Belkin F5D9630-4 ADSL2+ Modem with Wireless G Plus MIMO Router User Manual P75125uk F5D9630ukcoverchange indd

Belkin International, Inc. ADSL2+ Modem with Wireless G Plus MIMO Router P75125uk F5D9630ukcoverchange indd

Contents

Manual 2

51Manually Configuring your RouterManually Configuring your Router51Manually Configuring your Routersection2134567891011126.   Select “TKIP” or “AES” under “Data Encryption”. This setting will have to be identical to the Router that you set up.7.   Type in your encryption key in the “Network Key” box.Important: Enter your Pre-Shared key. This can be from eight to 63 characters and can be letters, numbers, or symbols. This same key must be used on all of the clients that you set up.8.   Click “OK” to apply settings.Wireless BridgeWireless Bridging or Wireless Distribution System (WDS) is used to connect Wireless Routers and Access points together to extend a network. Click on the Drop down menu next to ‘Bridge Mode’ to select either: Disabled: To disable Wireless Bridging (default)Manual: To enter the wireless MAC address(es) of the Access Points to bridge with, manually.
5352Manually Configuring your Router5352Manually Configuring your Router1  Wireless channels must match between Router and AP. 2  Security settings (WEP) must match between Router and AP. 3  If MAC filtering is enabled, user must be sure to add the WLAN MAC address(es) of the Router/AP in order to allow communication with each other. 4  If using a network protected by WPA, the SSID on both Access Points must be the same.FirewallYour Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including:•   IP Spoofing•   Land Attack•   Ping of Death (PoD)•   Denial of Service (DoS)•   IP with zero length•   Smurf Attack•   TCP Null Scan•   SYN flood•   UDP flooding•   Tear Drop Attack•   ICMP defect•   RIP defect•   Fragment floodingThe firewall also masks common ports that are frequently used to attack networks. These ports appear to be “Stealth”, meaning that essentially they do not exist to a would-be hacker. You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled.
53Manually Configuring your RouterManually Configuring your Router53Manually Configuring your Routersection213456789101112Virtual ServersVirtual servers allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications, through your Router to your internal network. Since your internal computers are protected by a firewall, machines from the Internet cannot get to them because they cannot be “seen”. If you need to configure the virtual server function for a specific application, you will need to contact the application vendor to find out which port settings you need. You can manually input this port information into the Router.Choosing an ApplicationA list of popular applications has been included to choose from. Click on “Select a Service” then select your application from the drop-down list. The settings will be transferred to the first row available. Click “Add” to save the setting for that application.Manually Entering Settings into the Virtual ServerTo manually enter settings, click on “Custom Server” and enter a name for the server. Enter the Server IP address in the space provided for the internal machine and the port(s) required to pass. Then select the protocol type (TCP or UDP), and then click “Add”.Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. It is recommended that you disable the settings when you are not using a specific application.
5554Manually Configuring your Router5554Manually Configuring your RouterClient IP FiltersThe Router can be configured to restrict access to the Internet, email, or other network services at specific days and times. To restrict Internet access to a single computer for example, enter a name of the filter in “Filter Name” box (1) and IP address of the computer you wish to restrict access to in the IP field (2). Next, enter “80:80” in the Port field (3). Select protocol from the “Protocol”  drop-down box (4). Click “Apply Changes”. The computer at the IP address you specified will now be blocked from Internet access. MAC Address FilteringThe MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in the filter list will be denied access. When you enable this feature, you must enter a name for the user and the MAC address of each client on your network to allow network access. Next, click “Add” to save the settings.(1) (2) (3) (4)
55Manually Configuring your RouterManually Configuring your Router55Manually Configuring your Routersection213456789101112DMZ (Demilitarized Zone)If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. This may be necessary if the NAT feature is causing problems with an application such as a game or video conferencing application. Use this feature on a temporary basis. The computer in the DMZ is not protected from  hacker attacks.To put a computer in the DMZ, enter its LAN IP address in the “Private IP” field and click “Apply Changes” for the change to take effect.Blocking an ICMP PingComputer hackers use what is known as “pinging” to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens the level of security of your Router. To turn off the ping response, select “Block ICMP Ping” (1) and click “Apply Changes”. The Router will not respong to an ICMP Ping.
