Belkin F5D7631-4V2 Wireless G ADSL2+ Modem Router User Manual

Belkin International, Inc. Wireless G ADSL2+ Modem Router

Manual

F5D7631-4_Manual Page 1 of 61
BELKIN
ADSL2+ Modem with Wireless G Router
Designed to Meet ADSL2+ Specification
Network your computers and share your ADSL Internet access
User Manual
F5D7631-4
------------------------------------------------------------------------------------------------------------
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Product Features. . . . . . . . . . . . . . . . . . . . . . . . . . x
Benefits of a Home Network. . . . . . . . . . . . . . . . . . . . . . . . . . x
Advantages of a Belkin Wireless Network. . . . . . . . . . . . . . . . . . . . . x
Make Sure You Have the Following. . . . . . . . . . . . . . . . . . . . . . . . . . x
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Internet Connection Settings
Knowing your Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Connecting your Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Positioning your Router. . . . . . . . . . . . . . . . . . . . . . . . . . x
Connecting your Computers . . . . . . . . . . . . . . . . . . . . . . . . x
Connecting your ADSL Line. . . . . . . . . . . . . . . . . . . . . . . . . . x
Powering up your Router. . . . . . . . . . . . . . . . . . . . . . . . . . x
Setting Up your Computers
Manually Configuring Network Adapters
Recommended Web Browser Settings. . . . . . . . . . . . . . . . . . . . . . . . . x
Configuring your Router with the Setup Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . x
Running the Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . x
Connecting to the Wireless LAN. . . . . . . . . . . . . . . . . . . . . . . . . . x
Manually Configuring your Router. . . . . . . . . . . . . . . . . . . . . . . . . . x
Understanding the Web-Based User Interface. . . . . . . . . . . . . . . . . x
Changing LAN Settings. . . . . . . . . . . . . . . . . . . . . . . . . . x
Internet WAN. . . . . . . . . . . . . . . . . . . . . . . . . . x
Wireless. . . . . . . . . . . . . . . . . . . . . . . . . . x
Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . x
Utilities. . . . . . . . . . . . . . . . . . . . . . . . . . .x
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Technical Support Information. . . . . . . . . . . . . . . . . . . . . . . . . x
Appendixes
Appendix A: Glossary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
F5D7631-4_Manual Page 2 of 61
Appendix B: Important Factors for Placement and Setup. . . . . . . . . . . . . x
Appendix C: Internet Connection Setting Table. . . . . . . . . . . . . . . . . . . x
Information ……………………………………………………………………..x
------------------------------------------------------------------------------------------------------------
Introduction
Thank you for purchasing the Belkin ADSL2+ Modem with Wireless G Router
(the Router). In minutes you will be able to share your Internet connection and
network your computers with your new Router. The following is a list of features
that make your Router an ideal solution for your home or small office network.
Please be sure to read through this User Manual completely, and pay special
attention to Appendix B entitled “Important Factors for Placement and Setup”.
------------------------------------------------------------------------------------------------------------
Product Features
Compatibility with both PCs and Mac® Computers
The Router supports a variety of networking environments including Mac OS® 8.x,
9.x, X v10.x, AppleTalk®, Linux®, Windows® 95, 98SE, Me, NT®, 2000, and XP,
and others. You need an Internet browser and a network adapter that supports
TCP/IP (the standard language of the Internet).
Front-Panel LED Display
Lighted LEDs on the front of the Router indicate which functions are in operation.
You’ll know at-a-glance whether your Router is connected to the Internet. This
feature eliminates the need for advanced software and status-monitoring
procedures.
Web-Based Advanced User Interface
You can set up the Router’s advanced functions easily through your web browser,
without having to install additional software onto the computer. There are no
disks to install or keep track of and, best of all, you can make changes and
perform setup functions from any computer on the network quickly and easily.
Integrated 10/100 4-Port Switch
The Router has a built-in, 4-port network switch to allow your wired computers to
share printers, data and MP3 files, digital photos, and much more. The switch
features automatic detection so it will adjust to the speed of connected devices.
The switch will transfer data between computers and the Internet simultaneously
without interrupting or consuming resources.
Integrated 802.11g Wireless Access Point
F5D7631-4_Manual Page 3 of 61
802.11g is an exciting new wireless technology that achieves data rates up to
54Mbps, nearly five times faster than 802.11b.
5454
Built-In Dynamic Host Configuration Protocol (DHCP)
Built-In Dynamic Host Configuration Protocol (DHCP) on-board makes for the
easiest possible connection of a network. The DHCP server will assign IP
addresses to each computer automatically so there is no need for a complicated
networking setup.
NAT IP Address Sharing
Your Router employs Network Address Translation (NAT) to share the single IP
address assigned to you by your Internet Service Provider while saving the cost
of adding additional IP addresses to your Internet service account.
SPI Firewall
Your Router is equipped with a firewall that will protect your network from a wide
array of common hacker attacks including IP Spoofing, Land Attack, Ping of
Death (PoD), Denial of Service (DoS), IP with zero length, Smurf Attack, TCP
Null Scan, SYN flood, UDP flooding, Tear Drop Attack, ICMP defect, RIP defect,
and fragment flooding.
MAC Address Filtering
For added security, you can set up a list of MAC addresses (unique client
identifiers) that are allowed access to your network. Every computer has its own
MAC address. Simply enter these MAC addresses into a list using the web-
based user interface and you can control access to your network.
Universal Plug-and-Play (UPnP) Compatibility
UPnP (Universal Plug-and-Play) is a technology that offers seamless operation
of voice messaging, video messaging, games, and other applications that are
UPnP-compliant.
Support for VPN Pass-Through
If you connect to your office network from home using a VPN connection, your
Router will allow your VPN-equipped computer to pass through the Router and to
your office network.
*When operating in , this Wi-Fi® device may achieve an actual throughput of up
to or greater than 20Mbps, which is the equivalent throughput of a system
F5D7631-4_Manual Page 4 of 61
following 802.11g protocol and operating at a signaling rate of 54Mbps. Actual
throughput will vary depending on environmental, operational, and other factors.
Benefits of a Home Network
By following our simple setup instructions, you will be able to use your Belkin
home network to:
• Share one high-speed Internet connection with all the computers in your home
• Share resources, such as files, and hard drives among all the connected
computers in your home
• Share a single printer with the entire family
• Share documents, music, video, and digital pictures
• Store, retrieve, and copy files from one computer to another
• Simultaneously play games online, check Internet email, and chat
Advantages of a Belkin Wireless Network
Mobility – you’ll no longer need a dedicated “computer room”—now you can
work on a networked laptop or desktop computer anywhere within your wireless
range
Easy installation – Belkin’s Setup Wizard makes setup simple
Flexibility – set up and access printers, computers, and other networking
devices from anywhere in your home
Easy Expansion – the wide range of Belkin networking products let you expand
your network to include devices such as printers and gaming consoles
No cabling required – you can spare the expense and hassle of retrofitting
Ethernet cabling throughout the home or office
Widespread industry acceptance – choose from a wide range of interoperable
networking products
------------------------------------------------------------------------------------------------------------
Make Sure You Have the Following
Package Contents
ADSL2+ Modem with Wireless G Router
RJ11 Telephone Cord - Gray
RJ45 Ethernet Networking Cable - Yellow
ADSL Microfilter*
Power Adapter
User Manual CD
F5D7631-4_Manual Page 5 of 61
*ADSL microfilter varies by country. If it’s not included, you will need to purchase
one.
System Requirements
An active ADSL service with a telephone wall jack for connecting the
Router
At least one computer with a Network Interface Card (NIC) and Internet
browser installed and correctly configured
TCP/IP networking protocol installed on each computer connected to the
Router
No other DHCP server on your local network assigning IP addresses to
computers and devices
Internet Connection Settings
Please collect the following information from your Internet Service Provider (ISP)
before setting up the ADSL Modem Wireless G Router.
Internet connection protocol: _________ (PPPoE, PPPoA, Dynamic
IP/Fixed IP, or IPoA)
Multiplexing method or Encapsulation: __________ (LLC or VC MUX)
Virtual circuit: VPI (Virtual Path Identifier) __________ (a number
between 0 and 255)
VCI (Virtual Channel Identifier) __________ (a number between
1 and 65535)
For PPPoE and PPPoA users: ADSL account user name
_______________ and password _______________
For fixed IP users: IP Address ___ . ___ . ___ . ___
Subnet Mask ___ . ___ . ___ . ___
Default Gateway Server ___ . ___ . ___ . ___
IP address for Domain Name Server ___ . ___ . ___ . ___ (If given by your
ISP)
Note: See Appendix C in this User Manual for some common DSL Internet
setting parameters. If you are not sure, please contact your ISP.
------------------------------------------------------------------------------------------------------------
Knowing your Router
The Router is designed to be placed on a desktop. All of the cables exit from the
rear of the Router for better organization and utility. The LED indicators are easily
visible on the front of the Router to provide you with information about network
activity and status.
Front Panel
F5D7631-4_Manual Page 6 of 61
1) [Insert: icon] Power LED
2) [Insert: icon] LAN Status LED (1-4)
3) [Insert: icon] Wireless LAN (WLAN) Status LED
4) [Insert: icon] ADSL LED
5) [Insert: icon] Internet
1. Power LED
When you apply power to the Router or restart it, a short period of time elapses
while the Router boots up. When the Router has completely booted up, the
Power LED becomes a GREEN light, indicating the Router is ready for use.
OFF Router is off
Green Router is on
Insert:
Power
Icon Red Router failed to start
2. LAN Status LEDs
These LAN Status LEDs are labeled 1–4 and correspond to the numbered ports
on the rear of the Router. When a computer is properly connected to one of the
LAN ports on the rear of the Router, the LED will light. Solid GREEN means a
computer or a network-enabled device is connected. When information is being
sent over the port, the LED blinks rapidly. ORANGE indicates a 10Base-T
connection.
OFF No device is connected
Orange Ethernet link is up and
10Base-T device connected
Orange—blinking When 10Base-T device
transmitting or receiving data
Green Ethernet link is up and
100Base-T connected
Insert
LAN
Icon
Green—blinking When 100Base-T device
transmitting or receiving data
3. WLAN Status LED
The WLAN Status LED is solid GREEN when you enable the wireless LAN
function. It flashes when the Router is transmitting or receiving data wirelessly.
OFF WLAN is off
Green WLAN is up and connected
Insert
WLAN
Icon Green—blinking When transmitting or receiving
data
4. ADSL LED
F5D7631-4_Manual Page 7 of 61
The ADSL LED flashes GREEN during negotiation with your ISP. It stays
GREEN when the Router is connected properly to your ADSL service.
OFF No ADSL connection
Green – blinking Negotiating connection
Insert
ADSL
Icon Green ADSL link is up and connected
5. Internet LED
The Internet LED shows you when the Router is connected to the Internet. When
the LED is OFF, the Router is NOT connected to the Internet. When the LED is
solid GREEN, the Router is connected to the Internet. When the LED is blinking,
the Router is transmitting or receiving data from the Internet.
OFF No Internet connection
Green Connected to the Internet
Green – blinking When transmitting or receiving
data
Insert
Internet
Icon
Red Failed to get IP
Back Panel
6) [Insert: icon] DSL Line
7) [Insert: icon] Ethernet Ports (4–1)
8) [Insert: icon] Reset Button
9) [Insert: icon] Power Plug
6. DSL Line
This port is for connection to your ADSL line. Connect your ADSL line to this port.
7. Ethernet Ports
The Ethernet ports are RJ45, 10/100 auto-negotiation. The ports are labeled 1
through 4. These ports correspond to the numbered LEDs on the front of the
Router. Connect your network-enabled computers or any networking devices to
one of these ports.
