Home > Belkin > Router > Belkin Router F6D6230xx4 User Manual

Belkin Router F6D6230xx4 User Manual

Here you can view all the pages of manual Belkin Router F6D6230xx4 User Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 51

49Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
setting Up a Deny  access  list 
The “Deny” list lets you specify computers to which you DO NOT want to allow access to the network  . Any computer in the list will not be allowed access to the wireless network, while all others will  .
1 . Select the “Deny” radio button to begin setting up a list of computers to be denied access to the wireless network  .
2 . Next, in the “MAC...

Page 52

50Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
bitTorrent®
The Belkin Double N+ Wireless Router can download files using the popular peer-to-peer, file-transfer protocol, BitTorrent  . The Router will download files on to the attached USB storage device so you won’t need to leave your computer on . 
To start a download, simply double-click on the torrent file you would like to download and Belkin’s torrent helper will start the...

Page 53

51Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
Qo s 
QoS (Quality of Service) will automatically prioritize the traffic to and from the internet so you get an interruption-free Internet experience  . The Router’s QoS will automatically prioritize the type of traffic that is more time-critical, such as VoIP, online games, and streaming video  . We recommend that you leave this function enabled and the profile on “ a u t o ” .
UPnP...

Page 54

52Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
Configuring the f irewall
Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:
•	 IP	Spoofing
•	 Land	 Attack	Ping	of	Death	 (PoD)
•	 Denial	 of	Service	 (DoS)
•	 IP	with	zero	 length
•	 Smurf	 Attack
•	 TCP	Null	Scan
•	 SYN	 flood
•	 UDP	 flooding
•	 Tear	Drop	Attack
•	 ICMP	 defect
•	 RIP	defect
•	 Fragment...

Page 55

53Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
Configuring Internal f orwarding settings
The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network  . Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them...

Page 56

54Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
access Control
The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times  . Restriction can be set for a single computer, a range of computers, or multiple computers  . Select the “Enable” radio button to use this feature . 
To restrict Internet access to a single computer, for example, click the “Add” button and select...

Page 57

55Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
The Access Control rule can be removed by clicking the “Delete” button  . Click on the entry number for the configuration options .There are four main configurations for Access Control lists  . The first one is “Schedule” for that rule . The second is “Service” for the services to be blocked for that rule . The third is “URL Blocking” for the URL access restrictions, and the fourth is...

Page 58

56Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
enabling the Demilitarized Zone (DMZ) 
The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall  . This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application . Use this feature on a temporary basis . The computer in the DMZ is NOT protected from hacker attacks  . 
To put a...

Page 59

57Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
Using Dynamic DN s 
The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS  .org offers, allowing your network computers to be more easily accessed from various locations on the Internet  . DynDNS .org provides this service, for up to five host names, free to the Internet community  .
The Dynamic DNSSM service is ideal...

Page 60

58Double N+ Wireless Router
sectionstable of c ontents12345789106
UsINg TH e Web- base D aDV aNC eD  Use R INT eR fa Ce 
blocking an ICMP Ping 
Computer hackers use what is known as “pinging” to find potential victims on the Internet  . By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there  . The Router can be set up so it will not respond to an ICMP ping from the outside  . This heightens your Router’s security...
Start reading Belkin Router F6D6230xx4 User Manual

Related Manuals for Belkin Router F6D6230xx4 User Manual

All Belkin manuals