Belkin F5D7230F Wireless G Router User Manual 3

Belkin International, Inc. Wireless G Router 3

User Manual 3

Download: Belkin F5D7230F Wireless G Router User Manual 3
Mirror Download [FCC.gov]Belkin F5D7230F Wireless G Router User Manual 3
Document ID914614
Application IDruPYarW7FybwIUyVY3PXlg==
Document DescriptionUser Manual 3
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize243.14kB (3039272 bits)
Date Submitted2008-03-14 00:00:00
Date Available2008-03-14 00:00:00
Creation Date2008-03-13 10:09:11
Producing SoftwareAdobe Acrobat 7.0 Image Conversion Plug-in
Document Lastmod2008-03-13 10:15:13
Document TitleUser Manual 3
Document CreatorAdobe Acrobat 7.0

Using the Web-Based Advanced User Interface
networks. For hest performance, use a channel that is at least five
channels away lrom the other wireless network. For instance. if another
network is operating on channel 11, then set your network to channel 6
or below. To change the channel. select the channel from the drop-down
list. click "Apply Changes". The change is lmmediate.
weer...) Cnml ml m
r. “on." M. "a.“ are, mmi mtlvv m4... ”at ,.,. on out,
ch n’ w an r». em, a". nr.
mm“, i .
new“,
mun-Am:
Using the Broadcast SSID Feature
Note: This advanced feature should be employed by advanced users only.
For security, you can choose not to broadcast your network's SSlD.
Doing so will keep your network name hidden from computers that
are scanning for the presence of wtreless networks. To turn oft the
broadcast of the SSID, remove the check mark from the box next to
“Broadcast SSlD", and then click "Apply changes". The change is
immediate. Each computer now needs to he set to connect to your
specific 58”): an SSID 0! "ANY" will no longer be accepted. Refer to
the documentation of your wireless network adapter for information on
making this change.
Protected Mode switch
As part of the 802.1 1g specification, Protected mode ensures proper
operation at 902 iig clients and access points when there is heavy
802.11!) traffic in the operating enVironmeht. When Protected mode is
ON, 802.119 scans for other wireless network traffic before it transmits
data. Therefore, using this mode in envrronrnents w'lth HEAVY 502.1“:
traffic or interference achieves best performance results. if you are in an
envrronrnent With very IIItIs—Dr no—other Wireless network traffic, your
best performance will he achieved with Protected mods OFF.
49
ua
Using the Web—Based Advanced User Interface
Securing your Wi- Network
Here are a low different ways you can maximize the security at your
Wireless network and protect your data irom prying eyes and ears. This
section is intended for the home, home office, and small office user
At the time oi this User Manuai‘s publication, there are tour encryption
methods available.
Nam. sir-BitWired 123—Bit Wired Wi-Fi Protected Wi-Fi Protected
En tent Equivalent Access-"GP Access 2
Privacy Privacy
Acronym 64—bitWEP 128—bltWEP WPA—TKIP/AES WPAZ—AES
tor just WA) (or |usl WPA?)
Security Good Better Best Besi
Features Static keys Static keys Dynamic key Dynamic key
encryption encryption
and mutual and mutual
authentication authentication
Encryption Moresecure TKlPtTemporal AEstAdvanced
keys based than ambit Key integrity Encryption
on HC4 WEP using a Protocol) Standardi
algorithm key length oi added so does not
(typically 104 hits plus that keys are cause any
40—bit keysi 24 additional rotated and throughput loss
bits oi system— encryption is
generated data strengthened
Wired Equivalent Privacy [WEP]
WEP is a common protocol that adds security to all Wi-Fi-compliant
Wireless products. WEP was designed to give wireless networks the
equivalent level or privacy prolection as a comparable wrred network
64-3" WEP
64-bit WEP was llrsl Introduced with 64>b|t encryption which Includes
a key length of 40 bits plus 24 additional bits el system—generated data
(64 bits totai). Some hardware manuiacturers reier to 64-bit as 40-bit
encryplion. Shortly after lhe technology was introduced, researchers
lound lhat 64-1)“ encryption was too easy lo decode.