8. Reset Button
The “Reset” button is used in rare cases when the Router may function
improperly. Resetting the Router will restore the Router’s normal operation while
maintaining the programmed settings. You can also restore the factory default
settings by using the Reset button. Use the restore option in instances where you
may have forgotten your custom password.
a. Resetting the Router
F5D7631-4_Manual Page 8 of 61
Push and hold the Reset button for one second then release it. When the
Power/Ready light becomes solid again, the reset is complete.
b. Restoring the Factory Defaults
Press and hold the Reset button for five seconds then release it. When the
Power/Ready light becomes solid again, the restore is complete.
9. Power Plug
Connect the included 15V DC power supply to this inlet. Using the wrong type of
power adapter may cause damage to your Router.
------------------------------------------------------------------------------------------------------------
Connecting your Router
Positioning your Router
Your wireless connection will be stronger the closer your computer is to your
Router. Typical indoor operating range for your wireless devices is between 100
and 200 feet. In the same way, your wireless connection and performance will
degrade somewhat as the distance between your Router connected devices
increases. This may or may not be noticeable to you. As you move farther from
your Router, connection speed may decrease. Factors that can weaken signals
simply by getting in the way of your network’s radio waves are metal appliances,
or obstructions, and walls. Please see “Appendix B: Important Factors for
Placement and Setup” in this User Manual for more guidelines.
If you have concerns about your network’s performance that might be related to
range or obstruction factors, try moving the computer to a position between five
and 10 feet from the Router, in order to see if distance is the problem. If
difficulties persist even at close range, please see the Troubleshooting section
for solutions.
Connecting your Computers
1. Power off your computers and networking equipment.
2. Connect your computer to one of the YELLOW [match font color] RJ45 ports
on the rear of the Router labeled “connections to your computers” by using an
Ethernet networking cable (one Ethernet network cable is supplied).
Connecting your ADSL Line
F5D7631-4_Manual Page 9 of 61
Connection for the Router to the ADSL line varies by country and region.
Typically it involves a microfilter or a microfilter with built-in splitter to allow
simultaneous use of ADSL service and telephone service on the same telephone
line. Please read the following steps carefully and select appropriate method.
1. If your telephone service and ADSL service are on the same telephone line,
ADSL microfilters are needed for each telephone and device, such as
answering machine, fax machine, and caller ID display. Additional splitters
may be used to separate telephone lines for telephone and the Router.
Note: Do not connect the ADSL microfilter between the wall jack and the
Router—this will prevent ADSL service from reaching the modem.
2. If your telephone service and ADSL service are on the same telephone line
and you are using an ADSL microfilter with built-in splitter, connect the splitter
to the telephone wall jack providing ADSL service. Then, connect the
telephone cord from the ADSL microfilter RJ11 port generally labeled “DSL”
to the gray RJ11 port labeled “DSL line” on the back of your Router. Connect
telephony device to the other port on the ADSL splitter commonly labeled
“Phone”. An additional ADSL microfilter is needed for another telephone and
device on the same line.
Note: One RJ11 telephone cord is supplied. When inserting an RJ11 plug, be
sure the tab on the plug clicks into position to ensure that it is properly seated.
3. If your have a dedicated ADSL service telephone line with an RJ11 wall jack,
simply connect a telephone cord from the wall jack to the gray RJ11 port
labeled “DSL line” on the back of your Router.
4. If you have an RJ45 wall jack for your ADSL service, connect an RJ45-to-
RJ11 converter to the wall jack. Then connect one end of a telephone cord to
the converter and the other end to the gray RJ11 port labeled “DSL line” on
the back of your Router.
Note: ADSL microfilter may or may not be provided depending on your
country.
Powering Up your Router
F5D7631-4_Manual Page 10 of 61
1. Connect the supplied power adapter to the Router power-input plug labeled
“Power”.
Note: For safety and performance reasons, only use the supplied power
adapter to prevent damage to the Router.
2. After connecting the power adapter and the power source is turned on, the
Router’s power icon [Insert: Power icon] on the front panel should be on. It
might take a few minutes for the Router to fully start up.
3. Turn on your computers. After your computers boot up, the LAN status LED
[Insert: LAN icon] on the front of the Router will be on for each port to which a
wired computer is connected. These lights show you the connection and
activity status. Now you are ready to configure the Router for ADSL
connection.
------------------------------------------------------------------------------------------------------------
---------------------
Setting Up your Computers
In order for your computer to properly communicate with your Router, you will
need to change your computer’s “TCP/IP / Ethernet” settings to “Obtain an IP
address automatically / Using DHCP”. This is normally the default setting in most
home computers.
You can set up the computer that is connected to the ADSL modem FIRST using
these steps. You can also use these steps to add computers to your Router after
the Router has been set up to connect to the Internet.
Manually Configuring Network Adapters in Windows XP, 2000, or NT
1. Click “Start”, “Settings”, then “Control Panel”.
2. Double-click on the “Network and dial-up connections” icon (Windows 2000)
or the “Network” icon (Windows XP).
3. Right-click on the “Local Area Connection” associated with your network
adapter and select “Properties” from the drop-down menu.
4. In the “Local Area Connection Properties” window, click “Internet Protocol
(TCP/IP)” and click the “Properties” button. The following screen will appear:
(1)
F5D7631-4_Manual Page 11 of 61
(2)
(3)
5. If “Use the following IP address” (2) is selected, your Router will need to be
set up for a static IP connection type. Write the address information in the
table below. You will need to enter this information into the Router.
6. If not already selected, select “Obtain an IP address automatically” (1) and
“Obtain DNS server address automatically” (3). Click “OK”.
Your network adapter(s) are now configured for use with the Router.
Manually Configuring Network Adapters in Windows 98SE or Me
1. Right-click on “My Network Neighborhood” and select “Properties” from the
drop-down menu.
2. Select “TCP/IP -> settings” for your installed network adapter. You will see the
following window.
(1)
(2)
(3)
3. If “Specify an IP address” is selected, your Router will need to be set up for a
static IP connection type. Write the address information in the table below.
You will need to enter this information into the Router.
4. Write down the IP address and subnet mask from the “IP Address” tab (3).
5. Click the “Gateway” tab (2). Write down the gateway address in the chart.
6. Click the “DNS Configuration” tab (1). Write down the DNS address(es) in the
chart.
7. If not already selected, select “Obtain an IP address automatically” on the IP
address tab. Click “OK”.
F5D7631-4_Manual Page 12 of 61
Restart the computer. When the computer restarts, your network adapter(s) are
now configured for use with the Router.
Set up the computer that is connected to the cable or DSL modem by FIRST
using these steps. You can also use these steps to add computers to your
Router after the Router has been set up to connect to the Internet.
Manually Configuring Network Adapters in Mac OS up to 9.x
In order for your computer to properly communicate with your Router, you will
need to change your Mac computer’s TCP/IP settings to DHCP.
1. Pull down the Apple menu. Select “Control Panels” and select “TCP/IP”.
2. You will see the TCP/IP control panel. Select “Ethernet Built-In” or “Ethernet”
in the “Connect via:” drop-down menu (1).
(1)
(2)
3. Next to “Configure” (2), if “Manually” is selected, your Router will need to be
set up for a static IP connection type. Write the address information in the
table below. You will need to enter this information into the Router.
4. If not already set, at “Configure:”, choose “Using DHCP Server”. This will tell
the computer to obtain an IP address from the Router.
5. Close the window. If you made any changes, the following window will appear.
Click “Save”.
Restart the computer. When the computer restarts, your network settings are
now configured for use with the Router.
Manually Configuring Network Adapters in Mac OS X
1. Click on the “System Preferences” icon.
F5D7631-4_Manual Page 13 of 61
2. Select “Network” (1) from the “System Preferences” menu.
(1)
3. Select “Built-in Ethernet” (2) next to “Show” in the Network menu.
(2)
(3)
(4)
4. Select the “TCP/IP” tab (3). Next to “Configure” (4), you should see
“Manually” or “Using DHCP”. If you do not, check the PPPoE tab (5) to make
sure that “Connect using PPPoE” is NOT selected. If it is, you will need to
configure your Router for a PPPoE connection type using your user name
and password.
5. If “Manually” is selected, your Router will need to be set up for a static IP
connection type. Write the address information in the table below. You will
need to enter this information into the Router.
6. If not already selected, select “Using DHCP” next to “Configure” (4), then click
“Apply Now”.
Your network adapter(s) are now configured for use with the Router.
Recommended Web Browser Settings
In most cases, you will not need to make any changes to your web browser’s
settings. If you are having trouble accessing the Internet or the advanced web-
based user interface, then change your browser’s settings to the recommended
settings in this section.
Internet Explorer 4.0 or Higher
1. Start your web browser. Select “Tools” then “Internet Options”.
2. In the “Internet Options” screen, there are three selections: “Never dial a
connection”, “Dial whenever a network connection is not present”, and
“Always dial my default connection”. If you can make a selection, select
“Never dial a connection”. If you cannot make a selection, go to the next step.
F5D7631-4_Manual Page 14 of 61
3. Under the “Internet Options” screen, click on “Connections” and select “LAN
Settings…”.
F5D7631-4_Manual Page 15 of 61
4. Make sure there are no check marks next to any of the displayed options:
“Automatically detect settings”, “Use automatic configuration script”, and “Use
a proxy server”. Click “OK”. Then click “OK” again in the “Internet Options”
page.
Netscape Navigator 4.0 or Higher
1. Start Netscape. Click on “Edit” then “Preferences”.
2. In the “Preferences” window, click on “Advanced” then select “Proxies”. In the
“Proxies” window, select “Direct connection to the Internet”.
Configuring your Router with the Setup Wizard
Running the Setup Wizard
1. You can access the web-based management user interface of the Router
using the Internet browser on a computer connected to the Router. Type
“192.168.2.1” (do not type in anything else such as “http://” or “www”) in your
browser’s address bar. Then press the “Enter” key.
Note: It is strongly recommended that you use a computer physically
connected to the Router with an RJ45 cable for initial setup. Using a
wirelessly connected computer for initial setup is not recommended.
2. The following screen will appear in your browser to prompt you to login. The
Router ships with no password entered. In the login screen, leave the
password blank and click the “Submit” button to log in.
Note: It is strongly recommended that you change the password to your own
for increased security. Please read the following section, entitled “Manually
Configuring your Router”, for details on how to change your password and to
reference other security features.
3. A Status page will follow showing detail status of your Router. Next, click on
the “Setup Wizard” button for express configuration (recommended).
4. Click on the “Setup Wizard” button to start the Router’s Setup Wizard. The
first step is to select your connection type (this information is provided by your
F5D7631-4_Manual Page 16 of 61
ISP) and click “Next”.
5. Now enter the required values provided by your ISP. For the “PPPoE” or
“PPPoA” page you will see the following screen. Enter the required values
provided by your ISP and click “Next”.
Note: For more detailed instruction on other connection types, please refer to the
“Manually Configuring your Router” section of this User Manual.
6. Double-check the settings shown on the following screen. You can click
“Back” to change the settings or click “Apply” to activate your settings.
Note: You can always restart the Setup Wizard or use the Navigation Menu on
the left to change your setting.
Connecting to the Wireless LAN
7. Now you can connect to the Router via a wireless-LAN-enabled computer
with the following default wireless LAN settings:
Wireless Channel = 11
SSID = belkin54g
Security = off
Note: Belkin strongly recommends that you enable wireless security to WEP or
WPA and change SSID to something of your own. Please read the User Manual
for details on levels of wireless security and how to change your security settings.
8. Congratulations! You have finished installing your new Belkin Router. To test
your Internet connection, open your browser and visit any website, such as
www.belkin.com. For advanced features and more detailed installation and
security setup information, see the following section, “Manually Configuring
your Router”.
------------------------------------------------------------------------------------------------------------
Manually Configuring your Router
F5D7631-4_Manual Page 17 of 61
Understanding the Web-Based User Interface
The home page shows you a quick view of the Router’s status and settings. All
advanced setup pages can be reached from this page.
