Belkin F5D7234V3 Belkin G Wireless Router User Manual K7S F5D7234V3

Belkin International, Inc. Belkin G Wireless Router K7S F5D7234V3

User Manual

G Wireless Router
User Manual
PM01110-A F5D7234 -4
F5D7234-4 v3
i
G Wireless Router
SECTIONS 12345678910Table of Contents
TABLE OF CONTENTS
Securing your Wi-Fi Network ................................49
WEP Setup ............................................52
Using Wi-Fi Protected Setup ..............................54
WPA Setup.............................................55
Setting WPA/WPA2......................................56
Guest Access ..........................................56
Using the Access Point Mode ...............................59
Configuring the Firewall ....................................60
Setting MAC Address Filtering...............................63
Enabling the DMZ .........................................64
Utilities Tab ..............................................65
Restarting the Router ......................................66
Updating the Firmware .....................................69
7 Manually Configuring Network Settings ...................75
8 Recommended Web Browser Settings ....................80
9 Troubleshooting........................................82
10 Information ...........................................99
1 Introduction ............................................1
Benefits of a Home Network..................................1
Advantages of a Wireless Network ............................1
Placement of your Router for Optimal Performance...............2
2 Product Overview .......................................5
Product Features...........................................5
3 Knowing your Router ....................................7
Package Contents ..........................................7
System Requirements.......................................7
Setup Assistant Software System Requirements .................7
4 Connecting and Configuring your Router ..................11
5Alternate Setup Method .................................25
6 Using the Web-Based Advanced User Interface ............40
Changing LAN Settings.....................................41
Viewing the DHCP Client List Page ...........................43
Configuring the Wireless Network Settings.....................43
1
G Wireless Router
SECTIONSTable of Contents 23456789101
INTRODUCTION
Thank you for purchasing the Belkin G Wireless Router (the Router). The following two short sections discuss the benefits of home
networking and outline best practices for maximizing your wireless home network range and performance. Please be sure to
read through this User Manual completely, and pay special attention to the section entitled “Placement of your Router for Optimal
Performance” on page 2.
Advantages of a Wireless Network
Ř Mobility – you’ll no longer need a dedicated “computer
room”now you can work on a networked laptop or desktop
computer anywhere within your wireless range
Ř Easy installation – The Belkin Setup Assistant software makes
setup simple
Ř Flexibility – set up and access printers, computers, and other
networking devices from anywhere in your home
Ř Easy expansion – the wide range of Belkin networking products
lets you expand your network to include devices such as printers
and gaming consoles
Ř No cabling required – you can spare the expense and hassle of
retrofitting Ethernet cabling throughout the home or office
Ř Widespread industry acceptance – choose from a wide range of
interoperable networking products
Ř Share one high-speed Internet connection with all the computers
in your home
Ř Share resources, such as files and hard drives among all the
connected computers in your home
Ř Share a single printer with the entire family
Ř Share documents, music, video, and digital pictures
Ř Store, retrieve, and copy files from one computer to another
Ř Simultaneously play games online, check Internet email, and chat
Benefits of a Home Network
2
G Wireless Router
SECTIONSTable of Contents 23456789101
INTRODUCTION
Ř Ensure that your Router’s networking antennas are parallel to each
other, and are positioned vertically (toward the ceiling). If your
Router itself is positioned vertically, point the antennas as much as
possible in an upward direction.
Ř In multistory homes, place the Router on a floor that is as close
to the center of the home as possible. This may mean placing the
Router on an upper floor.
Ř Try not to place the Router near a cordless phone.
2. Avoid Obstacles and Interference
Avoid placing your Router near devices that may emit radio “noise,
such as microwave ovens. Dense objects that can inhibit wireless
communication include:
Ř Refrigerators
Ř Washers and/or dryers
Ř Metal cabinets
Ř Large aquariums
Ř Metallic-based, UV-tinted windows
If your wireless signal seems weak in some spots, make sure that
objects such as these are not blocking the signal’s path (between your
computers and Router).
Placement of your Router for Optimal Performance
Important Factors for Placement and Setup
Your wireless connection will be stronger the closer your computer is
to your Router. Typical indoor operating range for wireless devices is
between 100 and 200 feet.
In the same way, your wireless connection and performance will degrade
somewhat as the distance between your Router and connected devices
increases. This may or may not be noticeable to you. As you move
farther from your Router, connection speed may decrease. Factors that
can weaken signals simply by getting in the way of your network’s radio
waves are metal appliances or obstructions, and walls.
If you have concerns about your network’s performance that might be
related to range or obstruction factors, try moving the computer to a
position between five and 10 feet away from the Router in order to see if
distance is the problem. If difficulties persist even at close range, please
contact Belkin Technical Support.
Note: While some of the items listed below can affect network
performance, they will not prohibit your wireless network from
functioning; if you are concerned that your network is not operating at
its maximum effectiveness, this checklist may help.
1. Wireless Router Placement
Place your Router, the central connection point of your network, as
close as possible to the center of your wireless network devices.
To achieve the best wireless network coverage for your “wireless clients”
(i.e., computers enabled by Belkin Wireless Notebook Network Cards,
Wireless Desktop Network Cards, and Wireless USB Adapters):
3
G Wireless Router
SECTIONSTable of Contents 23456789101
INTRODUCTION
4. Choose the “Quietest” Channel for your Wireless Network
In locations where homes or offices are close together, such as
apartment buildings or office complexes, there may be wireless
networks nearby that can conflict with yours.
Use the Site Survey capabilities found in the wireless utility of your
wireless adapter or card to locate any other wireless networks that
are available (see your wireless adapter’s or card’s user manual), and
move your Router and computers to a channel as far away from other
networks as possible.
Ř Experiment with more than one of the available channels in
order to find the clearest connection and avoid interference from
neighboring cordless phones or other wireless devices.
Ř For Belkin wireless networking products, use the detailed Site
Survey and wireless channel information included with your
Wireless Network Card or Adapter. See your Network Card’s user
guide for more information.
These guidelines should allow you to cover the maximum possible area
with your Router. Should you need to cover an even wider area, we
suggest the Belkin Wireless G Universal Range Extender/Access Point.
3. Cordless Phones
If the performance of your wireless network is impaired after attending
to the above issues, and you have a cordless phone:
Ř Try moving cordless phones away from the Router and your
wireless-enabled computers.
Ř Unplug and remove the battery from any cordless phone
that operates on the 2.4GHz band (check the manufacturer’s
information). If this fixes the problem, your phone may
be interfering.
Ř If your phone supports channel selection, change the channel on
the phone to the farthest channel from your wireless network. For
example, change the phone to channel 1 and move your Router to
channel 11. See your phone’s user manual for detailed instructions.
Ř If necessary, consider switching to a 900MHz cordless phone.
4
G Wireless Router
SECTIONSTable of Contents 23456789101
INTRODUCTION
5. Secure Connections, VPNs, and AOL
Secure connections typically require a user name and password, and
are used where security is important. Secure connections include:
Ř Virtual Private Network (VPN) connections, often used to connect
remotely to an office network
Ř The “Bring Your Own Access” program from America Online (AOL),
which lets you use AOL through broadband provided by another
cable or DSL service
Ř Most online banking websites
Ř Many commercial websites that require a user name and password
to access your account
Secure connections can be interrupted by a computer’s power
management setting, which causes it to “go to sleep.” The easiest
solution to avoid this is to simply reconnect by rerunning the VPN or
AOL software, or by re-logging into the secure website.
A second alternative is to change your computer’s power management
settings so it does not go to sleep; however, this may not be appropriate
for portable computers. To change your power management setting
under Windows, see the “Power Options” item in the Control Panel.
If you continue to have difficulty with secure connections, VPNs, and
AOL, please review the steps above to be sure you have addressed
these issues.
For more information regarding our networking products, visit our
website at www.belkin.com/networking.
5
G Wireless Router
SECTIONSTable of Contents 1 345678910
PRODUCT OVERVIEW
2
Product Features
In minutes you will be able to share your Internet connection and
network your computers. The following is a list of features that make
your new Belkin G Wireless Router an ideal solution for your home or
small office network.
Works with Both PCs and Mac® Computers
The Router supports a variety of networking environments including
Mac OS®, 9.x, X v10.x, AppleTalk®, Linux®, Windows® 98, Me, NT®,
2000, XP, Vista®, and others. All that is needed is an Internet browser
and a network adapter that supports TCP/IP (the standard language of
the Internet).
Front-Panel LED Display
Lighted LEDs on the front of the Router indicate which functions are in
operation. You’ll know at-a-glance whether your Router is connected to
the Internet. This feature eliminates the need for advanced software and
status-monitoring procedures.
Web-Based Advanced User Interface
You can set up the Router’s advanced functions easily through your web
browser, without having to install additional software onto the computer.
There are no disks to install or keep track of and, best of all, you can
make changes and perform setup functions from any computer on the
network quickly and easily.
NAT IP Address Sharing
Your Router employs Network Address Translation (NAT) to share the
single IP address assigned to you by your Internet Service Provider while
saving the cost of adding IP addresses to your Internet service account.
SPI Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including IP Spoofing, Land
Attack, Ping of Death (PoD), Denial of Service (DoS), IP with zero length,
Smurf Attack, TCP Null Scan, SYN flood, UDP flooding, Tear Drop
Attack, ICMP defect, RIP defect, and fragment flooding.
Integrated 10/100 4-Port Switch
The Router has a built-in, 4-port network switch to allow your wired
computers to share printers, data and MP3 files, digital photos, and
much more. The switch features automatic detection so it will adjust to
the speed of connected devices. The switch will transfer data between
computers and the Internet simultaneously without interrupting or
consuming resources.
Universal Plug-and-Play (UPnP) Compatibility
UPnP (Universal Plug-and-Play) is a technology that offers seamless
operation of voice messaging, video messaging, games, and other
applications that are UPnP-compliant.
6
G Wireless Router
SECTIONSTable of Contents 1 3456789102
PRODUCT OVERVIEW
Support for VPN Pass-Through
If you connect to your office network from home using a VPN
connection, your Router will allow your VPN-equipped computer to pass
through the Router and to your office network.
Built-In Dynamic Host Configuration Protocol (DHCP)
Built-In Dynamic Host Configuration Protocol (DHCP) on-board makes
for the easiest possible connection of a network. The DHCP server will
assign IP addresses to each computer automatically so there is no need
for a complicated networking setup.
Setup Assistant Software
The Setup Assistant Software takes the guesswork out of setting up
your Router. This automatic software determines your network settings
for you and sets up the Router for connection to your Internet Service
Provider (ISP). In a matter of minutes, your Wireless Router will be up
and running on the Internet.
NOTE: Setup Assistant Software is compatible with Windows 2000,
XP, Vista, and Mac OS X. If you are using another operating system,
the Wireless Router can be set up using the Alternate Setup Method
described in this User Manual (see page 25).
Integrated 802.11g Wireless Access Point
802.11g is an exciting new wireless technology that achieves data rates
up to 54Mbps, nearly five times faster than 802.11b.
MAC Address Filtering
For added security, you can set up a list of MAC addresses (unique
client identifiers) that are allowed access to your network. Every
computer has its own MAC address. Simply enter these MAC addresses
into a list using the Web-Based Advanced User Interface and you can
control access to your network.
7
G Wireless Router
SECTIONSTable of Contents 12 45678910
KNOWING YOUR ROUTER
3
Package Contents
Ř Belkin G Wireless Router
Ř Quick Installation Guide
Ř Belkin Setup Assistant Software CD with User Manual
Ř Belkin RJ45 Ethernet Networking Cable
Ř Power Supply
System Requirements
Ř Broadband Internet connection such as a cable or DSL modem
with RJ45 (Ethernet) connection
Ř At least one computer with an installed network interface adapter
Ř TCP/IP networking protocol installed on each computer
Ř RJ45 Ethernet networking cable
Ř Internet browser
Setup Assistant Software System Requirements
Ř A PC running Windows 2000, XP, or Vista, or a Mac computer
running Mac OS X v10.4 or v10.5
Ř Minimum 64MB RAM
Ř Internet browser
The Router has been designed to be placed on a desktop. All of the
cables exit from the rear of the Router for better organization and utility.
The LED indicators are easily visible on the front of the Router to provide
you with information about network activity and status.
(6)
(1)
(2)
(3)
(4)
(5)
8
G Wireless Router
SECTIONSTable of Contents 12 456789103
KNOWING YOUR ROUTER
3. Security/WPS LED
OFF Wireless security is OFF
Solid Green Wireless security is ON
Blinking Green WPS sync in progress
4. Wireless Network LED
OFF Wireless is OFF
Solid Green Wireless is ON
Blinking Green Indicates wireless activity
1. Modem LED
This LED lights in GREEN to indicate that your modem is connected
properly to the Router. It blinks rapidly when information is being sent
over the port between the Router and the modem.
OFF Not connected to the modem
Solid Green Connected to the modem
Blinking Green Router is connecting to the ISP/
indicates modem activity
2. Power LED
When you apply power to the Router or restart it, a short period of time
elapses while the Router boots up.
OFF Router is OFF
Solid Green Router is ready
9
G Wireless Router
SECTIONSTable of Contents 12 456789103
KNOWING YOUR ROUTER
5. Internet LED
This unique LED shows you when the Router is connected to the
Internet. When the light is OFF, the Router is NOT connected to the
Internet. When the light is blinking, the Router is attempting to connect
to the Internet. When the light is solid GREEN, the Router is connected
to the Internet. When using the “Disconnect after x minutes” feature,
this LED becomes extremely useful in monitoring the status of your
Router’s connection.
OFF Router is not connected to
the Internet
Blinking Green Router is attempting to connect
to the Internet
Solid Green Router is connected to
the Internet
6. Wired LEDs (1 – 2 – 3 – 4)
These LEDs are labeled 1–4 and correspond to the numbered ports on
the rear of the Router. When a computer is properly connected to one
of the wired computer ports on the rear of the Router, the LED will light.
GREEN means a 10/100Base-T device is connected. When information
is being sent over the port, the LED blinks rapidly.
OFF No device is linked to the port
Solid Green 10/100Base-T device connected
Blinking Green Port activity
(7)
(8)
(9)
10
G Wireless Router
SECTIONSTable of Contents 12 456789103
KNOWING YOUR ROUTER
7. Power Jack
Connect the included 9V DC power supply to this jack.
8. Connections to Computers (Wired Computer Ports) – Gray
Connect your wired (non-wireless) computers to these ports. These
ports are RJ45, 10/100 auto-negotiation, auto-uplinking ports for
standard UTP category 5 or 6 Ethernet cable. The ports are labeled 1
through 4. These ports correspond to the numbered LEDs on the front
of the Router.
9. Connection to Modem (Modem Port) – Yellow
This port is for connection to your cable or DSL modem. Use the cable
that was provided with the Router to connect the modem to this port.
Use of a cable other than the cable supplied with the Router may not
work properly.
10. Reset Button
The “Reset” button is used in rare cases when the Router may function
improperly. Resetting the Router will restore the Router’s normal
operation while maintaining the programmed settings. You can also
restore the factory default settings by using the “Reset” button. Use
the restore option in instances where you may have forgotten your
custom password.
a. Resetting the Router
Push and release the “Reset” button. The lights on the Router will
momentarily flash. The reset is complete in 60 seconds.
b. Restoring the Factory Defaults
Press and hold the “Reset” button for at least 10 seconds, then release
it. The lights on the Router will momentarily flash. The restore is
complete in 60 seconds.
11
G Wireless Router
SECTIONSTable of Contents 123 5678910
CONNECTING AND CONFIGURING YOUR ROUTER
4
Verify the contents of your box. You should have the following:
Ř Belkin G Wireless Router
Ř Quick Installation Guide
Ř Belkin Setup Assistant Software CD with User Manual
Ř RJ45 Ethernet Networking Cable (for connection of the Router to
the modem)
Ř Power Supply
Modem Requirements
Your cable or DSL modem must be equipped with an RJ45 Ethernet
port. Many modems have both an RJ45 Ethernet port and a USB
connection. If you have a modem with both Ethernet and USB, and are
using the USB connection at this time, you will be instructed to use the
RJ45 Ethernet port during the installation procedure. If your modem has
only a USB port, you can request a different type of modem from your
ISP, or you can, in some cases, purchase a modem that has an RJ45
Ethernet port on it.
Setup Assistant
Belkin has provided our Setup Assistant software to make installing your
Router a simple and easy task. You can use it to get your Router up and
running in minutes. The Setup Assistant requires that your Windows
2000/XP, Vista, or Mac OS X v10.4 or v10.5 computer be connected
directly to your cable or DSL modem and that the Internet connection is
active and working at the time of installation. If it is not, you must use
the “Alternate Setup Method” section of this User Manual to configure
your Router. Additionally, if you are using an operating system other
than Windows 2000/XP, Vista, or Mac OS X v10.4 or v10.5, you must
set up the Router using the “Alternate Setup Method” section of this
User Manual.
ALWAYS INSTALL YOUR ROUTER FIRST! If you are installing
numerous network devices for the first time, it is important that your
Router is connected and running before attempting to install other
network components such as notebook cards and desktop cards.
12
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
Step 1: Hardware Connections
A. Unplug your modem’s power cord. Put the Router next to the
modem. Raise the Router’s antenna.
B. Locate the networking cable that connects your modem and
computer. Unplug that cable from your modem, and plug it into any
gray port on the back of the Router.
C. Find your new networking cable (included in the box with your
Router) and connect it to the yellow port on the back of the Router.
Connect the other end to your modem, in the port that’s now free.
D. Plug in your modem’s power cord. Wait 60 seconds for the modem
to start up. Plug the Router’s power supply into the black port on
the back. Plug the other end into the wall outlet.
E. Wait 20 seconds for the
Router to start up. Look
at the display on the front
of the Router. Make sure
the “Wired” and “Power
icons are lit up in green.
If they are not, recheck
your connections.