5756Manually Configuring your Router5756Manually Configuring your RouterUtilitiesThe “Utilities” screen lets you manage different parameters of the Router and perform certain administrative functions.Restart RouterSometimes it may be necessary to restart or reboot the Router if it begins working improperly. Restarting or rebooting the Router will NOT delete any of your configuration settings.
57Manually Configuring your RouterManually Configuring your Router57Manually Configuring your Routersection213456789101112Restarting the Router to Restore Normal Operation1.   Click the “Restart Router” button.2.   The following message will appear. Click “OK” to restart your Router.Restore Factory DefaultsUsing this option will restore all of the settings in the Router to the factory (default) settings. It is recommended that you back up your settings before you restore all of the defaults.1.   Click the “Restore Defaults” button.2.   The following message will appear. Click “OK” to restore factory defaults.
5958Manually Configuring your Router5958Manually Configuring your RouterSaving/Backup Current SettingsYou can save your current configuration by using this feature. Saving your configuration will allow you to restore it later if your settings are lost or changed. It is recommended that you back up your current configuration before performing a firmware update.1.  Click “Save”. A window called “File Download” will open. Click “Save”.2.  A window will open that allows you to select the location in which to save the configuration file. Select a location. There are no restrictions on the file name, however, be sure to name the file so you can locate it yourself later. When you have selected the location and entered the file name, click “Save”.
59Manually Configuring your RouterManually Configuring your Router59Manually Configuring your Routersection2134567891011123.  When the save is complete, you will see the window below.  Click “Close”.The configuration is now saved.Restore Previous SettingsThis option will allow you to restore a previously saved configuration.1.  Click “Browse”. A window will open that allows you to select the location of the configuration file. All configuration files end with a “.conf”. Locate the configuration file you want to restore and double-click on it.2.  Then, click “Open”.
6160Manually Configuring your Router6160Manually Configuring your RouterFirmware UpdateFrom time to time, Belkin may release new versions of the Router’s firmware. Firmware updates contain feature improvements and fixes to problems that may have existed. When Belkin releases new firmware, you can download the firmware from the Belkin update website and update your Router’s firmware to the latest version.Updating the Router’s Firmware1.  In the “Firmware Update” page, click “Browse”. A window will open that allows you to select the location of the firmware  update file.2.  Browse to the firmware file you downloaded. Select the file by double-clicking on the file name.3.  Click “Update” to upgrade to the latest firmware version.
61Manually Configuring your RouterManually Configuring your Router61Manually Configuring your Routersection213456789101112System SettingsThe “System Settings” page is where you can enter a new administrator password, set the time zone, enable remote management, and turn on and off the UPnP function of the Router.Setting or Changing the Administrator PasswordThe Router ships with NO password entered. If you wish to add a password for greater security, you can set a password here. Write down your password and keep it in a safe place, as you will need it if you need to log into the Router in the future. It is also recommended that you set a password if you plan to use the remote management feature of your Router.Changing the Login Time-Out SettingThe login time-out option allows you to set the period of time that you can be logged into the Router’s advanced setup interface. The timer starts when there has been no activity. For example, you have made some changes in the advanced setup interface, then left your computer alone without clicking “Logout”. Assuming the time-out is set to 10 minutes, then 10 minutes after you leave, the login session will expire. You will have to log into the Router again to make any more changes. The login time-out option is for security purposes and the default is set to 10 minutes.Note: Only one computer can be logged into the Router’s advanced setup interface at one time.
