Belkin F5D7230F Wireless G Router User Manual 3
Belkin International, Inc. Wireless G Router 3
Belkin >
Contents
User Manual 3
Using the Web-Based Advanced User Interface networks. For hest performance, use a channel that is at least five channels away lrom the other wireless network. For instance. if another network is operating on channel 11, then set your network to channel 6 or below. To change the channel. select the channel from the drop-down list. click "Apply Changes". The change is lmmediate. weer...) Cnml ml m r. “on." M. "a.“ are, mmi mtlvv m4... ”at ,.,. on out, ch n’ w an r». em, a". nr. mm“, i . new“, mun-Am: Using the Broadcast SSID Feature Note: This advanced feature should be employed by advanced users only. For security, you can choose not to broadcast your network's SSlD. Doing so will keep your network name hidden from computers that are scanning for the presence of wtreless networks. To turn oft the broadcast of the SSID, remove the check mark from the box next to “Broadcast SSlD", and then click "Apply changes". The change is immediate. Each computer now needs to he set to connect to your specific 58”): an SSID 0! "ANY" will no longer be accepted. Refer to the documentation of your wireless network adapter for information on making this change. Protected Mode switch As part of the 802.1 1g specification, Protected mode ensures proper operation at 902 iig clients and access points when there is heavy 802.11!) traffic in the operating enVironmeht. When Protected mode is ON, 802.119 scans for other wireless network traffic before it transmits data. Therefore, using this mode in envrronrnents w'lth HEAVY 502.1“: traffic or interference achieves best performance results. if you are in an envrronrnent With very IIItIs—Dr no—other Wireless network traffic, your best performance will he achieved with Protected mods OFF. 49 ua Using the Web—Based Advanced User Interface Securing your Wi- Network Here are a low different ways you can maximize the security at your Wireless network and protect your data irom prying eyes and ears. This section is intended for the home, home office, and small office user At the time oi this User Manuai‘s publication, there are tour encryption methods available. Nam. sir-BitWired 123—Bit Wired Wi-Fi Protected Wi-Fi Protected En tent Equivalent Access-"GP Access 2 Privacy Privacy Acronym 64—bitWEP 128—bltWEP WPA—TKIP/AES WPAZ—AES tor just WA) (or |usl WPA?) Security Good Better Best Besi Features Static keys Static keys Dynamic key Dynamic key encryption encryption and mutual and mutual authentication authentication Encryption Moresecure TKlPtTemporal AEstAdvanced keys based than ambit Key integrity Encryption on HC4 WEP using a Protocol) Standardi algorithm key length oi added so does not (typically 104 hits plus that keys are cause any 40—bit keysi 24 additional rotated and throughput loss bits oi system— encryption is generated data strengthened Wired Equivalent Privacy [WEP] WEP is a common protocol that adds security to all Wi-Fi-compliant Wireless products. WEP was designed to give wireless networks the equivalent level or privacy prolection as a comparable wrred network 64-3" WEP 64-bit WEP was llrsl Introduced with 64>b|t encryption which Includes a key length of 40 bits plus 24 additional bits el system—generated data (64 bits totai). Some hardware manuiacturers reier to 64-bit as 40-bit encryplion. Shortly after lhe technology was introduced, researchers lound lhat 64-1)“ encryption was too easy lo decode. 50 Using the Web—Based Advanced User Interface 125-5" WEP As a result or 64-bit WEP's potential security weaknesses, a more secure method of iQS-bit encryption was developed. 128- it encn/ption includes a key length ol1o4 bits plus 24 additional bits ol system-generated data (128 bits total). Some hardware manuiacturers referto128-bllas 1U4>Dlt encryption. Most of the new wireless equipment in the market today suppons both 54-bit and 128-bit WEP encwption. but you might have oider equipment that only supports 64-bit WEP Ali Belkin Wireless products Wili support both 64—bit and 128—bit WEP. Encryption Keys Atter selecting either the 64-bit or 128-bit WEP encryption mode. it is critical that you generate an encryption key. it the encryption key is not consistent throughout the entire wireless network. your Wireless networking devices Will be unable to communicate With one another on your network and you Will not be able to successluliy communicate Within your network. You can enter your key by typing in the hex key manually. or you can type in a passphrase in the “Passphrase” tield and click “Generate“ to create a key. A hex (hexadecimal) key is a combination or numbers and letters from A4: and oeg. For 64—bit WER you need to enter 10 hex keys For 128-bit WEP, you need to enter 25 hex keys For Instance AF DF LB 03 D1. = 64—bit WEP key C3 03 DF AF OF AB 52 C3 DI. LB C3 D4 E7 =128-bitWEP key The WEP passphrase is NOT the same as a WEP key. Your Router uses this passphrase to generate your WEP keys, but dilferent hardware manufacturers might have diiferent methods on generating the keys it you have multiple vendors' equipment in your network. the easiest thing to do is to use the hex WEP key lrom your Router or access point and enter it manualiy into the hex WEP key table in your Routers configuration screen. 