LAN
WAN
13
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
Note for Windows Users: If the Setup Assistant does not start
up automatically, select your CD-ROM drive from “My Computer”
and double-click on the file named “SetupAssistant” to start the
Setup Assistant.
Step 2: Set Up the Router – Run the Setup Assistant Software
A. Shut down any programs that are running on your computer at this
time. Turn off any firewall or Internet-connection-sharing software
on your computer.
B. Insert the CD into your computer. The Setup Assistant will
automatically appear on your computer’s screen within 15
seconds. Click on “Go” to run the Setup Assistant. Follow the
instructions there.
IMPORTANT: Run the Setup Assistant from the computer that is
directly connected to the Router from Step 1.B.
14
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
Confirmation Screen
Verify that you have completed all QIG steps by checking the box to the
right of the arrow. Click “Next” to continue.
Select Country
Select your country from the drop-down box. Click “Begin” to continue.
15
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
2.1 Checking Settings
The Setup Assistant will now examine your computer’s network settings
and gather information needed to complete the Router’s connection to
the Internet.
Progress Screen
Setup Assistant will show you a progress screen each time a step in the
setup has been completed.
16
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
2.3 Naming your Wireless Network
The Setup Assistant will display the default wireless network name or
Service Set Identifier (SSID). This is the name of your wireless network
to which your computers or devices with wireless network adapters
will connect. You can either use the default or change it to something
unique. Write down this name for future reference.
2.2 Verifying Hardware Connections
The Setup Assistant will now verify your hardware connection.
17
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
If your Internet account requires a login and password, you will be
prompted with a screen similar to the illustration below. Click “Next”
to continue.
2.4 Requesting Internet Account Info (if needed)
Select your ISP from the drop-down boxes.
18
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
2.5 Configuring the Router
The Setup Assistant will now configure your Router by sending data to
the Router and restarting it. Wait for the on-screen instructions.
Note: Do not disconnect any cable or power off the Router while the
Router is rebooting. Doing so will render your Router inoperable.
2.6 Checking Internet Connection
We are almost done. The Setup Assistant will now check your
connection to the Internet.
19
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
Congratulations
You have finished installing your new Belkin Router. You will see
the Congratulations screen when your Router can connect to the
Internet. You can begin surfing by opening your browser and going to
any website.
You can use the Setup Assistant to set up your other wired and wireless
computers to connect to the Internet by clicking “Next”. If you decide
to add computers to your Router later, select “Finish—return to Main
Menu” and then click “Next.
Troubleshooting
If the Setup Assistant is not able to connect to the Internet, you will see
the following screen. Follow the on-screen instructions to go through the
troubleshooting steps.
20
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
2.7 Optional: Assistance Connecting Other Computers
This optional step will help you to connect additional wired and wireless
computers to your network. Follow the on-screen instructions.
Once you have verified that your other wired and wireless computers are
properly connected, your network is set up and working. You can now
surf the Internet. Click “Next” to return to the main menu.
21
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
Step 3: Set Up Wireless Security – Run the Security Assistant Software
Now that your network is set up and working, it is recommended that
you turn on wireless security to prevent unauthorized access to your
network from neighboring wireless-enabled computers. The Security
Assistant will guide you through the process. Click “Security Assistant”
and follow the on-screen instructions.
IMPORTANT: Run the Setup Assistant from the computer that is
directly connected to the Router from Step 1.B.
22
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
3.1 Picking the Security Type
Select the security type for your wireless network and click “Next
to continue.
Progress Screen
The Security Assistant will show you a progress screen each time a step
has been completed.
23
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
3.3 Transferring the Key
After setting up your wireless security, you will have to transfer the
network key to each of your wireless computers. Click on “Transfer Key”
if you have a USB flash drive. Follow the on-screen instructions, or click
on “Print” to print the information. Manually enter it to each wireless
computer. Then, click “Next” to continue.
3.2 Creating a Network Key
Enter a network key (PSK) for your wireless network and click “Next”
to continue.
24
G Wireless Router
SECTIONSTable of Contents 123 56789104
CONNECTING AND CONFIGURING YOUR ROUTER
Congratulations
Once you have verified that your wireless computers are properly
connected, your wireless network is set up and secured. You now can
run your network wirelessly and securely. Click “Finish” to take you back
to the main menu.
3.4 Verifying the Connection
If all your wireless computers are able to connect to the Router, click
“Next”. If you are having trouble, select “I had problem with at least one
computer” and click “Next”. Then, follow on-screen instructions.
25
G Wireless Router
SECTIONSTable of Contents 1234 678910
ALTERNATE SETUP METHOD
5
The Web-Based Advanced User Interface is a web-based tool that you can use to set up the Router if you don’t want to use the Setup Assistant
Software. You can also use it to manage advanced functions of the Router. From the Web-Based Advanced User Interface, you can perform the
following tasks:
Ř View the Router’s current settings and status
Ř Configure the Router to connect to your ISP with the settings that
they provided you
Ř Change the current network settings such as the Internal IP
address, the IP address pool, DHCP settings, and more
Ř Set the Router’s firewall to work with specific applications
(port forwarding)
Ř Set up security features such as client restrictions, MAC address
filtering, WEP, and WPA
Ř Enable the DMZ feature for a single computer on your network
Ř Change the Router’s internal password
Ř Enable/Disable UPnP (Universal Plug-and-Play)
Ř Reset the Router
Ř Back up your configuration settings
Ř Reset the Router’s default settings
Ř Update the Router’s firmware
26
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Step 1 Set up your Computer’s Network Settings to Work with a DHCP Server
See the section in this User Manual called “Manually Configuring Network Settings” for directions.
Step 2 Configure the Router Using the Web-Based Advanced User Interface
PLEASE NOTE: If you have difficulty accessing the Router’s Web-Based
Advanced User Interface, go to the section entitled “Manually
Configuring Network Settings.
Using your Internet browser, you can access the Router’s Web-Based
Advanced User Interface. In your browser, type “192.168.2.1” (you do not
need to type in anything else such as “http://” or “www”). Then press
the “Enter” key.
27
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Logging into the Router
You will see the Routers home page in your browser window. The home
page is visible to any user who wants to see it. To make any changes
to the Router’s settings, you have to log in. Clicking the “Login” button
or clicking on any one of the links on the home page will take you to
the login screen. The Router ships with no password entered. In the
login screen, leave the password blank and click the “Submit” button to
log in.
Logging out of the Router
One computer at a time can log into the Router for the purposes of
making changes to the settings of the Router. Once a user has logged in
to make changes, there are two ways that the computer can be logged
out. Clicking the “Logout” button will log the computer out. The second
method is automatic. The login will time out after a specified period of
time. The default login time-out is 10 minutes. This can be changed from
1 to 99 minutes. For more information, see the section in this manual
entitled “Changing the Login Time-Out Setting”.
28
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Using the Web-Based Advanced User Interface
The home page is the first page you will see when you access the Web-Based Advanced User Interface (UI). The home
page shows you a quick view of the Router’s status and settings. All advanced setup pages can be reached from this page.
(2)
(4)
(5)
(10)
(6)
(7)
(3)
(1)
(8)
(9)
29
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
1. Quick-Navigation Links
You can go directly to any of the Router’s UI pages by clicking directly
on these links. The links are divided into logical categories and grouped
by tabs to make finding a particular setting easier to find. Clicking on
the purple header of each tab will show you a short description of the
tab’s function.
2. Home Button
The “Home” button is available in every page of the UI. Pressing this
button will take you back to the home page.
3. Internet Status Indicator
This indicator is visible in all pages of the UI, indicating the connection
status of the Router. When the indicator says “Connected” in BLUE, the
Router is connected to the Internet. When the Router is not connected
to the Internet, the indicator will read “no connection” in RED. The
indicator is automatically updated when you make changes to the
settings of the Router.
4. Login/Logout Button
This button enables you to log in and out of the Router with the press of
one button. When you are logged into the Router, this button will change
to read “Logout. Logging into the Router will take you to a separate
login page where you will need to enter a password. When you are
logged into the Router, you can make changes to the settings. When you
are finished making changes, you can log out of the Router by clicking
the “Logout” button. For more information about logging into the Router,
see the section called “Logging into the Router.
5. Help Button
The “Help” button gives you access to the Router’s help pages. Help
is also available on many pages by clicking “more info” next to certain
sections of each page.
6. Language
This shows the active language for the User Interface. Select a desirable
language by clicking one of the available languages.
30
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
7. LAN Settings
Shows you the settings of the Local Area Network (LAN) side of the
Router. Changes can be made to the settings by clicking on any one
of the links (IP Address, Subnet Mask, DHCP Server) or by clicking the
“LAN” “Quick Navigation” link on the left side of the screen.
8. Features
Shows the status of the Router’s Firewall and Wireless features.
Changes can be made to the settings by clicking on any one of the links
or by clicking the “Quick Navigation” links on the left side of the screen.
9. Internet WAN Settings
Shows the settings of the Internet/WAN side of the Router that
connects to the Internet. Changes to any of these settings can be made
by clicking on the links or by clicking on the “Internet/WAN” “Quick
Navigation” link on the left side of the screen.
10. Version Info
Shows the firmware version, boot-code version, hardware version, and
serial number of the Router.
11. Page Name
The page you are on can be identified by this name. This User Manual
will sometimes refer to pages by name. For instance “LAN > LAN
Settings” refers to the “LAN Settings” page.
31
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Step 3 Configure your Router for Connection to your Internet Service Provider (ISP)
The “Internet/WAN” tab is where you will set up your Router to connect
to your Internet Service Provider (ISP). The Router is capable of
connecting to virtually any ISP’s system provided you have correctly
configured the Router’s settings for your ISPs connection type. Your ISP
connection settings are provided to you by your ISP. To configure the
Router with the settings that your ISP gave you, click “Connection Type”
(A) on the left side of the screen. Select the connection type you use. If
your ISP gave you DNS settings, clicking “DNS” (B) allows you to enter
DNS address entries for ISPs that require specific settings. Clicking
“MAC address” (C) will let you clone your computers MAC address or
type in a specific WAN MAC address, if required by your ISP. When you
have finished making settings, the “Internet Status” indicator will read
“Connected” if your Router is set up properly.
(B)
(A)
(C)
Setting your Connection Type
From the “Connection Type” page, you can select the type of connection
you use. Select the type of connection you use by clicking the button (1)
next to your connection type and then clicking “Next” (2).
(1)
(2)
32
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Setting your Internet Service Provider (ISP) Connection Type to
Dynamic IP
A dynamic connection type is the most common connection type used
with cable modems. Setting the connection type to “dynamic” in many
cases is enough to complete the connection to your ISP. Some dynamic
connection types may require a host name. You can enter your host
name in the space provided if you were assigned one. Your host name
is assigned by your ISP. Some dynamic connections may require that
you clone the MAC address of the PC that was originally connected to
the modem.
Change WAN MAC Address
If your ISP requires a specific MAC address to connect to the service,
you can enter a specific MAC address or clone the current computers
MAC address through this link.
33
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
1. IP Address
Provided by your ISP. Enter your IP address here.
2. Subnet Mask
Provided by your ISP. Enter your subnet mask here.
3. ISP Gateway Address
Provided by your ISP. Enter the ISP gateway address here.
Setting your Internet Service Provider (ISP) Connection Type to Static IP
A static IP address connection type is less common than other connection types. If your ISP uses static IP addressing, you will need your IP address
(1), subnet mask (2), and ISP gateway address (3). This information is available from your ISP or on the paperwork that your ISP left with you. Type in
your information, then click “Apply Changes”. After you apply the changes, the “Internet Status” indicator will read “Connected” if your Router is set
up properly.
(1)
(2)
(3)
34
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Setting your ISP Connection Type to PPPoE
Most DSL providers use PPPoE as the connection type. If you use a DSL modem to connect to the Internet, your ISP may use PPPoE to log you into
the service. If you have an Internet connection in your home or small office that doesn’t require a modem, you may also use PPPoE.
Your connection type is PPPoE if:
- Your ISP gave you a user name and password, which is required to
connect to the Internet;
- Your ISP gave you software such as WinPOET or Enternet300 that you
use to connect to the Internet; or
- You have to double-click on a desktop icon other than your browser to
get on the Internet.
35
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
1. User Name
This space is provided to type in your user name that was assigned by
your ISP.
2. Password
Type in your password and re-type it into the “Retype Password” box to
confirm it.
3. Service Name
A service name is rarely required by an ISP. If you are not sure if your
ISP requires a service name, leave this blank.
4. MTU
The MTU setting should never be changed unless your ISP gives you
a specific MTU setting. Making changes to the MTU setting can cause
problems with your Internet connection including disconnection from the
Internet, slow Internet access, and problems with Internet applications
working properly.
5. Maximum Idle Time
This feature is used to automatically disconnect the Router from your
ISP when there is no activity for a specified period of time. For instance,
placing a check mark next to this option and entering “5” into the minute
field will cause the Router to disconnect from the Internet after five
minutes of no Internet activity. This option should be used if you pay for
your Internet service by the minute.
36
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Setting your Internet Service Provider (ISP) Connection Type to Point-to-Point Tunneling Protocol (PPTP)
[European Countries Only]. Some ISPs require a connection using PPTP
protocol, a type of connection most common in European countries.
This sets up a direct connection to the ISP’s system. Type in the
information provided by your ISP in the space provided. When you
have finished, clickApply Changes”. After you apply the changes, the
“Internet Status” indicator will read “Connected” if your Router is set
up properly.
37
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
1. User ID
Provided by your ISP. Enter your PPTP User ID here.
2. Password
Provided by your ISP. Type in your password here.
3. PPTP Gateway
Provided by your ISP. Enter your PPTP gateway/service IP address here.
4. Idle Time Out
This feature is used to automatically disconnect the Router from your
ISP when there is no activity for a specified period of time. For instance,
entering “10” into the minute field will cause the Router to disconnect
from the Internet after 10 minutes of no Internet activity. This option
should be used if you pay for your Internet service by the minute.
5. Get IP by DHCP
Select the method of getting your Internet IP address from your ISP
server. It depends on your ISP service type. Check this box if your
ISP will automatically assign an IP address for you. If you are not
sure of this, please contact your ISP’s technical-support hotline. If
your ISP provided an IP address for you, enter the information in the
following fields.
a. IP Address
Provided by your ISP. Enter the IP address here.
b. Subnet Mask
Provided by your ISP. Enter the IP address here.
c. Default Gateway
Provided by your ISP. Enter the gateway address here.
38
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Setting your Connection Type if you are a Telstra®
BigPond/OptusNet Cable User
Follow the on-screen steps and click “Apply Changes” to complete
your setup.
Setting Custom Domain Name Server (DNS) Settings
A “Domain Name Server” is a server located on the Internet that
translates Universal Resource Locators (URLs) like “www.belkin.com”
into IP addresses. Many Internet Service Providers (ISPs) do not require
you to enter this information into the Router. The “Automatic from ISP
box should be checked if your ISP did not give you a specific DNS
address. If you are using a static IP connection type, then you may
need to enter a specific DNS address and secondary DNS address for
your connection to work properly. If your connection type is dynamic
or PPPoE, it is likely that you do not have to enter a DNS address.
Leave the “Automatic from ISP” box checked. To enter the DNS
address settings, uncheck the “Automatic from ISP” box and enter your
DNS entries in the spaces provided. Click “Apply Changes” to save
the settings.
39
G Wireless Router
SECTIONSTable of Contents 1234 6789105
ALTERNATE SETUP METHOD
Configuring your WAN Media Access Controller (MAC) Address
All network components including cards, adapters, and routers, have
a unique “serial number” called a MAC address. Your Internet Service
Provider may record the MAC address of your computer’s adapter
and only let that particular computer connect to the Internet service.
When you install the Router, its own MAC address will be “seen” by the
ISP and may cause the connection not to work. Belkin has provided
the ability to clone (copy) the MAC address of the computer into the
Router. This MAC address, in turn, will be seen by the ISP’s system as
the original MAC address and will allow the connection to work. If you
are not sure whether your ISP needs to see the original MAC address,
simply clone the MAC address of the computer that was originally
connected to the modem. Cloning the address will not cause any
problems with your network.
Cloning your MAC Address
To clone your MAC address, make sure that you are using the computer
that was ORIGINALLY CONNECTED to your modem before the Router
was installed. Click the “Clone” button (1). Click “Apply Changes”. Your
MAC address is now cloned to the Router.
Entering a Specific MAC Address
In certain circumstances you may need a specific WAN MAC address.
You can manually enter one in the “MAC Address” page. Type a MAC
address in the spaces provided (2) and click “Apply Changes” to save
the changes. The Routers WAN MAC address will now be changed to
the MAC address you specified.
(1)
(2)