50
Using the Web—Based Advanced User Interface
125-5" WEP
As a result or 64-bit WEP's potential security weaknesses, a more
secure method of iQS-bit encryption was developed. 128- it
encn/ption includes a key length ol1o4 bits plus 24 additional bits ol
system-generated data (128 bits total). Some hardware manuiacturers
referto128-bllas 1U4>Dlt encryption.
Most of the new wireless equipment in the market today suppons
both 54-bit and 128-bit WEP encwption. but you might have oider
equipment that only supports 64-bit WEP Ali Belkin Wireless products
Wili support both 64—bit and 128—bit WEP.
Encryption Keys
Atter selecting either the 64-bit or 128-bit WEP encryption mode. it is
critical that you generate an encryption key. it the encryption key is
not consistent throughout the entire wireless network. your Wireless
networking devices Will be unable to communicate With one another
on your network and you Will not be able to successluliy communicate
Within your network.
You can enter your key by typing in the hex key manually. or you can
type in a passphrase in the “Passphrase” tield and click “Generate“
to create a key. A hex (hexadecimal) key is a combination or numbers
and letters from A4: and oeg. For 64—bit WER you need to enter 10
hex keys For 128-bit WEP, you need to enter 25 hex keys
For Instance
AF DF LB 03 D1. = 64—bit WEP key
C3 03 DF AF OF AB 52 C3 DI. LB C3 D4 E7 =128-bitWEP key
The WEP passphrase is NOT the same as a WEP key. Your Router
uses this passphrase to generate your WEP keys, but dilferent
hardware manufacturers might have diiferent methods on generating
the keys it you have multiple vendors' equipment in your network.
the easiest thing to do is to use the hex WEP key lrom your Router or
access point and enter it manualiy into the hex WEP key table in your
Routers configuration screen.
51
USHDQS
Using the Web—Based Advanced User Interface
Wi-Fi Protected Access“ lWPA‘”l
WPA is a new Wi-Fi standard that was designed to improve upon the security
tealures of WEP To use WPA security, the drivers and software 0! your
wireless equipment must be upgraded to suppon WPA These updates Will
be found on the wireless vendor‘s website There are three types of WPA
security. WPA-PSK (no server), WPA (with radius sewer)‘ and WPA2.
WPA-PSK lno server] uses what is known as a pre-shared key as the
network key A network key is basically a password that is between eight
and 63 characters long. it can be a combination of letters, numbers. or
characters Each client uses the same network key to access the network
Typically, this is the mode that Will be used in a home environment.
WPA (with radius server] is a system where a radius server distributes
the network key to the clients automatically This is typically found in a
business environment
WPAz“ requires Advanced Encryption Standard (AES) lor encryption
of data. which otters much greater security than pr. pr uses both
Temporal Key Integrity protocol (TKIP) and (AES) lor encwptlon
For a list of Belkin wireless products that support WPA, please visit our
website at www.belkin.com/networking.
52
Using the Web—Based Advanced User Interface
Sharing the Same Network Keys
Most Wi-Fi products ship with security turned on So once you have your
network working, you need Io activate WEP or WPA and make sure your
wireless networking devices are sharing the same network key
The Wireless G Desktop Card cannot access the network because it
is using a dinerent network key than the network key that is configured
on the Wireless G Hauler.
53
UOHDBS
Using the Web-Based Advanced User Interface
WEP Setup
AA-BItWEP Encryptlon i
1. Select “64-bit WEP” from the “Security" menu’s
“Security Mode”.
2. Alter selecting your WEP encryption mode, you can enter your
key by typing in the hex key manually, or you can put a check 7
mark in “Passphrase”, then type in your passphrase Click
“Generate” to generate lour dilterem hex keys.
A hex (hexadecimal) key is a combination of numbers and letters
lrom A—F and 0-9 For 64-bit WEP, you need to enter 10
hex keys.
For instance: AF DF AB C3 DA = 64-bit WEP key
fl
unlpas
3. Click “Apply Changes" to save the setting.
wtnlun ileum
mum N-fi
.. m- I—_
«mm
innlAr—rle—la—fl‘ —
renal—l—l—l—l—
rt..-l‘l_l_l_l_
”ml—r—l—l—l—
lee. ... m.)
mYE Ya ltknmuicllv ant-rule mx 9-1; em .