51 USHDQS Using the Web—Based Advanced User Interface Wi-Fi Protected Access“ lWPA‘”l WPA is a new Wi-Fi standard that was designed to improve upon the security tealures of WEP To use WPA security, the drivers and software 0! your wireless equipment must be upgraded to suppon WPA These updates Will be found on the wireless vendor‘s website There are three types of WPA security. WPA-PSK (no server), WPA (with radius sewer)‘ and WPA2. WPA-PSK lno server] uses what is known as a pre-shared key as the network key A network key is basically a password that is between eight and 63 characters long. it can be a combination of letters, numbers. or characters Each client uses the same network key to access the network Typically, this is the mode that Will be used in a home environment. WPA (with radius server] is a system where a radius server distributes the network key to the clients automatically This is typically found in a business environment WPAz“ requires Advanced Encryption Standard (AES) lor encryption of data. which otters much greater security than pr. pr uses both Temporal Key Integrity protocol (TKIP) and (AES) lor encwptlon For a list of Belkin wireless products that support WPA, please visit our website at www.belkin.com/networking. 52 Using the Web—Based Advanced User Interface Sharing the Same Network Keys Most Wi-Fi products ship with security turned on So once you have your network working, you need Io activate WEP or WPA and make sure your wireless networking devices are sharing the same network key The Wireless G Desktop Card cannot access the network because it is using a dinerent network key than the network key that is configured on the Wireless G Hauler. 53 UOHDBS Using the Web-Based Advanced User Interface WEP Setup AA-BItWEP Encryptlon i 1. Select “64-bit WEP” from the “Security" menu’s “Security Mode”. 2. Alter selecting your WEP encryption mode, you can enter your key by typing in the hex key manually, or you can put a check 7 mark in “Passphrase”, then type in your passphrase Click “Generate” to generate lour dilterem hex keys. A hex (hexadecimal) key is a combination of numbers and letters lrom A—F and 0-9 For 64-bit WEP, you need to enter 10 hex keys. For instance: AF DF AB C3 DA = 64-bit WEP key fl unlpas 3. Click “Apply Changes" to save the setting. wtnlun ileum mum N-fi .. m- I—_ «mm innlAr—rle—la—fl‘ — renal—l—l—l—l— rt..-l‘l_l_l_l_ ”ml—r—l—l—l— lee. ... m.) mYE Ya ltknmuicllv ant-rule mx 9-1; em . 915557171“, awl mt. —® WARNING: ll you are configuring the ‘Mreless G Router or access point from El computer with El wireless client. you Wl|| need to ensure that security is turned ON for this wirelese client it this is not done, your client will lose its wireless connection 55 Using the Web—Based Advanced User Interface Using a Haxadecimal Kay A hexadecrmal key rs a oomblnatton of numbers and retters vrom A»F and 079 eA—brt keys are rrve two—dlglt humbers 128—brt keys are 13 two—orgrt humbers For mstance AF OF AB C3 04: 64-bit kay 03 03 UFAF OF LB B2 (23 DA LB C3 04 E7 =128-hitkay In the boxes below make up your key by wrmng m two characters between A4 and 079 m each box You wrh use thrs key to program the encryptrorr setttngs orr your Router arrd your wtreless computers mmuwlFITFIEF “M—I—l—l—l— MIIIIIIIIIIIII Note to Mac users: Orrgrrrat Apple" ArrPort‘ products support 64—brt ehcryptron omy Appre Aerort 2 products can support 64—brt or tzs-brt ehcrypuon Prsase check your product to see whrch verstoh you are usmg rf you carmot configure your network wrth 128-brt encryptronr try {SA-bu encryptton 54 Using the Web-Based Advanced User Interface 123—5" WEP Encryption Note to Mac users: The passphrase option Wl|| not operate with Apple Airport To configure encrypllcrl tor your Mac computer, set the encryption using the manual method described in the next section. 1. Select “128-bit WEP” ll’om the “Security" menu‘s “Security Mode". 