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
0J@E>PFLI$EK<IE<K9IFNJ<IPFL:8E8::<JJK?<-FLK<IJ2<98J<;;M8E:<;0J<I$EK<I=8:<$EPFLI9IFNJ<IKPG<SU;FEFKKPG<@E
8EPK?@E><CJ<JL:?8JS?KKGUFISNNNUK?<EGI<JJK?<S EK<IU B<P
4FLN@CCJ<<K?<-FLK<IJ?FD<G8><@EPFLI9IFNJ<IN@E;FN
41
G Wireless Router
SECTIONSTable of Contents 12345 78910
USING THE WEB-BASED ADVANCED USER INTERFACE
6
Changing LAN Settings
All settings for the internal LAN setup of the Router can be viewed and
changed here.
Viewing the LAN Settings
Clicking on the header of the “LAN Setup” tab (1) will take you to its
header page. A quick description of the functions can be found here. To
view the settings or make changes to any of the LAN settings, click on
“LAN Settings” (2), or to view the list of connected computers, click on
“DHCP Client List” (3).
(1)
(3)
(2)
42
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
1. IP Address
The “IP address” is the internal IP address of the Router. The default
IP address is “192.168.2.1. To access the Web-Based Advanced User
Interface, type this IP address into the address bar of your browser.
This address can be changed if needed. To change the IP address,
type in the new IP address and clickApply Changes”. The IP address
you choose should be a non-routable IP. Examples of a non-routable IP
are: 192.168.x.x (where x is anywhere between 0 and 255), and 10.x.x.x
(where x is anything between 0 and 255).
2. Subnet Mask
There is no need to change the subnet mask. This is a unique, advanced
feature of your Belkin Router. It is possible to change the subnet mask
if necessary; however, do NOT make changes to the subnet mask
unless you have a specific reason to do so. The default setting is
“255.255.255.0”.
3. DHCP Server
The DHCP server function makes setting up a network very easy by
assigning IP addresses to each computer on the network automatically.
The default setting is “On”. The DHCP server can be turned OFF if
necessary; however, in order to do so you must manually set a static
IP address for each computer on your network. To turn off the DHCP
server, select “Off” and click “Apply Changes”.
4. IP Pool
The range of IP addresses set aside for dynamic assignment to the
computers on your network. The default is 2–100 (99 computers). If you
want to change this number, you can do so by entering a new starting
and ending IP address and clicking on “Apply Changes”. The DHCP
server can assign 100 IP addresses automatically. This means that
you cannot specify an IP address pool larger than 100 computers. For
example, starting at 50 means you have to end at 150 or lower so as not
to exceed the 100-client limit. The starting IP address must be lower in
number than the ending IP address.
5. Lease Time
The length of time the DHCP server will reserve the IP address for each
computer. We recommend that you leave the lease time set to “Forever”.
The default setting is “Forever”, meaning that any time a computer is
assigned an IP address by the DHCP server, the IP address will not
change for that particular computer. Setting lease times for shorter
intervals such as one day or one hour frees IP addresses after the
specified period of time. This also means that a particular computer’s
IP address may change over time. If you have set any of the other
advanced features of the Router such as DMZ or client IP filters, these
are dependent on the IP address. For this reason, you will not want the
IP address to change.
6. Local Domain Name
The default setting is “Belkin”. You can set a local domain name
(network name) for your network. There is no need to change this setting
unless you have a specific advanced need to do so. You can name the
network anything you want such as “MY NETWORK”.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
-:6G:>8D96'<:6>D#:CD'286
4FL:8EM@<N8C@JKF=K?<:FDGLK<IJBEFNE8J:C@<EKJN?@:?8I<
:FEE<:K<;KFPFLIE<KNFIB4FL8I<89C<KFM@<NK?<$+8;;I<JJF=K?<
:FDGLK<IK?<?FJKE8D<@=K?<:FDGLK<I?8J9<<E8JJ@>E<;FE<
8E;K?<(8;;I<JJF=K?<:FDGLK<IJE<KNFIB@EK<I=8:<:8I;)$
+I<JJ@E>K?<S-<=I<J?U9LKKFEN@CCLG;8K<K?<C@JK$=K?<I<?8M<9<<E
8EP:?8E><JK?<C@JKN@CC9<LG;8K<;
 


?>7:8EB:>8D96.:B6<6CC%6DG?B;*6DD:>8C
C@:B@E>FEK?<?<8;<IF=K?<S2@I<C<JJUK89N@CCK8B<PFLKFK?<
S2@I<C<JJU?<8;<IG8><0E;<IK?<S2@I<C<JJUK89K?<I<8I<C@EBJK?8K
8CCFNPFLKFD8B<:?8E><JKFK?<N@I<C<JJE<KNFIBJ<KK@E>J

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
92>8:>8D96.:B6<6CC%6DG?B;%2=6** 
/F@;<EK@=PPFLIN@I<C<JJE<KNFIB8E8D<:8CC<;K?<..$.<IM@:<.<K
$;<EK@=@<I@JLJ<;/?<;<=8LCK..$F=K?<-FLK<I@JS9<CB@E>U4FL
:8E:?8E><K?@JKF8EPK?@E>PFLN8EKKFFIPFL:8EC<8M<@KLE:?8E><;
$=K?<I<8I<FK?<IN@I<C<JJE<KNFIBJFG<I8K@E>@EPFLI8I<8PFLN@CCN8EK
KFD8B<JLI<K?8KPFLI..$@JLE@HL<;F<JEFKD8K:?K?8KF=8EFK?<I
N@I<C<JJE<KNFIB@EK?<8I<8/F:?8E><K?<..$KPG<K?<..$K?8K
PFLN8EKKFLJ<@EK?<S..$U=@<C;8E;:C@:BSGGCP?8E><JU
/?<:?8E><@J@DD<;@8K<$=PFLD8B<8:?8E><KFK?<..$PFLI
N@I<C<JJ<HL@GG<;:FDGLK<IJD8P8CJFE<<;KF9<I<:FE=@>LI<;KF
:FEE<:KKFPFLIE<NE<KNFIBE8D<-<=<IKFK?<;F:LD<EK8K@FEF=PFLI
N@I<C<JJE<KNFIB8;8GK<I=FI@E=FID8K@FEFED8B@E>K?@J:?8E><



.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
**  B?2542CD62DEB6
%?D6+9:C25F2>465762DEB6C9?E<5366=@<?I653I25F2>465
EC6BC ?><I
!FIJ<:LI@KPPFL:8E:?FFJ<EFKKF9IF8;:8JKPFLIE<KNFIBJ..$
F@E>JFN@CCB<<GPFLIE<KNFIBE8D<?@;;<E=IFD:FDGLK<IJK?8K
8I<J:8EE@E>=FIK?<GI<J<E:<F=N@I<C<JJE<KNFIBJ/FKLIEF==K?<
9IF8;:8JKF=K?<..$J<C<:KS@J89C<U8E;K?<E:C@:BSGGCP?8E><JU
8:?:FDGLK<IEFNE<<;JKF9<J<KKF:FEE<:KKFPFLIJG<:@=@:..$8E
..$F=S)4UN@CCEFCFE><I9<8::<GK<;-<=<IKFK?<;F:LD<EK8K@FEF=
PFLIN@I<C<JJE<KNFIB8;8GK<I=FI@E=FID8K@FEFED8B@E>K?@J:?8E><
,C:>8D96.:B6<6CC$?56*G:D49
4FLI-FLK<I:8EFG<I8K<@EK?I<<;@==<I<EKN@I<C<JJDF;<JS(@O<;
9>US>*ECPUS9*ECPU8E;S*==U/?<;@==<I<EKDF;<J8I<
<OGC8@E<;9<CFN
46
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
11b Only Mode
We recommend you DO NOT use this mode unless you have a very
specific reason to do so. This mode exists only to solve unique problems
that may occur with some 802.11b client adapters and is NOT necessary
for interoperability of 802.11g and 802.11b standards.
When to Use 11b Only Mode
In some cases, older 802.11b clients may not be compatible with 802.11g
wireless. These adapters tend to be of inferior design and may use
older drivers or technology. Switching to this mode can solve problems
that sometimes occur with these clients. If you suspect that you are
using a client adapter that falls into this category of adapters, first
check with the adapter vendor to see if there is a driver update. If there
is no driver update available, switching to b only mode may fix your
problem. Please note that switching to 11b only mode will decrease
802.11g performance.
Off
This option will turn off wireless functionality.
Mixed (11b+11g) Mode
In this mode, the Router is compatible with 802.11b and 802.11g wireless
clients simultaneously. This is the factory default mode and ensures
successful operation with all Wi-Fi-compatible devices. If you have a
mix of 802.11b and 802.11g clients in your network, we recommend
setting the Router to mixed (11b+11g) mode. This setting should only be
changed if you have a specific reason to do so.
11g Only Mode
11g mode works with 802.11g clients only. This mode is recommended
only if you want to prevent 802.11b clients from accessing your network.
To switch modes, select the desired mode from the “Wireless Mode”
drop-down box. Then, click “Apply Changes”.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
92>8:>8D96.:B6<6CC92>>6<
/?<I<8I<8ELD9<IF=FG<I8K@E>:?8EE<CJPFL:8E:?FFJ<=IFD$EK?<
0E@K<;.K8K<JK?<I<8I<:?8EE<CJ$ELJKI8C@8K?<0E@K<;&@E>;FD
8E;DFJKF= LIFG<K?<I<8I<:?8EE<CJ$E8JD8CCELD9<IF=
FK?<I:FLEKI@<JK?<I<8I<FK?<I:?8EE<CI<HL@I<D<EKJ4FLI-FLK<I
@J:FE=@>LI<;KFFG<I8K<FEK?<GIFG<I:?8EE<CJ=FIK?<:FLEKIPPFL
I<J@;<@E/?<;<=8LCK:?8EE<C@JSLKFU/?<:?8EE<C:8E9<:?8E><;@=
E<<;<;$=K?<I<8I<FK?<IN@I<C<JJE<KNFIBJFG<I8K@E>@EPFLI8I<8PFLI
E<KNFIBJ?FLC;9<J<KKFFG<I8K<FE8:?8EE<CK?8K@J;@==<I<EKK?8EK?<
FK?<IN@I<C<JJE<KNFIBJ!FI9<JKG<I=FID8E:<LJ<8:?8EE<CK?8K@J8K
C<8JK=@M<:?8EE<CJ8N8P=IFDK?<FK?<IN@I<C<JJE<KNFIB!FI@EJK8E:<
@=8EFK?<IE<KNFIB@JFG<I8K@E>FE:?8EE<CK?<EJ<KPFLIE<KNFIBKF
:?8EE<CFI9<CFN/F:?8E><K?<:?8EE<CJ<C<:KK?<:?8EE<C=IFDK?<
;IFG;FNEC@JKC@:BSGGCP?8E><JU

