Belkin F5D7634V2 G Wireless Modem Router User Manual Manual 1 Part 1
Belkin International, Inc. G Wireless Modem Router Manual 1 Part 1
Belkin >
Contents
- 1. Manual 1 Part 1
- 2. Manual 1 Part 2
- 3. Manual 2 Part 1
- 4. Manual 2 Part 2
Manual 1 Part 1
G Wireless Modem Router User Manual PM01218ea-B F5D7634-4 v2 English Français Deutsch Nederl ands Español Italiano Table of Contents Table of Contents sections 1 Introduction���������������������������������������������������������������������������������������� 1 10 ��������������������������������������������������������������������������������������������������������������� 34 Wireless Range Extension and Bridging���������������������������������������������� 40 Firewall �������������������������������������������������������������������������������������������������� 42 Utilities �������������������������������������������������������������������������������������������������� 48 Product Features������������������������������������������������������������������������������������ 2 Benefits of a Home Network������������������������������������������������������������������ 4 Advantages of a Belkin Wireless Network �������������������������������������������� 4 6 Manually Configuring Network Adapters������������������������������������ 57 2 Make Sure You Have the Following������������������������������������������������ 5 Package Contents ���������������������������������������������������������������������������������� 5 System Requirements ���������������������������������������������������������������������������� 5 Setup Assistant Software System Requirements���������������������������������� 5 Internet Connection Settings������������������������������������������������������������������ 6 7 Recommended Web Browser Settings���������������������������������������� 62 8 Troubleshooting ������������������������������������������������������������������������������ 64 3 Knowing your Router������������������������������������������������������������������������ 7 Technical-Support Information������������������������������������������������������������ 76 9 Appendixes �������������������������������������������������������������������������������������� 77 4 Connecting and Configuring your Router������������������������������������ 11 Step 1: Hardware Connections ������������������������������������������������������������ 11 Step 1.1: Brand-New Setup�������������������������������������������������������������� 12 Step 1.2: Replacing an Existing Modem or Modem Router������������ 13 Step 2: Set Up the Router – Run the Setup Assistant Software�������� 14 Appendix A: Glossary �������������������������������������������������������������������������� 77 Appendix B: Important Factors for Placement and Setup������������������ 83 5 Manually Configuring your Router������������������������������������������������ 22 10 Information��������������������������������������������������������������������������������������86 Understanding the Web-Based User Interface ���������������������������������� 22 Changing LAN Settings������������������������������������������������������������������������ 25 DHCP Client List������������������������������������������������������������������������������������ 27 Internet WAN����������������������������������������������������������������������������������������� 27 Connection Type ���������������������������������������������������������������������������������� 27 Wireless ��������������������������������������������������������������� 32Encryption/Security G Wireless Modem Router Introduction Table of Contents sections 10 Thank you for purchasing the Belkin G Wireless Modem Router (the Router). In minutes you will be able to share your Internet connection and network your computers with your new Router. The following is a list of features that make your Router an ideal solution for your home or small office network. Please be sure to read through this User Manual completely, and pay special attention to Appendix B entitled “Important Factors for Placement and Setup”. G Wireless Modem Router Introduction Table of Contents sections 10 Product Features Compatibility with both PCs and Mac® Computers Integrated 10/100 4-Port Switch The Router supports a variety of networking environments including Mac OS® 8.x, 9.x, X v10.x, AppleTalk® , Linux® , Windows® 95, 98SE, Me, NT® , 2000, XP, Vista® , and others. You need an Internet browser and a network adapter that supports TCP/IP (the standard language of the Internet). The Router has a built-in, 4-port network switch to allow your wired computers to share printers, data and MP3 files, digital photos, and much more. The switch features automatic detection so it will adjust to the speed of connected devices. The switch will transfer data between computers and the Internet simultaneously without interrupting or consuming resources. Front-Panel LED Display Integrated 802.11g Wireless Access Point Lighted LEDs on the front of the Router indicate which functions are in operation. You’ll know at-a-glance whether your Router is connected to the Internet. This feature eliminates the need for advanced software and status-monitoring procedures. 802.11g is an exciting new wireless technology that achieves data rates up to 54Mbps, nearly five times faster than 802.11b. Built-In Dynamic Host Configuration Protocol (DHCP) Web-Based Advanced User Interface Built-In Dynamic Host Configuration Protocol (DHCP) on-board makes for the easiest possible connection of a network. The DHCP server will assign IP addresses to each computer automatically so there is no need for a complicated networking setup. You can set up the Router’s advanced functions easily through your web browser, without having to install additional software onto the computer. There are no disks to install or keep track of and, best of all, you can make changes and perform setup functions from any computer on the network quickly and easily. G Wireless Modem Router Introduction Table of Contents sections 10 NAT IP Address Sharing Universal Plug-and-Play (UPnP) Compatibility Your Router employs Network Address Translation (NAT) to share the single IP address assigned to you by your Internet Service Provider while saving the cost of adding additional IP addresses to your Internet service account. UPnP (Universal Plug-and-Play) is a technology that offers seamless operation of voice messaging, video messaging, games, and other applications that are UPnP-compliant. Support for VPN Pass-Through SPI Firewall If you connect to your office network from home using a VPN connection, your Router will allow your VPN-equipped computer to pass through the Router and to your office network. Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including IP Spoofing, Land Attack, Ping of Death (PoD), Denial of Service (DoS), IP with zero length, Smurf Attack, TCP Null Scan, SYN flood, UDP flooding, Tear Drop Attack, ICMP defect, RIP defect, and fragment flooding. MAC Address Filtering For added security, you can set up a list of MAC addresses (unique client identifiers) that are allowed access to your network. Every computer has its own MAC address. Simply enter these MAC addresses into a list using the web-based user interface and you can control access to your network. G Wireless Modem Router Introduction Table of Contents sections 10 Benefits of a Home Network Advantages of a Wireless Network By following our simple setup instructions, you will be able to use your Belkin home network to: Mobility – you’ll no longer need a dedicated “computer room”—now you can work on a networked laptop or desktop computer anywhere within your wireless range • Share one high-speed Internet connection with all the computers in your home • Share resources, such as files, and hard drives among all the connected computers in your home • Share a single printer with the entire family • Share documents, music, video, and digital pictures • Store, retrieve, and copy files from one computer to another • Simultaneously play games online, check Internet email, and chat G Wireless Modem Router Easy installation – Belkin’s Setup Wizard makes setup simple Flexibility – set up and access printers, computers, and other networking devices from anywhere in your home Easy expansion – the wide range of Belkin networking products let you expand your network to include devices such as printers and gaming consoles No cabling required – you can spare the expense and hassle of retrofitting Ethernet cabling throughout the home or office Widespread industry acceptance – choose from a wide range of interoperable