Belkin Router F5D8633-4 User Manual
Have a look at the manual Belkin Router F5D8633-4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
4948 4948 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 802.11e/WMM (Wi-Fi® Multimedia) QoS WMM, based on 802.11e QoS (Quality of Service), prioritizes important data on your network, such as multimedia content and voice-over-IP (VoIP), so it will not be interfered with by other data being sent over the network. This feature requires other wireless devices, such as Wi-Fi phones or wireless laptops, to support WMM for best results. Changing the Wireless Security Settings Your Router is equipped with the latest security standard called Wi- Fi Protected Access 2 (WPA2). It also supports the legacy security standard called Wired Equivalent Privacy (WEP). By default, wireless security is disabled. To enable security, you will need to determine which standard you want to use. To access the security settings, click “Security” on the “Wireless” tab. The Router features WPA2, which is the second generation of the WPA-based 802.11i standard. It offers a higher level of wireless security by combining advanced network authentication and stronger Advanced Encryption Standard (AES) encryption methods. WPA2 Requirements IMPORTANT: In order to use WPA2 security, all your computers and wireless client adapters must be upgraded with patches, driver, and client utility software that supported WPA2. At the time of this User Manual’s publication, a couple security patches are available, for free download, from Microsoft ®. These patches work only with the Windows XP operating system. Other operating systems are not supported at this time. For Windows XP computers that do not have Service Pack 2 (SP2), a file from Microsoft called “Windows XP Support Patch for Wireless Protected Access (KB 826942)” is available for free download at http://support.microsoft.com/kb/826942 For Windows XP with Service Pack 2, Microsoft has released a free download to update the wireless client components to support WPA2 (KB971021). The update is available from: http://support.microsoft.com/kb/917021 IMPORTANT: You also need to ensure that all your wireless client cards/adapters support WPA2, and that you have downloaded and installed the latest driver. Most of the Belkin wireless cards have driver updates available for download from the Belkin support site: www.belkin.com/networking.
5150 Using the Web-Based Advanced User Interface 5150 Setting WPA/WPA2-Personal (PSK) Like WPA security, WPA2 is available in both WPA2-Personal (PSK) mode and WPA2-Enterprise (RADIUS) mode. Typically, WPA2- Personal (PSK) is the mode that will be used in a home environment, while WPA2-Enterprise (RADIUS) is implemented in a business environment where an external radius server distributes the network key to the clients automatically. This guide will focus on WPA2- Personal (PSK) usage. Please refer to the User Manual for more information about wireless security and different types of wireless security. 1. After you’ve set up your Router, go to the “Security” page under “Wireless” and select “WPA/WPA2-Personal (PSK)” from the “Security Mode” drop-down menu. 2. For “Authentication”, select “WPA-PSK”, “WPA2-PSK”, or “WPA-PSK + WPA2-PSK”. This setting will have to be identical on the wireless clients that you set up. “WPA-PSK + WPA2-PSK” mode will allow the Router to support clients running either WPA or WPA2 security. 3. “Encryption Technique”, select “TKIP”, “AES”, or “TKIP+AES”. This setting will have to be identical on the wireless clients that you set up. 4. Enter your pre-shared key (PSK). This can be from eight to 63 characters and can be letters, numbers, or symbols. This same key must be used on all of the wireless clients that you set up. For example, your PSK might be something like: “Smith family network key”. Click “Apply Changes” to finish. You must now set all wireless clients to match these settings.
5150 5150 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 IMPORTANT: Make sure your wireless computers are updated to work with WPA2 and have the correct settings to get proper connection to the Router. Setting WPA Security Note: To use WPA security, your wireless network cards must be equipped with software that supports WPA. At the time this User Manual was published, a security patch from Microsoft is available for free download. This patch works only with Windows XP. Your Router supports WPA-PSK (no server). WPA-PSK uses what is known as a pre-shared key as the security key. A pre-shared key is basically a password that is between eight and 39 characters long. It can be a combination of letters, numbers, or characters. Each client uses the same key to access the network. Typically this is the mode that will be used in a home environment.