2. Alter selecting your WEP encryption mode, you can enter your key by typing in the hex key manually, or you can put a check mark in “Passphrase”, then type in your passphrase. Click “Generate" to generate the hex Keys. A hex (hexadecimal) key is a combination of numbers and letters Il’om AeF and 079. For 128—bll WEP you need to enter 26 hex keys. Forlnstance: t? 03 DF AF UF LB E2 C3 D4 45 C3 D4 E7 =128-h|l WEP key 3. Click “Apply Changes" to save the settings wtrotm > sxurly uni-«v mu natirtwep j. lua— i527 Ere FF is ta. mm.) WI Em mrE rr “mm-i amuxehex Dam are r began-S4, llwt lhn. new"... —_ _ q WARNING: it you are configuring the ‘Mreless G Router or access point li’om a computer with a wireless clienti you will need to ensure that securlly is turned on for this Wireless client if this is not done, your client will lose its Wireless connection. 56 Using the Web—Based Advanced User Interface Changing the Wireless Security Settings Your Router is equipped with the iatest security standard caiied Wi-Fi Protected Access 2 (WPA2) and the iegacy security standard caiied Wired Equivalent Privacy (WED) Your nouter aiso supports the Wi-Fi i Protected SetupTM (WPS) specification, which simplilies the setup of a wireless network. WPS uses iarniliar methodologies, such as typing in a Personai identification Number (PIN) or pushing a button, — to enable users to automatically configure network names and strong WPA/WPAQ data encryption and aulnerillcallon By delaull, wireless security is disabled To enable security, you will need to determine which standard you want to use To access the security settings click “Security“ on me ”Wireless" tab Using Wi-Fi Protected Setup u WPS uses WPA2 idescribed below) lor encryption It does not provide additional security, but rather, standardizes the method ior securing your Wireiess network You may use either the Push Button Configuration (PBC) method or PlN method to allow a device access to your wireless network. Conceptuaiiy, the two methods Work as follows“ PEG Push and hold the WPS button located on the back of your Router for three seconds. Then, initiate the WPS procedure on the client device within two rninules Pieter to your clleril's 7 documentation ori this procedure. Pushing the PEG button will aulomatically enable WPS. The client has now been securely added to your wireless network PiN. The ciient device has a PiN number (either tour or eight digits) that is associated with WPS Enable WPS through the GUl shown below Enter the client's PIN into the Houter‘s internal registrar (accessed through this GUl).The client wtii be automaticaiiy enrolled into your wireiess network within two minutes USHDQS 57 Using the Web-Based Advanced User Interface IELKIN new . ,_.. y, met- - mun-um um- w.n..-.n..... ....i was —7(1l was 1'.’ asthma _£ b u m i..e..._.u......in.. m.- n mun-4 an...” n...- .. w "Ween n. m... rel.” Mm. nnnrmhmw. 1v Wi-Fi Protected Setup (WPS): Enabled cr Disabled. 2. Personal Identification Number (PlN) Methnd: in this method, a wireless elisnt wishing to assess your network must supply is 4- or 8»digit PIN to the Router. Alter clicking "Enroll", you must stsrt the we handshaking procedure from the ciientwithin two minutes, 3. Rnuter PiN: Ii an external registrer is available, you rnsy enter in the Renter's PIN tn the registrar. Click “Generate New PIN" to change the PIN lrom the deleuit vslue. Click "Restare Deleuit PIN“ to reset the PIN value. 4. Push Button Configuration (PBC) Method: FBC is an alternate method to connect to e WPS netwark. Push the PEG button Incated an the back of the Router for three seconds, and then inltiate the PBC on the client device Alternatively, push the “Start PBC" soft button to start this process. 5. Manual Contiguretien Methcd: This section lists the default security settings if not using WPS. The Router leetures pr2, which ls the secund generation or the WPA-beeed 302.111 standard. lt otters a er level of wireless security by cwmbining advanced network authentleetlen and stronger oneneeo Encryption Standard (AES) encryption methods. 58 Using the Web—Based Advanced User Interface WPA Setup Note: To use WPA security. aii your clients must be upgraded to drivers and software that support it. At the time of this User Manuals puoircairon, a security patch download is available, ior iree, from Microsott”. This patch works only with the Windows XP operating system. You also need to download the latest driver for your Eelkin Wireless G Desktop or Notebook Network Card from the Beikln support site. other operating systems are not supported at this time. Microsoit‘s patch only supports devices with WF‘A-enabled drivers such as Belkin 802 11g products. WPA uses a so-called pre-shared key as the security key. A pre»shared key is a password that is between eight and 63 characters long. It can be a combination of