networking products Make Sure You Have the Following Table of Contents sections 10 Package Contents System Requirements • G Wireless Modem Router • • Quick Installation Guide An active ADSL service with a telephone wall jack for connecting the Router • RJ11 Telephone Cord – Gray • • RJ45 Ethernet Networking Cable – Yellow At least one computer with a Network Interface Card (NIC) and Internet browser installed and correctly configured • ADSL Micro Filter* • • Power Adapter TCP/IP networking protocol installed on each computer connected to the Router • User Manual and Belkin Setup Assistant Software on CD-ROM • No other DHCP server on your local network assigning IP addresses to computers and devices *ADSL micro filter varies by country. If it’s not included, you will need to purchase one. Setup Assistant Software System Requirements G Wireless Modem Router • A PC running Windows ® 2000, XP, or Vista®; or Mac OS® X v10.4, v10.5 • Minimum 500MHz processor and 128MB RAM • Internet browser Make Sure You Have the Following Table of Contents sections 10 Internet Connection Settings The Setup Assistant contains a database of Internet Service Providers (ISPs) in each country to help you set up your Router quickly. If your ISP is not on the list, please collect the following information from your ISP before setting up the Router: • Internet connection protocol: (PPPoE, PPPoA, Dynamic IP, Static IP) • Multiplexing method or Encapsulation: (LLC or VC MUX) • Virtual circuit: VPI (Virtual Path Identifier) __________ (a number between 0 and 255) • VCI (Virtual Channel Identifier) __________ (a number between 1 and 65535) • For PPPoE and PPPoA users: ADSL account user name and password _______________ • For static IP users: IP Address ___ . ___ . ___ . ___ Subnet Mask ___ . ___ . ___ . ___ Default Gateway Server ___ . ___ . ___ . • IP address for Domain Name Server ___ . ___ . ___ . ___ (If given by your ISP) G Wireless Modem Router Knowing your Router Table of Contents sections Knowing your Router The Router has been designed to be placed on a desktop. All of the cables exit from the rear of the Router for better organization and utility. The Network Status Display is easily visible on the FRONT of the Router to provide you with information about network activity and status. See the Network Status Display Guide for more detailed information. (A) (K) (B) (C) (D) (E) (F) G Wireless Modem Router 10 Knowing your Router Table of Contents sections A. Security 10 C. Wired-Computer Status OFF Wireless security is OFF OFF Wired computer is not present Solid Green Wireless security is ON Solid Green Wired computer is connected to the Router Flashing Green WPS sync is in progress Blinking Amber Problem with wired computer connecting to the Router B. Wireless-Computer Status D. Router/Power Status OFF Wireless computer is not present Solid Green Wireless computer is connected to the Router Blinking Amber Problem with wireless computer connecting properly to the Router G Wireless Modem Router When you apply power to the Router or restart it, a short period of time elapses while the Router boots up. During this time, the “router” icon blinks. When the Router has completely booted up, the “router” icon becomes a solid light, indicating the Router is ready for use. OFF Router is off Blinking Green Router is booting up Solid Green Router is on and ready Knowing your Router Table of Contents E. ADSL Line Status sections This icon lights in green to indicate that your modem is connected properly to the Router. It turns amber when problem is detected. OFF Router is NOT connected to a functioning ADSL line Blinking Green Router is attempting to connect to the ADSL line Solid Green Router is connected to an ADSL service and is functioning properly Blinking Amber Problem with ADSL line G Wireless Modem Router 10 F. Internet Status This unique icon shows you when the Router is connected to the Internet. When the light is off, the Router is NOT connected to the Internet. When the light is blinking amber, the Router is attempting to connect to the Internet. When the light is solid green, the Router is connected to the Internet. When using the “Disconnect after x minutes” feature, this icon becomes extremely useful in monitoring the status of your Router’s connection. OFF Router is NOT connected to the Internet Blinking Green Router is attempting to connect to the Internet Solid Green Router is connected to the Internet Knowing your Router Table of Contents sections G. Connection to ADSL – Gray This port is for connection to your ADSL. Connect your ADSL to this port. An RJ11 telephone cord is provided in the package. J. Power Jack – Black Connect the included 12V/. 1A DC power supply to this jack. H. Connections to Wired Computers – Yellow K. WPS Push Button Connect your wired (non-wireless) computers to these ports. These ports are RJ45, 10/100 auto-negotiation, auto-uplinking ports for standard UTP category 5 or 6 Ethernet cable. The ports are labeled 1 through 4, with onboard LEDs on the connectors. WPS This button is for the Wi-Fi Protected Setup feature. Refer to the “Changing the Wireless Security Settings” section for more details. I. Reset Button The “Reset” button is used in rare cases when the Router may function improperly. Resetting the Router will restore the Router’s normal operation while maintaining the programmed settings. You can also restore the factory default settings by using the “Reset” button. Use the restore option in instances where you may have forgotten your custom password. (J) (I) i. Resetting the Router (H) Push and release the “Reset” button. The lights on the Router will momentarily flash. The “Router” light will begin to blink. When the “Router” light becomes solid again, the reset is complete. (G) ii. Restoring the Factory Defaults Press and hold the “Reset” button for at least 10 seconds, then release it. The lights on the Router will momentarily flash. The “Router” light will begin to blink. When the “Router” light becomes solid again, the restore is complete. G Wireless Modem Router 10 10 Connecting and Configuring your Router Table of Contents sections 10 Setup Assistant Belkin has provided Setup Assistant software to make installing your Router a simple and easy task. You can use it to get your Router up and running in minutes. The Setup Assistant requires that your Windows 2000, XP, or Vista computer be connected directly to your ADSL and that the Internet connection is active and working at the time of installation. If it is not, you must use the “Alternate Setup Method” section of this User Manual to configure your Router. Additionally, if you are using an operating system other than Windows 2000, XP, or Vista, or Mac OS X, you must use the “Alternate Setup Method” section of this User Manual. Step 1: Hardware Connections New Router Setup Follow these steps if you are NOT replacing an existing modem. If you are replacing an existing modem, skip to the next section, “Replacing an Existing Modem or Modem Router”. Unpack your new Router from the box and place it next to your computer. Raise the Router’s antenna. G Wireless Modem Router 11 Connecting and Configuring your Router Table of Contents sections 10 1.1 Brand-New Setup Follow these steps if you are not replacing an existing modem. If you are replacing an existing modem, skip to the next section, “Replacing an Existing Modem or Modem Router”. 1. Retrieve the yellow RJ45 cable that was included with your Router. First, connect one end to any yellow port labeled “to Wired Computers” on the back of your Router. Then, connect the other end to the networking port on the back of your computer. G Wireless Modem Router 2. 3. Retrieve the included gray RJ11 phone cord. Connect one end to the gray port labeled “to ADSL” on the back of your Router. Then, connect the other end to your ADSL connection (either a wall jack or an ADSL splitter). Note: Some ADSL connections require a micro filter. Your ADSL provider can tell you if you need one. Belkin includes a micro filter in regions known to use them. You may or may not have received one in your box. 12 Plug your Router’s power supply into the black port labeled “Power” on the back of your Router. 4. Wait 20 seconds for the Router to start up. Look at the display on the front of the Router. Make sure the “Power” and “LAN (1-4)” LEDs are lit up in green. Connecting and Configuring your Router Table of Contents sections 1.2 Replacing an Existing Modem or Modem Router Unpack your new Router from the box and place it next to your computer. Raise the Router’s antennas. G Wireless Modem Router 10 Follow these steps if you currently have a modem or a modem router that you will be replacing with your new Router. 