Home > Belkin > Router > Belkin Router F6D4230-4 User Manual

Belkin Router F6D4230-4 User Manual

Here you can view all the pages of manual Belkin Router F6D4230-4 User Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 51

49Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
setting M aC  address Control 
The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network � note: This list applies only to wireless computers� This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access� When you enable this...

Page 52

50Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
setting up a d eny access l ist
The “Deny Access” list lets you specify computers that you DO NOT want to access the network � Any computer in the list will not be allowed access to the wireless network� All others will�
(1)(2)
(3)
(5)
(4)
1� Select the “Deny” radio button (2) to begin setting up a list of computers to be denied access to the wireless network � 
2� Next, in the “MAC...

Page 53

51Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
Configuring the  firewall
Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:
•	IP Spoofing
•	Land Attack Ping of Death (PoD)
•	Denial of Service (DoS)
•	IP with zero length
•	Smurf Attack
•	TCP Null Scan
•	SYN flood
•	UDP flooding
•	Tear Drop Attack
•	ICMP defect
•	RIP defect
•	Fragment flooding
The firewall also...

Page 54

52Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
Configuring Internal f orwarding settings
The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network � Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them...

Page 55

53Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
setting Client IP f ilters
The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times � Restriction can be set for a single computer, a range of computers, or multiple computers � 
To restrict Internet access to a single computer for example, enter the IP address of the computer you wish to restrict access to in the IP...

Page 56

54Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
Enabling the  demilitarized Zone ( dMZ)
The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall � This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application� Use this feature on a temporary basis� The computer in the DMZ is NOT protected from hacker attacks �
To put a...

Page 57

55Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
Using  dynamic  dns 
The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS �org offers, allowing your network computers to be more easily accessed from various locations on the Internet � DynDNS�org provides this service, for up to five host names, free to the Internet community �
The Dynamic DNSSM service is ideal for a...

Page 58

56Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
blocking an ICMP Ping
Computer hackers use what is known as “pinging” to find potential victims on the Internet � By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there � The Router can be set up so it will not respond to an ICMP ping from the outside � This heightens your Router’s security level�...

Page 59

57Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
Restarting the Router
Sometimes it may be necessary to restart or reboot the Router if it begins working improperly � Restarting or rebooting the Router will NOT delete any of your configuration settings �
Restarting the Router to Restore normal operation
1� Click the “Restart Router” button �
2� The following message will appear � Click “OK”�
3� The following message will appear �...

Page 60

58Enhanced Wireless Router
sectionstable of c ontents12345789106
UsIng  THE  WEb- bas Ed  ad Van CEd Us ER InTER faCE 
Restoring f actory default settings
Using this option will restore all of the settings in the Router to the factory (default) settings � It is recommended that you back up your settings before you restore all of the defaults �
4� A 60-second countdown will appear on the screen � When the countdown reaches zero, the Router’s defaults will be restored � The Router home page should appear...
Start reading Belkin Router F6D4230-4 User Manual

Related Manuals for Belkin Router F6D4230-4 User Manual

All Belkin manuals