letters, numbers, and other Characters Each client uses the same key to access the network. Typically, this mode will be used in a home environment. WPA2 is the second generation oi pr. oirering a more advanced encn/ption technique over MBA 59 USHDQS Using the Web—Based Advanced User Interface Selling WPAIWPAZ 1. Select “WPA/WPAZ-Personal (PSK)" from the “Security Mode" drop—clown box. 2. Select “WPA>PSK” for just WPA authentication, or “WPAZ-PSK” for just WPA2 authentication or you may select ”WF‘A-PSK + WPAQ- PSK” lor WPA and WPA2 as the authentication type. 3. Enter your pie-shared key This can be from eight to 53 characters and can be lellers‘ numbers, or symbols. Thls same key must be used on all oi the clients that you set up This prc-sharcd key will allow users full access to your network including shared files and printers. 4. Click “Apply Changes” lo iinisn. You must now sel all clienls lo match these settings depending on the type oi access you Want them to have 60 Using the Web-Based Advanced User Interface Guest Access (Optional) The guesl pure—shaved key aucws guest users an Internet—only access In resmct them from enlenng your network and having access to files cn your PCs Enler ycur pre—shared key fcr guesl access This can be from _ eight to 63 characters and can be letters, numbers, or symburs, Chck “Appw Changes" to finish. , nun» - -... , Mu... m‘fiL'"-sa.“‘.“rmmrm Put a r», Tum: awa..fl_m—.w‘~“ UOHDBS cm. “f.“ M m. a... a, r“."“"“’.s_.s_'“ ”a mu 61 Using the Web—Based Advanced User Interface Setting up WPA for Wireless Desktop and Wireless Notebook Cards that are NOT Manufactured by Belkin it you do NOT have a Belkin WPA Wireless Desktop or Wireless Notebook Card, and it is not equipped with WPA-enabled software, a tiie from Microsoft cailed “Windows XP Support Patch tor Wireless Protected Access" is availabie tor free download Please Note: The file that Microsoit has made availabie works only With Windows xp. Other operating systems are not supported at this time. Important: You aiso need to ensure that the wireless card manufacturer supports WPA and that you have downioaded and mstalied the latest driver from their support site. Supported Operating Systems. ' Windows XP Protessional - Windows XP Home Edition 62 Using the Web-Based Advanced User Interface Setting up Windows XP Wireless Network Utility to use WPA-PSK In order to use WPA—PSK, ensure you are using the Windows Wireless Network Utility by doing the following: 1. Under Windows XP. click “Start > Control Panel > Network Connections". 2. Rightrclick on "Wireless Network Connection Properties", and select “Properties". 3. Ciicking on the “Wireless Networks" tab will display the following screen. Ensure the “Use Windows to configure my wireless network settings" box is oneekeu. IJOHDBS Using the Web-Based Advanced User Interface 4. Under the “Wireless Networks" tab, click the “Configure" button and you will see the following screen. Muir-SSW] unst- w...“ r.-. m Drhumwumn—m n- math-"um! -@ 5. For a home or small business user, select “WPA-PSK" under "Network Authentication". Note: Select “WPA” ll you are uslng this computer to connect to a corporate network that supports an authenllcation server such as a radius server. Please consult your network adminlstrator lor further lnlormellon. 6. Select “TKIP” or “AES” under “Data Encryption". This setting will have to be identical to the Router that you set up‘ 7. Type your encryption key in the “Network key" box. Important: Enter your pre-shared key. This can be from eight to 63 characters and can be letters, numbers, or symbols. This same key must be used on all of the clients that you setup. 8. Click “OK" to apply settings. Using the Web—Based Advanced User Interface Using the Access Point Mode Note: This advanced leature should be employed by advanced users only. The Flouter can be configured to work as a wireless network access point. Using this mode will deieat the NAT tP sharing feature and DHCP server. in Access Foint (AF) mode, the Router will need to be configured with an IP address that is in the same subnet as the rest of the network that you will bridge to. The delauit IP address is 192.168.2254! and subnet mask is 255.255.2550. These can be customized for your need. i 1. Enable the AF mode my selecting "Enable" in the "Use as Access Point only" page. When you select this option, you will be able to change the lP settings. a 2. Set your IP settings to match your network. Click “Apply Changesi't uollaes 3. Connect a cable from the “Modem" port on the Homer to your existing network. The Router is now acting as an access point. To access the Reuters Web-Based Advanced User lnterlace again, type the IP address you