1. ADSL LAN 2. Locate the cable that connects your old modem to your computer. Unplug that cable from your old modem and plug it into any yellow port labeled “to Wired Computers” on the back of your new Router. 3. Locate the cable that connects your old modem to the ADSL wall jack. Unplug it from your old modem and then connect it to the gray port labeled “to ADSL” on the back of your Router. 13 4. Plug your Router’s power supply into the black port labeled “Power” on the back of your Router. 5. Wait 20 seconds for the Router to start up. Look at the display on the front of the Router. Make sure the “Power” and “LAN (1-4)” LEDs are lit up in green. Connecting and Configuring your Router Table of Contents sections 10 Step 2: Set Up the Router – Run the Setup Assistant Software 1. Shut down any programs that are running on your computer at this time. Turn off any firewall or Internet-connection-sharing software on your computer. 3. Insert the CD into your computer. The Setup Assistant will automatically appear on your computer’s screen within 15 seconds. Click on “Go” to run the Setup Assistant. Follow the instructions there. IMPORTANT: Run the Setup Assistant from the computer that is directly connected to the Router from 1.1 Step 1. Note for Windows Users: If the Setup Assistant does not start up automatically, select your CD-ROM drive from “My Computer” and double-click on the file named “SetupAssistant” to start the Setup Assistant. G Wireless Modem Router 14 Connecting and Configuring your Router Table of Contents sections 10 2.1 Select Country 2.2 Confirmation Screen Select your country from the drop-down box. Click “Begin” to continue. Verify that you have completed all QIG steps by checking the box to the right of the arrow. Click “Next” to continue. Note to US model owner: To comply with US FCC regulation, the country selection function has been completely removed from all US models. The above function is for non-US models only. G Wireless Modem Router 15 Connecting and Configuring your Router Table of Contents sections 10 2.3 Progress Screen 2.4 Checking Settings Setup Assistant will show you a progress screen each time a step in the setup has been completed. The Setup Assistant will now examine your computer’s network settings and gather information needed to complete the Router’s connection to the Internet. G Wireless Modem Router 16 Connecting and Configuring your Router Table of Contents sections 10 2.5 Verifying Hardware Connections 2.6 Naming your Wireless Network The Setup Assistant will now verify your hardware connection. The Setup Assistant will display the default wireless network name or Service Set Identifier (SSID). This is the name of your wireless network to which your computers or devices with wireless network adapters will connect. You can either use the default or change it to something unique. Write down this name for future reference. Click “Next” to continue. G Wireless Modem Router 17 Connecting and Configuring your Router Table of Contents sections 10 2.7 Requesting Internet Account Info (if needed) 2.8 Configuring the Router If your Internet account requires a login and password, you will be prompted with a screen similar to the illustration below. Select your country or ISP from the drop-down boxes. The Setup Assistant will now configure your Router by sending data to the Router and restarting it. Wait for the on-screen instructions. G Wireless Modem Router Note: Do not disconnect any cable or power off the Router while the Router is rebooting. Doing so will render your Router inoperable. 18 Connecting and Configuring your Router Table of Contents sections 2.9 Checking Internet Connection We are almost done. The Setup Assistant will now check your connection to the Internet. G Wireless Modem Router 19 10 Connecting and Configuring your Router Table of Contents sections 10 Congratulations Troubleshooting You have finished installing your new Belkin Router. You will see the Congratulations screen when your Router can connect to the Internet. You can begin surfing by opening your browser and going to any website. If the Setup Assistant is not able to connect to the Internet, you will see the following screen. Follow the on-screen instructions to go through the troubleshooting steps. You can use the Setup Assistant to set up your other wired and wireless computers to connect to the Internet by clicking “Next”. If you decide to add computers to your Router later, select “Exit the Assistant” and then click “Next”. G Wireless Modem Router 20 Connecting and Configuring your Router Table of Contents sections 10 2.10 Optional: Assistance Connecting Other Computers Once you have verified that your other wired and wireless computers are properly connected, your network is set up and working. You can now surf the Internet. Click “Next” to take you back to the main menu. This optional step will help you to connect additional wired and wireless computers to your network. Follow the on-screen instructions. G Wireless Modem Router 21 Manually Configuring your Router Table of Contents sections 10 Understanding the Web-Based User Interface The home page shows you a quick view of the Router’s status and settings. All advanced setup pages can be reached from this page. (2) (3) (4) Using Web-Based Manager Once your host PC is properly configured, start your web browser and type the private IP address of the Router into the URL field: “192.168.2.1” and then click “Enter”. (5) (10) (1) (6) (9) (7) (8) G Wireless Modem Router 22 Manually Configuring your Router Table of Contents 1. sections Quick-Navigation Links Home Button 5. 10 Internet Status Indicator This indicator is visible in all pages of the Router, showing the connection status of the Router. When the indicator says “connection OK” in GREEN, the Router is connected to the Internet. When the Router is not connected to the Internet, the indicator will read “no connection” in RED. The indicator is automatically updated when you make changes to the settings of the Router. Help Button The “Help” button gives you access to the Router’s help pages. Help is also available on many pages by clicking “more info” next to certain sections of each page. G Wireless Modem Router This button enables you to log in and out of the Router with the press of one button. When you are logged into the Router, this button will change to read “Logout”. Logging into the Router will take you to a separate login page where you will need to enter a password. When you are logged into the Router, you can make changes to the settings. When you are finished making changes, you can log out of the Router by clicking the “Logout” button. For more information about logging into the Router, see the section called “Logging into the Router”. The “Home” button is available in every page of the UI. Pressing this button will take you back to the home page. 3. 4. Login/Logout Button You can go directly to any of the Router’s UI pages by clicking directly on these links. The links are divided into logical categories and grouped by tabs to make finding a particular setting easier to find. Clicking on the header of each tab will show you a short description of the tab’s function. 2. 23 Manually Configuring your Router Table of Contents sections 10 6. LAN Settings 9. Version Info Shows you the settings of the Local Area Network (LAN) side of the Router. Changes can be made to the settings by clicking the “LAN” “Quick Navigation” link on the left side of the screen. Shows the firmware version, boot-code version, hardware version, and serial number of the Router. 10. Page Name 7. Features The page you are on can be identified by this name. This manual will sometimes refer to pages by name. For instance, “LAN > LAN Settings” refers to the “LAN Settings” page. Shows the status of the Router’s NAT, firewall, and wireless features. Changes can be made to the settings by clicking on any one of the links or by clicking the “Quick Navigation” links on the left side of the screen. 