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
'B?D64D65$?56*G:D49
JG8IKF=K?<>JG<:@=@:8K@FE+IFK<:K<;DF;<<EJLI<JGIFG<I
FG<I8K@FEF=>:C@<EKJ8E;8::<JJGF@EKJN?<EK?<I<@J?<8MP
9KI8==@:@EK?<FG<I8K@E><EM@IFED<EK2?<E+IFK<:K<;DF;<@J
*)>J:8EJ=FIFK?<IN@I<C<JJE<KNFIBKI8==@:9<=FI<@KKI8EJD@KJ
;8K8/?<I<=FI<LJ@E>K?@JDF;<@E<EM@IFED<EKJN@K?# 149
KI8==@:FI@EK<I=<I<E:<8:?@<M<J9<JKG<I=FID8E:<I<JLCKJ$=PFL8I<@E8E
<EM@IFED<EKN@K?M<IPC@KKC<WFIEFWFK?<IN@I<C<JJE<KNFIBKI8==@:PFLI
9<JKG<I=FID8E:<N@CC9<8:?@<M<;N@K?+IFK<:K<;DF;<*!!
49
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Securing your Wi-Fi®Network
Here are a few different ways you can maximize the security of your
wireless network and protect your data from prying eyes and ears. This
section is intended for the home, home office, and small office user.
At the time of this User Manual’s publication, there are four encryption
methods available.
Name
64-Bit Wired
Equivalent
Privacy
128-Bit Wired
Equivalent
Privacy
Wi-Fi Protected
Access-TKIP
Wi-Fi Protected
Access 2
Acronym 64-bit WEP 128-bit WEP WPA-TKIP/AES (or
just WPA)
WPA2-AES (or just
WPA2)
Security Good Better Best Best
Features Static keys Static keys
Dynamic key
encryption
and mutual
authentication
Dynamic key
encryption
and mutual
authentication
Encryption
keys based on
RC4 algorithm
(typically
40-bit keys)
More secure
than 64-bit
WEP using a
key length of
104 bits plus
24 additional
bits of system-
generated
data
TKIP (Temporal
Key Integrity
Protocol) added
so that keys
are rotated and
encryption is
strengthened
AES (Advanced
Encryption
Standard) does
not cause any
throughput loss
Wired Equivalent Privacy (WEP)
WEP is a common protocol that adds security to all Wi-Fi-compliant
wireless products. WEP was designed to give wireless networks the
equivalent level of privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes
a key length of 40 bits plus 24 additional bits of system-generated data
(64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit
encryption. Shortly after the technology was introduced, researchers
found that 64-bit encryption was too easy to decode.
128-Bit WEP
As a result of 64-bit WEP’s potential security weaknesses, a more
secure method of 128-bit encryption was developed. 128-bit encryption
includes a key length of 104 bits plus 24 additional bits of system-
generated data (128 bits total). Some hardware manufacturers refer to
128-bit as 104-bit encryption.
Most of the new wireless equipment in the market today supports both
64-bit and 128-bit WEP encryption, but you might have older equipment
that only supports 64-bit WEP. All Belkin wireless products will support
both 64-bit and 128-bit WEP.
50
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Encryption Keys
After selecting either the 64-bit or 128-bit WEP encryption mode, it is
critical that you generate an encryption key. If the encryption key is
not consistent throughout the entire wireless network, your wireless
networking devices will be unable to communicate with one another
on your network and you will not be able to successfully communicate
within your network.
You can enter your key by typing in the hex key manually, or you can
type in a passphrase in the “Passphrase” field and click “Generate” to
create a key. A hex (hexadecimal) key is a combination of numbers and
letters from A–F and 09. For 64-bit WEP, you need to enter 10 hex
keys. For 128-bit WEP, you need to enter 26 hex keys.
For instance:
AF 0F 4B C3 D4 = 64-bit WEP key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key
The WEP passphrase is NOT the same as a WEP key. Your Router uses
this passphrase to generate your WEP keys, but different hardware
manufacturers might have different methods on generating the keys.
If you have multiple vendors’ equipment in your network, the easiest
thing to do is to use the hex WEP key from your Router or access
point and enter it manually into the hex WEP key table in your Routers
configuration screen.
Wi-Fi Protected Access (WPA)
WPA is a new Wi-Fi standard that was designed to improve upon the
security features of WEP. To use WPA security, the drivers and software
of your wireless equipment must be upgraded to support WPA. These
updates will be found on the wireless vendor’s website. There are two
types of WPA security: WPA-PSK and WPA2.
WPA-PSK uses what is known as a pre-shared key as the network
key. A network key is basically a password that is between eight
and 63 characters long. It can be a combination of letters, numbers,
or characters. Each client uses the same network key to access
the network. Typically, this is the mode that will be used in a home
environment.
WPA2 requires Advanced Encryption Standard (AES) for encryption
of data, which offers much greater security than WPA. WPA uses both
Temporal Key Integrity Protocol (TKIP) and (AES) for encryption.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
*92B:>8D96*2=6%6DG?B;"6IC
(FJK2@!@GIF;L:KJJ?@GN@K?J<:LI@KPKLIE<;F==.FFE:<PFL?8M<
PFLIE<KNFIBNFIB@E>PFLE<<;KF8:K@M8K<2 +FI2+8E;D8B<JLI<
PFLIN@I<C<JJE<KNFIB@E>;<M@:<J8I<J?8I@E>K?<J8D<E<KNFIBB<P
/?<=FCCFN@E>;@8>I8DJ?FNJK?<<==<:KF=EFK?8M@E>K?<:FII<:K
E<KNFIBB<PK?IFL>?FLKPFLIE<KNFIB
,C:>826H2564:=2<"6I
?<O8;<:@D8CB<P@J8:FD9@E8K@FEF=ELD9<IJ8E;C<KK<IJ=IFDT!
8E;T9@KB<PJ8I<=@M<KNF;@>@KELD9<IJ9@KB<PJ8I<
KNF;@>@KELD9<IJ
!FI@EJK8E:<
9@KB<P
   9@KB<P
$EK?<9FO<J9<CFND8B<LGPFLIB<P9PNI@K@E>@EKNF:?8I8:K<IJ
9<KN<<ET!8E;T@E<8:?9FO4FLN@CCLJ<K?@JB<PKFGIF>I8DK?<
<E:IPGK@FEJ<KK@E>JFEPFLI-FLK<I8E;PFLIN@I<C<JJ:FDGLK<IJ
%?D6D?$24EC6BC*I@>@E8CGGC<Y@I+FIKYGIF;L:KJJLGGFIK9@K
<E:IPGK@FEFECPGGC<@I+FIKGIF;L:KJ:8EJLGGFIK9@KFI9@K
<E:IPGK@FE+C<8J<:?<:BPFLIGIF;L:KKFJ<<N?@:?M<IJ@FEPFL8I<
LJ@E>$=PFL:8EEFK:FE=@>LI<PFLIE<KNFIBN@K?9@K<E:IPGK@FEKIP
9@K<E:IPGK@FE















/?<E<KNFIB8;8GK<I:8EEFK8::<JJK?<E<KNFIB9<:8LJ<@KLJ<J8
;@==<I<EKE<KNFIBB<PK?8EK?<FE<:FE=@>LI<;FEK?<N@I<C<JJIFLK<I

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
.'*6DE@
:D.'>4BI@D:?>
.<C<:KS2 +U=IFDK?<S.<:LI@KPUD<ELJSCCFN<;C@<EK/PG<U
 .<C<:KS9@KU=IFDK?<;IFG;FNED<EL@ES2 +(F;<U
 =K<IJ<C<:K@E>PFLI2 +<E:IPGK@FEDF;<PFL:8E<EK<IPFLI
B<P9PKPG@E>@EK?<?<OB<PD8EL8CCPFIPFL:8EKPG<@EPFLI
G8JJG?I8J<C@:BS"<E<I8K<UKF><E<I8K<=FLI;@==<I<EK?<OB<PJ
?<O?<O8;<:@D8CB<P@J8:FD9@E8K@FEF=ELD9<IJ8E;C<KK<IJ=IFD
T!8E;T!FI9@K2 +PFLE<<;KF<EK<I?<OB<PJ
!FI@EJK8E:<
9@K2 +B<P
.)% %$=PFL8I<:FE=@>LI@E>K?<"2@I<C<JJ-FLK<IFI8::<JJGF@EK
=IFD8:FDGLK<IN@K?8N@I<C<JJ:C@<EKPFLN@CCE<<;KFI<:FEE<:KKFK?<
-FLK<I8E;J<KLGK?<:FEE<:K@FEN@K?K?<J<:LI@KPB<PPFLM<J<KLG

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
:D.' >4BI@D:?>
%?D6D?$24EC6BC/?<G8JJG?I8J<FGK@FEN@CCEFKFG<I8K<N@K?GGC<@I+FIK/F:FE=@>LI<<E:IPGK@FE=FIPFLI(8::FDGLK<IJ<KK?<<E:IPGK@FE
LJ@E>K?<D8EL8CD<K?F;;<J:I@9<;@EK?<E<OKJ<:K@FE
.)% %$=PFL8I<:FE=@>LI@E>K?<"2@I<C<JJ-FLK<IFI8::<JJGF@EK
=IFD8:FDGLK<IN@K?8N@I<C<JJ:C@<EKPFLN@CCE<<;KFI<:FEE<:KKFK?<
-FLK<I8E;J<KLGK?<:FEE<:K@FEN@K?K?<J<:LI@KPB<PPFLM<J<KLG
.<C<:KS2 +U=IFDK?<S.<:LI@KPUD<ELJSCCFN<;C@<EK/PG<U
 .<C<:KS9@KU=IFDK?<;IFG;FNED<EL@ES2 +(F;<U
 =K<IJ<C<:K@E>PFLI2 +<E:IPGK@FEDF;<PFL:8E<EK<IPFLI
B<P9PKPG@E>@EK?<?<OB<PD8EL8CCPFIPFL:8EGLK8:?<:B
D8IB@ES+8JJG?I8J<UK?<EKPG<@EPFLIG8JJG?I8J<C@:BSGGCP
?8E><JUKF><E<I8K<=FLI;@==<I<EK?<OB<PJ
?<O?<O8;<:@D8CB<P@J8:FD9@E8K@FEF=ELD9<IJ8E;C<KK<IJ=IFD
T!8E;T!FI9@K2 +PFLE<<;KF<EK<I?<OB<PJ
!FI@EJK8E:<
   9@K2 +B<P

