Belkin Router F6D4230-4 User Manual
Here you can view all the pages of manual Belkin Router F6D4230-4 User Manual. The Belkin manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 51
49Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE setting M aC address Control The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network � note: This list applies only to wireless computers� This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access� When you enable this...
Page 52
50Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE setting up a d eny access l ist The “Deny Access” list lets you specify computers that you DO NOT want to access the network � Any computer in the list will not be allowed access to the wireless network� All others will� (1)(2) (3) (5) (4) 1� Select the “Deny” radio button (2) to begin setting up a list of computers to be denied access to the wireless network � 2� Next, in the “MAC...
Page 53
51Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE Configuring the firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding The firewall also...
Page 54
52Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE Configuring Internal f orwarding settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network � Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them...
Page 55
53Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE setting Client IP f ilters The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times � Restriction can be set for a single computer, a range of computers, or multiple computers � To restrict Internet access to a single computer for example, enter the IP address of the computer you wish to restrict access to in the IP...
Page 56
54Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE Enabling the demilitarized Zone ( dMZ) The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall � This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application� Use this feature on a temporary basis� The computer in the DMZ is NOT protected from hacker attacks � To put a...
Page 57
55Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE Using dynamic dns The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS �org offers, allowing your network computers to be more easily accessed from various locations on the Internet � DynDNS�org provides this service, for up to five host names, free to the Internet community � The Dynamic DNSSM service is ideal for a...
Page 58
56Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE blocking an ICMP Ping Computer hackers use what is known as “pinging” to find potential victims on the Internet � By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there � The Router can be set up so it will not respond to an ICMP ping from the outside � This heightens your Router’s security level�...
Page 59
57Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE Restarting the Router Sometimes it may be necessary to restart or reboot the Router if it begins working improperly � Restarting or rebooting the Router will NOT delete any of your configuration settings � Restarting the Router to Restore normal operation 1� Click the “Restart Router” button � 2� The following message will appear � Click “OK”� 3� The following message will appear �...
Page 60
58Enhanced Wireless Router sectionstable of c ontents12345789106 UsIng THE WEb- bas Ed ad Van CEd Us ER InTER faCE Restoring f actory default settings Using this option will restore all of the settings in the Router to the factory (default) settings � It is recommended that you back up your settings before you restore all of the defaults � 4� A 60-second countdown will appear on the screen � When the countdown reaches zero, the Router’s defaults will be restored � The Router home page should appear...