8. Internet Settings Shows the settings of the Internet/WAN side of the Router that connects to the Internet. Changes to any of these settings can be made by clicking on the “Internet/WAN” “Quick Navigation” link on the left side of the screen. G Wireless Modem Router 24 Manually Configuring your Router Table of Contents sections Changing LAN Settings All settings for the internal LAN setup of the Router can be viewed and changed here. LAN Settings Clicking on the header of the LAN tab (A) will take you to the LAN tab’s header page. A quick description of the functions can be found here. To view the settings or make changes to any of the LAN settings, click on “LAN Settings” (B) or to view the list of connected computers, click on “DHCP Client List” (C). G Wireless Modem Router (B) (A) (C) 25 10 Manually Configuring your Router Table of Contents sections 10 IP Address IP Pool The “IP address” is the internal IP address of the Router. The default IP address is “192.168.2.1”. To access the advanced setup interface, type this IP address into the address bar of your browser. This address can be changed if needed. To change the IP address, type in the new IP address and click “Apply Changes”. The IP address you choose should be a non-routable IP. Examples of a non-routable IP are: The range of IP addresses set aside for dynamic assignment to the computers on your network. If you want to change this number, you can do so by entering a new starting and ending IP address and clicking on “Apply Changes”. The starting IP address must be lower in number than the ending IP address. 192.168.x.x (where x is anything between 0 and 255) 10.x.x.x (where x is anything between 0 and 255) Lease Time The length of time the DHCP server will reserve the IP address for each computer. We recommend that you leave the lease time set to “Forever”. The default setting is “Forever”, meaning that any time a computer is assigned an IP address by the DHCP server, the IP address will not change for that particular computer. Setting lease times for shorter intervals such as one day or one hour frees IP addresses after the specified period of time. This also means that a particular computer’s IP address may change over time. If you have set any of the other advanced features of the Router such as DMZ or client IP filters, these are dependent on the IP address. For this reason, you will not want the IP address to change. Subnet Mask There is no need to change the subnet mask. This is a unique, advanced feature of your Belkin Router. DHCP Server The DHCP server function makes setting up a network very easy by assigning IP addresses to each computer on the network automatically. The default setting is “On”. The DHCP server can be turned OFF if necessary; however, in order to do so, you must manually set a static IP address for each computer on your network. To turn off the DHCP server, select “Off” and click “Apply Changes”. G Wireless Modem Router Local Domain Name You can set a local domain name (network name) for your network. There is no need to change this setting unless you have a specific advanced need to do so. You can name the network anything you want such as “MY NETWORK”. 26 Manually Configuring your Router Table of Contents sections 10 DHCP Client List You can view a list of the computers, which are connected to your network. You are able to view the IP address of the computer, the host name (name of the computer in your network), and the MAC address of the computer’s network interface card (NIC). Pressing the “Refresh” button will update the list. If there have been any changes, the list will be updated. Internet WAN The “Internet WAN” tab is where you will set up your Router to connect to your Internet Service Provider (ISP). The Router is capable of connecting to virtually any ADSL service provider’s system provided you have correctly configured the Router’s settings for your ISP’s connection type. Your connection settings are provided to you by your ISP. To configure the Router with the settings that your ISP gave you, click “Connection Type” (1) on the left side of the screen. Select the connection type you use. If your ISP gave you DNS settings, clicking “DNS” (2) allows you to enter DNS address entries for ISPs that require specific settings. When you have finished making settings, the “Internet Status” indicator will read “Connected” if your Router is set up properly. Connection Type Note: If you are not sure which connection type to select, please contact your ISP. From the “Connection Type” page, you can select one of these five connection types based on the instructions provided by your ISP: PPPoE Select the type of connection you use by clicking the radio button next to your connection type and then clicking “Next”. PPPoA Dynamic IP (1483 Bridged) Static IP (IPoA) Modem Only (Disable Internet Sharing) G Wireless Modem Router 27 Manually Configuring your Router Table of Contents sections 10 Setting your ISP Connection Type to PPPoE or PPPoA PPPoE (Point-to-Point Protocol over Ethernet) is the standard method of connecting networked devices. It requires a user name and password to access the network of your ISP for connecting to the Internet. PPPoA (PPP over A™ ) is similar to PPPoE, but is mostly implemented in the UK. Select PPPoE or PPPoA and click “Next”. Then, enter the information provided by your ISP, and click “Apply Changes” to activate your settings. 1. User Name – Enter the user name. (Assigned by your ISP). 2. Password – Enter your password. (Assigned by your ISP). 3. Retype Password – Confirm the password. (Assigned by your ISP). 6. Encapsulation – Select your encapsulation type (supplied by your ISP) to specify how to handle multiple protocols at the A™ transport layer. VC-MUX: PPPoA Virtual Circuit Multiplexer (null encapsulation) allows only one protocol running per virtual circuit with fewer overheads. LLC: PPPoA Logical Link Control allows multiple protocols running over one virtual circuit (more overhead). 7. Dial on Demand – By selecting “Dial on Demand”, your Router will automatically connect to the Internet when a user opens up a web browser. 4. IP Assigned by ISP – Leave “Yes” if your ISP automatically assigns an IP address. If your ISP assigned a fixed IP address, select “No” and enter assigned values. 8. Idle Time (Minutes) – Enter the maximum idle time for the Internet connection. After this time has been exceeded, the connection will be terminated. 5. VPI/VCI – Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI) parameter here. (Assigned by your ISP). 9. MTU – The MTU setting should never be changed unless your ISP requires a specific MTU setting. Making changes to the MTU can cause problems with your Internet connection, including disconnection from the Internet, slow Internet access, and problems with Internet applications working properly. G Wireless Modem Router 28 Manually Configuring your Router Table of Contents sections 10 Setting your Connection Type to Dynamic IP (1483 Bridged) Setting your ISP Connection Type to Static IP (IPoA) This connection method bridges your network and ISP’s network together. The Router will obtain an IP address automatically from your ISP’s DHCP server. This connection type is also called “Classical IP over A™ ” or “CLIP”, which your ISP provides a fixed IP for your Router to connect to the Internet. 1. IP Assigned by ISP – Leave “Yes” if your ISP automatically assigns an IP address. If your ISP assigned a fixed IP address, select “No” and enter assigned values. 1. IP Address – Enter an IP address assigned by your ISP for the Router WAN interface. 2. Subnet Mask – Enter a subnet mask assigned by your ISP. 2. VPI/VCI – Enter your VPI and VCI parameter here. These identifiers are assigned by your ISP. 3. Default Gateway – Enter a default gateway IP address. If the Router cannot find the destination address within its local network, it will forward the packets to the default gateway assigned by your ISP. 3. Encapsulation – Select LLC or VC MUX your ISP uses. 4. VPI/VCI – Enter your VPI and VCI parameter here. These identifiers are assigned by your ISP. 5. Encapsulation – Select LLC or VC MUX (assigned by your ISP). G Wireless Modem Router 29 Manually Configuring your Router Table of Contents sections Setting your Connection Type to Modem Only (Disable Internet Sharing) 10 DNS (Domain Name Server) Settings A “Domain Name Server” is a server located on the Internet that translates Universal Resource Links (URLs) like “www.belkin.com” to IP addresses. Many ISPs do not require you to enter this information into the Router. The “Automatic from ISP” box (1) should be checked if your ISP did not give you a specific DNS address. If you are using a static IP connection type, then you may need to enter a specific DNS address and secondary DNS address for your connection to work properly. If your connection type is dynamic or PPPoE, it is likely that you do not have to enter a DNS address. In this mode, the Router simply acts as a bridge passing packets across the DSL port. It requires additional software to be installed on your computers in order to access the Internet. 