Belkin Router F5D8235-4 User Manual
Have a look at the manual Belkin Router F5D8235-4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
39N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce Changing the Wireless Channel There are a number of operating channels from which you can choose—in the United States, there are 11 and in the United Kingdom (and most of Europe), there are 13 . In a small number of other countries, there are other channel requirements . Your Router is configured to operate on the proper channels for the country in which you reside . The channel can be changed if needed . If there are other wireless networks operating in your area, your network should be set to operate on a channel that is different than the other wireless networks . extension Channel The IEEE 802 .11n draft specification allows the use of a secondary channel to double the bandwidth (see “Using the Bandwidth Switch” below) . An appropriate extension channel will be displayed when operating in 40MHz mode (see “Using the Wireless Mode Switch” below) . The channel can be changed if needed . Using the Wireless Mode switch This switch allows you to set the Router’s wireless modes . There are several modes . Note: Some modes may require firmware updates to be enabled . 1� of f This mode will turn OFF the Router’s access point, so no wireless devices can join the network . Turning off the wireless function of your Router is a great way to secure your network when you are away from home for a long period of time, or don’t want to use the wireless feature of the Router at a certain time . 2� 802�11b+g Setting the Router to this mode will allow only 802 .11b- and g-compliant devices to join the network 3 � 802�11b+g+n Setting the Router to this mode will allow 802 .11b-, 802 .11g-, and 802 .11n-compliant devices to join the network . 4� 802�11n only Setting the Router to this mode will allow only N/draft 802 .11n-compliant devices to join the network, keeping out 802 .11g and 802 .11b devices .
40N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce Using the b andwidth switch This switch allows you to set the Router’s wireless bandwidth modes . There are several modes available: 1� 20MHz only Setting the Router to this mode allows only 20MHz operation . This mode is compatible with N, draft 802 .11n-, 802 .11g-, and 802 .11b-compliant devices, but will limit N, draft 802 .11n-compliant devices’ bandwidth by half . Reducing bandwidth to 20MHz-only operation might solve some wireless problems . 2) 20MHz/40MHz auto Setting the Router to this mode allows it to switch automatically between 20MHz and 40MHz operation . This mode enables 40MHz operation, to maximize speed for N, draft 802 .11n-compliant devices when conditions permit . When a legacy 802 .11g access point is presented and occupies an adjacent secondary channel, the Router automatically reverts to 20MHz operation to maximize compatibility . We recommend using this as the default mode . Using the broadcast ss Id f eature Note: This advanced feature should be employed by advanced users only . For security, you can choose not to broadcast your network’s SSID . Doing so will keep your network name hidden from computers that are scanning for the presence of wireless networks . To turn off the broadcast of the SSID, remove the check mark from the box next to “Broadcast SSID”, and then click “Apply Changes” . The change is immediate . Each computer now needs to be set to connect to your specific SSID; an SSID of “ANY” will no longer be accepted . Refer to the documentation of your wireless network adapter for information on making this change . Protected Mode switch Protected mode ensures proper operation of N, draft 802 .11n-compliant devices on your wireless network when 802 .11g or 802 .11b devices are present or when there is heavy 802 .11g or 802 .11b traffic in the operating environment . Use protected mode if your network consists of a mix of Belkin N+ Wireless Cards and 802 .11g or 802 .11b cards on your network . If you are in an environment that includes little to no 802 .11g or 802 .11b wireless network traffic, you will achieve the best N+ wireless performance with protected mode OFF . Conversely, in an environment with HEAV Y 802 .11g or 802 .11b traffic or interference, you will achieve the best N+ wireless performance with protected mode ON . This will ensure N+ wireless performance is not affected . 802�11e/WMM (Wi- fi® Multimedia) Qo s WMM, based on 802 .11e QoS (Quality of Service), prioritizes important data on your network, such as multimedia content and voice-over-IP ( VoIP), so it will not be interfered with by other data being sent over the network . This feature requires other wireless devices, such as Wi-Fi phones or wireless laptops, to support WMM for best results .