1. Quick-Navigation Links
You can go directly to any of the Router’s UI pages by clicking directly on
these links. The links are divided into logical categories and grouped by tabs
to make finding a particular setting easier to find. Clicking on the header of
each tab will show you a short description of the tab’s function.
2. Home Button
The “Home” button is available in every page of the UI. Pressing this button
will take you back to the home page.
3. Help Button
The “Help” button gives you access to the Router’s help pages. Help is also
available on many pages by clicking “more info” next to certain sections of
each page.
4. Login/Logout Button
This button enables you to log in and out of the Router with the press of one
button. When you are logged into the Router, this button will change to read
“Logout”. Logging into the Router will take you to a separate login page where
you will need to enter a password. When you are logged into the Router, you can
make changes to the settings. When you are finished making changes, you can
log out of the Router by clicking the “Logout” button. For more information about
logging into the Router, see the section called “Logging into the Router”.
5. Internet Status Indicator
This indicator is visible in all pages of the Router, showing the connection status
of the Router. When the indicator says “connection OK” in GREEN, the Router is
connected to the Internet. When the Router is not connected to the Internet, the
indicator will read “no connection” in RED. The indicator is automatically updated
when you make changes to the settings of the Router.
6. LAN Settings
Shows you the settings of the Local Area Network (LAN) side of the Router.
Changes can be made to the settings by clicking the “LAN” “Quick Navigation”
link on the left side of the screen.
7. Features
Shows the status of the Router’s NAT, firewall, and wireless features. Changes
F5D7631-4_Manual Page 18 of 61
can be made to the settings by clicking on any one of the links or by clicking
the “Quick Navigation” links on the left side of the screen.
8. Internet Settings
Shows the settings of the Internet/WAN side of the Router that connects to the
Internet. Changes to any of these settings can be made by clicking on the
“Internet/WAN” “Quick Navigation” link on the left side of the screen.
9. Version Info
Shows the firmware version, boot-code version, hardware version, and serial
number of the Router.
10. Page Name
The page you are on can be identified by this name. This manual will
sometimes refer to pages by name. For instance, “LAN > LAN Settings” refers
to the “LAN Settings” page.
Changing LAN Settings
All settings for the internal LAN setup of the Router can be viewed and changed
here.
LAN Settings
Clicking on the header of the LAN tab (A) will take you to the LAN tab’s header
page. A quick description of the functions can be found here. To view the settings
or make changes to any of the LAN settings, click on “LAN Settings” (B) or to
view the list of connected computers, click on “DHCP Client List” (C).
1. IP Address
The “IP address” is the internal IP address of the Router. The default IP address
is “192.168.2.1”. To access the setup interface, type this IP address into the
address bar of your browser. This address can be changed if needed. To change
the IP address, type in the new IP address and click “Apply Changes”. The IP
address you choose should be a non-routable IP. Examples of a non-routable IP
are:
192.168.x.x (where x is anything between 0 and 255)
10.x.x.x (where x is anything between 0 and 255)
2. Subnet Mask
There is no need to change the subnet mask. This is a unique, advanced
feature of your Belkin Router.
3. DHCP Server
F5D7631-4_Manual Page 19 of 61
The DHCP server function makes setting up a network very easy by assigning IP
addresses to each computer on the network automatically. The default setting is
“On”. The DHCP server can be turned OFF if necessary, however, in order to do
so you must manually set a static IP address for each computer on your network.
To turn off the DHCP server, select “Off” and click “Apply Changes”.
4. IP Pool
The IP Pool is the range of IP addresses set aside for dynamic assignment to the
computers on your network. The default is 2–100 (99 computers). If you want to
change this number, you can do so by entering a new starting and ending IP
address and clicking on “Apply Changes”. The DHCP server can assign 100 IP
addresses automatically. This means that you cannot specify an IP address pool
larger than 100 computers. For example, starting at 50 means you have to end at
150 or lower so as not to exceed the 100-client limit. The starting IP address
must be lower in number than the ending IP address.
5. Lease Time
Lease time is the length of time the DHCP server will reserve the IP address for
each computer. We recommend that you leave the lease time set to “Forever”.
The default setting is “Forever”, meaning that any time a computer is assigned an
IP address by the DHCP server, the IP address will not change for that particular
computer. Setting lease times for shorter intervals, such as one day or one hour,
frees IP addresses after the specified period of time. This also means that a
particular computer’s IP address may change over time. If you have set any of
the other advanced features of the Router, such as DMZ or client IP filters, these
are dependent on the IP address. For this reason, you will not want the IP
address to change.
6. Local Domain Name
The default setting is “Belkin”. You can set a local domain name (network name)
for your network. There is no need to change this setting unless you have a
specific advanced need to do so. You can name the network anything you want
such as “MY NETWORK”.
DHCP Client List
You can view a list of the computers (known as clients), which are connected to
your network. You are able to view the IP address (1) of the computer, the host
name (2) (if the computer has been assigned one), and the MAC address (3) of
the computer’s Network Interface Card (NIC). Pressing the “Refresh” (4) button
will update the list. If there have been any changes, the list will be updated.
Internet WAN
The “Internet WAN” tab is where you will set up your Router to connect to your
Internet Service Provider. The Router is capable of connecting to virtually any
ADSL Service Provider’s system provided you have correctly configured the
Router’s settings for your ISP’s connection type. Your connection settings are
provided to you by your ISP. To configure the Router with the settings that your
F5D7631-4_Manual Page 20 of 61
ISP gave you, click “Connection Type” (1) on the left side of the screen. Select
the connection type you use. If your ISP gave you DNS settings, clicking “DNS”
(2) allows you to enter DNS address entries for ISPs that require specific settings.
When you have finished making settings, the “Internet Status” indicator will read
“Connection OK” if your Router is set up properly.
Connection Type
From the “Connection Type” page, you can select one of these five connection
types based on the instruction provided by your ISP:
PPPoE
PPPoA
Dynamic IP (1483 Bridged)
Static IP (IPoA)
Modem Only (Disable Internet Sharing)
Note: See Appendix C in this User Manual for some common DSL Internet
setting parameters. If you are not sure, please contact your ISP.
Select the type of connection you use by clicking the radio button (1) next to your
connection type and then clicking “Next” (2).
Setting your ISP Connection Type to PPPoE or PPPoA
PPPoE (Point-to-Point Protocol over Ethernet) is the standard method of
connecting networked devices. It requires a user name and password to access
the network of your ISP for connecting to the Internet. PPPoA (PPP over ATM) is
similar to PPPoE, but is mostly implemented in the UK. Select PPPoE or PPPoA
and click “Next”. Then enter the information provided by your ISP, and click
“Apply Changes” to activate your settings.
1. User Name - Enter the user name. (Assigned by your ISP).
2. Password - Enter your password. (Assigned by your ISP).
3. Retype Password - Confirm the password. (Assigned by your ISP).
4. VPI/VCI - Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier
(VCI) parameter here. (Assigned by your ISP).
5. Encapsulation - Select your encapsulation type (supplied by your ISP) to
specify how to handle multiple protocols at the ATM transport layer.
F5D7631-4_Manual Page 21 of 61
VC-MUX: PPPoA Virtual Circuit Multiplexer (null encapsulation) allows only one
protocol running per virtual circuit with fewer overheads.
LLC: PPPoA Logical Link Control allows multiple protocols running over one
virtual circuit (more overhead).
6. Dial on Demand - By selecting “Dial on Demand” your Router will
automatically connect to the Internet when a user opens up a web browser.
7. Idle Time (Minutes) - Enter the maximum idle time for the Internet
connection. After this time has been exceeded, the connection will be
terminated.
Setting your Connection Type to Dynamic IP (1483 Bridged)
This connection method bridges your network and ISP’s network together. The
Router will obtain IP address automatically from your ISP’s DHCP server.
1. VPI/VCI - Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier
(VCI) parameter here. These identifiers are assigned by your ISP.
2. Encapsulation - Select LLC or VC MUX your ISP uses.
Setting your ISP Connection Type to Static IP (IPoA)
This connection type is also called “Classical IP over ATM” or “CLIP”, which your
ISP provides a fixed IP for your Router to connect to the Internet.
1. WAN IP Address – Enter an IP address assigned by your ISP for the Router
WAN interface.
2. WAN Subnet Mask - Enter a subnet mask assigned by your ISP.
3. Default Route - Enter a default gateway IP address. If the Router cannot find
the destination address within its local network, it will forward the packets to the
default gateway assigned by your ISP.
4. VPI/VCI - Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier
(VCI) parameter here. These identifiers are assigned by your ISP.
5. Encapsulation - Select LLC or VC MUX your ISP uses.
Setting your Connection Type to Modem Only (Disable Internet Sharing)
In this mode, the Router simply acts as a bridge passing packets across the DSL
port. It requires additional software to be installed on your computers in order to
access the Internet.
1. VPI/VCI - Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier
(VCI) parameter here. (Assigned by your ISP).
2. Encapsulation - Select LLC or VC MUX. (Assigned by your ISP).
DNS (Domain Name Server) Settings
F5D7631-4_Manual Page 22 of 61
A “Domain Name Server” is a server located on the Internet that translates
Universal Resource Links (URLs) like “www.belkin.com” to IP addresses. Many
ISPs do not require you to enter this information into the Router. The “Automatic
from ISP” box (1) should be checked if your ISP did not give you a specific DNS
address. If you are using a static IP connection type, then you may need to enter
a specific DNS address and secondary DNS address for your connection to work
properly. If your connection type is dynamic or PPPoE, it is likely that you do not
have to enter a DNS address. Leave the “Automatic from ISP” box checked. To
enter the DNS address settings, uncheck the “Automatic from ISP” box and enter
your DNS entries in the spaces provided. Click “Apply Changes” (2) to save the
settings.
Wireless
The “Wireless” tab lets you make changes to the wireless network settings. From
this tab, you can make changes to the wireless network name (SSID), operating
channel, and encryption security settings.
Channel and SSID
1. Changing the Wireless Channel
There are a number of operating channels you can choose from. In the United
States, there are 11 channels. In the United Kingdom and most of Europe, there
are 13 channels. In a small number of other countries, there are other channel
requirements. Your Router is configured to operate on the proper channels for
the country you reside in. The default channel is 11 (unless you are in a country
that does not allow channel 11). The channel can be changed if needed. If there
are other wireless networks operating in your area, your network should be set to
operate on a channel that is different than the other wireless networks. For best
performance, use a channel that is at least five channels away from the other
wireless network. For instance, if another network is operating on channel 11,
then set your network to channel 6 or below. To change the channel, select the
channel from the drop-down list. Click “Apply Changes”. The change is
immediate.
2. Changing the Wireless Network Name (SSID)
To identify your wireless network, a name called the SSID (Service Set Identifier)
is used. The default SSID of the Router is “belkin54g”. You can change this to
anything you want to or you can leave it unchanged. If there are other wireless
networks operating in your area, you will want to make sure that your SSID is
unique (does not match that of another wireless network in the area). To change
the SSID, type in the SSID that you want to use in the SSID field (1) and click
“Apply Changes” (2). The change is immediate. If you make a change to the
SSID, your wireless-equipped computers may also need to be reconfigured to
connect to your new network name. Refer to the documentation of your wireless
network adapter for information on making this change.
F5D7631-4_Manual Page 23 of 61
3. Using the ESSID Broadcast Feature
For security purposes, you can choose not to broadcast your network’s SSID.
Doing so will keep your network name hidden from computers that are scanning
for the presence of wireless networks. To turn off the broadcast of the SSID,
select “DISABLE” and then click “Apply Changes”. The change is immediate.
Each computer now needs to be set to connect to your specific SSID; an SSID of
“ANY” will no longer be accepted. Refer to the documentation of your wireless
network adapter for information on making this change.
Note: This advanced feature should be employed by advanced users only.
4. Using the Wireless Mode Switch
Your Router can operate in three different wireless modes: “802.11g-Auto”,
“802.11g-Only”, and “802.11g-LRS”. The different modes are explained below.