1. VPI/VCI – Enter your VPI and VCI parameter here. (Assigned by your ISP). 2. Encapsulation – Select LLC or VC MUX. (Assigned by your ISP). Leave the “Automatic from ISP” box checked. To enter the DNS address settings, uncheck the “Automatic from ISP” box and enter your DNS entries in the spaces provided. Click “Apply Changes” (2) to save the settings. (1) (2) G Wireless Modem Router 30 Manually Configuring your Router Table of Contents sections 10 Using DDNS (Dynamic DNS) Setting up the Router’s Dynamic DNS Update Client The DDNS service allows you to alias a dynamic IP address to a static host name in any of the many domains DynDNS.org offers, allowing your network computers to be more easily accessed from various locations on the Internet. DynDNS.org provides this service, for up to five host names, free to the Internet community. TZO.com is another alternative to DynDNS.org. DDNS service is ideal for a home website, file server, or to make it easy to access your home PC and stored files while you’re at work. Using the service can ensure that your host name always points to your IP address, no matter how often your ISP changes it. When your IP address changes, your friends and associates can always locate you by visiting yourname.dyndns.org instead! To register free for your Dynamic DNS host name, please visit http://www.dyndns.org. You must register with DynDNS.org’s free update service before using this feature. Once you have your registration, follow the directions below. 1. Enter your DynDNS.org user name in the “Account / E-mail” field (1). 2. Enter your DynDNS.org password in the “Password / Key” field (2). 3. Enter the DynDNS.org domain name you set up with DynDNS.org in the “Domain Name” field (3). 4. Click “Apply Changes” to update your IP address. Whenever your IP address assigned by your ISP changes, the Router will automatically update DynDNS.org’s servers with your new IP address. You can also do this manually by clicking the “Apply Changes” button (4). (1) (2) (3) (4) G Wireless Modem Router 31 Manually Configuring your Router Table of Contents sections 10 Wireless The “Wireless” tab lets you make changes to the wireless network settings. From this tab, you can make changes to the wireless network name (SSID), operating channel, and encryption security settings. Channel and SSID 1. Changing the Wireless Network Name (SSID) 2. To identify your wireless network, a name called the SSID (Service Set Identifier) is used. You can change this to anything you want to or you can leave it unchanged. If there are other wireless networks operating in your area, you will want to make sure that your SSID is unique (does not match that of another wireless network in the area). To change the SSID, type in the SSID that you want to use in the SSID field and click “Apply Changes”. The change is immediate. If you make a change to the SSID, your wireless-equipped computers may also need to be reconfigured to connect to your new network name. Refer to the documentation of your wireless network adapter for information on making this change. G Wireless Modem Router Using the ESSID Broadcast Feature For security purposes, you can choose not to broadcast your network’s SSID. Doing so will keep your network name hidden from computers that are scanning for the presence of wireless networks. To turn off the broadcast of the SSID, select “DISABLE” and then click “Apply Changes”. The change is immediate. Each computer now needs to be set to connect to your specific SSID; an SSID of “ANY” will no longer be accepted. Refer to the documentation of your wireless network adapter for information on making this change. Note: This advanced feature should be employed by advanced users only. 32 Manually Configuring your Router Table of Contents 3. sections 4. Using the Wireless Mode Switch 10 Changing the Wireless Channel There are a number of operating channels from which to choose. In the United States, there are 11 channels. In the United Kingdom and most of Europe, there are 13 channels. In a small number of other countries, there are other channel requirements. Your Router is configured to operate on the proper channels in which the country you reside. The default is “Auto”. The channel can be changed if needed. If there are other wireless networks operating in your area, your network should be set to operate on a channel that is different than the other wireless networks. For best performance, use a channel that is at least five channels away from the other wireless network. For instance, if another network is operating on channel 11, then set your network to channel 6 or below. To change the channel, select the channel from the drop-down list. Click “Apply Changes”. The change is immediate. Your Router can operate in three different wireless modes: “Mixed (11b+11g)”, “11g Only”, and “11b Only”. The different modes are explained below. Mixed (11b+11g) Mode In this mode, the Router is compatible with 802.11b and 802.11g wireless clients simultaneously. This is the factory default mode and ensures successful operation with all devices compatible with Wi-Fi® . If you have a mix of 802.11b and 802.11g clients in your network, we recommend that you keep the default setting. This setting should only be changed if you have a specific reason to do so. 11g-Only Mode 802.11g-Only mode works with 802.11g clients only. This mode is recommended only if you want to prevent 802.11b clients from accessing your network. To switch modes, select the desired mode from the “Wireless Mode” drop-down box. Then, click “Apply Changes”. 11b-Only Mode We recommend you DO NOT use this mode unless you have a very specific reason to do so. This mode exists only to solve unique problems that may occur with some 802.11b client adapters and is NOT necessary for interoperability of 802.11g and 802.11b standards. G Wireless Modem Router 33 Manually Configuring your Router Table of Contents sections 10 Encryption/Security Securing your Wi-Fi Network Here are a few different ways you can maximize the security of your wireless network and protect your data from prying eyes and ears. This section is intended for the home, home-office, and small-office user. At the time of this User Manual’s publication, there are four encryption methods available. G Wireless Modem Router Name 64-Bit Wired Equivalent Privacy 128-Bit Wired Equivalent Privacy Wi-Fi Protected Access-TKIP Wi-Fi Protected Access 2 Acronym 64-bit WEP 128-bit WEP WPA-TKIP/AES (or just WPA) WPA2-AES (or just WPA2) Security Good Better Best Best Features Static keys Static keys Dynamic key encryption and mutual authentication Dynamic key encryption and mutual authentication Encryption keys based on RC4 algorithm (typically 40-bit keys) More secure than 64-bit WEP using a key length of 104 bits plus 24 additional bits of systemgenerated data TKIP (Temporal Key Integrity Protocol) added so that keys are rotated and encryption is strengthened AES (Advanced Encryption Standard) does not cause any throughput loss 34 Manually Configuring your Router Table of Contents sections 10 Wired Equivalent Privacy (WEP) WEP is a common protocol that adds security to all wireless products that are compliant with Wi-Fi. WEP was designed to give wireless networks the equivalent level of privacy protection as a comparable wired network. 64-Bit WEP Encryption Keys 64-bit WEP was first introduced with 64-bit encryption, which includes a key length of 40 bits plus 24 additional bits of system-generated data (64 bits total). Some hardware manufacturers refer to 64-bit as 40-bit encryption. Shortly after the technology was introduced, researchers found that 64-bit encryption was too easy to decode. After selecting either the “64-bit” or “128-bit WEP” encryption mode, it is critical that you generate an encryption key. If the encryption key is not consistent throughout the entire wireless network, your wireless networking devices will be unable to communicate with one another on your network and you will not be able to successfully communicate within your network. You can enter your key by typing in the hex key manually, or you can type in a passphrase in the “Passphrase” field and click “Generate” to create a key. A hex (hexadecimal) key is a mixture of numbers and letters from A–F and 0–9. For 64-bit WEP, you need to enter 10 hex keys. For 128-bit WEP, you need to enter 26 hex keys. 128-Bit WEP As a result of 64-bit WEP’s potential security weaknesses, a more secure method of 128-bit encryption was developed. 