6362Manually Configuring your Router6362Manually Configuring your RouterSetting the Time and Time ZoneThe Router keeps time by connecting to a Simple Network Time Protocol (SNTP) server. This allows the Router to synchronize the system clock to the global Internet. The synchronized clock in the Router is used to record the security log and control client filtering. Select desired NTP time servers and the time zone that you reside in, then click “Apply Changes”. The system clock may not update immediately. Allow at least 15 minutes for the Router to contact the time servers on the Internet and get a response. You cannot set the clock yourself.Enabling Remote ManagementBefore you enable this advanced feature of your Belkin Router, MAKE SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management allows you to make changes to your Router’s settings from anywhere on the Internet. Click on the “Change Settings” button to bring up the “Remote Management” page.There are two methods of remotely managing the Router. The first is to allow access to the Router from anywhere on the Internet by selecting “Any IP address can remotely manage the Router”. By typing in your WAN IP address from any computer on the Internet, you will be presented with a login screen where you need to type in the password of your Router. The second method is to allow a specific IP address only to remotely manage the Router. This is more secure, but less convenient. To use this method, enter the IP address you know you will be accessing the Router from in the space provided and select “Only this IP address can remotely manage the Router”. Before you enable this function, it is STRONGLY RECOMMENDED that you set your administrator password. Leaving the password empty will potentially open your Router to intrusion.
63Manually Configuring your RouterManually Configuring your Router63Manually Configuring your Routersection213456789101112Click on the “Apply Changes” button to save your settings.Enabling/Disabling UPnPUPnP (Universal Plug-and-Play) is yet another advanced feature offered by your Belkin Router. It is a technology that offers seamless operation of voice messaging, video messaging, games, and other applications that are UPnP-compliant. Some applications require the Router’s firewall to be configured in a specific way to operate properly. This usually requires opening TCP and UDP ports, and in some instances, setting trigger ports. An application that is UPnP-compliant has the ability to communicate with the Router, basically “telling” the Router which way it needs the firewall configured. The Router ships with the UPnP feature disabled. If you are using any applications that are UPnP-compliant, and wish to take advantage of the UPnP features, you can enable the UPnP feature. Click on the “Change Setting” button to bring up the “UPnP Setting” page. Then select “On” for “Enable UPnP”. Click on the “Apply Changes” button to save your settings.
6564Troubleshooting6564Troubleshooting Problem: The ADSL LED is not on.Solution:1.  Check the connection between the Router and ADSL line. Make sure the cable from the ADSL line is connected to the port on the Router labeled “DSL Line”.2.  Make sure the Router has power. The Power LED   on the front panel should be illuminated. Problem: The Internet LED is not on.Solution:1.  Make sure the cable from the ADSL line is connected to the port on the Router labeled “DSL Line” and the ADSL LED   is on.2.  Make sure you have the correct VPI/VCI, user name, and password from your ISP provider.Problem:My connection type is static IP address. I can’t connect to  the Internet.Solution:Since your connection type is static IP address, your ISP must assign you the IP address, subnet mask, and gateway address. Instead of using the Wizard, go to “Connection Type”, and then select your connection type. Click “Next”, select “Static IP”, and enter your IP address, subnet mask, and default gateway information.Problem:I’ve forgotten or lost my password.Solution:Press and hold the “Reset” button on the rear panel for at least 10 seconds to restore the factory defaults.
65Troubleshooting65section213456789101112Problem:My wireless PC cannot connect to the Router.Solution:1.  Make sure the wireless PC has the same SSID settings as the Router, and you have the same security settings on the clients such as WPA or WEP encryption.2.  Make sure the distance between the Router and wireless PC are not too far away.Problem:The wireless network is often interrupted.Solution:1.  Move your wireless PC closer to the Router to find a better signal.2.  There may also be interference, possibly caused by a microwave oven or 2.4GHz cordless phones. Change the location of the Router or use a different wireless channel.Problem:I can’t connect to the Internet wirelessly.Solution:If you are unable to connect to the Internet from a wireless computer, please check the following items:1.  Look at the lights on your Router. If you are using a Belkin Router, the lights should be as follows:  •  The “Power” light should be on.  •  The “DSL LED”v should be on, and not blinking.  •  The “Internet LED” should be either on or blinking.2.  Open your wireless utility software by clicking on the icon in the system tray at the bottom right-hand corner of the screen. If you’re using a Belkin Wireless Card, the tray icon should look like this.   The icon may be red or green.3.  The exact window that opens will vary depending on the model of wireless card you have; however, any of the utilities should have a list of “Available Networks”— those wireless networks it can connect to.
