Belkin F5D7231P High-Speed Mode Wireless G Router w/ Print Server User Manual P74606 F5D7231 4P man indd
Belkin International, Inc. High-Speed Mode Wireless G Router w/ Print Server P74606 F5D7231 4P man indd
Belkin >
Contents
Users Manual Part 5
48
Alternate Setup Method
Alternate Setup Method
49
section
2
1
3
4
5
6
7
8
9
10
11
12
13
3. Password
Type in your password and retype it into the “Retype Password”
box to confirm it.
4. User Decide Login Server Manually
If your login server IP address is not available in the “Select Your
State” drop-down menu (1), you may manually enter the login
server IP address by placing a check in the box next to “User
decide login server manually” and type in the address next to
“Login Server” (5).
Setting Custom Domain Name Server (DNS) Settings
A “Domain Name Server” is a server located on the Internet that
translates Universal Resource Locater (URLs) like “www.belkin.com”
to IP addresses. Many Internet Service Providers (ISPs) do not require
you to enter this information into the Router. The “Automatic from ISP”
box (1) should be checked if your ISP did not give you a specific DNS
address. If you are using a static IP connection type, then you may
need to enter a specific DNS address and secondary DNS address for
your connection to work properly. If your connection type is dynamic
or PPPoE, it is likely that you do not have to enter a DNS address.
Leave the “Automatic from ISP” box checked. To enter the DNS address
settings, uncheck the “Automatic from ISP” box and enter your DNS
entries in the spaces provided. Click “Apply Changes” (2) to save
the settings.
(2)
(1)
50
Alternate Setup Method
Alternate Setup Method
51
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Configuring your WAN Media Access Controller
(MAC) Address
All network components including cards, adapters, and routers, have
a unique “serial number” called a MAC address. Your Internet Service
Provider may record the MAC address of your computer’s adapter and
only let that particular computer connect to the Internet service. When
you install the Router, its own MAC address will be “seen” by the
ISP and may cause the connection not to work. Belkin has provided
the ability to clone (copy) the MAC address of the computer into the
Router. This MAC address, in turn, will be seen by the ISP’s system as
the original MAC address and will allow the connection to work. If you
are not sure whether your ISP needs to see the original MAC address,
simply clone the MAC address of the computer that was originally
connected to the modem. Cloning the address will not cause any
problems with your network.
50
Alternate Setup Method
Alternate Setup Method
51
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Cloning your MAC Address
To clone your MAC address, make sure that you are using the computer
that was ORIGINALLY CONNECTED to your modem before the Router
was installed. Click the “Clone” button (1). Click “Apply Changes” (3).
Your MAC address is now cloned to the Router.
Entering a Specific MAC Address
In certain circumstances you may need a specific WAN MAC address.
You can manually enter one in the “MAC Address” page. Type in a
MAC address in the spaces provided (2) and click “Apply Changes” (3)
to save the changes. The Router’s WAN MAC address will now be
changed to the MAC address you specified.
(1)
(2)
(3)
52
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
53
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Using your Internet browser, you can access the Router’s Web-Based
Advanced User Interface. In your browser, type “192.168.2.1” (do
not type in anything else such as “http://” or “www”) then press the
“Enter” key.
You will see the Router’s home page in your browser window.
Viewing the LAN Settings
Clicking on the header of the LAN tab (1) will take you to the LAN
tab’s header page. A quick description of the functions can be
found here. To view the settings or make changes to any of the LAN
settings, click on “LAN Settings” (2) or to view the list of connected
computers, click on “DHCP Client List” (3).
(1)
(2)
(3)
52
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
53
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Changing LAN Settings
All settings for the internal LAN setup of the Router can be viewed
and changed here.
1. IP Address
The “IP address” is the internal IP address of the Router. The
default IP address is “192.168.2.1”. To access the advanced
setup interface, type this IP address into the address bar of your
browser. This address can be changed if needed. To change the
IP address, type in the new IP address and click “Apply Changes”.
The IP address you choose should be a non-routable IP.
Examples of a non-routable IP are:
192.168.x.x (where x is anything between 0 and 255)
10.x.x.x (where x is anything between 0 and 255)
2. Subnet Mask
There is no need to change the subnet mask. This is a unique,
advanced feature of your Belkin Router. It is possible to change
the subnet mask if necessary, however, do NOT make changes to
the subnet mask unless you have a specific reason to do so. The
default setting is “255.255.255.0”.