41N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce Changing the Wireless s ecurity settings Your N+ Wireless Router is equipped with the latest security standard called Wi-Fi Protected Access™ 2 (WPA2™) and the legacy security standard called Wired Equivalent Privacy (WEP) . Your Router also supports the Wi-Fi Protected Setup™ (WPS) specification, which simplifies the setup of a wireless network . WPS uses familiar methodologies, such as typing in a Personal Identification Number (PIN) or pushing a button, to enable users to automatically configure network names and strong WPA™/ WPA2 data encryption and authentication . By default, wireless security is disabled . To enable security, you will need to determine which standard you want to use . To access the security settings, click “Security” on the “Wireless” tab . Using Wi-fi Protected s etup WPS uses WPA2 (described on page 42) for encryption . It does not provide additional security, but rather, standardizes the method for securing your wireless network . You may use either the Push Button Configuration (PBC) method or PIN method to allow a device access to your wireless network . Conceptually, the two methods work as follows: PBC: First, initiate the WPS PBC procedure on the client device . Refer to your client’s documentation on this procedure . Then, within two minutes, push and hold the WPS button located on the front of your Router for two seconds . Pushing the PBC button will automatically enable WPS . The client has now been securely added to your wireless network . PIN: The client device has an 8-digit PIN number that is associated with WPS . Enable WPS through the screen illustrated below . Enter the client’s PIN into the Router’s internal registrar (accessed through this screen) . The client will be automatically enrolled into your wireless network within two minutes .
42N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce 1� Wi-fi Protected setup ( WP s) Enabled or Disabled . 2� Personal Identification Number (PIN) Method: In this method, a wireless client wishing to access your network must supply an 8-digit PIN to the Router . After clicking “Enroll”, you must start the WPS handshaking procedure from the client within two minutes . 3� Router PIN If an external registrar is available, you may enter in the Router’s PIN to the registrar . Click “Generate New PIN” to change the PIN from the default value . Click “Restore Default PIN” to reset the PIN value . 4� Push button Configuration (P bC) Method PBC is an alternate method to connect to a WPS network . Push the PBC button located on the back of the Router for two seconds, and then initiate the PBC on the client device . Alternatively, push the “Start PBC” soft button to start this process . 5� Manual Configuration Method This section lists the default security settings to be set up if not using WPS . WPa2 Requirements IMP oRT aNT: In order to use WPA2 security, all your computers and wireless client adapters must be upgraded with patches, driver, and client utility software that supported WPA2 . At the time of this User Manual’s publication, a couple security patches are available, for free download, from Microsoft® . These patches work only with the Windows XP operating system . Other operating systems are not supported at this time . For Windows XP computers that do not have Service Pack 2 (SP2), a file from Microsoft called “Windows XP Support Patch for Wireless Protected Access (KB 826942)” is available for free download at http://support . microsoft .com/kb/826942 For Windows XP with Service Pack 2, Microsoft has released a free download to update the wireless client components to support WPA2 (KB971021) . The update is available from: http://support .microsoft .com/kb/917021 These steps are not necessary for Windows XP SP3 and above . IMPoRT aNT: You also need to ensure that all your wireless client cards/adapters support WPA2, and that you have downloaded and installed the latest driver . Most of the Belkin wireless cards have driver updates available for download from the Belkin support site: www .belkin .com/networking .
43N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce setting WP a/WP a2-Personal (P sK) Like WPA security, WPA2 is available in both WPA2-Personal (PSK ) mode and WPA2-Enterprise (RADIUS) mode . Typically, WPA2-Personal (PSK ) is the mode that will be used in a home environment, while WPA2-Enterprise (RADIUS) is implemented in a business environment where an external radius server distributes the network key to the clients automatically . Your Router supports WPA2-Personal (PSK ) . 1� After you’ve set up your Router, go to the “Security” page under “Wireless” and select “WPA-PSK(no server)” from the “Security Mode” drop-down menu . 2� For “Authentication”, select “WPA-PSK”, “WPA2-PSK”, or “WPA-PSK + WPA2-PSK” . This setting will have to be identical on the wireless clients that you set up . “WPA-PSK + WPA2-PSK” mode will allow the Router to support clients running either WPA or WPA2 security . 3� For “Encryption Technique” will auto-fill depending on the authentication type above . This setting will have to be identical on the wireless clients that you set up . 4� Enter your pre-shared key (PSK ) . This can be from eight to 63 characters and can be letters, numbers, or symbols . This same key must be used on all of the wireless clients that you set up . For example, your PSK might be something like: “Smith family network key” . Click “Apply Changes” to finish . You must now set all wireless clients to match these settings .IMPoRT aNT: Make sure your wireless computers are updated to work with WPA2 and have the correct settings to get proper connection to the R o u te r .