6766Troubleshooting6766TroubleshootingDoes the name of your wireless network appear in  the results?Yes, my network name is listed—go to the troubleshooting solution titled “I can’t connect to the Internet wirelessly, but my network name is listed”.No, my network name is not listed—go to the troubleshooting solution titled “I can’t connect to the Internet wirelessly, and my network name is not listed”.Problem:I can’t connect to the Internet wirelessly, but my network name  is listed.Solution:If the name of your network is listed in the “Available Networks” list, please follow the steps below to connect wirelessly:1.  Click on the correct network name in the “Available  Networks” list.  2.   If the network has security (encryption) enabled, you will need to enter the network key. For more information regarding security, see the page entitled: “Changing the Wireless Security Settings”.3.   Within a few seconds, the tray icon in the lower left-hand corner of your screen should turn green, indication a successful connection to the network.  Problem:I can’t connect to the Internet wirelessly, and my network name is not listed.SolutionIf the correct network name is not listed under “Available  Networks” in the wireless utility, please attempt the following troubleshooting steps:1.  Temporarily move computer, if possible, five to 10 feet from the Router. Close the wireless utility, and re-open it. If the
67Troubleshooting67section213456789101112correct network name now appears under “Available Networks”, you may have a range or interference problem. Please see the suggestions discussed in Appendix B entitled “Important Factors for Placement and Setup”.2.  Using a computer that is connected to the Router via a network cable (as opposed to wirelessly), ensure that “Broadcast SSID” is enabled. This setting is found on the Router’s wireless “Channel and SSID” configuration page.  If you are still unable to access the Internet after completing these steps, please contact Belkin Technical Support.Problem: My wireless network performance is inconsistent.Data transfer is sometimes slow.Signal strength is poor.Difficulty establishing and/or maintaining a Virtual Private Network (VPN) connection.Solution:Wireless technology is radio-based, which means connectivity and the throughput performance between devices decreases when the distance between devices increases. Other factors that will cause signal degradation (metal is generally the worst culprit) are obstructions such as walls and metal appliances. As a result, the typical indoor range of your wireless devices will be between 100 to 200 feet. Note also that connection speed may decrease as you move farther from the Router or access point. In order to determine if wireless issues are related to range, we suggest temporarily moving the computer, if possible, five to 10 feet from the Router. Changing the wireless channel - Depending on local wireless traffic and interference, switching the wireless channel of your network can improve performance and reliability. The default channel the Router is shipped with is channel 11, you may choose from several other channels depending on your region; see the section entitled “Changing the Wireless Channel” on page 37 for instructions on how to choose other channels.
6968Troubleshooting6968TroubleshootingLimiting the wireless transmit rate - Limiting the wireless transmit rate can help improve the maximum wireless range, and connection stability. Most wireless cards have the ability to limit the transmission rate. To change this property, go to the Windows Control Panel, open “Network Connections” and double-click on your wireless card’s connection. In the “Properties” dialog, select the “Configure” button on the “General” tab (Windows 98 users will have to select the wireless card in the list box and then click “Properties”), then choose the “Advanced” tab and select the rate property. Wireless client cards are usually set to automatically adjust the wireless transmit rate for you, but doing so can cause periodic disconnects when the wireless signal is too weak; as a rule, slower transmission rates are more stable. Experiment with different connection rates until you find the best one for your environment; note that all available transmission rates should be acceptable for browsing the Internet. For more assistance, see your wireless card’s user manual.Problem:I am having difficulty setting up Wired Equivalent Privacy (WEP) security on a Belkin Router or Belkin Access Point.Solution 1.   Log into your Wireless Router or access point. 2.   Open your web browser and type in IP address of the Wireless Router or access point. (The Router default is 192.168.2.1, the 802.11g access point is 192.168.2.254 ). Log into your Router by clicking on the “Login” button in the top right-hand corner of the screen. You will be asked to enter your password. If you never set a password, leave the password field blank and  click “Submit”. 3.   Click the “Wireless” tab on the left of your screen. Select  the “Encryption” or “Security” tab to get to the security  settings page.4.   Select “128-bit WEP” from the drop-down menu.5.   After selecting your WEP encryption mode, you can type in your hex WEP key manually, or you can type in a passphrase in the “Passphrase” field and click “Generate” to create a WEP key from the passphrase. Click “Apply Changes” to finish. You must now set all of your clients to match these settings. A hex (hexadecimal) key is a mixture of numbers and letters from A-F