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
92>8:>8D96.:B6<6CC*64EB:DI*6DD:>8C
4FLI-FLK<I@J<HL@GG<;N@K?K?<C8K<JKJ<:LI@KPJK8E;8I;:8CC<;2@!@
+IFK<:K<;::<JJ2+8E;K?<C<>8:PJ<:LI@KPJK8E;8I;:8CC<;
2@I<; HL@M8C<EK+I@M8:P2 +4FLI-FLK<I8CJFJLGGFIKJK?<2@!@
+IFK<:K<;.<KLGX2+.JG<:@=@:8K@FEN?@:?J@DGC@=@<JK?<J<KLGF=8
N@I<C<JJE<KNFIB2+.LJ<J=8D@C@8ID<K?F;FCF>@<JJL:?8JKPG@E>@E
8+<IJFE8C$;<EK@=@:8K@FE)LD9<I+$)FIGLJ?@E>89LKKFEKF<E89C<
LJ<IJKF8LKFD8K@:8CCP:FE=@>LI<E<KNFIBE8D<J8E;JKIFE>2+2+
;8K8<E:IPGK@FE8E;8LK?<EK@:8K@FEP;<=8LCKN@I<C<JJJ<:LI@KP@J
;@J89C<;/F<E89C<J<:LI@KPPFLN@CCE<<;KF;<K<ID@E<N?@:?JK8E;8I;
PFLN8EKKFLJ</F8::<JJK?<J<:LI@KPJ<KK@E>J:C@:BS.<:LI@KPUFEK?<
S2@I<C<JJUK89
,C:>8.::'B?D64D65*6DE@
2+.LJ<J2+;<J:I@9<;9<CFN=FI<E:IPGK@FE$K;F<JEFKGIFM@;<
8;;@K@FE8CJ<:LI@KP9LKI8K?<IJK8E;8I;@Q<JK?<D<K?F;=FIJ<:LI@E>PFLI
N@I<C<JJE<KNFIB4FLD8PLJ<<@K?<IK?<+LJ?LKKFEFE=@>LI8K@FE
+D<K?F;FI+$)D<K?F;KF8CCFN8;<M@:<8::<JJKFPFLIN@I<C<JJ
E<KNFIBFE:<GKL8CCPK?<KNFD<K?F;JNFIB8J=FCCFNJ
+C@:BK?<S.K8IK+U9LKKFECF:8K<;FEK?<2@!@+IFK<:K<;.<KLG
G8></?<E@E@K@8K<K?<2+.GIF:<;LI<FEK?<:C@<EK;<M@:<N@K?@E
KNFD@ELK<J-<=<IKFPFLI:C@<EKJ;F:LD<EK8K@FEFEK?@JGIF:<;LI<
C@:B@E>K?<S.K8IK+U9LKKFEN@CC8LKFD8K@:8CCP<E89C<2+./?<
:C@<EK?8JEFN9<<EJ<:LI<CP8;;<;KFPFLIN@I<C<JJE<KNFIB
+$)/?<:C@<EK;<M@:<?8J8+$)ELD9<I<@K?<I=FLIFI<@>?K;@>@KJK?8K
@J8JJF:@8K<;N@K?2+. E89C<2+.K?IFL>?K?<"0$ EK<IK?<:C@<EKJ
+$)@EKFK?<-FLK<IJ@EK<IE8CI<>@JKI8I8::<JJ<;K?IFL>?K?@J"0$/?<
:C@<EKN@CC9<8LKFD8K@:8CCP<EIFCC<;@EKFPFLIN@I<C<JJE<KNFIBN@K?@E
KNF D@ELK<J
55
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
1. Wi-Fi Protected Setup (WPS): Enabled or Disabled.
2. Personal Identification Number (PIN) Method: In this method, a
wireless client wishing to access your network must supply an
8-digit PIN to the Router. After clicking “Enroll”, you must start the
WPS handshaking procedure from the client within two minutes.
3. Router PIN: If an external registrar is available, you may enter in the
Router’s PIN to the registrar. Click “Generate New PIN” to change
the PIN from the default value. Click “Restore Default PIN” to reset
the PIN value.
4. Push Button Configuration (PBC) Method: PBC is an alternate
method to connect to a WPS network. Click the “Start PBC” button
to start this process. After clicking “Start PBC”, you must start the
WPS handshaking procedure from the client within two minutes.
5. Manual Configuration Method: This section lists the current
security settings to set up in your client devices.
The Router features WPA2, which is the second generation of the
WPA-based 802.11i standard. It offers a higher level of wireless security
by combining advanced network authentication and stronger Advanced
Encryption Standard (AES) encryption methods.
WPA Setup
Note: To use WPA security, all your clients must be upgraded to
drivers and software that support it. At the time of this User Manual’s
publication, a security patch download is available, for free, from
Microsoft®. This patch works only with the Windows XP operating
system. You also need to download the latest driver for your Belkin
Wireless G Desktop or Notebook Network Card from the Belkin support
site. Other operating systems are not supported at this time. Microsofts
patch only supports devices with WPA-enabled drivers such as Belkin
802.11g products.
WPA uses a so-called pre-shared key as the security key. A pre-shared
key is a password that is between eight and 63 characters long. It can
be a combination of letters, numbers, and other characters. Each client
uses the same key to access the network. Typically, this mode will be
used in a home environment.
WPA2 is the second generation of WPA, offering a more advanced
encryption technique over WPA.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
*6DD:>8.'.' E6CD446CC&@D:?>2<
/?<>L<JKGI<J?8I<;B<P8CCFNJ>L<JKLJ<IJ$EK<IE<KFECP8::<JJKF
I<JKI@:KK?<D=IFD<EK<I@E>PFLIE<KNFIB8E;?8M@E>8::<JJKF=@C<JFE
PFLI+J EK<IPFLIGI<J?8I<;B<P=FI>L<JK8::<JJ/?@J:8E9<=IFD
<@>?KKF:?8I8:K<IJ8E;:8E9<C<KK<IJELD9<IJFIJPD9FCJC@:B
SGGCP?8E><JUKF=@E@J?
.<C<:KS2+2+U=IFDK?<SCCFN<;C@<EK/PG<U
;IFG;FNE 9FO
 .<C<:KS+8JJNFI;+.&U=IFDK?<SLK?<EK@:8K@FEU;IFG;FNE
9FO/?<EJ<C<:KS+8JJG?I8J<R:?8I8:K<IJU=IFDK?<
S+8JJNFI;+.&KPG<U;IFG;FNE9FO
 EK<IPFLIGI<J?8I<;B<P/?@J:8E9<=IFD<@>?KKF:?8I8:K<IJ
8E;:8E9<C<KK<IJELD9<IJFIJPD9FCJ/?@JJ8D<B<PDLJK
9<LJ<;FE8CCF=K?<:C@<EKJK?8KPFLJ<KLG/?@JGI<J?8I<;B<P
N@CC8CCFNLJ<IJ=LCC8::<JJKFPFLIE<KNFIB@E:CL;@E>J?8I<;=@C<J
8E; GI@EK<IJ
 C@:BSGGCP?8E><JUKF=@E@J?4FLDLJKEFNJ<K8CC:C@<EKJKF
D8K:?K?<J<J<KK@E>J
57
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting up WPA for Wireless Desktop and Wireless Notebook Cards
that are NOT Manufactured by Belkin
If you do NOT have a Belkin WPA Wireless Desktop or Wireless
Notebook Card and it is not equipped with WPA-enabled software,
a file from Microsoft called “Windows XP Support Patch for Wireless
Protected Access” is available for free download.
Please Note: The file that Microsoft has made available works only with
Windows XP. Other operating systems are not supported at this time.
Important: You also need to ensure that the wireless card manufacturer
supports WPA and that you have downloaded and installed the latest
driver from their support site.
Supported Operating Systems:
Ř Windows XP Professional
Ř Windows XP Home Edition
Setting up Windows XP Wireless Network Utility to use WPA-PSK
In order to use WPA-PSK, ensure you are using the Windows Wireless
Network Utility by doing the following:
1. Under Windows XP, click “Start > Control Panel >
Network Connections”.
2. Right-click on “Wireless Network Connection Properties” and
select “Properties”.
3. Clicking on the “Wireless
Networks” tab will display
the following screen.
Ensure the “Use Windows
to configure my wireless
network settings” box
is checked.
58
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
4. Under the “Wireless
Networks” tab, click the
“Configure” button and you
will see the following screen.
5. For a home or small business user, select “WPA-PSK” under
“Network Authentication.
Note: Select “WPA” if you are using this computer to connect to
a corporate network that supports an authentication server such
as a radius server. Please consult your network administrator for
further information.
6. Select “TKIP” or “AES” under “Data Encryption”. This setting will
have to be identical to the Router that you set up.
7. Type in your encryption key in the “Network key” box.
Important: Enter your pre-shared key. This can be from eight to 63
characters and can be letters, numbers, or symbols. This same key
must be used on all of the clients that you set up.
8. Click “OK” to apply settings.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
,C:>8D96446CC'?:>D$?56
%?D6/?@J8;M8E:<;=<8KLI<J?FLC;9<<DGCFP<;9P8;M8E:<;LJ<IJ
FECP/?<-FLK<I:8E9<:FE=@>LI<;KFNFIB8J8N@I<C<JJE<KNFIB
8::<JJGF@EK0J@E>K?@JDF;<N@CC;<=<8KK?<)/$+J?8I@E>=<8KLI<
8E;#+J<IM<I$E::<JJ+F@EK+DF;<K?<-FLK<IN@CCE<<;
KF9<:FE=@>LI<;N@K?8E$+8;;I<JJK?8K@J@EK?<J8D<JL9E<K8J
K?<I<JKF=K?<E<KNFIBK?8KPFLN@CC9I@;><KF/?<;<=8LCK$+8;;I<JJ
@J8E;JL9E<KD8JB@J/?<J<:8E9<
:LJKFD@Q<;=FIPFLIE<<;
 E89C<K?<+DF;<DPJ<C<:K@E>S E89C<U@EK?<S0J<8J::<JJ
+F@EKFECPUG8><2?<EPFLJ<C<:KK?@JFGK@FEPFLN@CC9<89C<KF
:?8E><K?<$+J<KK@E>J
 .<KPFLI$+J<KK@E>JKFD8K:?PFLIE<KNFIBC@:BSGGCP?8E><JU
 FEE<:K8:89C<=IFDK?<S(F;<DUGFIKFEK?<-FLK<IKFPFLI
<O@JK@E>E<KNFIB
/?<-FLK<I@JEFN8:K@E>8J8E8::<JJGF@EK/F8::<JJK?<-FLK<IJ
2<98J<;;M8E:<;0J<I$EK<I=8:<8>8@EKPG<K?<$+8;;I<JJPFL
JG<:@=@<;@EKFPFLI9IFNJ<IJE8M@>8K@FE98I4FL:8EJ<KK?<<E:IPGK@FE
J<KK@E>J(8;;I<JJ=@CK<I@E>..$8E;:?8EE<CEFID8CCP
60
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
Ř IP Spoofing
Ř SYN flood
Ř Land Attack
Ř UDP flooding
Ř Ping of Death (PoD)
Ř Tear Drop Attack
Ř Denial of Service (DoS)
Ř ICMP defect
Ř IP with zero length
Ř RIP defect
Ř Smurf Attack
Ř Fragment flooding
Ř TCP Null Scan
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “Stealth, meaning that for
all intents and purposes, they do not exist to a would-be hacker. You
can turn the firewall function off if needed; however, while disabling the
firewall protection will not leave your network completely vulnerable to
hacker attacks, it is recommended that you leave the firewall enabled.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
?>7:8EB:>8 >D6B>2<?BG2B5:>8*6DD:>8C
/?<S1@IKL8C.<IM<IJU=LE:K@FEN@CC8CCFNPFLKFIFLK<<OK<IE8C$EK<IE<K
:8CCJ=FIJ<IM@:<JJL:?8J8N<9J<IM<IGFIK!/+J<IM<I+FIKFI
FK?<I8GGC@:8K@FEJK?IFL>?PFLI-FLK<IKFPFLI@EK<IE8CE<KNFIB.@E:<
PFLI@EK<IE8C:FDGLK<IJ8I<GIFK<:K<;9P8=@I<N8CC:FDGLK<IJFLKJ@;<
PFLIE<KNFIBFM<IK?<$EK<IE<K:8EEFK><KKFK?<D9<:8LJ<K?<P:8EEFK
9<SJ<<EU4FLN@CCE<<;KF:FEK8:KK?<8GGC@:8K@FEM<E;FIKF=@E;FLK
N?@:?GFIKJ<KK@E>JPFLE<<;
>D6B:>8*6DD:>8C:>D?D96-:BDE2<*6BF6B
/F<EK<IJ<KK@E>J<EK<IK?<$+8;;I<JJ@EK?<JG8:<GIFM@;<;=FIK?<
@EK<IE8CJ<IM<ID8:?@E<8E;K?<GFIKJI<HL@I<;KFG8JJ/?<EJ<C<:K
K?<GFIKKPG</+FI0+GFIKELD9<I:?<:BK?<S E89C<U9FO8E;
:C@:BS.<KU*G<E@E>GFIKJ@EPFLI=@I<N8CC:8EGFJ<8J<:LI@KPI@JB4FL
:8E<E89C<8E;;@J89C<J<KK@E>JM<IPHL@:BCP$K@JI<:FDD<E;<;K?8K
PFL;@J89C<K?<J<KK@E>JN?<EPFL8I<EFKLJ@E>8JG<:@=@:8GGC@:8K@FE

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
*6DD:>8<:6>D ':<D6BC
/?<-FLK<I:8E9<:FE=@>LI<;KFI<JKI@:K8::<JJKFK?<$EK<IE<K<D8@CFI
FK?<IE<KNFIBJ<IM@:<J8KJG<:@=@:;8PJ8E;K@D<J-<JKI@:K@FE:8E9<J<K
=FI8J@E>C<:FDGLK<I8I8E><F=:FDGLK<IJFIDLCK@GC<:FDGLK<IJ
/FI<JKI@:K$EK<IE<K8::<JJKF8J@E>C<:FDGLK<I=FI<O8DGC<<EK<IK?<
$+8;;I<JJF=K?<:FDGLK<IKFN?@:?PFLN@J?KFI<JKI@:K8::<JJ@EK?<
$+=@<C;J)<OK<EK<ISU@E9FK?K?<GFIK=@<C;J.<C<:KSFK?U.<C<:K
SCF:BU4FL:8E8CJFJ<C<:KSCN8PJUKF9CF:B8::<JJ8CCF=K?<K@D<
.<C<:KK?<;8PKFJK8IKFEKFGK?<K@D<KFJK8IKFEKFGK?<;8PKF<E;FE
K?<9FKKFD8E;K?<K@D<KFJKFGFEK?<9FKKFD.<C<:KS E89C<UC@:B
SGGCP?8E><JU/?<:FDGLK<I8KK?<$+8;;I<JJPFLJG<:@=@<;N@CCEFN
9<9CF:B<;=IFD$EK<IE<K8::<JJ8KK?<K@D<JPFLJG<:@=@<;)FK<<
JLI<PFL?8M<J<C<:K<;K?<:FII<:KK@D<QFE<LE;<IS0K@C@K@<J.PJK<D
.<KK@E>J/@D<5FE<U

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
*6DD:>8$55B6CC:<D6B:>8
/?<(8;;I<JJ=@CK<I@J8GFN<I=LCJ<:LI@KP=<8KLI<K?8K8CCFNJPFL
KFJG<:@=PN?@:?:FDGLK<IJ8I<8CCFN<;FEK?<E<KNFIBEP:FDGLK<I
8KK<DGK@E>KF8::<JJK?<E<KNFIBK?8K@JEFKJG<:@=@<;@EK?<=@CK<IC@JK
N@CC9<;<E@<;8::<JJ2?<EPFL<E89C<K?@J=<8KLI<PFLDLJK<EK<I
K?<(8;;I<JJF=<8:?:C@<EK:FDGLK<IFEPFLIE<KNFIBKF8CCFN
E<KNFIB8::<JJKF<8:?
/F<E89C<K?@J=<8KLI<J<C<:KS(;;I<JJ!@CK<I@E>U8E;:C@:BS E89C<U
)<OKJ<C<:KK?<(8;;I<JJPFLNFLC;C@B<KF8;;KFK?<C@JK=IFD
K?<;IFG;FNED<ELF=:LII<EKCP:FEE<:K<;:FDGLK<IJ:C@:BSFGPKFU
8E;J<C<:KK?<JCFKKFN?@:?KF8;;K?<(8;;I<JJ4FL:8E8CJF
D8EL8CCP<EK<IK?<(8;;I<JJ@EK?<JG8:<GIFM@;<;C@:BSGGCP
?8E><JUKFJ8M<K?<J<KK@E>J4FL:8E?8M<8(8;;I<JJ=@CK<I@E>C@JK
F=LGKF:FDGLK<IJ




.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
>23<:>8D966=:<:D2B:J651?>6$1
/?<(5=<8KLI<8CCFNJPFLKFJG<:@=PFE<:FDGLK<IFEPFLIE<KNFIB
KF9<GC8:<;FLKJ@;<F=K?<=@I<N8CC/?@JD8P9<E<:<JJ8IP@=K?<
=@I<N8CC@J:8LJ@E>GIF9C<DJN@K?8E8GGC@:8K@FEJL:?8J8>8D<FI
M@;<F:FE=<I<E:@E>8GGC@:8K@FE0J<K?@J=<8KLI<FE8K<DGFI8IP98J@J
/?<:FDGLK<I@EK?<(5@J)*/GIFK<:K<;=IFD?8:B<I8KK8:BJ)FK<
$=PFLI$.+JL9J:I@GK@FEGIFM@;<JPFLN@K?8;;@K@FE8CGL9C@:2)$+
8;;I<JJ<J8;;@K@FE8C:FDGLK<IJ:8E9<GC8:<;FLKJ@;<K?<=@I<N8CC
GIFM@;<;<8:?:FDGLK<ILJ<J8;@==<I<EKGL9C@:2)$+
/FGLK8:FDGLK<I@EK?<(5<EK<IK?<C8JK;@>@KJF=@KJ$+8;;I<JJ@E
K?<$+=@<C;8E;J<C<:KS E89C<UC@:BSGGCP?8E><JU=FIK?<:?8E><KF
K8B<<==<:K
/FGLK8:FDGLK<I@EK?<(5<EK<IK?<C8JK;@>@KJF=@KJ$+8;;I<JJ@E
K?<$+=@<C;8E;J<C<:KS E89C<UC@:BSGGCP?8E><JU=FIK?<:?8E><KF
K8B<<==<:K
65
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
WAN Ping Blocking
Computer hackers use what is known as “pinging” to find potential
victims on the Internet. By pinging a specific IP address and receiving a
response from the IP address, a hacker can determine that something of
interest might be there. The Router can be set up so it will not respond
to an ICMP ping from the outside. This heightens the level of security of
your Router.
Utilities Tab
This screen lets you manage different parameters of the Router and
perform certain administrative functions.
To turn off the ping response, select “Block ICMP Ping” and click “Apply
Changes”. The Router will not respond to an ICMP ping.
66
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Restarting the Router
Sometimes it may be necessary to restart or reboot the Router if it
begins working improperly. Restarting or rebooting the Router will NOT
delete any of your configuration settings.
Restoring Factory Default Settings
Using this option will restore all of the settings in the Router to the
factory (default) settings. It is recommended that you back up your
settings before you restore all of the defaults.
67
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Saving a Current Configuration
You can save your current configuration by using this feature. Saving
your configuration will allow you to restore it later if your settings are lost
or changed.
1. Click “Save”. A window
called “File Download” will
open. Click “Save”.
2. A window will open that allows you to select the location where
you want to save the configuration file. Select a location. You can
name the file anything you want, or use the default name. Be sure
to name the file so you can locate it yourself later. When you have
selected the location and name of the file, click “Save”.
68
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Restoring a Previous Configuration
This option will allow you to restore a previously saved configuration. 1. Click “Browse”. A window will open that allows you to select the
location of the configuration file. All configuration files end with
a “.conf”. Locate the configuration file you want to restore and
double-click on it.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
 +C<8J<N8@KN?@C<K?<-FLK<ICF8;JK?<:FE=@>LI8K@FE=@C</?<
-FLK<IJ?FD<G8><J?FLC;8GG<8I8LKFD8K@:8CCP$=EFKKPG<K?<
-FLK<IJ8;;I<JJ;<=8LCK@EKFK?<E8M@>8K@FE98IF=
PFLI9IFNJ<I
,@52D:>8D96:B=G2B6
!IFDK@D<KFK@D<<CB@ED8PI<C<8J<E<NM<IJ@FEJF=K?<-FLK<IJ
=@IDN8I<!@IDN8I<LG;8K<J:FEK8@E=<8KLI<@DGIFM<D<EKJ8E;=@O<JKF
GIF9C<DJK?8KD8P<O@JK2?<E<CB@EI<C<8J<JE<N=@IDN8I<PFL:8E
;FNECF8;K?<=@IDN8I<=IFDK?<<CB@ELG;8K<N<9J@K<8E;LG;8K<PFLI
-FLK<IJ=@IDN8I<KFK?<C8K<JKM<IJ@FE