915557171“, awl mt.
—®
WARNING: ll you are configuring the ‘Mreless G Router or access
point from El computer with El wireless client. you Wl|| need to ensure
that security is turned ON for this wirelese client it this is not done,
your client will lose its wireless connection
55
Using the Web—Based Advanced User Interface
Using a Haxadecimal Kay
A hexadecrmal key rs a oomblnatton of numbers and retters vrom A»F and
079 eA—brt keys are rrve two—dlglt humbers 128—brt keys are 13
two—orgrt humbers
For mstance
AF OF AB C3 04: 64-bit kay
03 03 UFAF OF LB B2 (23 DA LB C3 04 E7 =128-hitkay
In the boxes below make up your key by wrmng m two characters
between A4 and 079 m each box You wrh use thrs key to program the
encryptrorr setttngs orr your Router arrd your wtreless computers
mmuwlFITFIEF
“M—I—l—l—l—
MIIIIIIIIIIIII
Note to Mac users: Orrgrrrat Apple" ArrPort‘ products support
64—brt ehcryptron omy Appre Aerort 2 products can support 64—brt or
tzs-brt ehcrypuon Prsase check your product to see whrch verstoh you
are usmg rf you carmot configure your network wrth 128-brt encryptronr
try {SA-bu encryptton
54
Using the Web-Based Advanced User Interface
123—5" WEP Encryption
Note to Mac users: The passphrase option Wl|| not operate with
Apple Airport To configure encrypllcrl tor your Mac computer, set the
encryption using the manual method described in the next section.
1. Select “128-bit WEP” ll’om the “Security" menu‘s “Security Mode".
2. Alter selecting your WEP encryption mode, you can enter your key
by typing in the hex key manually, or you can put a check mark in
“Passphrase”, then type in your passphrase. Click “Generate" to
generate the hex Keys.
A hex (hexadecimal) key is a combination of numbers and
letters Il’om AeF and 079. For 128—bll WEP you need to enter
26 hex keys.
Forlnstance: t? 03 DF AF UF LB E2 C3 D4 45 C3 D4 E7 =128-h|l
WEP key
3. Click “Apply Changes" to save the settings
wtrotm > sxurly
uni-«v mu natirtwep j.
lua—
i527
Ere
FF
is ta. mm.)
WI
Em
mrE rr “mm-i amuxehex Dam are r
began-S4, llwt lhn.
new"... —_
_ q
WARNING: it you are configuring the ‘Mreless G Router or access point
li’om a computer with a wireless clienti you will need to ensure that
securlly is turned on for this Wireless client if this is not done, your
client will lose its Wireless connection.
56
Using the Web—Based Advanced User Interface
Changing the Wireless Security Settings
Your Router is equipped with the iatest security standard caiied Wi-Fi
Protected Access 2 (WPA2) and the iegacy security standard caiied
Wired Equivalent Privacy (WED) Your nouter aiso supports the Wi-Fi i
Protected SetupTM (WPS) specification, which simplilies the setup
of a wireless network. WPS uses iarniliar methodologies, such as
typing in a Personai identification Number (PIN) or pushing a button, —
to enable users to automatically configure network names and strong
WPA/WPAQ data encryption and aulnerillcallon By delaull, wireless
security is disabled To enable security, you will need to determine
which standard you want to use To access the security settings click
“Security“ on me ”Wireless" tab
Using Wi-Fi Protected Setup u
WPS uses WPA2 idescribed below) lor encryption It does not
provide additional security, but rather, standardizes the method
ior securing your Wireiess network You may use either the Push
Button Configuration (PBC) method or PlN method to allow a device
access to your wireless network. Conceptuaiiy, the two methods
Work as follows“
PEG Push and hold the WPS button located on the back of your
Router for three seconds. Then, initiate the WPS procedure on
the client device within two rninules Pieter to your clleril's 7
documentation ori this procedure. Pushing the PEG button will
aulomatically enable WPS. The client has now been securely added
to your wireless network
PiN. The ciient device has a PiN number (either tour or eight digits)
that is associated with WPS Enable WPS through the GUl shown
below Enter the client's PIN into the Houter‘s internal registrar
(accessed through this GUl).The client wtii be automaticaiiy enrolled
into your wireiess network within two minutes
USHDQS
57
Using the Web-Based Advanced User Interface
IELKIN new . ,_.. y,
met- - mun-um um-
w.n..-.n..... ....i was —7(1l
was 1'.’ asthma _£ b
u m i..e..._.u......in.. m.-
n mun-4 an...” n...-
.. w "Ween n. m... rel.” Mm. nnnrmhmw.