44N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce setting W eP encryption Note to Mac users: The “Passphrase” option will not operate with Apple® AirPort® . To configure encryption for your Mac computer, set the encryption using the manual method described in the next section . 1� Select “128-bit WEP” or “64-bit WEP” from the drop-down menu . 2� After selecting your WEP encryption mode, you can enter you WEP key manually by typing in the hex WEP key manually, or you can type a passphrase in the “PassPhrase” field and click “Generate” to create a WEP key from the passphrase . Click “Apply Changes” to finish . You must now set all of your clients to match these settings . Using a Hexadecimal Key A hexadecimal key is a mixture of numbers and letters from A–F and 0 –9 . 64-bit keys are 10 digits long and can be divided into five two-digit numbers . 128-bit keys are 26 digits long and can be divided into 13 two-digit numbers . For instance: af 0f 4 b C3 d 4 = 64-bit key C3 03 0 f af 0 f 4b b2 C3 d4 4 b C3 d4 e7 = 128-bit key In the boxes below, make up your key by writing in two characters between A–F and 0 –9 . You will use this key to program the encryption settings on your Router and your wireless computers . Note to Mac users: Original Apple AirPort products support 64-bit encryption only . Apple AirPort 2 products can support 64-bit or 128-bit encryption . Please check your product to see which version you are using . If you cannot configure your network with 128-bit encryption, try 64-bit encryption . 3� Encryption in the Router is now set . Each of your computers on your wireless network will now need to be configured with the same passphrase . Refer to the documentation of your wireless network adapter for information on making this change .
45N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce g uest access: This option allows guest users access to the Internet while keeping them away from your private network . By default, this option is enabled . Guest users should connect to the Belkin N+ Guest network . securit y options for guest access: Hotel Style: Users will be redirected to a hotel-style landing page when they first try to access the Internet . They must correctly enter in the passphrase to log in . WPA / WPA2-PSK: This option is similar to the security mode for the main router network . Users must correctly enter the PSK in order to join the guest network .
46N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce Using the a ccess Point Mode Note: This advanced feature should be employed by advanced users only . The Router can be configured to work as a wireless network access point . Using this mode will defeat the NAT IP sharing feature and DHCP server . In AP mode, the Router will need to be configured with an IP address that is in the same subnet as the rest of the network that you will bridge to . The default IP address is 192 .168 .2 .254 and subnet mask is 255 .255 .255 .0 . These can be customized for your need . 1� Enable the AP mode my selecting “Enable” in the “Use as Access Point only” page . When you select this option, you will be able to change the IP settings . 2� Set your IP settings to match your network . Click “Apply Changes” . 3� Connect a cable from the WAN port on the Router to your existing network . The Router is now acting as an access point . To access the Router advanced user interface again, type the IP address you specified into your browser’s navigation bar . You can set the encryption settings, MAC address filtering, SSID, and channel normally .
47N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce Configuring the f irewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding The firewall also masks common ports that are frequently used to attack networks . These ports appear to be “stealth” meaning that for all intents and purposes, they do not exist to a would-be hacker . You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled . Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled .
48N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- based ad Va NC ed Use R INT eR fa Ce Configuring Internal f orwarding settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network . Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be “seen” . A list of common applications has been provided in case you need to configure the Virtual Server function for a specific application . If your application is not listed, you will need to contact the application vendor to find out which port settings you need . Choosing an application Select your application from the drop-down list . Click “Add” . The settings will be transferred to the next available space in the screen . Click “Apply Changes” to save the setting for that application . To remove an application, select the number of the row that you want to remove then click “Clear” . Manually entering settings into the Virtual s erver To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass (use a comma between multiple ports), select the port type ( TCP or UDP), and click “Apply Changes” . You can only pass one port per internal IP address . Opening ports in your firewall can pose a security risk . You can enable and disable settings very quickly . It is recommended that you disable the settings when you are not using a specific application .