(1)
(2)
(3)
(4)
(6)
(5)
54
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
55
section
2
1
3
4
5
6
7
8
9
10
11
12
13
3. DHCP Server
The DHCP server function makes setting up a network very easy
by assigning IP addresses to each computer on the network
automatically. The default setting is “On”. The DHCP server
can be turned OFF if necessary, however, in order to do so you
must manually set a static IP address for each computer on
your network. To turn off the DHCP server, select “Off” and click
“Apply Changes”.
4. IP Pool
The range of IP addresses set aside for dynamic assignment to the
computers on your network. The default is 2–100 (99 computers). If
you want to change this number, you can do so by entering a new
starting and ending IP address and clicking on “Apply Changes”.
The DHCP server can assign 100 IP addresses automatically. This
means that you cannot specify an IP address pool larger than 100
computers. For example, starting at 50 means you have to end at
150 or lower so as not to exceed the 100-client limit. The starting
IP address must be lower in number than the ending IP address.
5. Lease Time
The length of time the DHCP server will reserve the IP address
for each computer. We recommend that you leave the lease
time set to “Forever”. The default setting is “Forever”, meaning
that any time a computer is assigned an IP address by the
DHCP server, the IP address will not change for that particular
computer. Setting lease times for shorter intervals such as one
day or one hour frees IP addresses after the specified period of
time. This also means that a particular computer’s IP address
may change over time. If you have set any of the other advanced
features of the Router such as DMZ or client IP filters, these are
dependent on the IP address. For this reason, you will not want
the IP address to change.
6. Local Domain Name
The default setting is “Belkin”. You can set a local domain name
(network name) for your network. There is no need to change this
setting unless you have a specific advanced need to do so. You can
name the network anything you want such as “MY NETWORK”.
54
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
55
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Viewing the DHCP Client List Page
You can view a list of the computers (known as clients), which are
connected to your network. You are able to view the IP address (1) of
the computer, the host name (2) (if the computer has been assigned
one), and the MAC address (3) of the computer’s network interface
card (NIC). Pressing the “Refresh” button will update the list. If there
have been any changes, the list will be updated.
(1) (2) (3)
56
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
57
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Configuring the Wireless Network Settings
The Wireless tab lets you make changes to the wireless network
settings. From this tab you can make changes to the wireless network
name (SSID), operating channel, encryption security settings, and
configure the Router to be used as an access point.
Changing the Wireless Network Name (SSID)
To identify your wireless network, a name called the SSID (Service
Set Identifier) is used. The default SSID of the Router is “belkin54g”.
You can change this to anything you want to or you can leave it
unchanged. If there are other wireless networks operating in your
area, you will want to make sure that your SSID is unique (does not
match that of another wireless network in the area). To change the
SSID, type in the SSID that you want to use in the SSID field (1) and
click “Apply Changes” (2). The change is immediate. If you make a
change to the SSID, your wireless-equipped computers may also need
to be reconfigured to connect to your new network name. Refer to the
documentation of your wireless network adapter for information on
making this change.
(1)
(2)
56
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
57
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Using the Wireless Mode Switch
Your Router can operate in three different wireless modes: “802.11g-
Auto”, “802.11g-Only”, and “802.11g-LRS”. The different modes are
explained below.
802.11g-Auto Mode
In this mode, the Router is compatible with 802.11b and 802.11g
wireless clients simultaneously. This is the factory default mode and
ensures successful operation with all Wi-Fi-compatible devices. If
you have a mix of 802.11b and 802.11g clients in your network, we
recommend setting the Router to 802.11g-Auto mode. This setting
should only be changed if you have a specific reason to do so.
802.11g-Only Mode
802.11g-Only mode works with 802.11g clients only. This mode
is recommended only if you want to prevent 802.11b clients from
accessing your network. To switch modes, select the desired
mode from the “Wireless Mode” drop-down box. Then, click
“Apply Changes”.
802.11g-LRS Mode
We recommend you DO NOT use this mode unless you have a very
specific reason to do so. This mode exists only to solve unique
problems that may occur with some 802.11b client adapters and is
NOT necessary for interoperability of 802.11g and 802.11b standards.
