSK”,  or  “WPA-PSK  +  WPA2-PSK”.  This  setting  will  have  to  be  identical  on  the 
    wireless  clients  that  you  set  up.  “WPA-PSK  +  WPA2-PSK”  mode 
    will  allow  the  Router  to  support  clients  running  either  WPA  or 
    WPA2  security.
    3.   “Encryption  Technique”,  select  “TKIP”,    “AES”,  or  “TKIP+AES”. This  setting  will  have  to  be  identical  on  the  wireless  clients  that 
    you  set  up.
    4.  Enter  your  pre-shared  key  (PSK).  This  can  be  from  eight  to  63  characters  and  can  be  letters,  numbers,  or  symbols.  This  same 
    key  must  be  used  on  all  of  the  wireless  clients  that  you  set  up. 
    For  example,  your  PSK  might  be  something  like:  “Smith  family 
    network  key”.  Click  “Apply  Changes”  to  finish.  You  must  now  set 
    all  wireless  clients  to  match  these  settings. 
    						
    							
    5150
    5150
    Using the Web-Based Advanced User Interface
    s e c t i o n
    1
    9
    2
    3
    4
    5
    6
    7
    8
    10
    
    IMPORTANT:  Make  sure  your  wireless  computers  are  updated  to  work 
    with  WPA2  and  have  the  correct  settings  to  get  proper  connection  to 
    the  Router.
    Setting WPA Security
    Note:  To  use  WPA  security,  your  wireless  network  cards  must  be 
    equipped  with  software  that  supports  WPA.  At  the  time  this  User  Manual 
    was  published,  a  security  patch  from  Microsoft  is  available  for  free 
    download.  This  patch  works  only  with  Windows  XP.
    Your  Router  supports  WPA-PSK  (no  server).  WPA-PSK  uses  what  is 
    known  as  a  pre-shared  key  as  the  security  key.  A  pre-shared  key  is 
    basically  a  password  that  is  between  eight  and  39  characters  long.  It 
    can  be  a  combination  of  letters,  numbers,  or  characters.  Each  client 
    uses  the  same  key  to  access  the  network.  Typically  this  is  the  mode 
    that  will  be  used  in  a  home  environment. 
    						
    							
    5352
    Using the Web-Based Advanced User Interface
    
    5352
    
    Setting WPA-PSK
    1.   From the “Security Mode” drop-down menu, select “WPA-PSK (no 
    server)”.
    2.    For  “Encryption  Technique”,  select  “TKIP”  or  “AES”.  This  setting 
    will  have  to  be  identical  on  the  clients  that  you  set  up.
    3.    Enter  your  pre-shared  key.  This  can  be  from  eight  to  39 characters  and  can  be  letters,  numbers,  or  symbols.  This  same 
    key  must  be  used  on  all  of  the  clients  that  you  set  up.
    4. Click  “Apply  Changes”  to  finish.  You  must  now  set  all  clients  to 
    match  these  settings. 
    						
    							
    5352
    5352
    Using the Web-Based Advanced User Interface
    s e c t i o n
    1
    9
    2
    3
    4
    5
    6
    7
    8
    10
    
    Setting WEP Encryption
    Note  to  Mac  users:  The  “Passphrase”  option  will  not  operate  with 
    Apple®  AirPort®.  To  configure  encryption  for  your  Mac  computer,  set  the 
    encryption  using  the  manual  method  described  in  the  next  section.
    1.    Select “128-bit WEP” or “64-bit WEP” from the drop-down menu.
    2.    After  selecting  your  WEP  encryption  mode,  you  can  enter  your 
    WEP  key  manually  by  typing  in  the  hex  values  in  the  space 
    provided,  or  you  can  type  a  passphrase  in  the  “PassPhrase”  field 
    and  click  “Generate”  to  create  a  WEP  key  from  the  passphrase. 
    Click  “Apply  Changes”  to  finish.  You  must  now  set  all  of  your 
    clients  to  match  these  settings.
    3.    Encryption  in  the  Router  is  now  set.  Each  of  your  computers  on your  wireless  network  will  now  need  to  be  configured  with  the 
    same  passphrase.  Refer  to  the  documentation  of  your  wireless 
    network  adapter  for  information  on  making  this  change. 
    						
    							
    5554
    Using the Web-Based Advanced User Interface
    
    5554
    
    Using a Hexadecimal KeyA hexadecimal key is a mixture of numbers and letters from A–F and 
    0–9. 64-bit keys are 10 digits long and can be divided into five two-
    digit numbers. 128-bit keys are 26 digits long and can be divided into 
    13 two-digit numbers.
    For instance:
    AF 0F 4B C3 D4 = 64-bit key
     
    C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7  = 128-bit key
    In the boxes below, make up your key by writing in two characters 
    between A–F and 0–9. You will use this key to program the encryption 
    settings on your Router and your wireless computers.
    Note to Mac users:  Original Apple AirPort products support 64-
    bit encryption only. Apple AirPort 2 products can support 64-bit or 
    128-bit encryption. Please check your product to see which version 
    you are using. If you cannot configure your network with 128-bit 
    encryption, try 64-bit encryption. 
    						
