Belkin Router F5D7234-4user Manual
Here you can view all the pages of manual Belkin Router F5D7234-4user Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 61
59Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce Using the access Point Mode note: This advanced feature should be employed by advanced users only. The Router can be configured to work as a wireless network access point. Using this mode will defeat the NAT IP sharing feature and DHCP server. In Access Point (AP) mode, the Router will need to be configured with an IP address that is in the same subnet as the rest of the network...
Page 62
60Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce Configuring the firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • SYN flood • Land Attack • UDP flooding • Ping of Death (PoD) • Tear Drop Attack • Denial of Service (DoS) • ICMP defect • IP with zero length • RIP defect • Smurf Attack • Fragment flooding • TCP Null Scan...
Page 63
61Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce Configuring Internal f orwarding settings The “Virtual Servers” function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them...
Page 64
62Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce setting Client IP f ilters The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers. To restrict Internet access to a single computer, for example, enter the IP address of the computer to which you wish to restrict access in the...
Page 65
63Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce s etting Ma C address filtering The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client (computer) on your network to allow...
Page 66
64Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce e nabling the demilitarized Zone ( dMZ) The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall. This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application. Use this feature on a temporary basis. The computer in the DMZ is NOT protected from hacker attacks. Note: If...
Page 67
65Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce Using dynamic dns The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS.org offers, allowing your network computers to be more easily accessed from various locations on the Internet. DynDNS.org provides this service, for up to five host names, free to the Internet community. The Dynamic DNS SM service is ideal for a...
Page 68
66Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce W an Ping b locking Computer hackers use what is known as “pinging” to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens the level of security of your...
Page 69
67Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce Restarting the Router Sometimes it may be necessary to restart or reboot the Router if it begins working improperly. Restarting or rebooting the Router will NOT delete any of your configuration settings.Restoring f actory default settings Using this option will restore all of the settings in the Router to the factory (default) settings. It is recommended that you back up your...
Page 70
68Wireless G Router sectionstable of c ontents1 2345 78910 6 Us In G TH e Web- based ad Van Ced Use R In Te R fa Ce saving a Current Configuration You can save your current configuration by using this feature. Saving your configuration will allow you to restore it later if your settings are lost or changed. 1� Click “Save”. A window called “File Download” will open. Click “Save”. 2� A window will open that allows you to select the location where you want to save the configuration file. Select...