69Troubleshooting69section213456789101112and 0-9. For 128-bit WEP, you need to enter 26 hex characters.    For example:  C3 03 0F AF 4B B2 C3 D4 4B C3 D4 E7 E4 = 128-bit key6.   Click “Apply Changes” to finish. Encryption in the Wireless Router is now set. Each of your computers on your wireless network will now need to be configured with the same  security settings. WARNING:  If you are configuring the Wireless Router or Access Point from a computer with a wireless client, you will need to ensure that security is turned on for this wireless client. If this is not done, you will lose your wireless connection.Note to Mac users: Original Apple AirPort® products support  64-bit encryption only. Apple AirPort 2 products can support  64-bit or 128-bit encryption. Please check your Apple AirPort product to see which version you are using. If you cannot configure your network with 128-bit encryption, try 64-bit encryption.Problem:I am having difficulty setting up Wired Equivalent Privacy (WEP)    security on a Belkin Wireless Card.Solution:The Wireless Card must use the same key as the Wireless Router or access point. For instance, if your Wireless Router or access point uses the key 00112233445566778899AABBCC, then the Wireless Card must be set to the exact same key.1.   Double-click the “Signal Indicator” icon to bring up the Wireless  “Network” screen. The “Advanced” button will allow you to view and configure more options of your Card.2.  The “Advanced” button will allow you to view and configure more options of the Card. 3.   Once the “Advanced” button is clicked, the Belkin Wireless LAN Utility will appear. This Utility will allow you to manage all the advanced features of the Belkin Wireless Card.4.   Under the “Wireless Network Properties” tab, select a network name from the “Available networks” list and click the “Properties” button.
7170Troubleshooting7170Troubleshooting5.   Under “Data Encryption” select “WEP”.6.   Ensure the check box “The key is provided for me automatically” at the bottom is unchecked. If you are using this computer to connect to a corporate network, please consult your network administrator if this box needs to be checked.7.  Type your WEP key in the “Network key” box.  Important: A WEP key is a mixture of numbers and letters from A–F and 0–9. For 128-bit WEP, you need to enter 26 keys. This Network key needs to match the key you assign to your Wireless Router or access point.  For example:  C3 03 0F AF 4B B2 C3 D4 4B C3 D4 E7 E4 = 128-bit key8.   Click “OK”, and then “Apply” to save the settings.If you are NOT using a Belkin Wireless Card, please consult the manufacturer for that wireless client card’s user manual.Problem:Do Belkin products support WPA?Solution Note: To use WPA security, all your clients must be upgraded to drivers and software that support it. At the time of this FAQ publication, a security patch download is available, for free, from Microsoft. This patch works only with the Windows XP operating system.  Download the patch here:http://www.microsoft.com/downloads/details.aspx?FamilyID=009d8425-ce2b-47a4-abec-274845dc9e91&displaylang=enYou also need to download the latest driver for your Belkin Wireless 802.11g Desktop or Notebook Network Card from the Belkin support site. Other operating systems are not supported at this time. Microsoft’s patch only supports devices with WPA-enabled drivers such as Belkin 802.11g products.Download the latest driver at:  http://web.belkin.com/support/networkingsupport.asp.WPA support will also be automatically installed if you upgrade your system to Windows XP Service pack 2. Detials about this can be found at http://support.microsoft.com
71Troubleshooting71section213456789101112Problem:I am having difficulty setting up Wi-Fi Protected Access (WPA) security on a Belkin Wireless Router or Belkin Access Point for a home network.Solution:1.   From the “Security Mode” drop-down menu, select “WPA-PSK (no server)”.2.   For “Encryption Technique”, select “TKIP” or “AES”. This setting will have to be identical on the clients that you set up.3.   Enter your pre-shared key. This can be from eight to 63 characters and can be letters, numbers, or symbols or spaces. This same key must be used on all of the clients that you set up. For example, your PSK might be something like: “Smith family network key”.4.   Click “Apply Changes” to finish. You must now set all clients to match these settings.Problem:I am having difficulty setting up Wi-Fi Protected Access (WPA) security on a Belkin Wireless Router or Belkin Access Point for  a business.Solution:If your network uses a radius server to distribute keys to the clients, use this setting. This is typically used in a business environment.1.   From the “Security Mode” drop-down menu, select “WPA  (with server)”.2.   For “Encryption Technique”, select “TKIP” or “AES”. This setting will have to be identical on the clients that you set up.3.   Enter the IP address of the radius server into the “Radius Server” fields.4.   Enter the radius key into the “Radius Key” field.5.   Enter the key interval. Key interval is how often the keys are distributed (in packets).6.   Click “Apply Changes” to finish. You must now set all clients to match these settings.
