Belkin Router F5D8633-4 User Manual
Here you can view all the pages of manual Belkin Router F5D8633-4 User Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 51
4948 4948 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 802.11e/WMM (Wi-Fi® Multimedia) QoS WMM, based on 802.11e QoS (Quality of Service), prioritizes important data on your network, such as multimedia content and voice-over-IP (VoIP), so it will not be interfered with by other data being sent over the network. This feature requires other wireless devices, such as Wi-Fi phones or wireless laptops, to support WMM...
Page 52
5150 Using the Web-Based Advanced User Interface 5150 Setting WPA/WPA2-Personal (PSK) Like WPA security, WPA2 is available in both WPA2-Personal (PSK) mode and WPA2-Enterprise (RADIUS) mode. Typically, WPA2- Personal (PSK) is the mode that will be used in a home environment, while WPA2-Enterprise (RADIUS) is implemented in a business environment where an external radius server distributes the network key to the clients automatically. This guide will...
Page 53
5150 5150 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 IMPORTANT: Make sure your wireless computers are updated to work with WPA2 and have the correct settings to get proper connection to the Router. Setting WPA Security Note: To use WPA security, your wireless network cards must be equipped with software that supports WPA. At the time this User Manual was published, a security patch from Microsoft is available for...
Page 54
5352 Using the Web-Based Advanced User Interface 5352 Setting WPA-PSK 1. From the “Security Mode” drop-down menu, select “WPA-PSK (no server)”. 2. For “Encryption Technique”, select “TKIP” or “AES”. This setting will have to be identical on the clients that you set up. 3. Enter your pre-shared key. This can be from eight to 39 characters and can be letters, numbers, or symbols. This same key must be used on all of the clients that you set...
Page 55
5352 5352 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 Setting WEP Encryption Note to Mac users: The “Passphrase” option will not operate with Apple® AirPort®. To configure encryption for your Mac computer, set the encryption using the manual method described in the next section. 1. Select “128-bit WEP” or “64-bit WEP” from the drop-down menu. 2. After selecting your WEP encryption mode, you can enter your WEP key...
Page 56
5554 Using the Web-Based Advanced User Interface 5554 Using a Hexadecimal KeyA hexadecimal key is a mixture of numbers and letters from A–F and 0–9. 64-bit keys are 10 digits long and can be divided into five two- digit numbers. 128-bit keys are 26 digits long and can be divided into 13 two-digit numbers. For instance: AF 0F 4B C3 D4 = 64-bit key C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key In the boxes below, make up your key by writing in two characters between A–F and 0–9. You will...
Page 57
5554 5554 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 Using the Access Point Mode Note: This advanced feature should be employed by advanced users only. The Router can be configured to work as a wireless network access point. Using this mode will defeat the NAT IP sharing feature and DHCP server. In Access Point (AP) mode, the Router will need to be configured with an IP address that is in the same subnet as...
Page 58
5756 Using the Web-Based Advanced User Interface 5756 Setting MAC Address Control The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network. Note: This list applies only to wireless computers. This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client...
Page 59
5756 5756 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 Setting up a Deny Access List The “Deny Access” list lets you specify computers that you DO NOT want to access the network. Any computer in the list will not be allowed access to the wireless network. All others will. 1. Select the “Deny” radio button (1) to begin setting up a list of computers to be denied access to the wireless network. 2. Next, in the...
Page 60
5958 Using the Web-Based Advanced User Interface 5958 Configuring the Firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding The firewall also masks common ports that are frequently used to...