802.11g-Auto Mode—In this mode, the Router is compatible with 802.11b and
802.11g wireless clients simultaneously. This is the factory default mode and
ensures successful operation with all Wi-Fi-compatible devices. If you have a mix
of 802.11b and 802.11g clients in your network, we recommend setting the
Router to 802.11g-Auto mode. This setting should only be changed if you have a
specific reason to do so.
802.11g-Only Mode—802.11g-Only mode works with 802.11g clients only. This
mode is recommended only if you want to prevent 802.11b clients from
accessing your network. To switch modes, select the desired mode from the
“Wireless Mode” drop-down box. Then, click “Apply Changes”.
802.11g-LRS Mode—We recommend you DO NOT use this mode unless you
have a very specific reason to do so. This mode exists only to solve unique
problems that may occur with some 802.11b client adapters and is NOT
necessary for interoperability of 802.11g and 802.11b standards.
When to Use 802.11g-LRS Mode—In some cases, older 802.11b clients may not
be compatible with 802.11g wireless technology. These adapters tend to be of
inferior design and may use older drivers or technology. 802.11g-LRS (Limited
Rate Support) allows these clients to be compatible with the newer 802.11g
technology. Switching to this mode can solve problems that sometimes occur
with these clients. If you suspect that you are using a client adapter that falls into
this category, first check with the adapter vendor to see if there is a driver update.
If there is no driver update available, switching to 802.11g-LRS mode may fix
your problem. Please note that switching to 802.11g-LRS mode may
decrease 802.11g performance slightly.
F5D7631-4_Manual Page 24 of 61
5. Protected Mode Switch
As part of the 802.11g specification, Protected mode ensures proper operation of
802.11g clients and access points when there is heavy 802.11b traffic in the
operating environment. When Protected mode is ON, 802.11g scans for other
wireless network traffic before it transmits data. Therefore, using this mode in
environments with HEAVY 802.11b traffic or interference achieves best
performance results. If you are in an environment with very little—or no—wireless
network traffic, your best performance will be achieved with Protected mode OFF.
Encryption/Security
Securing your Wi-Fi Network
Here are a few different ways you can maximize the security of your wireless
network and protect your data from prying eyes and ears. This section is
intended for the home, home office, and small office user. At the time of this User
Manual’s publication, there are three encryption methods available.
[Insert the following as a table. See Pg49 of P74490-A]
Name64-bit Wired Equivalent Privacy128-bit Wired Equivalent Privacy Wi-Fi
Protected Access-TKIP With Protected AccessAcronym64-bit WEP128-bit
WEPWPA-TKIPWPA-AES Security Good Better Best Best Features Static keys
Static keys Dynamic key encryption and mutual authentication. Dynamic key
encryption and mutual authentication. Encryption keys based on RC4 algorithm
(typically 40-bit keys) More secure than 64-bit WEP using a key length of 104 bits
plus 24 additional bits of system-generated data. TKIP (temporal key integrity
protocol) added so that keys are rotated and encryption is strengthened. AES
(Advanced Encryption Standard) does not cause any throughput loss.
WEP (Wired Equivalent Privacy)
WEP is a common protocol that adds security to all Wi-Fi-compliant wireless
products. WEP was designed to give wireless networks the equivalent level of
privacy protection as a comparable wired network.
64-Bit WEP
64-bit WEP was first introduced with 64-bit encryption, which includes a key
length of 40 bits plus 24 additional bits of system-generated data (64 bits total).
Some hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after
the technology was introduced, researchers found that 64-bit encryption was too
easy to decode.
128-Bit WEP
F5D7631-4_Manual Page 25 of 61
As a result of 64-bit WEP’s potential security weaknesses, a more secure
method of 128-bit encryption was developed. 128-bit encryption includes a key
length of 104 bits plus 24 additional bits of system-generated data (128 bits total).
Some hardware manufacturers refer to 128-bit as 104-bit encryption.
Most of the new wireless equipment in the market today supports both 64-bit and
128-bit WEP encryption, but you might have older equipment that only supports
64-bit WEP. All Belkin wireless products will support both 64-bit and 128-bit WEP.
Encryption Keys
After selecting either the “64-bit” or “128-bit WEP” encryption mode, it is critical
that you generate an encryption key. If the encryption key is not consistent
throughout the entire wireless network, your wireless networking devices will be
unable to communicate with one another on your network and you will not be
able to successfully communicate within your network.
You can enter your key by typing in the hex key manually, or you can type in a
passphrase in the “Passphrase” field and click “Generate” to create a key. A hex
(hexadecimal) key is a mixture of numbers and letters from A–F and 0–9. For 64-
bit WEP, you need to enter 10 hex keys. For 128-bit WEP, you need to enter 26
hex keys.
For instance:
AF 0F 4B C3 D4 = 64-bit WEP key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key
The WEP passphrase is NOT the same as a WEP key. Your wireless card uses
this passphrase to generate your WEP keys, but different hardware
manufacturers might have different methods for generating the keys. If you have
equipment from multiple vendors in your network, you can use the hex WEP key
from your Router or access point and enter it manually into the hex WEP key
table in your wireless card’s configuration screen.
WPA (Wi-Fi Protected Access)
WPA (Wi-Fi Protected Access) is a new Wi-Fi standard that was designed to
improve upon the security features of WEP. To use WPA security, the drivers
and software of your wireless equipment must be upgraded to support WPA.
These updates will be found on the wireless vendors’ websites. There are two
types of WPA security: WPA-PSK (no server) and WPA (with radius server).
WPA-PSK (no server)
This method uses what is known as a Pre-Shared key as the Network key. A
Network key is basically a password that is between eight and 63 characters long.
It can be a combination of letters, numbers, or characters. Each client uses the
F5D7631-4_Manual Page 26 of 61
same Network key to access the network. Typically, this is the mode that will be
used in a home environment.
WPA (with radius server)
With this system, a radius server distributes the Network key to the clients
automatically. This is typically found in a business environment. For a list of
Belkin wireless products that support WPA, please visit our website at
www.belkin.com/networking.
Sharing the Same Network Keys
Most Wi-Fi products ship with security turned off. So once you have your network
working, you need to activate WEP or WPA and make sure your wireless
networking devices are sharing the same Network key.
The Wireless G Desktop Network Card cannot access the network because it is
using a different Network key than the Network key that is configured on the
Wireless G Router.
F5D7631-4_Manual Page 27 of 61
Using a Hexadecimal Key
A hexadecimal key is a mixture of numbers and letters from A–F and 0–9. 64-bit
keys are five two-digit numbers. 128-bit keys are 13 two-digit numbers.
For instance:
AF 0F 4B C3 D4 = 64-bit key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key
In the boxes below, make up your key by writing in two characters between A–F
and 0–9 in each box. You will use this key to program the encryption settings on
your Router and your wireless computers.
Note to Mac users: Original Apple AirPort® products support 64-bit encryption
only. Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please
check your product to see which version you are using. If you cannot configure
your network with 128-bit encryption, try 64-bit encryption.
F5D7631-4_Manual Page 28 of 61
WEP Setup
64-Bit WEP Encryption
1 Select “64-bit WEP” from the drop-down menu.
2. After selecting your WEP encryption mode, you can enter your key by typing in
the hex key manually.
A hex (hexadecimal) key is a mixture of numbers and letters from A–F and 0–9.
For 64-bit WEP, you need to enter 10 hex keys.
For instance:
AF 0F 4B C3 D4 = 64-bit WEP key
3. Click “Apply Changes” to finish. Encryption in the Router is now set. Each of
your computers on your wireless network will now need to be configured with the
same security settings.
WARNING: If you are configuring the Wireless Router or access point from a
computer with a wireless client, you will need to ensure that security is turned ON
for this wireless client. If this is not done, you will lose your wireless connection.
128-Bit WEP Encryption
1. Select “128-bit WEP” from the drop-down menu.
2. After selecting your WEP encryption mode, you can enter your key manually
by typing in the hex key manually.
A hex (hexadecimal) key is a mixture of numbers and letters from A–F and 0–
9. For 128-bit WEP, you need to enter 26 hex keys.
For instance:
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key
3. Click “Apply Changes” to finish. Encryption in the Router is now set. Each of
your computers on your wireless network will now need to be configured with
the same security settings.
WARNING: If you are configuring the Wireless Router (or access point) from a
computer with a wireless client, you will need to ensure that security is turned ON
for this wireless client. If this is not done, you will lose your wireless connection.
F5D7631-4_Manual Page 29 of 61
Changing the Wireless Security Settings
Your Router is equipped with WPA (Wi-Fi Protected Access), the latest wireless
security standard. It also supports the legacy security standard, WEP (Wired
Equivalent Privacy). By default, wireless security is disabled. To enable security,
you must first determine which standard you want to use. To access the security
settings, click “Security” on the Wireless tab.
WPA Setup
Note: To use WPA security, all your clients must be upgraded to drivers and
software that support it. At the time of this User Manual’s publication, a security
patch download is available free from Microsoft. This patch works only with the
Windows XP operating system. You also need to download the latest driver for
your Belkin Wireless G Desktop or Notebook Network Card from the Belkin
support site. Other operating systems are not supported at this time. Microsoft’s
patch only supports devices with WPA-enabled drivers such as Belkin 802.11g
products.
There are two types of WPA security: WPA-PSK (no server) and WPA (with
radius server). WPA-PSK (no server) uses a so-called Pre-Shared key as the
security key. A Pre-Shared key is a password that is between eight and 63
characters long. It can be a combination of letters, numbers, and other
characters. Each client uses the same key to access the network. Typically, this
mode will be used in a home environment.
WPA (with radius server) is a configuration wherein a radius server distributes
the keys to the clients automatically. This is typically used in a business
environment.
Setting WPA-PSK (no server)
1. From the “Security Mode” drop-down menu, select “WPA-PSK (no server)”.
2. For Encryption Technique, select “TKIP” or “AES”. This setting will have to be
identical on the clients that you set up.
3. Enter your Pre-Shared key. This can be from eight to 63 characters and can
be letters, numbers, or symbols. This same key must be used on all of the clients
that you set up. For example, your PSK might be something like: “Smith family
network key”.
4. Click “Apply Changes” to finish. You must now set all clients to match these
settings.
F5D7631-4_Manual Page 30 of 61
Setting WPA (with radius server) Settings
If your network uses a radius server to distribute keys to the clients, use this
setting.
1. From the “Security Mode” drop-down menu, select “WPA—Radius Server”.
2. For Encryption Technique, select “TKIP” or “AES”. This setting will have to be
identical on the clients that you set up.
3. Enter the IP address of the radius server into the “Radius Server” fields.
4. Enter the radius key into the “Radius Key” field.
5. Enter the key interval. Key interval is how often the keys are distributed (in
packets).
6. Click “Apply Changes” to finish. You must now set all clients to match these
settings.
Configuring your Belkin Wireless G Network Cards to Use Security
Please Note: This section provides information on how to configure your Belkin
Wireless G Network Cards to use security.
At this point, you should already have your Wireless Router or access point set to
use WPA or WEP. In order for you to gain a wireless connection, you will need to
set your wireless notebook card and wireless desktop card to use the same
security settings.
Connecting your Computer to a Wireless Network that Requires a 64-Bit or
128-Bit WEP Key
1. Double-click the “Signal Indicator” icon to bring up the “Wireless Network”
screen. The “Advanced” button will allow you to view and configure more options
of your wireless card.
2. Under the “Wireless Network Properties” tab, select a network name from the
“Available networks” list and click “Configure”.
3. Under “Data Encryption” select “WEP”.
F5D7631-4_Manual Page 31 of 61
4. Ensure the check box “Network key is provided for me automatically” at the
bottom is unchecked. If you are using this computer to connect to a corporate
network, please consult your network administrator if this box needs to be
checked.