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
C@:BFES!!@IDN8I<0G;8K<UKF=@E;8E;;FNECF8;K?<C8K<JK
=@IDN8I<8M8@C89C<
*62B49:>87?B2%6G-6BC:?>?7:B=G2B6
!IFD?KKGNNN9<CB@E:FDJLGGFIKKPG<K?<<CB@EG8IKELD9<I
S!U@EK?<S.<8I:?U=@<C;C@:BS.<8I:?U
,@52D:>8D96)?ED6BC:B=G2B6
$EK?<S!@IDN8I<LG;8K<UG8><:C@:BSIFNJ<UN@E;FNN@CCFG<EK?8K
8CCFNJPFLKFJ<C<:KK?<CF:8K@FEF=K?<=@IDN8I<LG;8K<=@C<
Click on ³)' v3 Firmware Update” to find and download the
latest firmware available.
³)' v3” in the “Search” field. Click “Search”.

.:B6<6CC)?ED6B
  
,* % +.*-%,*) %+)
92>8:>8*ICD6=*6DD:>8C
/?<S.PJK<D.<KK@E>JUG8><@JN?<I<PFL:8E<EK<I8E<N8;D@E@JKI8KFI
G8JJNFI;J<KK?<K@D<QFE<<E89C<I<DFK<D8E8><D<EK8E;KLIEFE
8E;F==K?<0+E+=LE:K@FEF=K?<-FLK<I
72
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting or Changing the Administrator Password
The Router ships with NO password entered. If you wish to add a
password for greater security, you can set a password here. Write down
your password and keep it in a safe place, as you will need it if you need
to log into the Router in the future. It is also recommended that you
set a password if you plan to use the remote management feature of
your Router.
Changing the Login Time-Out Setting
The login time-out option allows you to set the period of time that you
can be logged into the Routers Web-Based Advanced User Interface.
The timer starts when there has been no activity. For example, you
have made some changes in the Web-Based Advanced User Interface,
then left your computer alone without clicking “Logout”. Assuming the
time-out is set to 10 minutes, then 10 minutes after you leave, the login
session will expire. You will have to log into the Router again to make
any more changes. The login time-out option is for security purposes
and the default is set to 10 minutes.
Note: Only one computer can be logged into the Routers Web-Based
Advanced User Interface at one time.
73
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting the Time and Time Zone
The Router keeps time by connecting to a Simple Network Time Protocol
(SNTP) server. This allows the Router to synchronize the system clock
to the global Internet. The synchronized clock in the Router is used
to record the security log and control client filtering. Select the time
zone that you reside in. If you reside in an area that observes daylight
saving, then place a check mark in the box next to “Automatically Adjust
Daylight Saving”. The system clock may not update immediately. Allow
at least 15 minutes for the Router to contact the time servers on the
Internet and get a response. You cannot set the clock yourself.
Enabling Remote Management
Before you enable this advanced feature of your Belkin Router, MAKE
SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote
management allows you to make changes to your Router’s settings from
anywhere on the Internet. There are two methods of remotely managing
the Router. The first is to allow access to the Router from anywhere
on the Internet by selecting “Any IP address can remotely manage the
Router”. By typing in your WAN IP address from any computer on the
Internet, you will be presented with a login screen where you need to
type in the password of your Router. The second method is to allow a
specific IP address only to remotely manage the Router. This is more
secure, but less convenient. To use this method, enter the IP address
you know you will be accessing the Router from in the space provided
and select “Only this IP address can remotely manage the Router.
Before you enable this function, it is STRONGLY RECOMMENDED that
you set your administrator password. Leaving the password empty will
potentially open your Router to intrusion.
74
G Wireless Router
SECTIONSTable of Contents 12345 789106
USING THE WEB-BASED ADVANCED USER INTERFACE
Enabling/Disabling UPnP
UPnP (Universal Plug-and-Play) is yet another advanced feature
offered by your Belkin Router. It is a technology that offers seamless
operation of voice messaging, video messaging, games, and other
applications that are UPnP-compliant. Some applications require the
Router’s firewall to be configured in a specific way to operate properly.
This usually requires opening TCP and UDP ports. An application that
is UPnP-compliant has the ability to communicate with the Router,
basically “telling” the Router which way it needs the firewall configured.
The Router ships with the UPnP feature disabled. If you are using any
applications that are UPnP-compliant, and wish to take advantage of the
UPnP features, you can enable the UPnP feature. Simply select “Enable
in the “UPnP Enabling” section of the “System Settings” page. Click
Apply Changes” to save the change.
Enabling/Disabling Auto Firmware Update
This innovation provides the Router with the built-in capability to
automatically check for a new version of firmware and alert you that the
new firmware is available. When you log into the Routers Web-Based
Advanced User Interface, the Router will perform a check to see if
new firmware is available. If so, you will be notified. You can choose
to download the new version or ignore it. The Router ships with this
feature enabled. If you want to disable it, select “Disable” and click
Apply Changes.
75
G Wireless Router
SECTIONSTable of Contents 123456 8910
MANUALLY CONFIGURING NETWORK SETTINGS
7
In order for your computer to properly communicate with your Router, you will need to change your PC’s TCP/IP settings to DHCP.
Manually Configuring Network Adapters in Windows 2000, NT, XP, or Vista
1. Click “Start”, “Settings”, then “Control Panel”.
2. Double-click on the “Network and dial-up connections” icon
(Windows 2000) or the “Network” icon (Windows XP or Vista).
3. Right-click on the “Local Area Connection” associated
with your network adapter and select “Properties” from the
drop-down menu.
4. In the “Local Area Connection Properties” window, click “Internet
Protocol (TCP/IP)” and click the “Properties” button. The following
screen will appear:
5. If “Use the following IP address” (2) is selected, your Router
will need to be set up for a static IP connection type. Write the
address information in the table below. You will need to enter this
information into the Router.
6. If not already selected, select “Obtain an IP address automatically”
(1) and “Obtain DNS server address automatically” (3). Click “OK”.
Your network adapter(s) are now configured for use with the Router.
(1)
(2)
(3)
76
G Wireless Router
SECTIONSTable of Contents 123456 89107
MANUALLY CONFIGURING NETWORK SETTINGS
Manually Configuring Network Adapters in Windows 98SE or Me
1. Right-click on “My Network Neighborhood” and select “Properties”
from the drop-down menu.
2. Select “TCP/IP -> settings” for your installed network adapter. You
will see the following window.
3. If “Specify an IP address” is selected, your Router will need
to be set up for a static IP connection type. Write the address
information in the table below. You will need to enter this
information into the Router.
4. Write in the IP address and subnet mask from the “IP Address”
tab (3).
5. Click the “Gateway” tab (2). Write the gateway address down in
the chart.
6. Click the “DNS Configuration” tab (1). Write the DNS address(es) in
the chart.
7. If not already selected, select “Obtain IP address automatically” in
the “IP Address” tab. Click “OK”.
Restart the computer. When the computer restarts, your network
adapter(s) are now configured for use with the Router.
Set up the computer that is connected to the cable or DSL modem
FIRST using these steps. You can also use these steps to add
computers to your Router after the Router has been set up to connect to
the Internet.
(1) (3)
(2)
77
G Wireless Router
SECTIONSTable of Contents 123456 89107
MANUALLY CONFIGURING NETWORK SETTINGS
Manually Configuring Network Adapters in Mac OS up to v9.x
In order for your computer to properly communicate with your Router, you will need to change your Mac computer’s TCP/IP settings to DHCP.
(1)
(2)
3. Next to “Configure” (2),
if “Manually” is selected,
your Router will need to
be set up for a static IP
connection type. Write the
address information in the
table below. You will need
to enter this information into
the Router.
4. If not already set, at “Configure:, choose “Using DHCP Server”.
This will tell the computer to obtain an IP address from the Router.
5. Close the window. If you
made any changes, the
following window will
appear. Click “Save”.
Restart the computer. When the computer restarts, your network
settings are now configured for use with the Router.
1. Pull down the Apple menu. Select “Control Panels” and
select “TCP/IP”.
2. You will see the TCP/IP control panel. Select “Ethernet Built-In” or
“Ethernet” in the “Connect via:” drop-down menu (1).
78
G Wireless Router
SECTIONSTable of Contents 123456 89107
MANUALLY CONFIGURING NETWORK SETTINGS
Manually Configuring Network Adapters in Mac OS X
3. Select “Built-in Ethernet” (1) next to “Show” in the “Network” menu.
4. Select the “TCP/IP” tab (2). Next to “Configure:(3), you should see
“Manually” or “Using DHCP”. If you do not, check the PPPoE tab
(4) to make sure that “Connect using PPPoE” is NOT selected. If it
is, you will need to configure your Router for a PPPoE connection
type using your user name and password.
1. Click on the “System
Preferences” icon.
2. Select “Network” from the “System Preferences” menu.
(1)
(3)
(4)
(2)
79
G Wireless Router
SECTIONSTable of Contents 123456 89107
MANUALLY CONFIGURING NETWORK SETTINGS
5. If “Manually” is selected,
your Router will need to
be set up for a static IP
connection type. Write the
address information in the
table below. You will need
to enter this information into
the Router.
(1)
(3)
(4)
(2)
6. If not already selected, select “Using DHCP” next to “Configure:
(3), then click “Apply Now”.
Your network adapter(s) are now configured for use with the Router.
80
G Wireless Router
SECTIONSTable of Contents 1234567 910
RECOMMENDED WEB BROWSER SETTINGS
8
In most cases, you will not need to make any changes to your web browser’s settings. If you are having trouble accessing the Internet or the
Web-Based Advanced User Interface, then change your browser’s settings to the recommended settings in this section.
Internet Explorer 4.0 or Higher
1. Start your web browser. Select “Tools” then “Internet Options”. 2. In the “Internet Options” screen, there are three selections: “Never
dial a connection, “Dial whenever a network connection is not
present, and “Always dial my default connection”. If you can make
a selection, select “Never dial a connection. If you cannot make a
selection, go to the next step.
81
G Wireless Router
SECTIONSTable of Contents 1234567 9108
RECOMMENDED WEB BROWSER SETTINGS
3. Under the “Internet Options” screen, click on “Connections” and
select “LAN Settings….
4. Make sure there are no check marks next to any of the displayed
options:Automatically detect settings”, “Use automatic
configuration script”, and “Use a proxy server”. Click “OK”. Then
click “OK” again in the “Internet Options” page.
Netscape®Navigator® 4.0 or Higher
1. Start Netscape. Click on “Edit” then “Preferences.
2. In the “Preferences” window, click on “Advanced” then select
“Proxies”. In the “Proxies” window, select “Direct connection to
the Internet”.

.:B6<6CC)?ED6B
  
+)&,#*&&+ %
'B?3<6=
$EJK8CC8K@FE;F<JEFK8LKFD8K@:8CCPJK8IK
*?<ED:?>
$=K?<-*(;F<JEFKJK8IKK?<.<KLGJJ@JK8EK8LKFD8K@:8CCP@K:FLC;9<K?8KK?<
:FDGLK<I@JILEE@E>FK?<I8GGC@:8K@FEJK?8K8I<@EK<I=<I@E>N@K?K?<;I@M<
 )<OK;FL9C<:C@:BFEK?<-*(;I@M<K?8KK?<.<KLGJJ@JK8EK
.F=KN8I<?8J9<<EGC8:<;@EKFJK8IKK?<@EJK8CC8K@FE
$=K?<.<KLGJJ@JK8EK
J:I<<E;F<JEFK8GG<8I
N@K?@ETJ<:FE;JFG<E
LGPFLI-*(;I@M<
9P;FL9C<:C@:B@E>FEK?<
S(PFDGLK<IU@:FEK?8K@J
CF:8K<;FEPFLI;<JBKFG