5352 Using the Web-Based Advanced User Interface 5352 Setting WPA-PSK 1. From the “Security Mode” drop-down menu, select “WPA-PSK (no server)”. 2. For “Encryption Technique”, select “TKIP” or “AES”. This setting will have to be identical on the clients that you set up. 3. Enter your pre-shared key. This can be from eight to 39 characters and can be letters, numbers, or symbols. This same key must be used on all of the clients that you set up. 4. Click “Apply Changes” to finish. You must now set all clients to match these settings.
5352 5352 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 Setting WEP Encryption Note to Mac users: The “Passphrase” option will not operate with Apple® AirPort®. To configure encryption for your Mac computer, set the encryption using the manual method described in the next section. 1. Select “128-bit WEP” or “64-bit WEP” from the drop-down menu. 2. After selecting your WEP encryption mode, you can enter your WEP key manually by typing in the hex values in the space provided, or you can type a passphrase in the “PassPhrase” field and click “Generate” to create a WEP key from the passphrase. Click “Apply Changes” to finish. You must now set all of your clients to match these settings. 3. Encryption in the Router is now set. Each of your computers on your wireless network will now need to be configured with the same passphrase. Refer to the documentation of your wireless network adapter for information on making this change.
5554 Using the Web-Based Advanced User Interface 5554 Using a Hexadecimal KeyA hexadecimal key is a mixture of numbers and letters from A–F and 0–9. 64-bit keys are 10 digits long and can be divided into five two- digit numbers. 128-bit keys are 26 digits long and can be divided into 13 two-digit numbers. For instance: AF 0F 4B C3 D4 = 64-bit key C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key In the boxes below, make up your key by writing in two characters between A–F and 0–9. You will use this key to program the encryption settings on your Router and your wireless computers. Note to Mac users: Original Apple AirPort products support 64- bit encryption only. Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please check your product to see which version you are using. If you cannot configure your network with 128-bit encryption, try 64-bit encryption.
5554 5554 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 Using the Access Point Mode Note: This advanced feature should be employed by advanced users only. The Router can be configured to work as a wireless network access point. Using this mode will defeat the NAT IP sharing feature and DHCP server. In Access Point (AP) mode, the Router will need to be configured with an IP address that is in the same subnet as the rest of the network that you will bridge to. The default IP address is 192.168.2.254 and subnet mask is 255.255.255.0. These can be customized for your need. 1. Enable the AP mode my selecting “Enable” (1) in the “Use as Access Point only” page. When you select this option, you will be able to change the IP settings. 2. Set your IP settings to match your network. Click “Apply Changes” (2). 3. Connect a cable from the “Modem” port on the Router to your existing network. The Router is now acting as an access point. To access the Router’s Web-Based Advanced User Interface again, type the IP address you specified into your browser’s navigation bar. You can set the encryption settings, MAC address filtering, SSID, and channel normally. (2) (1)
5756 Using the Web-Based Advanced User Interface 5756 Setting MAC Address Control The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network. Note: This list applies only to wireless computers. This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client (computer) to which you want to allow network access. The “Block” feature lets you turn on and off access to the network easily for any computer without having to add and remove the computer’s MAC address from the list. Setting up an Allow Access List 1. Select the “Allow” radio button (1) to begin setting up a list of computers allowed to connect to the wireless network. 2. Next, in the “MAC Address” field that is blank (2), type in the MAC address of the wireless computer you want to be able to access the wireless network, then click “
5756 5756 Using the Web-Based Advanced User Interface s e c t i o n 1 9 2 3 4 5 6 7 8 10 Setting up a Deny Access List The “Deny Access” list lets you specify computers that you DO NOT want to access the network. Any computer in the list will not be allowed access to the wireless network. All others will. 1. Select the “Deny” radio button (1) to begin setting up a list of computers to be denied access to the wireless network. 2. Next, in the “MAC Address” field that is blank (2), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click “
5958 Using the Web-Based Advanced User Interface 5958 Configuring the Firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding The firewall also masks common ports that are frequently used to attack networks. These ports appear to be “stealth” meaning that for all intents and purposes, they do not exist to a would-be hacker. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled.