Home > Belkin > Router > Belkin Router F5D8231-4 User Manual

Belkin Router F5D8231-4 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Belkin Router F5D8231-4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 623
    							
    5049
    Using the Web-Based Advanced User Interface
    
    5049
    Using the Web-Based Advanced User Interface
    
    Setting WPA-PSK
    1.   From the “Security Mode” drop-down menu, select “WPA-PSK 
    (no server)”.
    2.    For  “Encryption  Technique”,  select  “TKIP”  or  “AES”.  This  setting  will  have  to  be  identical  on  the  clients  that  you  set  up.
    3.    Enter  your  pre-shared  key.  This  can  be  from  eight  to  39 characters  and  can  be  letters,  numbers,  or  symbols.  This  same 
    key  must  be  used  on  all  of  the  clients  that  you  set  up.
    4. Click  “Apply  Changes”  to  finish.  You  must  now  set  all  clients  to 
    match  these  settings. 
    						
    							
    50
    
    Using the Web-Based Advanced User Interface
    50
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Setting WEP Encryption
    Note  to  Mac  users:  The  “Passphrase”  option  will  not  operate  with 
    Apple®  AirPort®.  To  configure  encryption  for  your  Mac  computer,  set  the 
    encryption  using  the  manual  method  described  in  the  next  section.
    1.    Select “128-bit WEP” or “64-bit WEP” from the drop-down menu.
    2.    After  selecting  your  WEP  encryption  mode,  you  can  enter  you 
    WEP  key  manually  by  typing  in  the  hex  WEP  key  manually,  or 
    you  can  type  a  passphrase  in  the  “PassPhrase”  field  and  click 
    “Generate”  to  create  a  WEP  key  from  the  passphrase.  Click 
    “Apply  Changes”  to  finish.  You  must  now  set  all  of  your  clients  to 
    match  these  settings.
    3.    Encryption  in  the  Router  is  now  set.  Each  of  your  computers  on your  wireless  network  will  now  need  to  be  configured  with  the 
    same  passphrase.  Refer  to  the  documentation  of  your  wireless 
    network  adapter  for  information  on  making  this  change. 
    						
    							
    5251
    Using the Web-Based Advanced User Interface
    
    5251
    Using the Web-Based Advanced User Interface
    
    Using a Hexadecimal KeyA hexadecimal key is a mixture of numbers and letters from A–F  
    and 0–9. 64-bit keys are 10 digits long and can be divided into five  
    two-digit numbers. 128-bit keys are 26 digits long and can be divided 
    into 13 two-digit numbers.
    For instance:
    AF 0F 4B C3 D4  = 64-bit key
     
    C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7  = 128-bit key
    In the boxes below, make up your key by writing in two characters 
    between A–F and 0–9. You will use this key to program the encryption 
    settings on your Router and your wireless computers.
    Note to Mac users:  Original Apple AirPort products support 64-bit 
    encryption only. Apple AirPort 2 products can support 64-bit or 128-
    bit encryption. Please check your product to see which version you are 
    using. If you cannot configure your network with 128-bit encryption, 
    try 64-bit encryption. 
    						
    							
    52
    
    Using the Web-Based Advanced User Interface
    52
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Using the Access Point Mode
    Note: This  advanced  feature  should  be  employed  by  advanced  users 
    only.  The  Router  can  be  configured  to  work  as  a  wireless  network 
    access  point.  Using  this  mode  will  defeat  the  NAT  IP  sharing  feature 
    and  DHCP  server.  In  Access  Point  (AP)  mode,  the  Router  will  need 
    to  be  configured  with  an  IP  address  that  is  in  the  same  subnet  as 
    the  rest  of  the  network  that  you  will  bridge  to.  The  default  IP  address 
    is  192.168.2.254  and  subnet  mask  is  255.255.255.0.  These  can  be 
    customized  for  your  need.
    1.  Enable  the  AP  mode  my  selecting  “Enable”  in  the  “Use  as  Access  Point  only”  page.  When  you  select  this  option,  you  will  be  able  to 
    change  the  IP  settings.
    2.  Set  your  IP  settings  to  match  your  network.  Click 
    “Apply  Changes”.
    3.  Connect  a  cable  from  the  “Modem”  port  on  the  Router  to  your  existing  network.
    The  Router  is  now  acting  as  an  access  point.  To  access  the  Router’s 
    Web-Based  Advanced  User  Interface  again,  type  the  IP  address 
    you  specified  into  your  browser’s  navigation  bar.  You  can  set  the 
    encryption  settings,  MAC  address  filtering,  SSID,  and 
     
    channel  normally.
    (2)
    (1) 
    						
    							
    5453
    Using the Web-Based Advanced User Interface
    
    5453
    Using the Web-Based Advanced User Interface
    
    Setting MAC Address Control 
    The MAC address filter is a powerful security feature that allows you  
    to specify which computers are allowed on the wireless network.  Note: This list applies only to wireless computers. This list can be 
    configured so any computer attempting to access the wireless network 
    that is not specified in the filter list will be denied access. When you 
    enable this feature, you must enter the MAC address of each client 
    (computer) to which you want to allow network access. The “Block” 
    feature lets you turn on and off access to the network easily for any 
    computer without having to add and remove the computer’s MAC 
    address from the list. 
    						