specified into your browser’s navigation bar. Vou can set the encryptiwn settings, MAC address tilteiing, SSID, and channel normally. “nun 55 Using the Web-Based Advanced User Interface Wireless Range Extension and Bridging Wirsisss range extension and bridging works with the ioiiowing models only: F5D7231-4 Wireless 6 Plus Router FSD7230-4 Wireless G Router rsonso Wireless G Range Extender/Access Point FSD7132 Wireless G universal Range Extender Please make sure to download the latest llrmware version for the Router or Access Point for optimal pertormance: http:/lweh.belkln.:om/support What is a Wireless Bridge? A Wireless bridge is a "mode" in which your Wireless Router can directly connect to a secondary Wireless Access Point. Note that you can only bridge your Belkln Wireless G Router (model F5D7230-4. F5D7231-4) to a Belkin Wireless G Range Extender/Access Point (model F5D7131. F5D7130). We do not support orldging with access points ot other manutacturers at this time. You can use the brldge mode to extend the range at your wireless network. or add an extenslon or your network in another area at your cities or home Without running cables. Range Extension Range extension WI|| extend the wireless coverage area in your home or oilice. The example on the next page illustrates the use oi bridging to extend the range of your wireless network. ln this example, the Router is set up to connect to an Access Point located in another area. Laptops can roam or move between the two Wireless coverage areas. I . ' . r ‘\ w a k l WE \ \ (“Wm \ Wireless L - \ Computer .& ‘ ‘ wireless computers 56 Using the Web-Based Advanced User Interface Adding Another Network Segmenl Wirelessly Bridging an Access Pom! to your Router chws you to add a network segment in another area in the home or ouics without running wlres. Connecting a netwwk swltch Dr hub to the Access Point's HJ45 jack will 7 allow a number 01 computers connected to the switch access to the rest 0' the network. Inxemu '7 UOHJGS \ "gluw‘rwhh WW ‘\ wnems ..f L ., if 54” wned Compums 57 Using the Web-Based Advanced User Interface Setting Up a Bridge Between your Wireless Router and 3 Secondary Access Point Bridging your Belkin Router to a secondary Access Point requires that you access the Router’s Advanced Setup Utility and enter the MAC address of the Access Point in the appropriate area. There are also a few other requirements. PLEASE BE SURE TO FOLLOW THE STEPS BELOW, CAREFULLY. 1. Set your Access Point to the same channel as the Router. By default, the Router and Access Point channels are set to channel 11 at the factory. If you have never changed the channel, you don’t need to do anything (for more information on changing channels, see page 48 of this User Manual). Find the Access Point’s MAC address on the bottom of the Access Point. There are two MAC addresses on the bottom label. You will need the MAC address named “WLAN MAC Address“. The MAC address starts with 003OBD and is followed by six other numbers or letters (i.e. 003OBD—XXXXXX). Write the MAC address below. Go to the next step. Place your secondary Access Point within range of your Wireless Router and near the area where you want to extend the range or add the network segment. Typically, indoor range should be between 100 and 200 feet. Connect power to your Access Point. Make sure the Access Point is on and proceed to the next step. 68 Using the Web-Based Advanced User Interface 5. From a computer already connected to your Router. access the Advanced Setup Utility by opening your browser. In the address bar. type in “192.168.21“ Do not type in “www” or “hum/l" belcre the number. Note: w you have changed your Renter's IP 7 address, use that IF address. 6. You wilt see the Router's user interface in the browser window. — Click “Wiretess Bridge" [2] on the Iett-hand side of the screen. You wwll see the toHowing screen, (H mm. . mm. m min m.“ .. no... am new (term em. .-..n mu... m.“ m... m- u-.. ..... . n... UOHJBS (2) .r.-..r...rurm-......enn.>.n.. mmlvlr (3) _ _ 7. Check the box that says “Enable ONLY specific Access Points to connect" (1). a. \n the iie|ds named “AP1” [3], type m the MAC address of your eeoondery Access Pomp When you neve typed m the address, click “Apply Changes". 9. Bridging is now setup. 