7372Troubleshooting7372TroubleshootingProblem:I am having difficulty setting up Wi-Fi Protected Access (WPA) security on a Belkin Wireless Card for a home network.Solution:Clients must use the same key that the wireless router or access point uses. For instance if the key is “Smith Family Network Key” in the wireless router or access point, the clients must also use that same key.1.  Double-click the “Signal Indicator” icon to bring up the “Wireless Network” screen. The “Advanced” button will allow you to view and configure more options of your Card.2.  The “Advanced” button will allow you to view and configure more options of the Card. 3.   Once the “Advanced” button is clicked, the Belkin Wireless LAN Utility will appear. This Utility will allow you to manage all the advanced features of the Belkin Wireless Card.4.   Under the “Wireless Network Properties” tab, select a network name from the “Available networks” list and click the “Properties” button. 5.   Under “Network Authentication” select “WPA-PSK (no server)”.6.   Type your WPA key in the “Network key” box.  Important: WPA-PSK is a mixture of numbers and letters from  A–Z and 0–9. For WPA-PSK you can enter eight to 63 characters. This network key needs to match the key you assign to your Wireless Router or access point.7.   Click “OK, then “Apply” to save the settings.Problem:I am having difficulty setting up Wi-Fi Protected Access (WPA) security on a Belkin Wireless Card for a business.Solution:1.  Double-click the “Signal Indicator” icon to bring up the “Wireless Network” screen. The “Advanced” button will allow you to view and configure more options of your Card.2.  The “Advanced” button will allow you to view and configure more options of the Card.
73Troubleshooting73section2134567891011123.  Once the “Advanced” button is clicked, the Belkin Wireless LAN Utility will appear. This Utility will allow you to manage all the advanced features of the Belkin Wireless Card.4.  Under the “Wireless Network Properties” tab, select a network  name from the “Available networks” list and click the  “Properties” button.5.  Under “Network Authentication” select “WPA”.6.  In the “Authentication” tab, select the settings that are indicated by your network administrator.7.  Click “OK, then “Apply” to save the settings.Problem:I am having difficulty setting up Wi-Fi Protected Access (WPA) security and I am NOT using a Belkin Wireless Card for a home network.Solution:If you are NOT using a Belkin Wireless Desktop or Wireless Notebook Network Card and it is not equipped with WPA-enabled software, a file from Microsoft called “Windows XP Support Patch for Wireless Protected Access” is available for free download. Download the patch from Microsoft by searching the knowledge base for Windows XP WPA. Note: The file that Microsoft has made available works only with Windows XP. Other operating systems are not supported at this time. You also need to ensure that the wireless card manufacturer supports WPA and that you have downloaded and installed the latest driver from their support site.Supported Operating Systems:• Windows XP Professional • Windows XP Home EditionEnabling WPA-PSK (no server)1.   Under Windows XP, click “Start > Control Panel > Network Connections”.2.   Right-clicking on the “Wireless Networks” tab will display the following screen. Ensure the “Use Windows to configure my wireless network settings” check box is checked.3.   Under the “Wireless Networks” tab, click the “Configure” button,