1v Wi-Fi Protected Setup (WPS): Enabled cr Disabled.
2. Personal Identification Number (PlN) Methnd: in this method, a wireless
elisnt wishing to assess your network must supply is 4- or 8»digit PIN to
the Router. Alter clicking "Enroll", you must stsrt the we handshaking
procedure from the ciientwithin two minutes,
3. Rnuter PiN: Ii an external registrer is available, you rnsy enter in the
Renter's PIN tn the registrar. Click “Generate New PIN" to change the PIN
lrom the deleuit vslue. Click "Restare Deleuit PIN“ to reset the
PIN value.
4. Push Button Configuration (PBC) Method: FBC is an alternate method to
connect to e WPS netwark. Push the PEG button Incated an the back of
the Router for three seconds, and then inltiate the PBC on the client device
Alternatively, push the “Start PBC" soft button to start this process.
5. Manual Contiguretien Methcd: This section lists the default security
settings if not using WPS.
The Router leetures pr2, which ls the secund generation or the
WPA-beeed 302.111 standard. lt otters a er level of wireless security
by cwmbining advanced network authentleetlen and stronger oneneeo
Encryption Standard (AES) encryption methods.
58
Using the Web—Based Advanced User Interface
WPA Setup
Note: To use WPA security. aii your clients must be upgraded to
drivers and software that support it. At the time of this User Manuals
puoircairon, a security patch download is available, ior iree, from
Microsott”. This patch works only with the Windows XP operating
system. You also need to download the latest driver for your Eelkin
Wireless G Desktop or Notebook Network Card from the Beikln
support site. other operating systems are not supported at this time.
Microsoit‘s patch only supports devices with WF‘A-enabled drivers
such as Belkin 802 11g products.
WPA uses a so-called pre-shared key as the security key. A
pre»shared key is a password that is between eight and 63
characters long. It can be a combination of letters, numbers, and
other Characters Each client uses the same key to access the
network. Typically, this mode will be used in a home environment.
WPA2 is the second generation oi pr. oirering a more advanced
encn/ption technique over MBA
59
USHDQS
Using the Web—Based Advanced User Interface
Selling WPAIWPAZ
1. Select “WPA/WPAZ-Personal (PSK)" from the “Security Mode"
drop—clown box.
2. Select “WPA>PSK” for just WPA authentication, or “WPAZ-PSK” for
just WPA2 authentication or you may select ”WF‘A-PSK + WPAQ-
PSK” lor WPA and WPA2 as the authentication type.
3. Enter your pie-shared key This can be from eight to 53 characters
and can be lellers‘ numbers, or symbols. Thls same key must be
used on all oi the clients that you set up This
prc-sharcd key will allow users full access to your network
including shared files and printers.
4. Click “Apply Changes” lo iinisn. You must now sel all clienls lo
match these settings depending on the type oi access you Want
them to have
60
Using the Web-Based Advanced User Interface
Guest Access (Optional)
The guesl pure—shaved key aucws guest users an Internet—only access In
resmct them from enlenng your network and having access to files cn
your PCs Enler ycur pre—shared key fcr guesl access This can be from _
eight to 63 characters and can be letters, numbers, or symburs, Chck
“Appw Changes" to finish. ,
nun» - -... , Mu...
m‘fiL'"-sa.“‘.“rmmrm Put a r»,
Tum: awa..fl_m—.w‘~“
UOHDBS
cm. “f.“ M m. a... a,
r“."“"“’.s_.s_'“ ”a mu
61
Using the Web—Based Advanced User Interface
Setting up WPA for Wireless Desktop and Wireless
Notebook Cards that are NOT Manufactured by Belkin
it you do NOT have a Belkin WPA Wireless Desktop or Wireless
Notebook Card, and it is not equipped with WPA-enabled software,
a tiie from Microsoft cailed “Windows XP Support Patch tor Wireless
Protected Access" is availabie tor free download
Please Note: The file that Microsoit has made availabie works only
With Windows xp. Other operating systems are not supported at
this time.