5. Type your WEP key in the “Network key” box. [Insert: screenshot from P58
of P74490-A]
Important: A WEP key is a mixture of numbers and letters from A–F and 0–9.
For 128-bit WEP, you need to enter 26 keys. For 64-bit WEP, you need to enter
10 keys. This Network key needs to match the key you assign to your Wireless
Router or access point.
6. Click “OK” to save the settings.
F5D7631-4_Manual Page 32 of 61
Connecting your Computer to a Wireless Network that Requires WPA-PSK
(no server)
1. Double-click the “Signal Indicator” icon to bring up the “Wireless Network”
screen. The “Advanced” button will allow you to view and configure more options
of your wireless card.
2. Under the “Wireless Networks” tab, select a network name from the “Available
networks” list and click “Configure”.
3. Under “Network Authentication” select “WPA-PSK (No Server)”.
4. Type your WPA key in the “Network key” box.
[Insert: screenshot from P59 of P74490-A]
Important: WPA-PSK is a mixture of numbers and letters from A–Z and 0–9. For
WPA-PSK you can enter eight to 63 keys. This Network key needs to match the
key you assign to your Wireless Router or access point.
5. Click “OK” to save the settings.
Connecting your Computer to a Wireless Network that Requires WPA (with
radius server)
1. Double-click the “Signal Indicator” icon to bring up the “Wireless Network”
screen. The “Advanced” button will allow you to view and configure more options
of your wireless card.
2. Under the “Wireless Networks” tab, select a network name from the “Available
networks” list and click “Configure”.
3. Under “Network Authentication” select WPA.
4. Under the “Authentication” tab, select the settings that are indicated by your
network administrator.
[Insert: screenshot from P60 of P74490-A]
5. Click “OK” to save the settings.
Setting Up WPA for a Non-Belkin Wireless Desktop and Wireless Notebook
Cards
F5D7631-4_Manual Page 33 of 61
For non-Belkin WPA Wireless Desktop and Wireless Notebook Cards that are
not equipped with WPA-enabled software, a file from Microsoft called “Windows
XP Support Patch for Wireless Protected Access” is available as a free download.
Please Note: The file that Microsoft has made available works only with
Windows XP. Other operating systems are not supported at this time.
Important: You also need to ensure that the wireless card manufacturer
supports WPA and that you have downloaded and installed the latest driver from
their support site.
Supported Operating Systems:
• Windows XP Professional
• Windows XP Home Edition
Setting Up Windows XP Wireless Network Utility to Use WPA-PSK
In order to use WPA-PSK, ensure you are using Windows Wireless Network
Utility by doing the following:
1. Under Windows XP, click “Start > Control Panel > Network Connections”.
2. Right-click on “Wireless Network Connection”, and select “Properties”.
3. Clicking on the “Wireless Networks” tab will display the following screen.
Ensure the “Use Windows to configure my wireless network settings” check
box is checked.
[Insert: screenshot from P62 of P74490-A]
4. Under the “Wireless Networks” tab, click the “Configure” button, and you will
see the following screen.
[Insert: screenshot from P63 of P74490-A]
5. For a home or small business user, select “WPA-PSK” under “Network
Authentication”.
Note: Select “WPA” if you are using this computer to connect to a corporate
network that supports an authentication server such as a radius server.
Please consult your network administrator for further information.
6. Select “TKIP” or “AES” under “Data Encryption”. This setting will have to be
identical to the Router that you set up.
F5D7631-4_Manual Page 34 of 61
7. Type in your encryption key in the “Network Key” box.
Important: Enter your Pre-Shared key. This can be from eight to 63 characters
and can be letters, numbers, or symbols. This same key must be used on all of
the clients that you set up.
8. Click “OK” to apply settings.
F5D7631-4_Manual Page 35 of 61
Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
• IP Spoofing
• Land Attack
• Ping of Death (PoD)
• Denial of Service (DoS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be “Stealth”, meaning that essentially they do
not exist to a would-be hacker. You can turn the firewall function off if needed;
however, it is recommended that you leave the firewall enabled. Disabling the
firewall protection will not leave your network completely vulnerable to hacker
attacks, but it is recommended that you leave the firewall enabled.
Virtual Servers
Virtual servers allow you to route external (Internet) calls for services such as a
web server (port 80), FTP server (Port 21), or other applications, through your
Router to your internal network. Since your internal computers are protected by a
firewall, machines from the Internet cannot get to them because they cannot be
“seen”. If you need to configure the virtual server function for a specific
application, you will need to contact the application vendor to find out which
port settings you need. You can manually input this port information into the
Router.
Choosing an Application
F5D7631-4_Manual Page 36 of 61
A list of popular applications has been included to choose from. Click on “Select
a Service” then select your application from the drop-down list. The settings will
be transferred to the first row available. Click “Add” to save the setting for that
application.
Manually Entering Settings into the Virtual Server
To manually enter settings, click on “Custom Server” and enter a name for the
server. Enter the Server IP address in the space provided for the internal
machine and the port(s) required to pass. Then select the the protocol type (TCP
or UDP), and
then click “Add”.
Opening ports in your firewall can pose a security risk. You can enable and
disable settings very quickly. It is recommended that you disable the settings
when you are not using a specific application.
Client IP Filters
The Router can be configured to restrict access to the Internet, email, or other
network services at specific days and times. Restriction can be set for a single
computer, a range of computers, or multiple computers.
To restrict Internet access to a single computer for example, enter a name
of the filter in “Filter Name” box (1) and IP address of the computer you
wish to restrict access to in the IP field (2). Next, enter “80:80” in the Port
fields (3). Select protocol from the “Protocol” drop down box (4). Click
“Apply Changes”. The computer at the IP address you specified will now
be blocked from Internet access.
MAC Address Filtering
The MAC address filter is a powerful security feature that allows you to specify
which computers are allowed on the network. Any computer attempting to access
the network that is not specified in the filter list will be denied access. When you
enable this feature, you must enter a name for the user and the MAC address of
each client on your
network to allow network access. Next, click “Add” to save the settings.
DMZ (Demilitarized Zone)
If you have a client PC that cannot run an Internet application properly from
behind the firewall, you can open the client up to unrestricted two-way Internet
access. This may be necessary if the NAT feature is causing problems with an
application such as a game or video conferencing application. Use this feature on
a temporary basis. The computer in the DMZ is not protected from hacker
attacks.
F5D7631-4_Manual Page 37 of 61
To put a computer in the DMZ, enter its LAN IP address in the
“Private IP” field and click “Apply Changes” for the change to take effect.
Blocking an ICMP Ping
Computer hackers use what is known as “pinging” to find potential victims on the
Internet. By pinging a specific IP address and receiving a response from the IP
address, a hacker can determine that something of interest might be there. The
Router can be set up so it will not respond to an ICMP ping from the outside. This heightens the
level of security of your Router.
F5D7631-4_Manual Page 38 of 61
To turn off the ping response, select “Block ICMP Ping” (1) and click “Apply Changes”. The
Router will not respond to an ICMP ping.
Utilities
The “Utilities” screen lets you manage different parameters of the Router and
perform certain administrative functions.
Restart Router
Sometimes it may be necessary to restart or reboot the Router if it begins
working improperly. Restarting or rebooting the Router will NOT delete any of
your configuration settings.
Restarting the Router to Restore Normal Operation
1. Click the “Restart Router” button.
2. The following message will appear. Click “OK” to restart your Router.
Restore Factory Defaults
Using this option will restore all of the settings in the Router to the factory
(default) settings. It is recommended that you back up your settings before you
restore all of the defaults.
1. Click the “Restore Defaults” button.
2. The following message will appear. Click “OK” to restore factory defaults.
Saving/Backup Current Settings
You can save your current configuration by using this feature. Saving your
configuration will allow you to restore it later if your settings are lost or
changed. It is recommended that you back up your current configuration before
performing a firmware update.
1. Click “Save”. A window called “File Download” will open. Click “Save”.
2. A window will open that allows you to select the location in which to save
the configuration file. Select a location. There are no restrictions on the file
name, however, be sure to name the file so you can locate it yourself later.
When you have selected the location and entered the file name, click “Save”.
3. When the save is complete, you will see the window below. Click “Close”.
The configuration is now saved.
Restore Previous Settings
This option will allow you to restore a previously saved configuration.
1. Click “Browse”. A window will open that allows you to select the location of
the configuration file. All configuration files end with a “.bin”. Locate the
configuration file you want to restore and double-click on it.
F5D7631-4_Manual Page 39 of 61
2. Then, click “Open”.
Firmware Update
From time to time, Belkin may release new versions of the Router’s firmware.
Firmware updates contain feature improvements and fixes to problems that may
have existed. When Belkin releases new firmware, you can download the
firmware from the Belkin update website and update your Router’s firmware to
the latest version.
Updating the Router’s Firmware
1. In the “Firmware Update” page, click “Browse”. A window will open that allows
you to select the location of the firmware update file.
2. Browse to the firmware file you downloaded. Select the file by double-clicking
on the file name.
3. Click “Update” to upgrade to the latest firmware version.
System Settings
The “System Settings” page is where you can enter a new administrator
password, set the time zone, enable remote management, and turn on and off
the UPnP function of the Router.
Setting or Changing the Administrator Password
The Router ships with NO password entered. If you wish to add a password for
greater security, you can set a password here. Write down your password and
keep it in a safe place, as you will need it if you need to log into the Router in
the future. It is also recommended that you set a password if you plan to use the
remote management feature of your Router.
Changing the Login Time-Out Setting
The login time-out option allows you to set the period of time that you can be
logged into the Router’s advanced setup interface. The timer starts when there
has been no activity. For example, you have made some changes in the
advanced setup interface, then left your computer alone without clicking “Logout”.
Assuming the time-out is set to 10 minutes, then 10 minutes after you leave, the
login session will expire. You will have to log into the Router again to make any
more changes. The login time-out option is for security purposes and the default
is set to 10 minutes.
Note: Only one computer can be logged into the Router’s advanced setup
interface at one time.
Setting the Time and Time Zone
F5D7631-4_Manual Page 40 of 61
The Router keeps time by connecting to a Simple Network Time Protocol (SNTP)
server. This allows the Router to synchronize the system clock to the global
Internet. The synchronized clock in the Router is used to record the security log
and control client filtering.
Select desired NTP time servers and the time zone that you reside in, then click
“Apply Changes”. The system clock may not update immediately. Allow at least
15 minutes for the Router to contact the time servers on the Internet and get a
response. You cannot set the clock yourself.
Enabling Remote Management
Before you enable this advanced feature of your Belkin Router, MAKE SURE
YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management
allows you to make changes to your Router’s settings from anywhere on the
Internet.
Click on the “Change Setting” button to bring up the “Remote Management” page.
There are two methods of remotely managing the Router. The first is to allow
access to the Router from anywhere on the Internet by selecting “Any IP address
can remotely manage the Router”. By typing in your WAN IP address from any
computer on the Internet, you will be presented with a login screen where you
need to type in the password of your Router.
The second method is to allow a specific IP address only to remotely manage the
Router. This is more secure, but less convenient. To use this method, enter the
IP address you know you will be accessing the Router from in the space provided
and select “Only this IP address can remotely manage the Router”. Before you
enable this function, it is STRONGLY RECOMMENDED that you set your
administrator password. Leaving the password empty will potentially open your
Router to intrusion.
Click on the “Apply Changes” button to save your settings.
Enabling/Disabling UPnP
UPnP (Universal Plug-and-Play) is yet another advanced feature offered by your
Belkin Router. It is a technology that offers seamless operation of voice
messaging, video messaging, games, and other applications that are UPnP-
compliant. Some applications require the Router’s firewall to be configured in a
specific way to operate properly. This usually requires opening TCP and UDP
ports, and in some instances, setting trigger ports. An application that is UPnP-
compliant has the ability to communicate with the Router, basically “telling” the
Router which way it needs the firewall configured. The Router ships with the
UPnP feature disabled. If you are using any applications that are UPnP-
F5D7631-4_Manual Page 41 of 61
compliant, and wish to take advantage of the UPnP features, you can enable the
UPnP feature.