    							
    5554
    5554
    Using the Web-Based Advanced User Interface
    s e c t i o n
    1
    9
    2
    3
    4
    5
    6
    7
    8
    10
    
    Using the Access Point Mode
    Note: This  advanced  feature  should  be  employed  by  advanced  users 
    only.  The  Router  can  be  configured  to  work  as  a  wireless  network 
    access  point.  Using  this  mode  will  defeat  the  NAT  IP  sharing  feature 
    and  DHCP  server.  In  Access  Point  (AP)  mode,  the  Router  will  need 
    to  be  configured  with  an  IP  address  that  is  in  the  same  subnet  as 
    the  rest  of  the  network  that  you  will  bridge  to.  The  default  IP  address 
    is  192.168.2.254  and  subnet  mask  is  255.255.255.0.  These  can  be 
    customized  for  your  need.
    1.  Enable  the  AP  mode  my  selecting  “Enable” (1)  in  the  “Use  as 
    Access  Point  only”  page.  When  you  select  this  option,  you  will  be 
    able  to  change  the  IP  settings.
    2.  Set  your  IP  settings  to  match  your  network.  Click  “Apply  Changes” (2).
    3.  Connect  a  cable  from  the  “Modem”  port  on  the  Router  to  your existing  network.
    The  Router  is  now  acting  as  an  access  point.  To  access  the  Router’s 
    Web-Based  Advanced  User  Interface  again,  type  the  IP  address 
    you  specified  into  your  browser’s  navigation  bar.  You  can  set  the 
    encryption  settings,  MAC  address  filtering,  SSID,  and  channel 
    normally.
    (2)
    (1) 
    						
    							
    5756
    Using the Web-Based Advanced User Interface
    
    5756
    
    Setting MAC Address Control
    The MAC address filter is a powerful security feature that allows you 
    to specify which computers are allowed on the wireless network. 
    Note: This list applies only to wireless computers. This list can be 
    configured so any computer attempting to access the wireless network 
    that is not specified in the filter list will be denied access. When you 
    enable this feature, you must enter the MAC address of each client 
    (computer) to which you want to allow network access. The “Block” 
    feature lets you turn on and off access to the network easily for any 
    computer without having to add and remove the computer’s MAC 
    address from the list.
    Setting up an Allow Access List
    1.  Select  the  “Allow”  radio  button (1)  to  begin  setting  up  a  list  of 
    computers  allowed  to  connect  to  the  wireless  network. 
    2.  Next,  in  the  “MAC  Address”  field  that  is  blank (2),  type  in  the 
    MAC  address  of  the  wireless  computer  you  want  to  be  able  to 
    access  the  wireless  network,  then  click  “
    						
    							
    5756
    5756
    Using the Web-Based Advanced User Interface
    s e c t i o n
    1
    9
    2
    3
    4
    5
    6
    7
    8
    10
    
     
      Setting up a Deny Access List
     The  “Deny  Access”  list  lets  you  specify  computers  that  you  DO 
    NOT  want  to  access  the  network.  Any  computer  in  the  list  will  not 
    be  allowed  access  to  the  wireless  network.  All  others  will.
    1.  Select  the  “Deny”  radio  button (1)  to  begin  setting  up  a  list  of 
    computers  to  be  denied  access  to  the  wireless  network.
    2.  Next,  in  the  “MAC  Address”  field  that  is  blank (2),  type  in  the 
    MAC  address  of  the  wireless  computer  you  want  to  deny  access 
    to  the  wireless  network,  then  click  “
    						
    							
    5958
    Using the Web-Based Advanced User Interface
    
    5958
    
    Configuring the Firewall
    Your Router is equipped with a firewall that will protect your network 
    from a wide array of common hacker attacks including:
    •  IP Spoofing
    •  Land Attack Ping of Death (PoD)
    •  Denial of Service (DoS)
    •  IP with zero length
    •  Smurf Attack
    •  TCP Null Scan
    •  SYN flood
    •  UDP flooding
    •  Tear Drop Attack
    •  ICMP defect
    •  RIP defect
    •  Fragment flooding
    The firewall also masks common ports that are frequently used to 
    attack networks. These ports appear to be “stealth” meaning that 
    for all intents and purposes, they do not exist to a would-be hacker. 
    Disabling the firewall protection will not leave your network completely 
    vulnerable to hacker attacks, but it is recommended that you leave the 
    firewall enabled. 
    						
    All Belkin manuals Comments (0)

    Related Manuals for Belkin Router F5D8633-4 User Manual