128-bit encryption includes a key length of 104 bits plus 24 additional bits of systemgenerated data (128 bits total). Some hardware manufacturers refer to 128-bit as 104-bit encryption. Most of the new wireless equipment in the market today supports both 64-bit and 128-bit WEP encryption, but you might have older equipment that only supports 64-bit WEP. All Belkin wireless products will support both 64-bit and 128-bit WEP. G Wireless Modem Router For instance: AF 0F 4B C3 D4 = 64-bit WEP key C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit WEP key The WEP passphrase is NOT the same as a WEP key. Your wireless card uses this passphrase to generate your WEP keys, but different hardware manufacturers might have different methods for generating the keys. If you have equipment from multiple vendors in your network, you can use the hex WEP key from your Router or access point and enter it manually into the hex WEP key table in your wireless card’s configuration screen. 35 Manually Configuring your Router Table of Contents sections 10 Wi-Fi Protected Access (WPA) WPA2 WPA is a new Wi-Fi standard that was designed to improve upon the security features of WEP. To use WPA security, the drivers and software of your wireless equipment must be upgraded to support WPA. These updates will be found on the wireless vendors’ websites. There are two types of WPA security: WPA-PSK (no server) and WPA (with 802.1x radius server). The Router features WPA2, which is the second generation of the WPA-based 802.11i standard. It offers a higher level of wireless security by combining advanced network authentication and stronger AES encryption methods. WPA2 Requirements WPA-PSK (no server) This method uses what is known as a “pre-shared key” as the network key. A network key is basically a password that is between eight and 63 characters long. It can be a combination of letters, numbers, or characters. Each client uses the same network key to access the network. Typically, this is the mode that will be used in a home environment. IMPORTANT: In order to use WPA2 security, all your computers and wireless client adapters must be upgraded with patches, drivers, and client utility software that support WPA2. At the time of this User Manual’s publication, a couple security patches are available, for free download, from Microsoft® . These patches work only with the Windows XP operating system. Other operating systems are not supported at this time. WPA (with 802.1x radius server) With this system, a radius server distributes the network key to the clients automatically. This is typically found in a business environment. G Wireless Modem Router 36 Manually Configuring your Router Table of Contents sections 10 Sharing the Same Network Keys For a Windows XP computer that does not have Service Pack 2 (SP2), a file from Microsoft called “Windows XP Support Patch for Wireless Protected Access (KB 826942)” is available for free download at http:// www.microsoft.com/downloads/details.aspx?displaylang=en&familyid=0 09D8425-CE2B-47A4-ABEC-274845DC9E91. Most Wi-Fi products ship with security turned off. So, once you have your network working, you need to activate WEP or WPA and make sure your wireless networking devices are sharing the same network key. For Windows XP computers with SP2, Microsoft has released a free download to update the wireless client components to support WPA2 (KB893357). The update can be downloaded from: http://www.microsoft. com/downloads/details.aspx?FamilyID=662bb74d-e7c1-48d6-95ee1459234f4483&DisplayLang=en. Using a Hexadecimal Key A hexadecimal key is a mixture of numbers and letters from A–F and 0–9. 64-bit keys are five 2-digit numbers. 128-bit keys are 13 2-digit numbers. For instance: IMPORTANT: You also need to ensure that all your wireless client cards and adapters support WPA2, and that you have downloaded and installed the latest driver. Most of the Belkin wireless cards have updated drivers available for download from the Belkin support site: www.belkin.com/networking. For a list of Belkin wireless products that support WPA/WPA2, please visit our website at www.belkin.com/networking. AF 0F 4B C3 D4 = 64-bit key C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key In the boxes below, make up your key by writing in two characters between A–F and 0–9 in each box. You will use this key to program the encryption settings on your Router and your wireless computers. Note to Mac users: Original Apple ® AirPort® products support 64-bit encryption only. Apple AirPort 2 products can support 64-bit or 128-bit encryption. Please check your product to see which version you are using. If you cannot configure your network with 128-bit encryption, try 64-bit encryption. G Wireless Modem Router 37 Manually Configuring your Router Table of Contents sections 10 WEP Setup Changing the Wireless Security Settings 1. Select “WEP” from the drop-down menu. 2. Select “WEP Mode” of 64-bit or 128-bit. 3. After selecting your WEP mode, you can enter your key by typing in the hex key manually. Your Router is equipped with WPA/WPA2, the latest wireless security standard. It also supports the legacy security standard, WEP. By default, wireless security is disabled. To enable security, you must first determine which standard you want to use. To access the security settings, click “Security” on the “Wireless” tab. A hex (hexadecimal) key is a mixture of numbers and letters from A–F and 0–9. For 64-bit WEP, you need to enter 10 hex keys. For 128-bit WEP, you need to enter 26 hex keys. For instance: AF 0F 4B C3 D4 = 64-bit key C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key 4. Click “Apply Changes” to finish. Encryption in the Router is now set. Each of your computers on your wireless network will now need to be configured with the same security settings. WARNING: If you are configuring the Wireless Router from a computer with a wireless client, you will need to ensure that security is turned ON for this wireless client. If this is not done, you will lose your wireless connection. G Wireless Modem Router 38 Manually Configuring your Router Table of Contents sections 10 WPA Setup Setting WPA/WPA2-PSK (no server) Note: To use WPA security, all your clients must be upgraded to drivers and software that support it. At the time of this User Manual’s publication, a security patch download is available free from Microsoft. This patch works only with the Windows XP operating system. You also need to download the latest driver for your Belkin Wireless G Desktop or Notebook Card from the Belkin support site. Other operating systems are not supported at this time. Microsoft’s patch only supports devices with WPA-enabled drivers such as Belkin 802.11g products. 1. From the “Allowed Client Type” drop-down menu, select “WPA/WPA2”. 2. For “Authentication”, select “Pre-shared Key” for typical home/ SOHO use. This setting will have to be identical on the clients that you set up. 3. Enter your pre-shared key. This can be from eight to 63 characters and can be letters, numbers, or symbols. This same key must be used on all of the clients that you set up. For example, your preshared key might be something like: “Smith family network key”. 4. Click “Apply Changes” to finish. You must now set all clients to match these settings. There are two types of WPA security: WPA-PSK (no server) and WPA (with radius server). WPA-PSK (no server) uses a so-called pre-shared key (PSK) as the security key. A pre-shared key is a password that is between eight and 63 characters long. It can be a combination of letters, numbers, and other characters. Each client uses the same key to access the network. Typically, this mode will be used in a home environment. WPA (with radius server) is a configuration wherein a radius server distributes the keys to the clients automatically. This is typically used in a business environment. WPA2 is the second generation of WPA, offering a more advanced encryption technique over WPA. G Wireless Modem Router 39 Manually Configuring your Router Table of Contents sections 10 Wireless Range Extension and Bridging What is a Wireless Bridge? PLEASE BE SURE TO FOLLOW THE STEPS BELOW CAREFULLY. A wireless bridge is actually an operation “mode” you can use to extend the range of your wireless network, or add an extension of your network in another area of your office or home without running cables. 1. Set your access point to the same channel as the Router. For more information on changing channels, see the “Wireless - Channel and SSID” section of this User Manual. 