Home > Belkin > Router > Belkin Router F5D7234-4user Manual

Belkin Router F5D7234-4user Manual

Here you can view all the pages of manual Belkin Router F5D7234-4user Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 61

59Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
Using the  access Point Mode
note:  This advanced feature should be employed by advanced users 
only. The Router can be configured to work as a wireless network 
access point. Using this mode will defeat the NAT IP sharing feature 
and DHCP server. In Access Point (AP) mode, the Router will need 
to be configured with an IP address that is in the same subnet as 
the rest of the network...

Page 62

60Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
Configuring the  firewall
Your Router is equipped with a firewall that will protect your network 
from a wide array of common hacker attacks including:
•	 IP Spoofing
•	 SYN flood
•	 Land Attack
•	 UDP flooding
•	 Ping of Death (PoD)
•	 Tear Drop Attack
•	 Denial of Service (DoS) 
•	 ICMP defect
•	 IP with zero length 
•	 RIP defect
•	 Smurf Attack
•	 Fragment flooding
•	 TCP Null Scan...

Page 63

61Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
Configuring Internal f orwarding settings
The “Virtual Servers” function will allow you to route external (Internet) 
calls for services such as a web server (port 80), FTP server (Port 21), or 
other applications through your Router to your internal network. Since 
your internal computers are protected by a firewall, computers outside 
your network (over the Internet) cannot get to them...

Page 64

62Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
setting Client IP f ilters
The Router can be configured to restrict access to the Internet, email, or 
other network services at specific days and times. Restriction can be set 
for a single computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer, for example, enter the 
IP address of the computer to which you wish to restrict access in the...

Page 65

63Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
s etting Ma C address  filtering
The MAC address filter is a powerful security feature that allows you 
to specify which computers are allowed on the network. Any computer 
attempting to access the network that is not specified in the filter list 
will be denied access. When you enable this feature, you must enter 
the MAC address of each client (computer) on your network to allow...

Page 66

64Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
e nabling the  demilitarized Zone ( dMZ)
The DMZ feature allows you to specify one computer on your network 
to be placed outside of the firewall. This may be necessary if the 
firewall is causing problems with an application such as a game or 
video conferencing application. Use this feature on a temporary basis. 
The computer in the DMZ is NOT protected from hacker attacks. Note: 
If...

Page 67

65Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
Using  dynamic  dns
The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS.org offers, allowing 
your network computers to be more easily accessed from various locations on the Internet. DynDNS.org provides this service, for up to five host 
names, free to the Internet community.
The Dynamic DNS
SM service is ideal for a...

Page 68

66Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
W an  Ping b locking
Computer hackers use what is known as “pinging” to find potential 
victims on the Internet. By pinging a specific IP address and receiving a 
response from the IP address, a hacker can determine that something of 
interest might be there. The Router can be set up so it will not respond 
to an ICMP ping from the outside. This heightens the level of security of 
your...

Page 69

67Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
Restarting the Router
Sometimes it may be necessary to restart or reboot the Router if it 
begins working improperly. Restarting or rebooting the Router will NOT 
delete any of your configuration settings.Restoring f actory default settings
Using this option will restore all of the settings in the Router to the 
factory (default) settings. It is recommended that you back up your...

Page 70

68Wireless G Router
sectionstable of c ontents1 2345 78910
6
Us In G  TH e Web- based  ad Van Ced Use R In Te R fa Ce 
saving a Current Configuration
You can save your current configuration by using this feature. Saving 
your configuration will allow you to restore it later if your settings are lost 
or changed.
1�  Click “Save”. A window 
called “File Download” will 
open. Click “Save”. 
2�  A window will open that allows you to select the location where 
you want to save the configuration file. Select...
Start reading Belkin Router F5D7234-4user Manual

Related Manuals for Belkin Router F5D7234-4user Manual

All Belkin manuals