Important: You aiso need to ensure that the wireless card manufacturer
supports WPA and that you have downioaded and mstalied the latest
driver from their support site.
Supported Operating Systems.
' Windows XP Protessional
- Windows XP Home Edition
62
Using the Web-Based Advanced User Interface
Setting up Windows XP Wireless Network Utility to use
WPA-PSK
In order to use WPA—PSK, ensure you are using the Windows Wireless
Network Utility by doing the following:
1. Under Windows XP. click “Start > Control Panel > Network
Connections".
2. Rightrclick on "Wireless Network Connection Properties", and
select “Properties".
3. Ciicking on the “Wireless Networks" tab will display the
following screen. Ensure the “Use Windows to configure my
wireless network settings" box is oneekeu.
IJOHDBS
Using the Web-Based Advanced User Interface
4. Under the “Wireless Networks" tab, click the “Configure" button
and you will see the following screen.
Muir-SSW] unst-
w...“ r.-. m
Drhumwumn—m n-
math-"um!
-@
5. For a home or small business user, select “WPA-PSK" under
"Network Authentication".
Note: Select “WPA” ll you are uslng this computer to connect to
a corporate network that supports an authenllcation server such
as a radius server. Please consult your network adminlstrator lor
further lnlormellon.
6. Select “TKIP” or “AES” under “Data Encryption". This setting will
have to be identical to the Router that you set up‘
7. Type your encryption key in the “Network key" box.
Important: Enter your pre-shared key. This can be from eight to 63
characters and can be letters, numbers, or symbols. This same key
must be used on all of the clients that you setup.
8. Click “OK" to apply settings.
Using the Web—Based Advanced User Interface
Using the Access Point Mode
Note: This advanced leature should be employed by advanced users
only. The Flouter can be configured to work as a wireless network
access point. Using this mode will deieat the NAT tP sharing feature
and DHCP server. in Access Foint (AF) mode, the Router will need to
be configured with an IP address that is in the same subnet as the
rest of the network that you will bridge to. The delauit IP address
is 192.168.2254! and subnet mask is 255.255.2550. These can be
customized for your need. i
1. Enable the AF mode my selecting "Enable" in the "Use as
Access Point only" page. When you select this option, you will
be able to change the lP settings. a
2. Set your IP settings to match your network. Click “Apply
Changesi't
uollaes
3. Connect a cable from the “Modem" port on the Homer to your
existing network.
The Router is now acting as an access point. To access the Reuters
Web-Based Advanced User lnterlace again, type the IP address
you specified into your browser’s navigation bar. Vou can set the
encryptiwn settings, MAC address tilteiing, SSID, and
channel normally.
“nun
55
Using the Web-Based Advanced User Interface
Wireless Range Extension and Bridging
Wirsisss range extension and bridging works with the ioiiowing models only:
F5D7231-4 Wireless 6 Plus Router
FSD7230-4 Wireless G Router
rsonso Wireless G Range Extender/Access Point
FSD7132 Wireless G universal Range Extender
Please make sure to download the latest llrmware version for the Router or Access
Point for optimal pertormance: http:/lweh.belkln.:om/support
What is a Wireless Bridge?
A Wireless bridge is a "mode" in which your Wireless Router can directly
connect to a secondary Wireless Access Point. Note that you can only bridge
your Belkln Wireless G Router (model F5D7230-4.
F5D7231-4) to a Belkin Wireless G Range Extender/Access Point (model
F5D7131. F5D7130). We do not support orldging with access points ot other
manutacturers at this time. You can use the brldge mode to extend the range
at your wireless network. or add an extenslon or your network in another
area at your cities or home Without running cables.
Range Extension
Range extension WI|| extend the wireless coverage area in your home or
oilice. The example on the next page illustrates the use oi bridging to extend
the range of your wireless network. ln this example, the Router is set up to
connect to an Access Point located in another area. Laptops can roam or
move between the two Wireless coverage areas.