2. Find the access point’s MAC address on the bottom of the access point. There are two MAC addresses on the bottom label. You will need the MAC address named “WLAN MAC Address”. The MAC address starts with “0030BD” and is followed by six other numbers or letters (i.e., 0030BD-XXXXXX). Write the MAC address below. Go to the next step. 3. Place your secondary access point within range of your Router and near the area where you want to extend the range or add the network segment. Typically, indoor range should be between 100 and 200 feet. 4. Connect power to your access point. Make sure the access point is on and proceed to the next step. 5. From a computer already connected to your Router, access the Advanced Setup Utility by opening your browser. In the address bar, type in “192.168.2.1”. Do not type in “www” or “http://” before the number. Note: If you have changed your Router’s IP address, use that IP address. Note: We can make no guarantees that this feature will interoperate with hardware from other wireless manufacturers. Note: Please make sure to download the latest firmware version for the Router for optimal performance at: http://web.belkin.com/support. Adding Another Network Segment Wirelessly Connecting a network switch or hub to the Router’s RJ45 jack will allow a number of computers connected to the switch access to the rest of the network. Setting up a Bridge Between your Router and a Secondary Access Point Bridging your Belkin Router to a secondary access point requires that you access the Router’s Advanced Setup Utility and enter the MAC address of the access point in the appropriate area. There are also a few other requirements. G Wireless Modem Router 40 Manually Configuring your Router Table of Contents sections 6. You will see the Router’s user interface in the browser window. Click “Wireless Bridge” (2) on the left-hand side of the screen. You will see the following screen. 7. Check the box that says, “Enable ONLY specific Access Points to connect” (1). 8. In the field named “AP1” (3), type in the MAC address of your secondary access point. When you have typed in the address, click “Apply Changes”. (1) Bridging is now set up. (3) 9. (2) Note: It may take up to a minute for the bridged connection to properly establish itself. In some cases, it may be necessary to restart the access point and the Router to initiate the bridge. G Wireless Modem Router 41 10 Manually Configuring your Router Table of Contents sections 10 Firewall Virtual Servers Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: • IP Spoofing • Land Attack • Ping of Death (PoD) • Denial of Service (DoS) • IP with zero length • Smurf Attack • TCP Null Scan • SYN flood • UDP flooding • Tear Drop Attack • ICMP defect • RIP defect • Fragment flooding Virtual servers allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications, through your Router to your internal network. Since your internal computers are protected by a firewall, machines from the Internet cannot get to them because they cannot be “seen”. If you need to configure the virtual server function for a specific application, you will need to contact the application vendor to find out which port settings you need. You can manually input this port information into the Router. The firewall also masks common ports that are frequently used to attack networks. These ports appear to be “Stealth”, meaning that essentially they do not exist to a would-be hacker. You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled. G Wireless Modem Router 42 Manually Configuring your Router Table of Contents sections 10 Choosing an Application Manually Entering Settings into the Virtual Server Select your application from the drop-down list. Click “Add”. The settings will be transferred to the next available space in the screen. Click “Apply Changes” to save the setting for that application. To remove an application, select the number of the row that you want to remove, then click “Clear”. To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass, the port type (TCP or UDP), and click “Apply Changes”. Each inbound port entry has two fields with five characters maximum per field that allows a start and end port range (e.g., [xxxxx]-[xxxxx]). For each entry, you can enter a single port value by filling in the two fields with the same value (e.g., [7500]-[7500]) or a wide range of ports (e.g., [7500]-[9000]). If you need multiple single-port values or a mixture of ranges and a single value, you must use multiple entries up to the maximum of 20 entries (e.g., 1. [7500]-[7500], 2. [8023]-[8023], 3. [9000]-[9000]). You can only pass one port per internal IP address. Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. It is recommended that you disable the settings when you are not using a specific application. G Wireless Modem Router 43 Manually Configuring your Router Table of Contents sections 10 Client IP Filters Access Control The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers. Access control allows users to define the outgoing traffic permitted or denied access through the WAN interface. The default is to permit all outgoing traffic. To configure restrictive access to your computers, do the following: 1. Click “Add PC” on the “Access Control” screen. 2. Define the appropriate settings for client PC services (as shown on the following screen). 3. G Wireless Modem Router 44 Click “OK” and then click “Apply Changes” to save your settings. Manually Configuring your Router Table of Contents sections 10 URL Blocking Schedule Rule To configure the URL-blocking feature, specify the websites (www. somesite.com) and or keywords you want to filter on your network. Click “Apply Changes” to activate the change. To complete this configuration, you will need to create or modify an access rule in the “Client IP filters” section. To modify an existing rule, click the “Edit” option next to the rule you want to modify. To create a new rule, click on the “Add PC” option. From the “Access Control > Add PC” section, check the option for “WWW with URL Blocking” in the “Client PC Service” table to filter out the websites and keywords specified. You may filter Internet access for local clients based on rules. Each access control rule may be activated at a scheduled time. Define the schedule on the “Schedule Rule”, and apply the rule on the “Access Control” page. G Wireless Modem Router Follow these steps to add a schedule: 45 1. Click “Add Schedule Rule”. 2. You will see the following screen. 3. To configure the schedule rule, specify the name, comment, start time, and end time that you want to filter on your network. 4. Click “OK” and then “Apply Changes” to save your settings. 5. To complete this configuration, you will need to create or modify an access rule in the “Client IP filters” section. This activates the schedule for use in the “Access Control” page. Manually Configuring your Router Table of Contents sections 10 Setting MAC-Address Filtering The MAC-address filter is a powerful security feature that allows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client (computer) on your network to allow network access to each. The “Block” feature lets you turn on and off access to the network easily for any computer without having to add and remove the computer’s MAC address from the list. To enable this feature, select “Enable MAC Address Filtering” (1). Next, select the access rule as “Allow” or “Deny”. (1) (2) (3) Then, enter the MAC address of each computer on your network by selecting from the “DHCP Client List” drop-down box (2) and the ID to copy to (3) before clicking “Copy to”. As an alternative method, click in the space provided (4) and enter the MAC address of the computer you want to add to the list. Click “Apply Changes” to save the settings. (4) Note: You will not be able to delete the MAC address of the computer you are using to access the Router’s administrative functions (the computer you are using now). G Wireless Modem Router 46 Manually Configuring your Router Table of Contents sections 10 DMZ (Demilitarized Zone) Blocking an ICMP Ping If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted 2-way Internet access. This may be necessary if the NAT feature is causing problems with an application such as a game or videoconferencing application. Use this feature on a temporary basis. The computer in the DMZ is not protected from hacker attacks. Computer hackers use what is known as “pinging” to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens the level of security of your Router. To put a computer in the DMZ, enter the last digits of its IP address in the IP field and select “Enable”. Click “Apply Changes” for the change to take effect. If you are using multiple static WAN IP addresses, it is possible to select to which WAN IP address the DMZ host will be directed. Type in the WAN IP address to which you wish the DMZ host to direct, enter the last two digits of the IP address of the DMZ host computer, select “Enable”, and click “Apply Changes”. To turn off the ping response, select “Block ICMP Ping” (1) and click “Apply Changes”. The Router will not respond to an ICMP ping. G Wireless Modem Router 47 Manually Configuring your Router Table of Contents sections 10 Utilities The “Utilities” screen lets you manage different parameters of the Router and perform certain administrative functions. Restart Router Restore Factory Defaults At times it may be necessary to restart or reboot the Router if it begins working improperly. Restarting or rebooting the Router will NOT delete any of your configuration settings. Using this option will restore all of the settings in the Router to the factory (default) settings. It is recommended that you back up your settings before you restore all of the defaults. Restarting the Router to Restore Normal Operation 1. Click the “Restart Router” button. 2. The following message will appear. Click “OK” to restart your Router. G Wireless Modem Router 48 1. Click the “Restore Defaults” button. 2. The following message will appear. Click “OK” to restore factory defaults.