Click on the “Change Setting” button to bring up the “UPnP Setting” page. Then
select “On” for “Enable UPnP”. Click on the “Apply Changes” button to save your
settings.
------------------------------------------------------------------------------------------------------------
Troubleshooting
Problem:
The ADSL LED is not on.
Solution:
1. Check the connection between the Router and ADSL line. Make sure the
cable from the ADSL line is connected to the port on the Router labeled “DSL
Line”.
2. Make sure the Router has power. The [Insert: Power Icon] Power LED of the
front panel should be illuminated.
Problem:
The Internet LED is not on.
Solution:
1. Make sure the cable from the ADSL line is connected to the port on the
Router labeled “DSL Line” and the [Insert: ADSL icon] ADSL LED is on.
2. Make sure you have the correct VPI/VCI, user name, and password from your
ISP provider.
Problem:
My connection type is static IP address. I cannot connect to the Internet.
Solution:
Since your connection type is static IP address, your ISP must assign you the IP
address, subnet mask, and gateway address. Instead of using the Wizard, go to
“Connection Type”, and then select your connection type. Click “Next”, select
“Static IP”, and enter your IP address, subnet mask, and default gateway
information.
Problem:
I’ve forgotten or lost my password.
Solution:
F5D7631-4_Manual Page 42 of 61
Press and hold the “Reset” button on the rear panel for at least six seconds to
restore the factory defaults.
Problem:
My wireless PC cannot connect to the Router.
Solution:
1. Make sure the wireless PC has the same SSID settings as the Router, and
you have the same security settings on the clients such as WPA or WEP
encryption.
2. Make sure the distance between the Router and wireless PC are not too far
away.
Problem:
The wireless network is often interrupted.
Solution:
1. Move your wireless PC closer to the Router to find a better signal.
2. There may also be interference, possibly caused by a microwave oven or
2.4GHz cordless phones. Change the location of the Router or use a different
wireless channel.
Problem:
I can’t connect to the Internet wirelessly.
Solution:
If you are unable to connect to the Internet from a wireless computer, please
check the following items:
1. Look at the lights on your Router. If you’re using a Belkin Router, the lights
should be as follows:
The “Power” light should be on.
The “Connected” light should be on, and not blinking.
The “WAN” light should be either on or blinking.
2. Open your wireless utility software by clicking on the icon in the system tray at
the bottom right-hand corner of the screen. If you’re using a Belkin Wireless
Card, the tray icon should look like this [INSERT ICON] (the icon may be red
or green):
3. The exact window that opens will vary depending on the model of wireless
card you have; however, any of the utilities should have a list of “Available
Networks”—those wireless networks it can connect to.
Does the name of your wireless network appear in the results?
F5D7631-4_Manual Page 43 of 61
Yes, my network name is listed—go to the troubleshooting solution titled “I
can’t connect to the Internet wirelessly, but my network name is listed”.
No, my network name is not listed—go to the troubleshooting solution titled “I
can’t connect to the Internet wirelessly, and my network name is not listed”.
Problem:
I can’t connect to the Internet wirelessly, but my network name is listed.
Solution:
If the name of your network is listed in the “Available Networks” list, please follow
the steps below to connect wirelessly:
1. Click on the correct network name in the “Available Networks” list.
If the network has security (encryption) enabled, you will need to enter the
network key. For more information regarding security, see the page entitled
“Changing the Wireless Security Settings”.
2. Within a few seconds, the tray icon in the lower left-hand corner of your
screen should turn green, indication a successful connection to the network.
Problem:
I can’t connect to the Internet wirelessly, and my network name is not listed.
Solution:
If the correct network name is not listed under “Available Networks” in the
wireless utility, please attempt the following troubleshooting steps:
1. Temporarily move computer, if possible, five to 10 feet from the Router. Close
the wireless utility, and re-open it. If the correct network name now appears
under “Available Networks”, you may have a range or interference problem.
Please see the suggestions discussed in Appendix B entitled “Important
Factors for Placement and Setup”.
2. Using a computer that is connected to the Router via a network cable (as
opposed to wirelessly), ensure that “Broadcast SSID” is enabled. This setting
is found on the Router’s wireless “Channel and SSID” configuration page.
If you are still unable to access the Internet after completing these steps, please
contact Belkin Technical Support.
Problem:
My wireless network performance is inconsistent.
Data transfer is sometimes slow.
Signal strength is poor.
F5D7631-4_Manual Page 44 of 61
Difficulty establishing and/or maintaining a Virtual Private Network (VPN)
connection.
Solution:
Wireless technology is radio-based, which means connectivity and the
throughput performance between devices decreases when the distance between
devices increases. Other factors that will cause signal degradation (metal is
generally the worst culprit) are obstructions such as walls and metal appliances.
As a result, the typical indoor range of your wireless devices will be between 100
to 200 feet. Note also that connection speed may decrease as you move farther
from the Router or Access Point.
In order to determine if wireless issues are related to range, we suggest
temporarily moving the computer, if possible, five to 10 feet from the Router.
Changing the wireless channel - Depending on local wireless traffic and
interference, switching the wireless channel of your network can improve
performance and reliability. The default channel the Router is shipped with is
channel 11, you may choose from several other channels depending on your
region; see the section entitled “Changing the Wireless Channel” on page XX for
instructions on how to choose other channels.
Limiting the wireless transmit rate - Limiting the wireless transmit rate can help
improve the maximum wireless range, and connection stability. Most wireless
cards have the ability to limit the transmission rate. To change this property, go to
the Windows Control Panel, open “Network Connections” and double-click on
your wireless card’s connection. In the “Properties” dialog, select the “Configure”
button on the “General” tab (Windows 98 users will have to select the wireless
card in the list box and then click “Properties”), then choose the “Advanced” tab
and select the rate property. Wireless client cards are usually set to automatically
adjust the wireless transmit rate for you, but doing so can cause periodic
disconnects when the wireless signal is too weak; as a rule, slower transmission
rates are more stable. Experiment with different connection rates until you find
the best one for your environment; note that all available transmission rates
should be acceptable for browsing the Internet. For more assistance, see your
wireless card’s user manual.
Problem:
I am having difficulty setting up Wired Equivalent Privacy (WEP) security
on a Belkin Router or Belkin Access Point.
F5D7631-4_Manual Page 45 of 61
Solution:
1. Log into your Wireless Router or Access Point.
2. Open your web browser and type in the IP address of the Wireless Router or
Access Point. (The Router default is “192.168.2.1”, the 802.11g Access Point
is “192.168.2.254”.) Log into your Router by clicking on the “Login” button in
the top right-hand corner of the screen. You will be asked to enter your
password. If you never set a password, leave the password field blank and
click “Submit”.
3. Click the “Wireless” tab on the left of your screen. Select the “Encryption” or
“Security” tab to get to the security settings page.
4. Select “128-bit WEP” from the drop-down menu.
5. After selecting your WEP encryption mode, you can type in your hex WEP
key manually, or you can type in a passphrase in the “Passphrase” field and
click “Generate” to create a WEP key from the passphrase. Click “Apply
Changes” to finish. You must now set all of your clients to match these
settings. A hex (hexadecimal) key is a mixture of numbers and letters from A–
F and 0–9. For 128-bit WEP, you need to enter 26 hex keys.
For example:
C3 03 0F AF 4B B2 C3 D4 4B C3 D4 E7 E4 = 128-bit key
6. Click “Apply Changes” to finish. Encryption in the Wireless Router is now set.
Each of your computers on your wireless network will now need to be
configured with the same security settings.
WARNING: If you are configuring the Wireless Router or Access Point from a
computer with a wireless client, you will need to ensure that security is turned
on for this wireless client. If this is not done, you will lose your wireless
connection.
Note to Mac users: Original Apple AirPort products support 64-bit encryption
only. Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please
check your Apple AirPort product to see which version you are using. If you
cannot configure your network with 128-bit encryption, try 64-bit encryption.
Problem:
I am having difficulty setting up Wired Equivalent Privacy (WEP) security
on a Belkin Wireless Card.
Solution:
The Wireless Card must use the same key as the Wireless Router or Access
Point. For instance, if your Wireless Router or Access Point uses the key
00112233445566778899AABBCC, then the Wireless Card must be set to the
exact same key.
F5D7631-4_Manual Page 46 of 61
1. Double-click the “Signal Indicator” icon to bring up the “Wireless Network”
screen. The “Advanced” button will allow you to view and configure more
options of your Card.
2. The “Advanced” button will allow you to view and configure more options of
the card.
3. Once the “Advanced” button is clicked, the Belkin Wireless LAN Utility will
appear. This Utility will allow you to manage all the advanced features of the
Belkin Wireless Card.
4. Under the “Wireless Network Properties” tab, select a network name from
the “Available networks” list and click the “Properties” button.
5. Under “Data Encryption” select “WEP”.
6. Ensure the check box “The key is provided for me automatically” at the
bottom is unchecked. If you are using this computer to connect to a
corporate network, please consult your network administrator if this box
needs to be checked.
7. Type your WEP key in the “Network key” box.
Important: A WEP key is a mixture of numbers and letters from A–F and 0–9.
For 128-bit WEP, you need to enter 26 keys. This network key needs to match
the key you assign to your Wireless Router or Access Point.
For example: C3 03 0F AF 4B B2 C3 D4 4B C3 D4 E7 E4 = 128-bit key
8. Click “OK”, and then “Apply” to save the settings.
If you are NOT using a Belkin Wireless Card, please consult the manufacturer for
that card’s user manual.
Problem:
Do Belkin products support WPA?
Solution:
Note: To use WPA security, all your clients must be upgraded to drivers and
software that support it. At the time of this FAQ publication, a security patch
download is available, for free, from Microsoft. This patch works only with the
Windows XP operating system.
Download the patch here:
http://www.microsoft.com/downloads/details.aspx?FamilyID=009d8425-ce2b-
47a4-abec-274845dc9e91&displaylang=en
F5D7631-4_Manual Page 47 of 61
You also need to download the latest driver for your Belkin 802.11g Wireless
Desktop Network Card or Notebook Network Card from the Belkin support site.
Other operating systems are not supported at this time. Microsoft’s patch only
supports devices with WPA-enabled drivers such as Belkin 802.11g products.
Download the latest driver at
http://web.belkin.com/support/networkingsupport.asp
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security on
a Belkin Wireless Router or Belkin Access Point for a home network.
Solution:
1. From the “Security Mode” drop-down menu, select “WPA-PSK (no server)”.
2. For “Encryption Technique”, select “TKIP” or “AES”. This setting will have to
be identical on the clients that you set up.
3. Enter your pre-shared key. This can be from eight to 63 characters and can
be letters, numbers, or symbols or spaces. This same key must be used on
all of the clients that you set up. For example, your PSK might be something
like: “Smith family network key”.
4. Click “Apply Changes” to finish. You must now set all clients to match these
settings.
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security on
a Belkin Wireless Router or Belkin Access Point for a business.
Solution:
If your network uses a radius server to distribute keys to the clients, use this
setting. This is typically used in a business environment.
1. From the “Security Mode” drop-down menu, select “WPA (with server)”.
2. For “Encryption Technique”, select “TKIP” or “AES”. This setting will have to
be identical on the clients that you set up.
3. Enter the IP address of the radius server into the “Radius Server” fields.
4. Enter the radius key into the “Radius Key” field.
5. Enter the key interval. Key interval is how often the keys are distributed (in
packets).
6. Click “Apply Changes” to finish. You must now set all clients to match these
settings.
F5D7631-4_Manual Page 48 of 61
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security on
a Belkin Wireless Card for a home network.
Solution:
Clients must use the same key that the wireless router or access point uses. For
instance if the key is “Smith Family Network Key” in the wireless router or access
point, the clients must also use that same key.