I . ' .
r ‘\
w a k l
WE \ \
(“Wm \ Wireless L
- \ Computer
.&
‘ ‘ wireless computers
56
Using the Web-Based Advanced User Interface
Adding Another Network Segmenl Wirelessly
Bridging an Access Pom! to your Router chws you to add a network
segment in another area in the home or ouics without running wlres.
Connecting a netwwk swltch Dr hub to the Access Point's HJ45 jack will 7
allow a number 01 computers connected to the switch access to the rest
0' the network.
Inxemu '7
UOHJGS
\ "gluw‘rwhh
WW ‘\ wnems
..f L ., if 54”
wned Compums
57
Using the Web-Based Advanced User Interface
Setting Up a Bridge Between your Wireless Router and 3
Secondary Access Point
Bridging your Belkin Router to a secondary Access Point requires that you
access the Router’s Advanced Setup Utility and enter the MAC address
of the Access Point in the appropriate area. There are also a few other
requirements. PLEASE BE SURE TO FOLLOW THE STEPS BELOW, CAREFULLY.
1.
Set your Access Point to the same channel as the Router. By
default, the Router and Access Point channels are set to channel
11 at the factory. If you have never changed the channel, you
don’t need to do anything (for more information on changing
channels, see page 48 of this User Manual).
Find the Access Point’s MAC address on the bottom of the
Access Point. There are two MAC addresses on the bottom label.
You will need the MAC address named “WLAN MAC Address“.
The MAC address starts with 003OBD and is followed by six
other numbers or letters (i.e. 003OBD—XXXXXX). Write the MAC
address below. Go to the next step.
Place your secondary Access Point within range of your Wireless
Router and near the area where you want to extend the range
or add the network segment. Typically, indoor range should be
between 100 and 200 feet.
Connect power to your Access Point. Make sure the Access
Point is on and proceed to the next step.
68
Using the Web-Based Advanced User Interface
5. From a computer already connected to your Router. access the
Advanced Setup Utility by opening your browser. In the address
bar. type in “192.168.21“ Do not type in “www” or “hum/l"
belcre the number. Note: w you have changed your Renter's IP 7
address, use that IF address.
6. You wilt see the Router's user interface in the browser window. —
Click “Wiretess Bridge" [2] on the Iett-hand side of the screen.
You wwll see the toHowing screen,
(H
mm. . mm. m
min m.“ .. no... am new (term em. .-..n mu... m.“ m...
m- u-.. ..... . n...
UOHJBS
(2)
.r.-..r...rurm-......enn.>.n.. mmlvlr
(3)
_ _
7. Check the box that says “Enable ONLY specific Access Points
to connect" (1).
a. \n the iie|ds named “AP1” [3], type m the MAC address of your
eeoondery Access Pomp When you neve typed m the address,
click “Apply Changes".
9. Bridging is now setup.
69
Using the Web—Based Advanced User Interface
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from
a wide array at common hacker attacks including:
0 IP Spoofing
' SYN flood
- Land Attack
- UDF' flooding
- Plng of Death (POD)
- Tear Drop Attack
- Denial 0! Service (Dos)
- ICMF' detect
- IP wlth zero length
- FlIP detect
. Smurt Attack
- Fragment flooding
- TCP Null Scan
The firewall also masks common ports that are lrequently used to attack
networks These ports appear to be “Stealth". meaning that lor all Intents
and purposes. they do not exist to a would-be hacker. You can turn
the 1Irewal|1unction on If needed: however. while disabling the llrewall
protection will not leave your network completely vulnerable to hacker
attacks, It Is recommended that you leave the firewall enabled.
nut-n ,
70
Using the Web-Based Advanced User Interface
Configuring Internal Forwarding Settings
The “Virtual Servers" function will allow you to route external (Internet)
calls for services such as a web server (port an), FTP server (Port 21),
or other applications through your Router to your internal network. _
Since your internal computers are protected by a firewall, computers
outside your network (over the Internet) cannot get to them because
they cannot be "seen" A list oi common applications has been
provided in case you need to configure the “Virtual Server" function
for a specific application You will need to contact the application
vendor to line out which port settings you need.