When to Use 802.11g-LRS Mode
In some cases, older 802.11b clients may not be compatible with
802.11g wireless. These adapters tend to be of inferior design and
may use older drivers or technology. 802.11g-LRS (Limited Rate
Support) allows these clients to be compatible with the newer
802.11g technology. Switching to this mode can solve problems that
sometimes occur with these clients. If you suspect that you are using
a client adapter that falls into this category of adapters, first check
with the adapter vendor to see if there is a driver update. If there
is no driver update available, switching to 802.11g-LRS mode may
fix your problem. Please note that switching to 802.11g-LRS mode may
decrease 802.11g performance slightly.
58
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
59
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Using High-Speed Mode
The Router supports two High-Speed modes, 125HSM* mode and
Frame Bursting mode.
Selecting “125HSM mode” will result in all devices running in 125HSM
mode if all devices are capable of 125Mbps speeds. If any
non-125HSM device connects or associates with the network, the
Router will automatically shift the entire network back to Frame
Bursting mode.
Selecting “Frame Bursting” will result in all devices capable of
Frame Bursting to function in Frame Bursting mode, and all clients
not capable, to operate in normal 802.11g modes. Frame Bursting
mode supports both Frame Bursting-enabled devices and non-Frame
Bursting-enabled devices simultaneously. Frame Bursting mode is
based on the unreleased 802.11e specification.
Selecting “Off” will disable Turbo mode.
*When operating in High-Speed Mode, this Wi-Fi device may achieve an actual throughput
of up to or greater than 34.1Mbps, which is the equivalent throughput of a system following
802.11g protocol and operating at a signaling rate of 125Mbps. Actual throughput will vary
depending on environmental operational and other factors.
58
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
59
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Changing the Wireless Channel
There are a number of operating channels you can choose from. In
the United States and Australia, there are 11 channels. In the United
Kingdom and most of Europe, there are 13 channels. In a small
number of other countries, there are other channel requirements.
Your Router is configured to operate on the proper channels for
the country you reside in. The default channel is 11 (unless you are
in a country that does not allow channel 11). The channel can be
changed if needed. If there are other wireless networks operating in
your area, your network should be set to operate on a channel that is
different than the other wireless networks. For best performance, use
a channel that is at least five channels away from the other wireless
network. For instance, if another network is operating on channel 11,
then set your network to channel 6 or below. To change the channel,
select the channel from the drop-down list. Click “Apply Changes”.
The change is immediate.
60
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
61
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Using the Broadcast SSID Feature
Note: This advanced feature should be employed by advanced users only.
For security, you can choose not to broadcast your network’s SSID.
Doing so will keep your network name hidden from computers that
are scanning for the presence of wireless networks. To turn off the
broadcast of the SSID, remove the check mark from the box next to
“Broadcast SSID”, and then click “Apply Changes”. The change is
immediate. Each computer now needs to be set to connect to your
specific SSID; an SSID of “ANY” will no longer be accepted. Refer to
the documentation of your wireless network adapter for information
on making this change.
Protected Mode Switch
As part of the 802.11g specification, Protected Mode ensures proper
operation of 802.11g clients and access points when there is heavy
802.11b traffic in the operating environment. When Protected mode
is ON, 802.11g scans for other wireless network traffic before it
transmits data. Therefore, using this mode in environments with
HEAVY 802.11b traffic or interference achieves best performance
results. If you are in an environment with very little—or no—other
wireless network traffic, your best performance will be achieved with
Protected mode OFF.
60
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
61
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Securing your Wi-Fi® Network
Here are a few different ways you can maximize the security of
your wireless network and protect your data from prying eyes and
ears. This section is intended for the home, home office, and small
office user. At the time of this manual’s publication, there are three
encryption methods available.
Name 64-bit Wired
Equivalent
Privacy
128-bit Wired
Equivalent
Privacy
Wi-Fi Protected
Access-TKIP
With Protected
Access
Acronym 64-bit WEP 128-bit WEP WPA-TKIP WPA-AES
Security Good Better Best Best
Features Static keys Static keys Dynamic key
encryption
and mutual
authentication.
Dynamic key
encryption
and mutual
authentication.