    							
    54
    
    Using the Web-Based Advanced User Interface
    54
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Setting up an Allow Access List
    1.  Select  the  “Allow”  radio  button (1)  to  begin  setting  up  a  list  of 
    computers  allowed  to  connect  to  the  wireless  network. 
    2.  Next,  in  the  “MAC  Address”  field  that  is  blank (3),  type  in  the 
    MAC  address  of  the  wireless  computer  you  want  to  be  able  to 
    access  the  wireless  network,  then  click  “
    						
    							
    5655
    Using the Web-Based Advanced User Interface
    
    5655
    Using the Web-Based Advanced User Interface
    
    Configuring the Firewall
    Your Router is equipped with a firewall that will protect your network 
    from a wide array of common hacker attacks including:
    •  IP Spoofing
    •  Land Attack Ping of Death (PoD)
    •  Denial of Service (DoS)
    •  IP with zero length
    •  Smurf Attack
    •  TCP Null Scan
    •  SYN flood
    •  UDP flooding
    •  Tear Drop Attack
    •  ICMP defect
    •  RIP defect
    •  Fragment flooding
    The firewall also masks common ports that are frequently used 
    to attack networks. These ports appear to be “stealth” meaning 
    that for all intents and purposes, they do not exist to a would-be 
    hacker. You can turn the firewall function off if needed; however, it 
    is recommended that you leave the firewall enabled. Disabling the 
    firewall protection will not leave your network completely vulnerable
     
    to hacker attacks, but it is recommended that you leave the 
    firewall enabled. 
    						
    							
    56
    
    Using the Web-Based Advanced User Interface
    56
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Configuring Internal Forwarding SettingsThe Virtual Servers function will allow you to route external (Internet) 
    calls for services such as a web server (port 80), FTP server (Port 21), 
    or other applications through your Router to your internal network. 
    Since your internal computers are protected by a firewall, computers 
    outside your network (over the Internet) cannot get to them because 
    they cannot be “seen”. A list of common applications has been 
    provided in case you need to configure the Virtual Server function 
     
    for a specific application. If your application is not listed, you will  
    need to contact the application vendor to find out which port settings 
    you need
    Choosing an ApplicationSelect your application from the drop-down list. Click “Add”. The 
    settings will be transferred to the next available space in the screen. 
    Click “Apply Changes” to save the setting for that application. To 
    remove an application, select the number of the row that you want to 
    remove then click “Clear”.
    Manually Entering Settings into the Virtual ServerTo manually enter settings, enter the IP address in the space provided 
    for the internal (server) machine, the port(s) required to pass (use a 
    comma between multiple ports), select the port type (TCP or UDP), 
    and click “Apply Changes”. You can only pass one port per internal IP 
    address. Opening ports in your firewall can pose a security risk. You 
    can enable and disable settings very quickly. It is recommended that 
    you disable the settings when you are not using a specific application. 
    						
    							
    5857
    Using the Web-Based Advanced User Interface
    
    5857
    Using the Web-Based Advanced User Interface
    
    Setting Client IP FiltersThe Router can be configured to restrict access to the Internet,  
    e-mail, or other network services at specific days and times. 
    Restriction can be set for a single computer, a range of computers, 
     
    or multiple computers. 
    To restrict Internet access to a single computer for example, enter 
    the IP address of the computer you wish to restrict access to in the 
    IP fields 
    (1). Next, enter “80” in both the port fields (2). Select “Both” (3). Select “Block” (4). You can also select “Always” to block access 
    all of the time. Select the day to start on top (5), the time to start on 
    top (6), the day to end on the bottom (7), and the time to stop (8) on 
    the bottom. Select “Enable” (9). Click “Apply Changes”. The computer 
    at the IP address you specified will now be blocked from Internet 
    access at the times you specified. Note: Be sure you have selected the 
    correct time zone under “Utilities> System Settings> Time Zone”.
    (1) (2)(3)(4)
    (7)(8)(9)
    (5)
    (6) 
    						
    							
    58
    
    Using the Web-Based Advanced User Interface
    58
    s e c t i o n
    2
    1
    3
    4
    5
    6
    7
    8
    9
    10
    
    Enabling the Demilitarized Zone (DMZ)The DMZ feature allows you to specify one computer on your network 
    to be placed outside of the firewall. This may be necessary if the 
    firewall is causing problems with an application such as a game or 
    video conferencing application. Use this feature on a temporary basis. 
    The computer in the DMZ is NOT protected from hacker attacks.
    To put a computer in the DMZ, enter the last digits of its IP address in 
    the IP field and select “Enable”. Click “Apply Changes” for the change 
    to take effect. If you are using multiple static WAN IP addresses, 
    it is possible to select which WAN IP address the DMZ host will be 
    directed to. Type in the WAN IP address you wish the DMZ host to 
    direct to, enter the last two digits of the IP address of the DMZ host 
    computer, select “Enable” and click “Apply Changes”. 
    						
    All Belkin manuals Comments (0)

    Related Manuals for Belkin Router F5D8231-4 User Manual