1. Double-click the “Signal Indicator” icon to bring up the “Wireless Network”
screen. The “Advanced” button will allow you to view and configure more
options of your Card.
2. The “Advanced” button will allow you to view and configure more options of
the Card.
3. Once the “Advanced” button is clicked, the Belkin Wireless LAN Utility will
appear. This Utility will allow you to manage all the advanced features of the
Belkin Wireless Card.
4. Under the “Wireless Network Properties” tab, select a network name from the
“Available networks” list and click the “Properties” button.
5. Under “Network Authentication” select “WPA-PSK (no server).
6. Type your WPA key in the “Network key” box.
Important: WPA-PSK is a mixture of numbers and letters from A–Z and 0–9. For
WPA-PSK you can enter eight to 63 characters. This network key needs to
match the key you assign to your wireless router or access point.
7. Click “OK, then “Apply” to save the settings.
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security on
a Belkin Wireless Card for a business.
Solution:
1. Double-click the “Signal Indicator” icon to bring up the “Wireless Network”
screen. The “Advanced” button will allow you to view and configure more
options of your Card.
2. The “Advanced” button will allow you to view and configure more options of
the Card.
F5D7631-4_Manual Page 49 of 61
3. Once the “Advanced” button is clicked, the Belkin Wireless LAN Utility will
appear. This Utility will allow you to manage all the advanced features of the
Belkin Wireless Card.
4. Under the “Wireless Network Properties” tab, select a network name from the
“Available networks” list and click the “Properties” button.
5. Under “Network Authentication” select “WPA”.
6. In the “Authentication” tab, select the settings that are indicated by your
network administrator.
7. Click “OK, then “Apply” to save the settings.
Problem:
I am having difficulty setting up Wi-Fi Protected Access (WPA) security and
I am NOT using a Belkin Wireless Card for a home network.
Solution:
If you are not using a Belkin Wireless Desktop or Wireless Notebook Network Card that is not
equipped with WPA-enabled software, a file from Microsoft called “Windows XP Support Patch for
Wireless Protected Access” is available for free download. Download the patch from Microsoft by
searching the knowledge base for Windows XP WPA.
Note: The file that Microsoft has made available works only with Windows XP.
Other operating systems are not supported at this time. You also need to ensure
that the wireless card manufacturer supports WPA and that you have
downloaded and installed the latest driver from their support site.
Supported Operating Systems:
• Windows XP Professional
• Windows XP Home Edition
Enabling WPA-PSK (no server)
1. Under Windows XP, click “Start > Control Panel > Network Connections”.
2. Right-clicking on the “Wireless Networks” tab will display the following screen.
Ensure the “Use Windows to configure my wireless network settings” box is
checked.
3. Under the “Wireless Networks” tab, click the “Configure” button, and you will
see the following screen.
4. For a home or small business user, select “WPA-PSK” under “Network
Administration”.
Note: Select WPA (with radius server) if you are using this computer to connect
to a corporate network that supports an authentication server such as a radius
server. Please consult your network administrator for further information.
F5D7631-4_Manual Page 50 of 61
5. Select “TKIP” or “AES” under “Date Encryption”. This setting will have to be
identical to the wireless router or access point that you set up.
6. Type in your encryption key in the “Network Key” box.
Important: Enter your pre-shared key. This can be from eight to 63 characters
and can be letters, numbers, or symbols. This same key must be used on all of
the clients that you set up.
7. Click “OK” to apply settings.
------------------------------------------------------------------------------------------------------------
Contacting Belkin Technical Support
For latest software updates or if you have any further questions regarding
installation of this product, please visit www.belkin.com/networking or contact:
Belkin Tech Support
USA: 877.736.5771
310.898.1100 ext. 2263
Europe: 00 800 223 55 460
Australia: 1800 235 546
New Zealand: 0800 235 546
Singapore: 800 616 1790
------------------------------------------------------------------------------------------------------------
Appendix A: Glossary
IP Address
The “IP address” is the internal IP address of the Router. To access the
advanced setup interface, type this IP address into the address bar of your
browser. This address can be changed if needed. To change the IP address,
type in the new IP address and click “Apply Changes”. The IP address you
choose should be a non-routable IP. Examples of a non-routable IP are:
192.168.x.x (where x is anything between 0 and 255)
10.x.x.x (where x is anything between 0 and 255)
Subnet Mask
F5D7631-4_Manual Page 51 of 61
Some networks are far too large to allow all traffic to flood all its parts. These
networks must be broken down into smaller, more manageable sections, called
subnets. The subnet mask is the network address plus the information reserved
for identifying the “subnetwork”.
DNS
DNS is an acronym for Domain Name Server. A Domain Name Server is a server
located on the Internet that translates URLs (Universal Resource Links) like
www.belkin.com to IP addresses. Many ISPs do not require you to enter this
information into the Router. If you are using a static IP connection type, then you
may need to enter a specific DNS address and secondary DNS address for your
connection to work properly. If your connection type is Dynamic or PPPoE, it is
likely that you do not have to enter a DNS address.
PPPoE (routing mode, for multiple PCs)
Most ADSL providers use PPPoE as the connection type. If you use an ADSL
modem to connect to the Internet, your ISP may use PPPoE to log you into the
service.
Your connection type is PPPoE if:
1. Your ISP gave you a user name and password which is required to connect to
the Internet.
2. Your ISP gave you software such as WinPoET or Enternet300 that you use to
connect to the Internet.
3. You have to double-click on a desktop icon other than your browser to get on
the Internet.
To set the Router to use PPPoE, type in your user name and password in the
spaces provided. After you have typed in your information, click “Apply Changes”.
After you apply the changes, the “Internet Status” indicator will read “connection
OK” if your Router is set up properly.
PPPoA (routing mode, for multiple PCs)
Enter the PPPoA information in the provided spaces, and click “Next”. Click
“Apply” to activate your settings.
1. User name - Enter the user name. (Assigned by your ISP).
2. Password - Enter your password. (Assigned by your ISP).
3. Retype Password - Confirm the password. (Assigned by your ISP).
4. VPI/VCI - Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier
(VCI) parameter here. (Assigned by your ISP).
Disconnect after X...
This feature is used to automatically disconnect the Router from your ISP when
there is no activity for a specified period of time. For instance, placing a check
mark next to this option and entering “5” into the minute field will cause the
F5D7631-4_Manual Page 52 of 61
Router to disconnect from the Internet after five minutes of no Internet activity.
This option should be used if you pay for your Internet service by the minute.
Channel and SSID
To change the channel of operation of the Router, select the desired channel
from the drop-down menu and select your channel. Click “Apply Changes” to
save the setting. You can also change the SSID. The SSID is the equivalent to
the wireless network’s name. You can make the SSID anything you want to. If
there are other wireless networks in your area, you should give your wireless
network a unique name. Click inside of the SSID box and type in a new name.
Click “Apply Changes” to make the change.
ESSID Broadcast
Many wireless network adapters currently on the market possess a feature
known as site survey. It scans the air for any available network and allows each
computer to automatically select a network from the survey. This occurs if the
computer’s SSID is set to “ANY”. Your Belkin Router can block this random
search for a network. If you disable the “ESSID Broadcast” feature, the only way
a computer can join your network is by its SSID being set to the specific name of
the network (like WLAN). Be sure that you know your SSID (network name)
before enabling this feature. It is possible to make your wireless network nearly
invisible. By turning off the broadcast of the SSID, your network will not appear in
a site survey. Obviously, turning off the broadcast feature of the SSID helps
increase security.
Encryption
Setting encryption can help keep your network secure. The Router uses Wired
Equivalent Privacy (WEP) encryption to protect your data and features two rates
of encryption: 64-bit and 128-bit. Encryption works on a system of keys. The key
on the computer must match the key on the Router, and there are two ways to
make a key. The easiest is to let the Router’s software convert a passphrase
you’ve created into a key. The advanced method is to enter the keys manually.
Virtual Servers
This function will allow you to route external (Internet) calls for services such as
a web server (port 80), FTP server (Port 21), or other applications through your
Router to your internal network. Since your internal computers are protected by a
firewall, machines from the Internet cannot get to them because they cannot be
“seen”. If you need to configure the virtual server function for a specific
application, you will need to contact the application vendor to find out which
port settings you need.
To manually enter settings, enter the IP address in the space provided for the
internal machine, the port type (TCP or UDP), and the LAN and public port(s)
required to pass. Then select “Enable” and click “Set”. You can only pass one
F5D7631-4_Manual Page 53 of 61
port per internal IP address. Opening ports in your firewall can pose a security
risk. You can enable and disable settings very quickly. It is recommended that
you disable the settings when you are not using a specific application.
Client IP Filters
The Router can be configured to restrict access to the Internet, email, or other
network services at specific days and times. Restriction can be set for a single
computer, a range of computers, or multiple computers.
URL Blocking
To configure the URL blocking feature, specify the websites (www.somesite.com)
and/or keywords you want to filter on your network. Click “Apply Changes” to
activate the change. To complete this configuration, you will need to create or
modify an access rule in the client IP filters section. To modify an existing rule,
click the “Edit” option next to the rule you want to modify. To create a new rule,
click on the “Add PC” option. From the “Access Control Add PC” section, check
the option for “WWW with URL Blocking” in the “Client PC Service” table to filter
out the websites and keywords specified.
Schedule Rule
To configure the schedule rule, specify the name, comment, start time, and end
time that you want to filter on your network. This page defines schedule rule
names and activates the schedule for use in the “Access Control” page.
MAC Address Filtering
The MAC address filter is a powerful security feature that allows you to specify
which computers are allowed on the network. Any computer attempting to access
the network that is not specified in the filter list will be denied access. When you
enable this feature, you must enter the MAC address of each client on your
network to allow network access to each or copy the MAC address by selecting
the name of the computer from the “DHCP Client List”. To enable this feature,
select “Enable”. Next, click “Apply Changes” to save the settings.
DMZ
If you have a client PC that cannot run an Internet application properly from
behind the firewall, you can open the client up to unrestricted two-way Internet
access. This may be necessary if the NAT feature is causing problems with an
application such as a game or video conferencing application. Use this feature on
a temporary basis. The computer in the DMZ is not protected from hacker
attacks. To put a computer in the DMZ, enter the last digits of its LAN IP address
in the “Static IP” field and click “Apply Changes” for the change to take effect.
If you have only one public (WAN) IP address, then you can leave the public IP
to “0.0.0.0”. If you are using multiple public (WAN) IP addresses, it is possible to
select which public (WAN) IP address the DMZ host will be directed to. Type in
the public (WAN) IP address you wish the DMZ host to direct to, enter the last
F5D7631-4_Manual Page 54 of 61
two digits of the IP address of the DMZ host computer, and click “Apply
Changes”.
Administrator Password
The Router ships with NO password entered. If you wish to add a password for
more security, you can set a password from your Router’s web-based user
interface. Keep your password in a safe place as you will need this password if
you need to log into the Router in the future. It is STRONGLY RECOMMENDED
that you set a password if you plan to use the remote management feature.
The login time-out option allows you to set the period of time that you can be
logged into the Router's advanced setup interface. The timer starts when there
has been no activity. For example, you have made some changes in the
advanced setup interface, then left your computer alone without clicking “Logout”.
Assuming the time-out is set to 10 minutes, then 10 minutes after you leave, the
login session will expire. You will have to log into the Router again to make any
more changes. The login time-out option is for security purposes and the default
is set to 10 minutes. Note, only one computer can be logged into the Router’s
advanced setup interface at a time.
Time and Time Zone
The Router keeps time by connecting to a Simple Network Time Protocol (SNTP)
server. This allows the Router to synchronize the system clock to the global
Internet. The synchronized clock in the Router is used to record the security log
and control client filtering. Select the time zone that you reside in. If you reside
in an area that observes daylight saving time, then place a check mark in the box
next to “Enable Daylight Saving”. The system clock may not update immediately.