69 Using the Web—Based Advanced User Interface Configuring the Firewall Your Router is equipped with a firewall that will protect your network from a wide array at common hacker attacks including: 0 IP Spoofing ' SYN flood - Land Attack - UDF' flooding - Plng of Death (POD) - Tear Drop Attack - Denial 0! Service (Dos) - ICMF' detect - IP wlth zero length - FlIP detect . Smurt Attack - Fragment flooding - TCP Null Scan The firewall also masks common ports that are lrequently used to attack networks These ports appear to be “Stealth". meaning that lor all Intents and purposes. they do not exist to a would-be hacker. You can turn the 1Irewal|1unction on If needed: however. while disabling the llrewall protection will not leave your network completely vulnerable to hacker attacks, It Is recommended that you leave the firewall enabled. nut-n , 70 Using the Web-Based Advanced User Interface Configuring Internal Forwarding Settings The “Virtual Servers" function will allow you to route external (Internet) calls for services such as a web server (port an), FTP server (Port 21), or other applications through your Router to your internal network. _ Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen" A list oi common applications has been provided in case you need to configure the “Virtual Server" function for a specific application You will need to contact the application vendor to line out which port settings you need. Fir-will > vnu- um“ tn nmn-li-lr—t w... M mmtim—mw Mm... ”Minn...“ w lfh!’ W‘s-r ("in mi r. n. “mm lm-qn ream... M w. m. is UUilDSS Entering Settings into the VirtualServer To enter settings, enter the iP address in the space provided for the internal (server) machine, and the port(s) required to pass Then select the port type (TOP or UDP), check the "Enable" pox, and click "Apply Changes”. Each inbound port entry has two fields With five characters maximum per field that allows a start and end port ranger eigr [xxxxxHxxxxx]. For each entry, you can enter a single port value by filling in the two fields with the same value (9 g. [7suoi-i75001) or a wide range of ports (e g, [75001-[90001ii If you need multiple single port values or a combination of ranges and a single value, you must use multiple entries up to the maximum of 20 entries iB-J 1. [7500]— [75001‘ 2 [8023145023], 3 [eaooi—[eoooiy You can only pass one port per internal iP address. Opening ports in your firewall can pose a security risk. You can enable arid disable settings very quickly It is recommended that you disable the settings when you are not using a specific application 71 Using the Web-Based Advanced User Interface Selling client IP Filters The Router can be configured to restrict access to the internal, email, or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers. =E=crzrll EEeLE'EE To restrict |nternet eccese tc e single computer. lor example. enter the lP address 0! the computer you wish to restrict access (Q in the lP fields I‘ll. Next, enter "so" in both the port fields [2]. Select "Beth" (3). Select “Black" (th You can also select “Always" to block access all of the time. Select the day to start on top [5]. the time to start on top (bl, the day to end on the bottom (7), and the time to stop (8) on the bottom Select “Enable" (91. Click “Apply Changes“. The computer at the iP address you specified Wlll new be blocked from Internet access at the times you specified. Note: Be sure you have selected the correct time zone under "Utilities> System Settlngs> Time Zone". [5] [Al ‘ (“ll lzl (3) (AI 72 Using the Web-Based Advanced User Interface Setting MAC Address Filtering The MAC address iiiter is a poweriul security leature tnat ailows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in ma tiiter list i wIIi be denied access. When you enabie lhls feature. you must enter the MAC address oi‘ eacn client (computer) on your network to allow network access to each. 7 FINw-Ii > m: .« tIImIM [1] m‘;‘;:.‘.';:m‘.::,1'7.:1:::'.1“.:3;.".'2 D/seflfi/ ......w.,..n....., m a m. ”an“. Wm I4] LIGHDSS To enable this teature, select "MAC Address Filtering“ and click “Enable MAC Address Flitering“ I1]. Next enter the MAC address of each computer on your network by clloklhg In the space provided [ZI and entering the MAC address oi‘ the computer you want to add to the list Cilck ”Add" (3), then “Apply Changes" (41 to save the settings. You can have a MAC~address-tl|tering list of up to 32 computers. Note: You will not be able to deiete the MAC address of the computer you are using to access the Router‘s administrative functions (the computer you are using now). 73
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Extract, Print high-res XMP Toolkit : 3.1-701 Modify Date : 2008:03:13 10:15:13+08:00 Create Date : 2008:03:13 10:09:11+08:00 Metadata Date : 2008:03:13 10:15:13+08:00 Creator Tool : Adobe Acrobat 7.0 Format : application/pdf Document ID : uuid:20f65a9f-8d33-4221-a475-fa9836c6c4ba Instance ID : uuid:2fabe532-1203-4e3c-93e2-68a26da0619d Producer : Adobe Acrobat 7.0 Image Conversion Plug-in Page Count : 25 Creator : Adobe Acrobat 7.0EXIF Metadata provided by EXIF.tools