.:B6<6CC)?ED6B
  
+)&,#*&&+ %
 /?<.<KLGJJ@JK8EKJ?FLC;JK8IKN@K?@E8=<NJ<:FE;J$=
@EJK<8;8N@E;FN8GG<8IJJ?FN@E>K?<=@C<JFEK?<
;FL9C<:C@:BFEK?<@:FEC89<C<;S.<KLGJJ@JK8EK<O<U
 $=K?<.<KLGJJ@JK8EKJK@CC;F<JEFKJK8IKI<=<I<E:<
K?<J<:K@FEK@KC<;S(8EL8CCPFE=@>LI@E>)<KNFIB
.<KK@E>JUG8><F=K?@J0J<I(8EL8C=FI8E8CK<IE8K<
J<KLG D<K?F;
84
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
The Setup Assistant cannot find my Router.
Solution:
If the Setup Assistant is not able to find the Router during the installation process, please check the following items:
2. Unplug power to the Router for 10 seconds, and then plug the
power back into the Router. Ensure that the Router’s Power light is
on; it should be solid green. If not, check to make sure that the AC
adapter is correctly connected to the Router and plugged into a
wall outlet.
3. Ensure that you have a cable (use the cable included with the
Router) connected between (1) the network (Ethernet) port on the
back of the computer and (2) one of the LAN ports, labeled “1
through “4”, on the back of the Router.
Note: The computer should NOT be connected to the port labeled
“Modem” on the back of the Router.
4. Try shutting down and restarting your computer, then rerunning the
Setup Assistant.
If the Setup Assistant is still unable to find the Router, reference
the section titled “Manually Configuring Network Settings” for
installation steps.
1. If the Setup Assistant is not able to find the Router during the
installation process, there may be third-party firewall software
installed on the computer attempting to access the Internet.
Examples of third-party firewall software are ZoneAlarm,
BlackICE PC Protection, McAfee Personal Firewall, and Norton
Personal Firewall.
If you do have firewall software installed on your computer, please make
sure that you properly configure it. You can determine if the firewall
software is preventing Internet access by temporarily turning it off. If,
while the firewall is disabled, Internet access works properly, you will
need to change the firewall settings to function properly when it is
turned on.
Please refer to the instructions provided by the publisher of your
firewall software for instructions on configuring the firewall to allow
Internet access.
85
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
The Setup Assistant cannot connect my Router to the Internet.
Solution:
If the Setup Assistant is not able to connect the Router to the Internet,
please check the following items:
1. Use the troubleshooting suggestions within the Setup Assistant.
If the troubleshooting screen does not open automatically, click
on the “Troubleshoot” button in the lower, right-hand corner of the
Setup Assistant window.
2. If your ISP requires a user name and password, make sure that you
have typed in your user name and password correctly. Some user
names require that the ISPs domain be at the end of the name.
Example: “myname@myisp.com”. The “@myisp.com” part of the
user name may need to be typed as well as your user name.
If you continue to have no Internet connection, reference the section
titled “Manually Configuring Network Settings” (page 75 of this User
Manual) for alternate setup method.
Problem:
Ř The Setup Assistant completed installation, but my web browser
doesn’t work.
Ř I am unable to connect to the Internet. The Router’s “Modem” light
is off and the “Internet” light is blinking.
Solution:
If you cannot connect to the Internet, the “Modem” light is off, and the
“Internet” light is blinking, the problem may be that your modem and
Router are not connected properly.
1. Make sure the network cable between the modem and the Router
is connected. We strongly recommend using the cable that was
supplied with your cable or DSL modem for this purpose. The
cable should be connected at one end to the Router’s “Modem”
port, and at the other end to the network port on your modem.
2. Unplug the cable or DSL modem from its power source for three
minutes. After three minutes, plug the modem back into its
power source. This may force the modem to properly recognize
the Router.
3. Unplug the power to your Router, wait 10 seconds, and then
reconnect the power. This will cause the Router to reattempt
communication with the modem.
If the “Modem” light on the Router is not lit after completing these steps,
please contact Belkin Technical Support.
4. Try shutting down and restarting your computer.
86
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
Ř The Setup Assistant completed installation, but my web browser
doesn’t work.
Ř I am unable to connect to the Internet. The Router’s “Modem” light
is on and the “Internet” light is blinking.
Solution:
If you cannot connect to the Internet, the “Modem” light is on, and the
“Internet” light is blinking, the problem may be that your connection type
may not match the ISPs connection.
Ř If you have a “static IP address” connection, your ISP must assign
you the IP address, subnet mask, and gateway address. Please
refer to the section entitled “Alternate Setup Method” for details on
changing this setting.
Ř If you have a “PPPoE” connection, your ISP will assign you a user
name and password and sometimes a service name. Make sure the
Router connection type is configured to PPPoE and the settings
are entered properly. Please refer to the section entitled “Alternate
Setup Method” for details on changing this setting.
Ř You may need to configure your Router to meet the specific
requirements of your ISP. To search our Knowledge Base for
ISP-specific issues, go to: http://web.belkin.com/support and type
in “ISP”.
If you are still unable to access the Internet after verifying these settings,
please contact Belkin Technical Support.
Problem:
Ř The Setup Assistant completed, but my web browser doesn’t work.
Ř I am unable to connect to the Internet. The “Modem” light on my
Router is blinking and the “Internet” light is solid.
Solution:
If the “Modem” light is blinking and the “Internet” light is solid, but
you are unable to access the Internet, there may be third-party firewall
software installed on the computer attempting to access the Internet.
Examples of third-party firewall software are ZoneAlarm, BlackICE PC
Protection, McAfee Personal Firewall, and Norton Personal Firewall.
If you do have firewall software installed on your computer, please make
sure that you properly configure it. You can determine if the firewall
software is preventing Internet access by temporarily turning it off. If,
while the firewall is disabled and Internet access works properly, you
will need to change the firewall settings to function properly when it is
turned on.
Please refer to the instructions provided by the publisher of your
firewall software for instructions on configuring the firewall to allow
Internet access.
If you are still unable to access the Internet after disabling any firewall
software, please contact Belkin Technical Support.