Allow at least 15 minutes for the Router to contact the time servers on the
Internet and get a response. You cannot set the clock yourself.
Remote Management
Before you enable this function, MAKE SURE YOU HAVE SET THE
ADMINISTRATOR PASSWORD. Remote management allows you to make
changes to your Router’s settings from anywhere on the Internet.
UPnP
UPnP (Universal Plug-and-Play) is a technology that offers seamless operation
of voice messaging, video messaging, games, and other applications that are
UPnP-compliant. Some applications require the Router's firewall to be configured
in a specific way to operate properly. This usually requires opening TCP and
UDP ports and in some instances setting trigger ports. An application that is
UPnP-compliant has the ability to communicate with the Router, basically “telling”
the Router which way it needs the firewall configured. The Router ships with the
UPnP feature disabled. If you are using any applications that are UPnP-
compliant, and wish to take advantage of the UPnP features, you can enable the
UPnP feature. Simply select “Enable” in the “UPnP Enabling” section of the
F5D7631-4_Manual Page 55 of 61
“Utilities” page. Click “Apply Changes” to save the change.
------------------------------------------------------------------------------------------------------------
Appendix B: Important Factors for Placement and Setup
Note: While some of the items listed below can affect network performance, they
will not prohibit your wireless network from functioning; if you are concerned that
your network is not operating at its maximum effectiveness, this checklist may
help.
1. Wireless Router (or Access Point) Placement
Place your wireless router (or access point), the central connection point of your
network, as close as possible to the center of your wireless network devices.
To achieve the best wireless network coverage for your “wireless clients” (i.e.,
computers enabled by Belkin Wireless Notebook Network Cards, Wireless
Desktop Network Cards, and Wireless USB Adapters):
Ensure that your wireless router’s (or access point’s) networking antennas
are parallel to each other, and are positioned vertically (toward the ceiling).
If your wireless router (or access point) itself is positioned vertically, point
the antennas a much as possible in an upward direction.
In multistory homes, place the wireless router (or access point) on a floor
that is as close to the center of the home as possible. This may mean
placing the wireless router (or access point) on an upper floor.
Try not to place the wireless router (or access point) near a cordless
2.4GHz phone.
2. Avoid Obstacles and Interference
Avoid placing your wireless router (or access point) near devices that may emit
radio “noise,” such as microwave ovens. Dense objects that can inhibit wireless
communication include:
Refrigerators
Washers and/or dryers
Metal cabinets
Large aquariums
Metallic-based UV tinted windows
If your wireless signal seems weak in some spots, make sure that objects such
as these are not blocking the signal’s path (between your computers and
wireless router or access point).
3. Cordless Phones
If the performance of your wireless network is impaired after attending to the
above issues, and you have a cordless phone:
F5D7631-4_Manual Page 56 of 61
Try moving cordless phones away from wireless routers (or access points)
and your wireless-enabled computers.
Unplug and remove the battery from any cordless phone that operates on
the 2.4GHz band (check manufacturer’s information). If this fixes the
problem, your phone may be interfering.
If your phone supports channel selection, change the channel on the
phone to the farthest channel from your wireless network. For example,
change the phone to channel 1 and move your wireless router (or access
point) to channel 11. See your phone’s user manual for detailed
instructions.
If necessary, consider switching to a 900MHz or 5GHz cordless phone.
4. Choose the “Quietest” Channel for your Wireless Network
In locations where homes or offices are close together, such as apartment
buildings or office complexes, there may be wireless networks nearby that can
conflict with yours.
Use the Site Survey capabilities found in the Wireless LAN Utility of your wireless
adapter to locate any other wireless networks that are available (see your
wireless adapter’s manual), and move your wireless router (or access point) and
computers to a channel as far away from other networks as possible.
Experiment with more than one of the available channels, in order to find the
clearest connection and avoid interference from neighboring cordless phones or
other wireless devices.
For Belkin wireless networking products, use the detailed Site Survey and
wireless channel information included in your User Manual.
These guidelines should allow you to cover the maximum possible area with your
wireless router (or access point). Should you need to cover an even wider area,
we suggest the Belkin Wireless Range Extender/Access Point.
5. Secure Connections, VPNs, and AOL
Secure connections typically require a user name and password, and are used
where security is important. Secure connections include:
• Virtual Private Network (VPN) connections, often used to connect remotely
to an office network
• The “Bring Your Own Access” program from America Online (AOL), which
lets you use AOL through broadband provided by another cable or DSL
service
• Most online banking websites
F5D7631-4_Manual Page 57 of 61
• Many commercial websites that require a user name and password to
access your account
Secure connections can be interrupted by a computer’s power management
setting, which causes it to “go to sleep.” The simplest solution to avoid this is to
simply reconnect by rerunning the VPN or AOL software, or by re-logging into the
secure website.
A second alternative is to change your computer’s power management settings
so it does not go to sleep; however, this may not be appropriate for portable
computers. To change your power management setting under Windows, see the
“Power Options” item in the Control Panel.
If you continue to have difficulty with Secure Connections, VPNs, and AOL,
please review the steps above to be sure you have addressed these issues.
Appendix C: Internet Connection Setting Table
This table provides references to select and configure Internet connection in
setting up your ADSL connection. Many ISPs use different settings depending on
the region and equipment they use. You may try the setting for the ISPs in your
region. If it does not work, please contact your ISP for your specific setting.
Country Connection
Protocol VPI/VCI Encapsulation ISPs
EUROPE:
France PPPoE 8/35 LLC Various
Germany PPPoE 1/32 LLC T-Online, various
1483 Bridged 0/35 or
0/34 or
0/32
LLC Various
PPPoA 0/32 or
0/35 or
8/48
VC MUX Various
Holland &
Belgium
PPPoE 8/35 LLC Various
Italy PPPoE or PPPoA 8/35 VC MUX TIN
Spain PPPoE or 1483
Bridged 8/32 LLC Telefonica
Sweden 1483 Bridged 3/35 LLC Telia
UK PPPoA 0/38 VC MUX BT, Freeserve,
Tiscali, AOL*
ASIA:
F5D7631-4_Manual Page 58 of 61
Australia PPPoE or PPPoA 8/35 LLC Various
New
Zealand PPPoE or PPPoA
0/100 VC MUX Various
Singapore PPPoE 0/100 LLC SingNet, Pacific
Internet
*Note: AOL users also need to enter 1400 for MTU.
------------------------------------------------------------------------------------------------------------
Information
FCC Statement
DECLARATION OF CONFORMITY WITH FCC RULES FOR
ELECTROMAGNETIC COMPATIBILITY
We, Belkin Corporation, of 501 West Walnut Street, Compton, CA 90220, declare
under our sole
responsibility that the product,
F5D7631-4
to which this declaration relates,
complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) this
device may not cause harmful interference, and (2) this device must accept any
interference received,
including interference that may cause undesired operation.
Caution: Exposure to Radio Frequency Radiation.
The radiated output power of this device is far below the FCC radio frequency
exposure limits.
Nevertheless, the device shall be used in such a manner that the potential for
human contact during normal operation is minimized.
In order to avoid the possibility of exceeding the FCC radio frequency exposure limits,
human proximity to the antenna shall not be less than 20cm (8 inches) during normal
operation.
Federal Communications Commission Notice
This equipment has been tested and found to comply with the limits for a Class B
digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection
against harmful interference in a residential installation.
This transmitter must not be co-located or operating in conjunction with any other antenna 
or transmitter.
F5D7631-4_Manual Page 59 of 61
This equipment generates, uses, and can radiate radio frequency energy. If this
equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user
is encouraged
to try and correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the distance between the equipment and the receiver.
• Connect the equipment to an outlet on a circuit different from that to which the
receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Modifications
The FCC requires the user to be notified that any changes or modifications to this
device that are not expressly approved by Belkin Corporation may void the user¡¦s
authority to operate the equipment.
Canada-Industry Canada (IC)
The wireless radio of this device complies with RSS 139 & RSS 210 Industry
Canada. This Class B
digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B conforme á la norme NMB-003 du
Canada.
Europe-European Union Notice
Radio products with the CE 0682 or CE alert marking comply
with the R&TTE Directive (1995/5/EC) issued by the Commission of the
European Community.
Compliance with this directive implies conformity to the following European
Norms (in brackets
are the equivalent international standards).
• EN 60950 (IEC60950) – Product Safety
• EN 300 328 Technical requirement for radio equipment
• ETS 300 826 General EMC requirements for radio equipment.
To determine the type of transmitter, check the identification label on your Belkin
product.
Products with the CE marking comply with the EMC Directive (89/336/EEC) and
the Low Voltage
Directive (72/23/EEC) issued by the Commission of the European Community.
Compliance with
these directives implies conformity to the following European Norms (in brackets
are the
equivalent international standards).
• EN 55022 (CISPR 22) – Electromagnetic Interference
The availability of some specific channels and/or operational frequency bands are country 
dependent and are firmware programmed at the factory to match the intended destination. 
The firmware setting is not accessible by the end user.
F5D7631-4_Manual Page 60 of 61
• EN 55024 (IEC61000-4-2,3,4,5,6,8,11) – Electromagnetic Immunity
• EN 61000-3-2 (IEC610000-3-2) – Power Line Harmonics
• EN 61000-3-3 (IEC610000) – Power Line Flicker
• EN 60950 (IEC60950) – Product Safety
Products that contain the radio transmitter are labeled with CE 0682 or CE alert
marking and may
also carry the CE logo.
------------------------------------------------------------------------------------------------------------
Wi-Fi Certified Document
------------------------------------------------------------------------------------------------------------
Belkin Corporation Limited Lifetime Product Warranty
Belkin Corporation warrants this product against defects in materials and
workmanship for its lifetime. If a defect is discovered, Belkin will, at its option,
repair or replace the product at no charge provided it is returned during the
warranty period, with transportation charges prepaid, to the authorized Belkin
dealer from whom you purchased the product. Proof of purchase may be
required.
This warranty does not apply if the product has been damaged by accident,
abuse, misuse, or misapplication; if the product has been modified without the
written permission of Belkin; or if any Belkin serial number has been removed or
defaced.
THE WARRANTY AND REMEDIES SET FORTH ABOVE ARE EXCLUSIVE IN
LIEU OF ALL OTHERS, WHETHER ORAL OR WRITTEN, EXPRESSED OR
IMPLIED. BELKIN SPECIFICALLY DISCLAIMS ANY AND ALL IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
No Belkin dealer, agent, or employee is authorized to make any modification,
extension, or addition to this warranty.
BELKIN IS NOT RESPONSIBLE FOR SPECIAL, INCIDENTAL, OR
CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OF
WARRANTY, OR UNDER ANY OTHER LEGAL THEORY, INCLUDING BUT
NOT LIMITED TO, LOST PROFITS, DOWNTIME, GOODWILL, DAMAGE TO
OR REPROGRAMMING OR REPRODUCING ANY PROGRAM OR DATA
STORED IN, OR USED WITH, BELKIN PRODUCTS.
Some states do not allow the exclusion or limitation of incidental or consequential
damages or exclusions of implied warranties, so the above limitations or
exclusions may not apply to you. This warranty gives you specific legal rights,
and you may also have other rights that vary from state to state.
------------------------------------------------------------------------------------------------------------
F5D7631-4_Manual Page 61 of 61
[Back cover]
BELKIN
ADSL2+ Modem with Wireless G Router
Belkin Tech Support
USA: 877.736.5771
310.898.1100 ext. 2263
Europe: 00 800 223 55 460
Australia: 1800 235 546
New Zealand: 0800 235 546
Singapore: 800 616 1790
© 2004 Belkin Corporation. All rights reserved. All trade names are registered
trademarks of respective manufacturers listed. Apple, AirPort, Mac, Mac OS, and
AppleTalk are trademarks of Apple Computer, Inc., registered in the U.S. and
other countries.
P74730uk

Navigation menu