Encryption
keys based
on RC4
algorithm
(typically
40-bit keys)
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system
generated
data.
TKIP (temporal
key integrity
protocol)
added so
that keys are
rotated and
encryption is
strengthened.
AES (Advanced
Encryption
Standard) does
not cause any
throughput
loss.
WEP (Wired Equivalent Privacy)
WEP (Wired Equivalent Privacy) is a common protocol that adds
security to all Wi-Fi-compliant wireless products. WEP was designed
to give wireless networks the equivalent level of privacy protection as
a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which
includes a key length of 40 bits plus 24 additional bits of
system-generated data (64 bits total). Some hardware
manufacturers refer to 64-bit as 40-bit encryption. Shortly after
the technology was introduced, researchers found that 64-bit
encryption was too easy
to decode.
62
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
63
section
2
1
3
4
5
6
7
8
9
10
11
12
13
128-Bit WEP
As a result of 64-bit WEP’s potential security weaknesses, a more
secure method of 128-bit encryption was developed. 128-bit
encryption includes a key length of 104 bits plus 24 additional
bits of system-generated data (128 bits total). Some hardware
manufacturers refer to 128-bit as 104-bit encryption.
Most of the new wireless equipment in the market today supports
both 64-bit and 128-bit WEP encryption, but you might have
older equipment that only supports 64-bit WEP. All Belkin
wireless products will support both 64-bit and 128-bit WEP.
Encryption Keys
After selecting either the 64-bit or 128-bit WEP encryption mode, it is
critical that you generate an encryption key. If the encryption key is
not consistent throughout the entire wireless network, your wireless
networking devices will be unable to communicate with one another
on your network and you will not be able to successfully communicate
within your network.
You can enter your key by typing in the hex key manually, or you can
type in a passphrase in the “Passphrase” field and click “Generate”
to create a key. A hex (hexadecimal) key is a mixture of numbers and
letters from A–F and 0–9. For 64-bit WEP, you need to enter 10 hex
keys. For 128-bit WEP, you need to enter 26 hex keys.
For instance:
AF 0F 4B C3 D4 = 64-bit WEP key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key
The WEP passphrase is NOT the same as a WEP key. Your card uses
this passphrase to generate your WEP keys, but different hardware
manufacturers might have different methods on generating the keys.
If you have multiple vendors’ equipments in your network, the easiest
thing to do is to use the hex WEP key from your Router or access
point and enter it manually into the hex WEP key table in your card’s
configuration screen.
62
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
63
section
2
1
3
4
5
6
7
8
9
10
11
12
13
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access) is a new Wi-Fi standard that was
designed to improve upon the security features of WEP. To use WPA
security, the drivers and software of your wireless equipment must
be upgraded to support WPA. These updates will be found on the
wireless vendors website. There are two types of WPA security, WPA-
PSK (no server) and WPA (with radius server).
WPA-PSK (no server) uses what is known as a
Pre-Shared key as the Network key. A Network key is basically a
password that is between 8 and 63 characters long. It can be a
combination of letters, numbers, or characters. Each client uses
the same Network key to access the network. Typically, this is the
mode that will be used in a home environment.
WPA (with radius server) is a system where a radius server
distributes the Network key to the clients automatically. This is
typically found in a business environment.
For a list of Belkin wireless products that support WPA, please visit
our website at www.belkin.com/networking.
64
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
65
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Sharing the Same Network Keys
Most Wi-Fi products ship with security turned off. So once you have
your network working, you need to activate WEP or WPA and make
sure your wireless networking devices are sharing the same
Network key.
The Wireless G Desktop Network Card cannot access the network
because it is using a different Network key than the Network key that
is configured on the Wireless G Router.
Wireless G Router
Wireless G Notebook
Network Card
Wireless G Desktop
Network Card
Wireless G Desktop
Network Card
Network key=
WRONG Password
Network key=
MyPassword
Network key=
MyPassword
Network key=
MyPassword
64
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
65
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Using a Hexadecimal Key
A hexadecimal key is a mixture of numbers and letters from A–F and
0–9. 64-bit keys are five two-digit numbers. 128-bit keys are 13
two-digit numbers.
