Belkin Router F6D6230xx4 User Manual
Have a look at the manual Belkin Router F6D6230xx4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 19 Belkin manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
49Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce setting Up a Deny access list The “Deny” list lets you specify computers to which you DO NOT want to allow access to the network . Any computer in the list will not be allowed access to the wireless network, while all others will . 1 . Select the “Deny” radio button to begin setting up a list of computers to be denied access to the wireless network . 2 . Next, in the “MAC Address” field that is blank, type in the MAC address of the wireless computer to which you want to deny access to the wireless network, and then click “Add” . 3 . Continue to do this until all of the computers to which you want to deny access have been entered . 4 . Click “Apply Changes” to finish .
50Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce bitTorrent® The Belkin Double N+ Wireless Router can download files using the popular peer-to-peer, file-transfer protocol, BitTorrent . The Router will download files on to the attached USB storage device so you won’t need to leave your computer on . To start a download, simply double-click on the torrent file you would like to download and Belkin’s torrent helper will start the download automatically . You can also do this manually by clicking on the “+” button . Hover your cursor over each part of the user interface and it will provide a brief description of its function .
51Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce Qo s QoS (Quality of Service) will automatically prioritize the traffic to and from the internet so you get an interruption-free Internet experience . The Router’s QoS will automatically prioritize the type of traffic that is more time-critical, such as VoIP, online games, and streaming video . We recommend that you leave this function enabled and the profile on “ a u t o ” . UPnP aV Media ser ver Easily share the media contents, such as photographs, movies, or music, stored in your USB storage device with other digital media players, such as Microsoft Xbox, Sony PS3, etc ., that support the UPnP protocols . You can disable this function by unchecking the box provided .
52Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce Configuring the f irewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding The firewall also masks common ports that are frequently used to attack networks . These ports appear to be “stealth” meaning that for all intents and purposes, they do not exist to a would-be hacker . You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled . Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled .
53Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce Configuring Internal f orwarding settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network . Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be “seen” . A list of common applications has been provided in case you need to configure the Virtual Server function for a specific application . If your application is not listed, you will need to contact the application vendor to find out which port settings you need . Choosing an application Select your application from the drop-down list . Click “Add” . The settings will be transferred to the next available space in the screen . Click “Apply Changes” to save the setting for that application . To remove an application, select the number of the row that you want to remove then click “Clear” . Manually entering settings into the Virtual s erver To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass (use a comma between multiple ports), select the port type ( TCP or UDP), and click “Apply Changes” . You can only pass one port per internal IP address . Opening ports in your firewall can pose a security risk . You can enable and disable settings very quickly . It is recommended that you disable the settings when you are not using a specific application .
54Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce access Control The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times . Restriction can be set for a single computer, a range of computers, or multiple computers . Select the “Enable” radio button to use this feature . To restrict Internet access to a single computer, for example, click the “Add” button and select the appropriate entry . This entry will deny access as a default according the specified criteria . Users can also add a particular MAC address of a device manually and press the “Add” button . They can also create a blanket rule for all the devices that are connecting via the Guest Access feature .
55Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce The Access Control rule can be removed by clicking the “Delete” button . Click on the entry number for the configuration options .There are four main configurations for Access Control lists . The first one is “Schedule” for that rule . The second is “Service” for the services to be blocked for that rule . The third is “URL Blocking” for the URL access restrictions, and the fourth is “URL Keyword Blocking” for certain keywords to be blocked in the URL address . “Everyday” is the default for the days of the week that this rule will be implemented on the “Schedule” page . The second configuration for the Access Control list is the “service” that is to be blocked or allowed . Users can choose to “Block All Services”, “Allow All Services”, or configure from a list of predefined popular services . The third configuration for the Access Control list is the “URL List” for the URL addresses that are to be blocked or allowed . Users can choose to “Block All URLs”, “Allow All URLs”, or configure their own list of URLs . The fourth configuration for the Access Control list is the “URL Keyword List” for the URL address keywords that are to be blocked or allowed . The default value is blank for this list and the user can configure a list of URL address keywords .
56Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce enabling the Demilitarized Zone (DMZ) The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall . This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application . Use this feature on a temporary basis . The computer in the DMZ is NOT protected from hacker attacks . To put a computer in the DMZ, enter the last digits of its IP address in the IP field and select “Enable” . Click “Apply Changes” for the change to take effect . If you are using multiple static WAN IP addresses, it is possible to select which WAN IP address the DMZ host will be directed to . Type in the WAN IP address you wish the DMZ host to direct to, enter the last two digits of the IP address of the DMZ host computer, select “Enable” and click “Apply Changes” .
57Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce Using Dynamic DN s The Dynamic DNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS .org offers, allowing your network computers to be more easily accessed from various locations on the Internet . DynDNS .org provides this service, for up to five host names, free to the Internet community . The Dynamic DNSSM service is ideal for a home website, file server, or to make it easy to access your home PC and stored files while you’re at work . Using the service can ensure that your host name always points to your IP address, no matter how often your ISP changes it . When your IP address changes, your friends and associates can always locate you by visiting yourname .dyndns .org instead! To register free for your Dynamic DNS host name, please visit http://www .dyndns .org . setting up the Router’s Dynamic DN s Update Client You must register with DynDNS .org’s free update service before using this feature . Once you have your registration, follow the directions below . 1� Select DynDNS as the “DDNS Service” (1) . 2� Enter your DynDNS .org user name in the “User Name” field (2) . 3� Enter your DynDNS .org password in the “Password” field (3) . 4� Enter the DynDNS .org domain name you set up with DynDNS .org in the “Domain Name” field (4) . 5� Click “Update Dynamic DNS” (5) to update your IP address . Whenever your IP address assigned by your ISP changes, the Router will automatically update DynDNS .org’s servers with your new IP address . You can also do this manually by clicking the “Update Dynamic DNS” button (5) . (1)(2)(3)(4) (5)
58Double N+ Wireless Router sectionstable of c ontents12345789106 UsINg TH e Web- base D aDV aNC eD Use R INT eR fa Ce blocking an ICMP Ping Computer hackers use what is known as “pinging” to find potential victims on the Internet . By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there . The Router can be set up so it will not respond to an ICMP ping from the outside . This heightens your Router’s security level . To turn off the ping response, select “Block ICMP Ping” (1) and click “Apply Changes” . The Router will not respond to an ICMP ping . securit y log This page keeps a log of router activity, such as computers logging in to and out of the Router, as well as attempts from the Internet to connect to the Router . This log file can be saved and cleared . Utilities The “Utilities” screen lets you manage different parameters of the Router and perform certain administrative functions . (1)