.:B6<6CC)?ED6B
  
+)&,#*&&+ %
'B?3<6=
$:8EK:FEE<:KKFK?<$EK<IE<KN@I<C<JJCP
*?<ED:?>
$=PFL8I<LE89C<KF:FEE<:KKFK?<$EK<IE<K=IFD8N@I<C<JJ:FDGLK<IGC<8J<;FK?<=FCCFN@E>
 /?<<O8:KN@E;FNK?8KFG<EJN@CCM8IP;<G<E;@E>FEK?<DF;<CF=
N@I<C<JJ:8I;PFL?8M<?FN<M<I8EPF=K?<LK@C@K@<JJ?FLC;?8M<
8C@JKF=SM8@C89C<)<KNFIBJUWK?FJ<N@I<C<JJE<KNFIBJ@K:8E
:FEE<:KKF
?6CD96>2=6?7I?EBG:B6<6CC>6DG?B;2@@62B:>D96B6CE<DC
4<JDPE<KNFIBE8D<@JC@JK<;W>FKFK?<KIFL9C<J?FFK@E>JFCLK@FE
K@KC<;S$:8EK:FEE<:KKFK?<$EK<IE<KN@I<C<JJCP9LKDPE<KNFIBE8D<
@J C@JK<;U
)FDPE<KNFIBE8D<@JEFKC@JK<;W>FKFK?<KIFL9C<J?FFK@E>JFCLK@FE
K@KC<;S$:8EK:FEE<:KKFK?<$EK<IE<KN@I<C<JJCP8E;DPE<KNFIBE8D<@J
EFKC@JK<;U
'FFB8KK?<C@>?KJFEPFLI-FLK<I4FLI<CB@E-FLK<IJC@>?KJJ?FLC;
9<8J=FCCFNJ
Ř7KHœ3RZHUŔOLJKWVKRXOGEHRQ
Ř7KHœ,QWHUQHWŔOLJKWVKRXOGEHRQ
Ř7KHœ0RGHPŔOLJKWVKRXOGEHHLWKHURQRUEOLQNLQJ
 *G<EPFLIN@I<C<JJLK@C@KPJF=KN8I<9P:C@:B@E>FEK?<@:FE@EK?<
JPJK<DKI8P8KK?<9FKKFDI@>?K?8E;:FIE<IF=K?<J:I<<E$=PFL
8I<8CJFLJ@E>8<CB@E2@I<C<JJ8I;FI;8GK<IN@K?K?@J-FLK<I
K?<KI8P@:FEJ?FLC;CFFBC@B<K?@J
88
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
I can’t connect to the Internet wirelessly, but my network name is listed.
Solution:
If the name of your network is listed in the “Available Networks” list,
please follow the steps below to connect wirelessly:
1. Click on the correct network name in the “Available Networks” list.
2. If the network has security (encryption) enabled, you will need to
enter the network key. For more information regarding security,
see the section entitled “Securing your Wi-Fi Network” in this
User Manual.
3. Within a few seconds, the tray icon in the lower, left-hand corner of
your screen should turn green, indicating a successful connection
to the network.
Problem:
I can’t connect to the Internet wirelessly, and my network name is
not listed.
Solution:
If the correct network name is not listed under “Available Networks”
in the wireless configuration utility, please attempt the following
troubleshooting steps:
1. Temporarily move your computer, if possible, five to 10 feet away
from the Router. Close the wireless configuration utility, and reopen
it. If the correct network name now appears under “Available
Networks”, you may have a range or interference problem. Please
see the suggestions discussed in the section titled “Placement of
your Router for Optimal Performance” in this User Manual.
2. Using a computer that is connected to the Router through a
network cable (as opposed to wirelessly), ensure that “Broadcast
SSID” is enabled. This setting is found on the Router’s wireless
“Channel and SSID” configuration page.
If you are still unable to access the Internet after completing these steps,
please contact Belkin Technical Support.
89
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
My wireless network performance is inconsistent.
Data transfer is sometimes slow.
Signal strength is poor.
I am having difficulty establishing and/or maintaining a Virtual Private Network (VPN) connection.
Limiting the Wireless Transmit Rate
Limiting the wireless transmit rate can help improve the maximum
wireless range, and connection stability. Most wireless cards have the
ability to limit the transmission rate. To change this property, go to the
Windows Control Panel, open “Network Connections” and double-click
on your wireless cards connection. In the “Properties” dialog, select the
“Configure” button on the “General” tab (Windows 98 users will have to
select the wireless card in the list box and then click “Properties”), then
choose the “Advanced” tab and select the rate property. Wireless client
cards are usually set to automatically adjust the wireless transmit rate
for you, but doing so can cause periodic disconnects when the wireless
signal is too weak; as a rule, slower transmission rates are more stable.
Experiment with different connection rates until you find the best one
for your environment; note that all available transmission rates should
be acceptable for browsing the Internet. For more assistance, see your
wireless card’s user manual.
Solution:
Wireless technology is radio-based, which means connectivity and
the throughput performance between devices decreases when the
distance between devices increases. Other factors that will cause signal
degradation (metal is generally the worst culprit) are obstructions such
as walls and metal appliances. As a result, the typical indoor range of
your wireless devices will be between 100 to 200 feet. Note also that
connection speed may decrease as you move farther away from the
Router or access point.
In order to determine if wireless issues are related to range, we suggest
temporarily moving the computer, if possible, five to 10 feet away from
the Router.
Changing the Wireless Channel
Depending on local wireless traffic and interference, switching the
wireless channel of your network can improve performance and
reliability. The default channel the Router is shipped with is channel 11.
You may choose from several other channels depending on your region
(see the section titled “Changing the Wireless Channel” on page 47 for
instructions on how to choose other channels).
90
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
How do I extend the range of my wireless network?
Solution:
Belkin recommends using one of the following products to extend
wireless network coverage throughout large homes or offices:
Ř Wireless Access Point: A wireless access point can effectively
double the coverage area of your wireless network. An access
point is typically placed in the area not currently covered by your
G Wireless Router, and is connected to the Router using either
an Ethernet cable or through your home’s power lines using two
Powerline Ethernet Adapters.
Ř For 802.11g (54g) wireless networks, Belkin offers a Wireless G
Range Extender/Access Point that can be connected wirelessly to
a Belkin G Wireless Router, without requiring an Ethernet cable or
Powerline Ethernet Adapters.
These Belkin products are available at your local retailer, or can be
ordered from Belkin directly.
For network/range extension information, please visit:
www.belkin.com/networking to find out more about:
Wireless G Range Extender/Access Point (F5D7130)
Powerline Ethernet Adapter (F5D4070)
91
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
I am having difficulty setting up Wired Equivalent Privacy (WEP) security on a Belkin Wireless Router or Belkin Access Point.
For example:
C3 03 0F AF 4B B2 C3 D4 4B C3 D4 E7 E4 = 128-bit key
4. Click “Apply Changes” to finish. Encryption in the Wireless Router
is now set. Each of your computers on your wireless network will
now need to be configured with the same security settings.
WARNING: If you are configuring the Wireless Router or Access Point
from a computer with a wireless client, you will need to ensure that
security is turned on for this wireless client. If this is not done, you will
lose your wireless connection.
Note to Mac users: Original Apple AirPort products support 64-bit
encryption only. Apple AirPort 2 products can support 64-bit or 128-bit
encryption. Please check your Apple AirPort product to see which
version you are using. If you cannot configure your network with 128-bit
encryption, try 64-bit encryption.
Solution:
1. Log into your Wireless Router or Access Point.
Open your web browser and type in the IP address of the Wireless
Router or Access Point. (The Router’s default is 192.168.2.1, the Access
Point’s default is 192.168.2.254.) Log into your Router by clicking on the
“Login” button in the top, right-hand corner of the screen. You will be
asked to enter your password. If you never set a password, leave the
password field blank and click “Submit”.
Click the “Wireless” tab on the left of your screen. Select the
“Encryption” or “Security” tab to get to the security settings page.
2. Select “128-bit WEP” from the drop-down menu.
3. After selecting your WEP encryption mode, you can type in your
hex WEP key manually, or you can type in a passphrase in the
“Passphrase” field and click “Generate” to create a WEP key from
the passphrase. Click “Apply Changes” to finish. You must now
set all of your clients to match these settings. A hex (hexadecimal)
key is a combination of numbers and letters from AF and 09. For
128-bit WEP, you need to enter 26 hex keys.
92
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
I am having difficulty setting up Wired Equivalent Privacy (WEP) security on a Belkin client card (Wireless Network Card or Adapter).
5. Ensure the box “The key is provided for me automatically” at the
bottom is unchecked. If you are using this computer to connect to
a corporate network, please consult your network administrator if
this box needs to be checked.
6. Type your WEP key in the “Network key” box.
Important: A WEP key is a combination of numbers and letters from
A–F and 0–7. For 128-bit WEP, you need to enter 26 keys. This network
key needs to match the key you assign to your G Wireless Router or
access point.
For example: C3030FAF4BB2C3D44BC3D4E7E4 = 128-bit key
7. Click “OK”, and thenApply” to save the settings.
If you are NOT using a Belkin wireless client card, please consult the
manufacturer’s user manual for that wireless client card.
Solution:
The client card must use the same key as the G Wireless Router or
access point. For instance, if your Wireless Router or access point uses
the key 00112233445566778899AABBCC, then the client card must be
set to the exact same key.
1. Double-click the “Signal Indicator” icon to bring up theWireless
Network Utility” screen. The “Advanced” button will allow you to
view and configure more options of your client card.
2. Once theAdvanced” button is clicked, the Belkin Wireless LAN
Utility will appear. This Utility will allow you to manage all the
advanced features of the Belkin client card.
3. Under the “Wireless Network Properties” tab, select a
network name from theAvailable Networks” list and click the
“Properties” button.
4. Under “Data Encryption, select “WEP”.
93
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
Do Belkin products support WPA?
Solution:
Note: To use WPA security, all your clients must be upgraded to drivers
and software that support it. At the time of this publication, a security
patch download is available, for free, from Microsoft. This patch works
only with the Windows XP operating system.
Download the patch here:
http://www.microsoft.com/downloads/details.aspx?FamilyID=009d8425-
ce2b-47a4-abec-274845dc9e91&displaylang=en
You also need to download the latest driver for your Belkin Wireless
802.11g Desktop or Notebook Network Card from the Belkin support
site. Other operating systems are not supported at this time. Microsofts
patch only supports devices with WPA-enabled drivers such as Belkin
802.11g products.
Download the latest drivers at http://www.belkin.com/support.
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security
on a Belkin Wireless Router or Belkin Access Point for a home network.
Solution:
1. From the “Security Mode” drop-down menu, select “WPA-PSK
(no server)”.
2. For “Encryption Technique”, select “TKIP” or “AES”. This setting
will have to be identical on the clients that you set up.
3. Enter your pre-shared key. This can be from eight to 63 characters
and can be letters, numbers, symbols, or spaces. This same key
must be used on all of the clients that you set up. For example,
your PSK might be something like: “Smith family network key”.
4. Click “Apply Changes” to finish. You must now set all clients to
match these settings.
94
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security on a Belkin client card (Wireless Network Card or Adapter) for a
home network.
4. Under “Network Authentication”, select “WPA-PSK (no server)”.
5. Type your WPA key in the “Network key” box.
Important: WPA-PSK is a combination of numbers and letters from
A-Z and 0-9. For WPA-PSK, you can enter eight to 63 characters. This
network key needs to match the key you assign to your G Wireless
Router or access point.
6. Click “OK”, then “Apply” to save the settings.
Solution:
Clients must use the same key that the G Wireless Router or access
point uses. For instance, if the key is “Smith Family Network Key” in
the G Wireless Router or access point, the clients must also use that
same key.
1. Double-click the “Signal Indicator” icon to bring up theWireless
Network Utility” screen. The “Advanced” button will allow you to
view and configure more options of your client card.
2. Once theAdvanced” button is clicked, the Belkin Wireless LAN
Utility will appear. This Utility will allow you to manage all the
advanced features of the Belkin client card.
3. Under the “Wireless Network Properties” tab, select a
network name from theAvailable Networks” list and click the
“Properties” button.
95
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security on a Belkin client card (Wireless Network Card or Adapter) for a business.
4. Under “Network Authentication”, select “WPA.
5. In the “Authentication” tab, select the settings that are indicated by
your network administrator.
6. Click “OK”, then “Apply” to save the settings.
Solution:
1. Double-click the “Signal Indicator” icon to bring up theWireless
Network Utility” screen. The “Advanced” button will allow you to
view and configure more options of your client card.
2. Once theAdvanced” button is clicked, the Belkin Wireless LAN
Utility will appear. This Utility will allow you to manage all the
advanced features of the Belkin client card.
3. Under the “Wireless Network Properties” tab, select a
network name from theAvailable Networks” list and click the
“Properties” button.
96
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security and I am NOT using a Belkin client card for a home network.
Enabling WPA-PSK (no server)
1. In systems running Windows XP, click “Start > Control Panel >
Network Connections”.
2. Right-click on the “Wireless Networks” tab. The “Wireless Network
Connection Properties” screen appears. Ensure the “Use Windows
to configure my wireless network settings” box is checked.
3. Under the “Wireless Networks” tab, click the “Configure” button,
and you will see the client card properties screen.
4. For a home or small business user, select “WPA-PSK” under
“Network Administration.
5. Select “TKIP” or “AES” under “Date Encryption”. This setting will
have to be identical to the G Wireless Router or access point that
you set up.
6. Type your encryption key in the “Network key” box.
Important: Enter your pre-shared key. This can be from eight to 63
characters and can be letters, numbers, or symbols. This same key
must be used on all of the clients that you set up.
7. Click “OK” to apply settings.
Solution:
If you are NOT using a Belkin WPA Wireless Desktop or Wireless
Notebook Network Card and it is not equipped with WPA-enabled
software, a file from Microsoft called “Windows XP Support Patch for
Wireless Protected Access” is available for free download:
http://www.microsoft.com/downloads/search.aspx?displaylang=en
Note: The file that Microsoft has made available works only with
Windows XP. Other operating systems are not supported at this time.
You also need to ensure that the wireless card manufacturer supports
WPA and that you have downloaded and installed the latest driver from
their support site.
Supported Operating Systems:
Ř Windows XP Professional
Ř Windows XP Home Edition
97
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
What is the difference between 802.11b, 802.11g, 802.11a, and
Draft-N?
Currently there are four levels of wireless networking standards, which
transmit data at very different maximum speeds. Each is based on
the designation 802.11(x), so named by the IEEE, the board that is
responsible for certifying networking standards. The most common
wireless networking standard, 802.11b, transmits information at
11Mbps; 802.11a and 802.11g work at 54Mbps; and Draft-N works up
to 300Mbps. Draft-N, the precursor to the upcoming 802.11n release,
promises speeds that exceed 802.11g, and up to twice the wireless
coverage area. See the following chart for more detailed information.
Wireless Comparison Chart
Wireless
Technology
802.11b 802.11g 802.11a Belkin Draft-N
Speed 11Mbps 54Mbps 54Mbps Up to 300Mbps
Frequency Common
household
devices such as
cordless phones
and microwave
ovens may
interfere with
the unlicensed
band 2.4GHz
Common
household
devices such as
cordless phones
and microwave
ovens may
interfere with
the unlicensed
band 2.4GHz
5GHz—
uncrowded
band
Common
household
devices such as
cordless phones
and microwave
ovens may
interfere with
the unlicensed
band 2.4GHz
Compatibility Compatible with
802.11g
Compatible with
802.11b
Incompatible
with 802.11b or
802.11g
Compatible
with 802.11g or
802.11b
Coverage Depends on
interference—
typically 100–
200 ft. indoors
Depends on
interference—
typically 100–
200 ft. indoors
Interference
range is
typically
50–100 ft.
Up to 800%
wider coverage
than standard
802.11g
Advantage Mature—legacy
technology
Common—
widespread
use for Internet
sharing
Less
interference—
great for
multimedia
application
Leading edge—
best coverage
and throughput
98
G Wireless Router
SECTIONSTable of Contents 12345678 109
TROUBLESHOOTING
Technical Support
You can find technical support information at http://www.belkin.com/
networking or www.belkin.com through the tech support area. If you
want to contact technical support by phone, please call:
US: 877-736-5771
800-223-5546 ext. 2263
310-898-1100 ext. 2263
UK: 0845 607 77 87
Australia: 1800 235 546
New Zealand: 0800 235 546
Singapore: 65 64857620
Europe: www.belkin.com/support
99
G Wireless Router
SECTIONSTable of Contents 123456789
INFORMATION
10
FCC Statement
DECLARATION OF CONFORMITY WITH FCC RULES FOR ELECTROMAGNETIC COMPATIBILITY
installation. If this equipment does cause harmful interference to radio or
television reception, which can be determined by turning the equipment
off and on, the user is encouraged to try and correct the interference by
one or more of the following measures:
Ř Reorient or relocate the receiving antenna.
Ř Increase the distance between the equipment and the receiver.
Ř Connect the equipment to an outlet on a circuit different from that
to which the receiver is connected.
Ř Consult the dealer or an experienced radio/TV technician for help.
FCC Caution: Any changes or modifications not expressly approved by
the party responsible for compliance could void the user’s authority to
operate this equipment.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for
an uncontrolled environment. This equipment should be installed and
operated with a minimum distance of 20cm between the radiator and
your body.
This transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
2.4GHz operation of this product in the USA is firmware-limited to
channels 1 through 11.
We, Belkin International, Inc., of 501 West Walnut Street, Compton, CA
90220, declare under our sole responsibility that this device,
F5D7234-4
to which this declaration relates:
Complies with Part 15 of the FCC Rules. Operation is subject to
the following two conditions: (1) this device may not cause harmful
interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
Caution: Exposure to Radio Frequency Radiation
The device shall be used in such a manner that the potential for human
contact during normal operation is minimized.
When connecting an external antenna to the device, the antenna shall
be placed in such a manner to minimize the potential for human contact
during normal operation. This transmitter must not be co-located or
operating in conjunction with any other antenna or transmitter.
Federal Communications Commission Notice
This equipment has been tested and found to comply with the limits for
a Class B digital device, pursuant to Part 15 of the FCC Rules. These
limits are designed to provide reasonable protection against harmful
interference in a residential installation.
This equipment generates, uses, and can radiate radio frequency
energy, and if not installed and used in accordance with the instructions,
may cause harmful interference to radio communications. However,
there is no guarantee that interference will not occur in a particular
100
G Wireless Router
SECTIONSTable of Contents 12345678910
INFORMATION
Modifications
The FCC requires the user to be notified that any changes or
modifications to this device that are not expressly approved by
Belkin International, Inc., may void the user’s authority to operate
the equipment.
Canada-Industry Canada (IC)
The wireless radio of this device complies with RSS 210 Industry
Canada. This Class B digital apparatus complies with Canadian
ICES-003.
Operation is subject to the following two conditions:
1) this device may not cause interference, and
2) this device must accept any interference, including interference
that may cause undesired operation of the device.
IMPORTANT NOTE:
IC Radiation Exposure Statement:
This equipment complies with Canada radiation exposure limits set forth
for uncontrolled environments. This equipment should be installed and
operated with a minimum distance of 20cm between the radiator and
your body.
This transmitter must not be co-located or operating in conjunction with
any other antenna or transmitter.
Cet appareil numérique de la classe B conforme á la norme NMB-003
du Canada.
Europe-European Union Notice
Radio products with the CE 0682 or CE alert marking comply with
the R&TTE Directive (1995/5/EC) issued by the Commission of the
European Community.
Compliance with this directive implies conformity to the following
European Norms (in brackets are the equivalent international standards).
Ř EN 60950-1 (IEC60950) – Product Safety
Ř EN 300 328 Technical requirement for radio equipment
Ř EN 301 489 General EMC requirements for radio equipment.
To determine the type of transmitter, check the identification label on
your Belkin product.
Products with the CE marking comply with the EMC Directive (89/336/
EEC) and the Low Voltage Directive (72/23/EEC) issued by the
Commission of the European Community. Compliance with these
directives implies conformity to the following European Norms (in
brackets are the equivalent international standards).
Ř EN 55022 (CISPR 22) – Electromagnetic Interference
Ř EN 55024 (IEC61000-4-2,3,4,5,6,8,11) – Electromagnetic Immunity
Ř EN 61000-3-2 (IEC610000-3-2) – Power Line Harmonics
Ř EN 61000-3-3 (IEC610000) – Power Line Flicker
Ř EN 60950-1 (IEC60950) – Product Safety
Products that contain the radio transmitter are labeled with CE 0682 or
CE alert marking and may also carry the CE logo.
101
G Wireless Router
SECTIONSTable of Contents 12345678910
INFORMATION
Belkin International, Inc., Limited 1-Year Product Warranty
What is not covered by this warranty?
All above warranties are null and void if the Belkin product is not
provided to Belkin for inspection upon Belkin’s request at the sole
expense of the purchaser, or if Belkin determines that the Belkin product
has been improperly installed, altered in any way, or tampered with.
The Belkin Product Warranty does not protect against acts of God such
as flood, lightning, earthquake, war, vandalism, theft, normal-use wear
and tear, erosion, depletion, obsolescence, abuse, damage due to low
voltage disturbances (i.e. brownouts or sags), non-authorized program,
or system equipment modification or alteration.
How to get service.
To get service for your Belkin product you must take the following steps:
1. Contact Belkin International, Inc., at 501 W. Walnut St., Compton CA
90220, Attn: Customer Service, or call (800)-223-5546, within 15 days
of the Occurrence. Be prepared to provide the following information:
a. The part number of the Belkin product.
b. Where you purchased the product.
c. When you purchased the product.
d. Copy of original receipt.
2. Your Belkin Customer Service Representative will then instruct you on
how to forward your receipt and Belkin product and how to proceed
with your claim.
What this warranty covers.
Belkin International, Inc. (“Belkin”) warrants to the original purchaser of
this Belkin product that the product shall be free of defects in design,
assembly, material, or workmanship.
What the period of coverage is.
Belkin warrants the Belkin product for one year.
What will we do to correct problems?
Product Warranty.
Belkin will repair or replace, at its option, any defective product free of
charge (except for shipping charges for the product). Belkin reserves the
right to discontinue any of its products without notice, and disclaims any
limited warranty to repair or replace any such discontinued products.
In the event that Belkin is unable to repair or replace the product (for
example, because it has been discontinued), Belkin will offer either
a refund or a credit toward the purchase of another product from
Belkin.com in an amount equal to the purchase price of the product
as evidenced on the original purchase receipt as discounted by its
natural use.
102
G Wireless Router
SECTIONSTable of Contents 12345678910
INFORMATION
Belkin reserves the right to review the damaged Belkin product. All
costs of shipping the Belkin product to Belkin for inspection shall be
borne solely by the purchaser. If Belkin determines, in its sole discretion,
that it is impractical to ship the damaged equipment to Belkin, Belkin
may designate, in its sole discretion, an equipment repair facility to
inspect and estimate the cost to repair such equipment. The cost, if any,
of shipping the equipment to and from such repair facility and of such
estimate shall be borne solely by the purchaser. Damaged equipment
must remain available for inspection until the claim is finalized.
Whenever claims are settled, Belkin reserves the right to be subrogated
under any existing insurance policies the purchaser may have.
How state law relates to the warranty.
THIS WARRANTY CONTAINS THE SOLE WARRANTY OF BELKIN.
THERE ARE NO OTHER WARRANTIES, EXPRESSED OR, EXCEPT AS
REQUIRED BY LAW, IMPLIED, INCLUDING THE IMPLIED WARRANTY
OR CONDITION OF QUALITY, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE, AND SUCH IMPLIED WARRANTIES, IF ANY,
ARE LIMITED IN DURATION TO THE TERM OF THIS WARRANTY.
Some states do not allow limitations on how long an implied warranty
lasts, so the above limitations may not apply to you.
IN NO EVENT SHALL BELKIN BE LIABLE FOR INCIDENTAL, SPECIAL,
DIRECT, INDIRECT, CONSEQUENTIAL OR MULTIPLE DAMAGES SUCH
AS, BUT NOT LIMITED TO, LOST BUSINESS OR PROFITS ARISING
OUT OF THE SALE OR USE OF ANY BELKIN PRODUCT, EVEN IF
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
This warranty gives you specific legal rights, and you may also have
other rights, which may vary from state to state. Some states do not
allow the exclusion or limitation of incidental, consequential, or other
damages, so the above limitations may not apply to you.
Belkin International, Inc.
501 West Walnut Street
Los Angeles, CA 90220, USA
310-898-1100
310 - 898 -1111 f ax
Belkin Ltd.
Express Business Park, Shipton Way
Rushden, NN10 6GL
United Kingdom
+44 (0) 1933 35 2000
+44 (0) 1933 31 2000 fax
Belkin Tech Support
US: 877-736-5771
800-223-5546 ext. 2263
310-898-1100 ext. 2263
UK: 0845 607 77 87
Australia: 1800 235 546
New Zealand: 0800 235 546
Singapore: 65 64857620
Europe: www.belkin.com/support
Belkin B.V.
Boeing Avenue 333
1119 PH Schiphol-Rijk
The Netherlands
+31 (0) 20 654 7300
+31 (0) 20 654 7349 fax
Belkin Ltd.
4 Pioneer Avenue
Tuggerah Business Park
Tuggerah, NSW 2259, Australia
+61 (0) 2 4350 4600
+61 (0) 2 4350 4700 fax
© 2008 Belkin International, Inc. All rights reserved. All trade names are registered trademarks of
respective manufacturers listed. Apple, AirPort, Mac, Mac OS, and AppleTalk are trademarks of Apple Inc.,
registered in the U.S. and other countries. Windows, Windows Vista, NT, and Microsoft are either registered
trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Navigation menu