For instance:
AF 0F 4B C3 D4 = 64-bit key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key
In the boxes below, make up your key by writing in two characters
between A–F and 0–9 in each box. You will use this key to program
the encryption settings on your Router and your wireless computers.
Note to Mac users: Original Apple AirPort® products support 64-
bit encryption only. Apple AirPort 2 products can support 64-bit or
128-bit encryption. Please check your product to see which version
you are using. If you cannot configure your network with 128-bit
encryption, try 64-bit encryption.
66
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
67
section
2
1
3
4
5
6
7
8
9
10
11
12
13
WEP Setup
64-Bit WEP Encryption
1 Select “64-bit WEP” from the drop-down menu.
2. After selecting your WEP encryption mode, you can enter your
key by typing in the hex key manually, or you can type in a
passphrase in the “Passphrase” field and click “Generate” to
create a key.
A hex (hexadecimal) key is a mixture of numbers and letters from
A–F and 0–9. For 64-bit WEP, you need to enter 10 hex keys.
For instance:
AF 0F 4B C3 D4 = 64-bit WEP key
3. Click “Apply Changes” to finish. Encryption in the Router is now
set. Each of your computers on your wireless network will now
need to be configured with the same security settings.
WARNING: If you are configuring the Wireless Router or Access Point
from a computer with a wireless client, you will need to ensure that
security is turned ON for this wireless client. If this is not done, you
will lose your wireless connection.
66
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
67
section
2
1
3
4
5
6
7
8
9
10
11
12
13
128-Bit WEP Encryption
Note to Mac® users: The Passphrase option will not operate with
Apple® AirPort®. To configure encryption for your Mac computer,
set the encryption using the manual method described in the
next section.
1. Select “128-bit WEP” from the drop-down menu.
2. After selecting your WEP encryption mode, you can enter your
key manually by typing in the hex key manually, or you can type
in a passphrase in the “Passphrase” field and click “Generate” to
create a key.
A hex (hexadecimal) key is a mixture of numbers and letters from
A–F and 0–9. For 128-bit WEP, you need to enter 26 hex keys.
For instance:
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key
3. Click “Apply Changes” to finish. Encryption in the Router is now
set. Each of your computers on your wireless network will now
need to be configured with the same security settings.
WARNING: If you are configuring the Wireless Router or Access Point
from a computer with a wireless client, you will need to ensure that
security is turned ON for this wireless client. If this is not done, you
will lose your wireless connection.
68
Using the Web-Based Advanced User Interface
Using the Web-Based Advanced User Interface
69
section
2
1
3
4
5
6
7
8
9
10
11
12
13
Changing the Wireless Security Settings
Your Router is equipped with WPA (Wireless Protected Access), the
latest wireless security standard. It also supports the legacy security
standard, WEP (Wired Equivalent Privacy). By default, wireless
security is disabled. To enable security, you must first determine
which standard you want to use. To access the security settings, click
“Security” on the Wireless tab.
WPA Setup
Note: To use WPA security, all your clients must be upgraded to
drivers and software that support it. At the time of this manual’s
publication, a security patch download is available, for free, from
Microsoft. This patch works only with the Windows XP operating
system. You also need to download the latest driver for your Belkin
Wireless G Desktop or Notebook Network Card from the Belkin
support site. Other operating systems are not supported at this time.
Microsoft’s patch only supports devices with WPA-enabled drivers
such as Belkin 802.11g products.
There are two types of WPA security: WPA-PSK (no server) and WPA
(with radius server). WPA-PSK (no server) uses a so-called Pre-
Shared key as the security key. A Pre-Shared key is a password that
is between 8 and 63 characters long. It can be a combination of
letters, numbers, and other characters. Each client uses the same key
to access the network. Typically, this mode will be used in a home
environment.
WPA (with radius server) is a configuration wherein a radius server
distributes the keys to the clients automatically. This is typically used
in a business environment.
Setting WPA-PSK (no server)
1. From the “Security Mode” drop-down menu, select “WPA-PSK
(no server)”.
2. For Encryption Technique, select “TKIP” or “AES”. This setting
will have to be identical on the clients that you set up.
3. Enter your pre-shared key. This can be from 8 to 63 characters
and can be letters, numbers, or symbols. This same key must be
used on all of the clients that you set up. For example, your PSK
might be something like: “Smith family network key”.