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Extract, Print high-res XMP Toolkit : 3.1-701 Instance ID : uuid:42e99f2e-6ce7-4efb-afc1-38d6c384e783 Document ID : adobe:docid:indd:9fa028b4-7841-11de-83b8-aba1c0c5a0ca Rendition Class : proof:pdf Derived From Instance ID : 20fdd546-7796-11de-83b8-aba1c0c5a0ca Derived From Document ID : adobe:docid:indd:eb983b70-6f0f-11dd-9806-9cf02ad35a2a Manifest Link Form : ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream Manifest Placed X Resolution : 300.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 504.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 96.00, 300.00, 300.00, 300.00, 300.00, 96.00, 96.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 72.00, 72.00, 300.00, 72.00, 72.00 Manifest Placed Y Resolution : 300.00, 300.00, 72.00, 72.00, 72.00, 72.00, 72.00, 72.00, 504.00, 72.00, 72.00, 72.00, 72.00, 72.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 96.00, 300.00, 300.00, 300.00, 300.00, 96.00, 96.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 300.00, 72.00, 300.00, 300.00, 72.00, 300.00, 300.00, 300.00, 72.00, 72.00, 300.00, 72.00, 72.00 Manifest Placed Resolution Unit : Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches, Inches Manifest Reference Instance ID : uuid:55FAE63F779111DE8A9A944E7F6EB892, uuid:55FAE63F779111DE8A9A944E7F6EB892, uuid:cdcf768b-2917-eb41-93f6-740d9a6a961e, uuid:05111660-d172-df4a-81bc-b8fb946b86ac, uuid:0b771514-cc38-0d4b-966a-8cd5d36a2c4b, uuid:8fabc241-6ce0-2442-8fed-62fcd1128c34, uuid:71fad413-e9a9-1140-b08b-f208f6b5a12d, uuid:b0b8a63b-9d93-11da-9482-000d93b8c722, uuid:95AF4477FFDEDD119A4AD29E0D1CA4AD, uuid:0ef7448e-d158-2b41-9b9a-175e78897dfc, uuid:71fad413-e9a9-1140-b08b-f208f6b5a12d, uuid:0b771514-cc38-0d4b-966a-8cd5d36a2c4b, uuid:cb7c1f7d-ec7c-9746-8cbc-08c648f68af5, uuid:92afe64d-8b3e-2046-a07e-ba358df2d179, uuid:B9355A27B263DD11866BB3A3B1595674, uuid:91C84341B263DD11866BB3A3B1595674, uuid:5AE1DC4EB263DD11866BB3A3B1595674, uuid:26DFCD57B263DD11866BB3A3B1595674, uuid:52616B6BB263DD11866BB3A3B1595674, uuid:C24B1477B263DD11866BB3A3B1595674, uuid:EA705983B263DD11866BB3A3B1595674, uuid:22BE628DB263DD11866BB3A3B1595674, uuid:9A293C99B263DD11866BB3A3B1595674, uuid:AA1928B7B263DD11866BB3A3B1595674, uuid:9AD962C2B263DD11866BB3A3B1595674, uuid:C46D41CEB263DD11866BB3A3B1595674, uuid:2143AA95F466DD119B77A0BC63F4B7B4, uuid:52387024B363DD11866BB3A3B1595674, uuid:CE3D9145B363DD11866BB3A3B1595674, uuid:2EC2A8AFF466DD119B77A0BC63F4B7B4, uuid:3683DFCAF666DD119B77A0BC63F4B7B4, uuid:B721536FBF6ADD118F3DF4A90CE8CCD2, uuid:5DC7872CF766DD119B77A0BC63F4B7B4, uuid:B3618BC6F866DD119B77A0BC63F4B7B4, uuid:A373428BBF6ADD118F3DF4A90CE8CCD2, uuid:CB92ED9AC06ADD118F3DF4A90CE8CCD2, uuid:69500276C36ADD118F3DF4A90CE8CCD2, uuid:69F3897AFC66DD119B77A0BC63F4B7B4, uuid:BB40E700C46ADD118F3DF4A90CE8CCD2, uuid:98301FB7B363DD11866BB3A3B1595674, uuid:86925D53B363DD11866BB3A3B1595674, uuid:403A97C2B363DD11866BB3A3B1595674, uuid:94B667E7AD6ADD11BFEA9B995003895A, uuid:B11D12CDB363DD11866BB3A3B1595674, uuid:758456D4B363DD11866BB3A3B1595674, uuid:977CEF212669DD119DCAA1E00C710F80, uuid:61DF9EFAB363DD11866BB3A3B1595674, uuid:94B667E7AD6ADD11BFEA9B995003895A, uuid:A11A1EB4B66ADD11BFEA9B995003895A, uuid:D82E0101B463DD11866BB3A3B1595674, uuid:BE72120FB463DD11866BB3A3B1595674, uuid:51820734B463DD11866BB3A3B1595674, uuid:5A820734B463DD11866BB3A3B1595674, uuid:232C8882B463DD11866BB3A3B1595674, uuid:2C2C8882B463DD11866BB3A3B1595674, uuid:232C8882B463DD11866BB3A3B1595674, uuid:A05D27A2B463DD11866BB3A3B1595674, uuid:8A701AE5B463DD11866BB3A3B1595674, uuid:EAB0F0D4B463DD11866BB3A3B1595674, uuid:1EC59EF8B463DD11866BB3A3B1595674, uuid:1E99CC12B563DD11866BB3A3B1595674, uuid:961A728CB76ADD11BFEA9B995003895A, uuid:194DB829B563DD11866BB3A3B1595674, uuid:EAB0F0D4B463DD11866BB3A3B1595674, uuid:CEC3FD7BB86ADD11BFEA9B995003895A, uuid:D956B147B663DD11866BB3A3B1595674, uuid:BD361857B663DD11866BB3A3B1595674, uuid:43C93060B663DD11866BB3A3B1595674, uuid:b0b8a63b-9d93-11da-9482-000d93b8c722, uuid:67c15245-6852-e544-87bf-f0928c05079c, uuid:8FB82D43F950DD11BEA396FE76D59FC9, uuid:e2d792a3-8394-48dc-b1fb-12546ffb2992, uuid:e2d792a3-8394-48dc-b1fb-12546ffb2992 Manifest Reference Document ID : uuid:55FAE63E779111DE8A9A944E7F6EB892, uuid:55FAE63E779111DE8A9A944E7F6EB892, uuid:E3177C00A163DD11B8C3A87375E4FBA4, uuid:69ACFB03924EDD11BC62F4BA02EA01AA, uuid:E38EB57D9659DD118E87AD737D81BF2C, uuid:E5177C00A163DD11B8C3A87375E4FBA4, uuid:E98DD98FBB54DD11BD0EA741B5DA0D7D, uuid:94AF4477FFDEDD119A4AD29E0D1CA4AD, uuid:7438668A8F29DD11B7C2AC97445B355C, uuid:E98DD98FBB54DD11BD0EA741B5DA0D7D, uuid:E38EB57D9659DD118E87AD737D81BF2C, uuid:6DD8F469BD6ADD11B981B164704BE981, uuid:71D8F469BD6ADD11B981B164704BE981, uuid:47F35501B263DD11866BB3A3B1595674, uuid:C1355A27B263DD11866BB3A3B1595674, uuid:99C84341B263DD11866BB3A3B1595674, uuid:62E1DC4EB263DD11866BB3A3B1595674, uuid:2EDFCD57B263DD11866BB3A3B1595674, uuid:5A616B6BB263DD11866BB3A3B1595674, uuid:CA4B1477B263DD11866BB3A3B1595674, uuid:21BE628DB263DD11866BB3A3B1595674, uuid:99293C99B263DD11866BB3A3B1595674, uuid:A91928B7B263DD11866BB3A3B1595674, uuid:99D962C2B263DD11866BB3A3B1595674, uuid:A2D962C2B263DD11866BB3A3B1595674, uuid:2043AA95F466DD119B77A0BC63F4B7B4, uuid:51387024B363DD11866BB3A3B1595674, uuid:CD3D9145B363DD11866BB3A3B1595674, uuid:2CC2A8AFF466DD119B77A0BC63F4B7B4, uuid:3583DFCAF666DD119B77A0BC63F4B7B4, uuid:B621536FBF6ADD118F3DF4A90CE8CCD2, uuid:5CC7872CF766DD119B77A0BC63F4B7B4, uuid:B2618BC6F866DD119B77A0BC63F4B7B4, uuid:A273428BBF6ADD118F3DF4A90CE8CCD2, uuid:CA92ED9AC06ADD118F3DF4A90CE8CCD2, uuid:68500276C36ADD118F3DF4A90CE8CCD2, uuid:68F3897AFC66DD119B77A0BC63F4B7B4, uuid:BA40E700C46ADD118F3DF4A90CE8CCD2, uuid:97301FB7B363DD11866BB3A3B1595674, uuid:85925D53B363DD11866BB3A3B1595674, uuid:3F3A97C2B363DD11866BB3A3B1595674, uuid:93B667E7AD6ADD11BFEA9B995003895A, uuid:B01D12CDB363DD11866BB3A3B1595674, uuid:748456D4B363DD11866BB3A3B1595674, uuid:967CEF212669DD119DCAA1E00C710F80, uuid:60DF9EFAB363DD11866BB3A3B1595674, uuid:93B667E7AD6ADD11BFEA9B995003895A, uuid:A01A1EB4B66ADD11BFEA9B995003895A, uuid:D72E0101B463DD11866BB3A3B1595674, uuid:BD72120FB463DD11866BB3A3B1595674, uuid:C95BE219B463DD11866BB3A3B1595674, uuid:59820734B463DD11866BB3A3B1595674, uuid:222C8882B463DD11866BB3A3B1595674, uuid:2B2C8882B463DD11866BB3A3B1595674, uuid:222C8882B463DD11866BB3A3B1595674, uuid:9F5D27A2B463DD11866BB3A3B1595674, uuid:89701AE5B463DD11866BB3A3B1595674, uuid:E9B0F0D4B463DD11866BB3A3B1595674, uuid:1DC59EF8B463DD11866BB3A3B1595674, uuid:1D99CC12B563DD11866BB3A3B1595674, uuid:951A728CB76ADD11BFEA9B995003895A, uuid:184DB829B563DD11866BB3A3B1595674, uuid:E9B0F0D4B463DD11866BB3A3B1595674, uuid:CDC3FD7BB86ADD11BFEA9B995003895A, uuid:D856B147B663DD11866BB3A3B1595674, uuid:BC361857B663DD11866BB3A3B1595674, uuid:42C93060B663DD11866BB3A3B1595674, uuid:66F89F37A463DD11958397F8FEF0F20D, uuid:8EB82D43F950DD11BEA396FE76D59FC9, uuid:9a112408-4143-43be-9ea1-83d6177ef7b5, uuid:9a112408-4143-43be-9ea1-83d6177ef7b5 Create Date : 2009:07:22 13:09:50+02:00 Modify Date : 2009:08:21 16:47:39+08:00 Metadata Date : 2009:08:21 16:47:39+08:00 Creator Tool : Adobe InDesign CS3 (5.0.1) Thumbnail Format : JPEG Thumbnail Width : 256 Thumbnail Height : 256 Thumbnail Image : (Binary data 6075 bytes, use -b option to extract) Format : application/pdf Producer : Adobe PDF Library 8.0 Trapped : False Has XFA : No Page Count : 50 Creator : Adobe InDesign CS3 (5.0.1)EXIF Metadata provided by EXIF.tools