Fir-will > vnu- um“
tn nmn-li-lr—t w... M mmtim—mw Mm... ”Minn...“
w lfh!’ W‘s-r ("in mi r. n. “mm lm-qn ream... M w. m.
is
UUilDSS
Entering Settings into the VirtualServer
To enter settings, enter the iP address in the space provided for
the internal (server) machine, and the port(s) required to pass Then
select the port type (TOP or UDP), check the "Enable" pox, and click
"Apply Changes”. Each inbound port entry has two fields With five
characters maximum per field that allows a start and end port ranger
eigr [xxxxxHxxxxx]. For each entry, you can enter a single port value
by filling in the two fields with the same value (9 g. [7suoi-i75001) or
a wide range of ports (e g, [75001-[90001ii If you need multiple single
port values or a combination of ranges and a single value, you must
use multiple entries up to the maximum of 20 entries iB-J 1. [7500]—
[75001‘ 2 [8023145023], 3 [eaooi—[eoooiy You can only pass one port
per internal iP address. Opening ports in your firewall can pose a
security risk. You can enable arid disable settings very quickly It is
recommended that you disable the settings when you are not using a
specific application
71
Using the Web-Based Advanced User Interface
Selling client IP Filters
The Router can be configured to restrict access to the internal, email, or
other network services at specific days and times. Restriction can be set for
a single computer, a range of computers, or multiple computers.
=E=crzrll
EEeLE'EE
To restrict |nternet eccese tc e single computer. lor example. enter the lP
address 0! the computer you wish to restrict access (Q in the lP fields I‘ll.
Next, enter "so" in both the port fields [2]. Select "Beth" (3). Select “Black"
(th You can also select “Always" to block access all of the time. Select the
day to start on top [5]. the time to start on top (bl, the day to end on the
bottom (7), and the time to stop (8) on the bottom Select “Enable" (91. Click
“Apply Changes“. The computer at the iP address you specified Wlll new be
blocked from Internet access at the times you specified. Note: Be sure you
have selected the correct time zone under "Utilities> System Settlngs>
Time Zone".
[5] [Al
‘
(“ll lzl (3) (AI
72
Using the Web-Based Advanced User Interface
Setting MAC Address Filtering
The MAC address iiiter is a poweriul security leature tnat ailows you
to specify which computers are allowed on the network. Any computer
attempting to access the network that is not specified in ma tiiter list i
wIIi be denied access. When you enabie lhls feature. you must enter
the MAC address oi‘ eacn client (computer) on your network to allow
network access to each. 7
FINw-Ii > m: .« tIImIM [1]
m‘;‘;:.‘.';:m‘.::,1'7.:1:::'.1“.:3;.".'2 D/seflfi/
......w.,..n....., m a
m. ”an“.
Wm
I4]
LIGHDSS
To enable this teature, select "MAC Address Filtering“ and click
“Enable MAC Address Flitering“ I1]. Next enter the MAC address of
each computer on your network by clloklhg In the space provided [ZI
and entering the MAC address oi‘ the computer you want to add to the
list Cilck ”Add" (3), then “Apply Changes" (41 to save the settings.
You can have a MAC~address-tl|tering list of up to 32 computers.
Note: You will not be able to deiete the MAC address of the computer
you are using to access the Router‘s administrative functions (the
computer you are using now).
73

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Extract, Print high-res
XMP Toolkit                     : 3.1-701
Modify Date                     : 2008:03:13 10:15:13+08:00
Create Date                     : 2008:03:13 10:09:11+08:00
Metadata Date                   : 2008:03:13 10:15:13+08:00
Creator Tool                    : Adobe Acrobat 7.0
Format                          : application/pdf
Document ID                     : uuid:20f65a9f-8d33-4221-a475-fa9836c6c4ba
Instance ID                     : uuid:2fabe532-1203-4e3c-93e2-68a26da0619d
Producer                        : Adobe Acrobat 7.0 Image Conversion Plug-in
Page Count                      : 25
Creator                         : Adobe Acrobat 7.0
EXIF Metadata provided by EXIF.tools
FCC ID Filing: K7SF5D7230F

Navigation menu