7574Troubleshooting7574Troubleshootingand you will see the following screen.4.   For a home or small business user, select “WPA-PSK” under “Network Administration”.  Note: Select WPA (with radius server) if you are using this computer to connect to a corporate network that supports an authentication server such as a radius server. Please consult your network administrator for further information.5.   Select “TKIP” or “AES” under “Date Encryption”. This setting will have to be identical to the wireless router or access point that you set up.6.   Type in your encryption key in the “Network Key” box.  Important:  Enter your pre-shared key. This can be from eight to 63 characters and can be letters, numbers, or symbols. This same key must be used on all of the clients that you set up.7.   Click “OK” to apply settings.What is the difference between 802.11b, 802.11g, G+ MIMO, and Pre-N?Currently there are four levels of wireless networking standards, which transmit data at very different maximum speeds. Each is based on the designation 802.11(x), so named by the IEEE, the board that is responsible for certifying networking standards. The most common wireless networking standard, 802.11b, transmits information at 11Mbps; 802.11a and 802.11g work at 54Mbps; G+ MIMO works at 54Mbps; and Pre-N works at 108Mbps.
75Troubleshooting75section213456789101112Wireless Comparison ChartWireless Technology802.11bG (802.11g)G+ (802.11g with HSM)G+ MIMO(802.11g with MIMO MRC)Belkin Pre-N(802.11g with TrueMIMO)Speed*11Mbps link rate / Baseline5x faster than 802.11b*10x faster than 802.11b*10x faster than 802.11b*15x faster than 802.11b*FrequencyCommon household devices such as cordless phones and microwave ovens may interfere with the unlicensed band 2.4GHzCommon household devices such as cordless phones and microwave ovens may interfere with the unlicensed band 2.4GHzCommon household devices such as cordless phones and microwave ovens may interfere with the unlicensed band 2.4GHzCommon household devices such as cordless phones and microwave ovens may interfere with the unlicensed band 2.4GHzCommon household devices such as cordless phones and microwave ovens may interfere with the unlicensed band 2.4GHzCompatibilityCompatible with 802.11gCompatible with 802.11b/gCompatible with 802.11b/gCompatible with 802.11b/gCompatible with 802.11g or 802.11bCoverage*typically 100–200 ft. indoorsUp to 400ft* Up to 700ft* Up to 1000ft*Up to 1400ft*AdvantageMature—legacy technology Common—widespread use for Internet sharingEnhanced speed and coverageBetter coverage and consistent speed at rangeLeading edge— best coverage and throughput*Distance and connection speeds will vary depending on your networking environment.
7776Technical Support Information7776Technical Support InformationTechnical SupportFor latest software updates or if you have any further questions regarding installation of this product, please visit  www.belkin.com/networking or contact: US:  877-736-5771 or   310-898-1100 ext. 2263Europe:  00 800 223 55 460Australia:  1800 235 546New Zealand:  0800 235 546Singapore:  800 616 1790
7777section21345671112Appendixes9810Appendix A: GlossaryIP AddressThe “IP address” is the internal IP address of the Router. To access the advanced setup interface, type this IP address into the address bar of your browser. This address can be changed if needed. To change the IP address, type in the new IP address and click “Apply Changes”. The IP address you choose should be a non-routable IP. Examples of a non-routable IP are:192.168.x.x (where x is anything between 0 and 255)10.x.x.x (where x is anything between 0 and 255)Subnet MaskSome networks are far too large to allow all traffic to flood all its parts. These networks must be broken down into smaller, more manageable sections, called subnets. The subnet mask is the network address plus the information reserved for identifying the “subnetwork”.DNSDNS is an acronym for Domain Name Server. A Domain Name Server is a server located on the Internet that translates URLs (Universal Resource Links) like www.belkin.com to IP addresses. Many ISPs do not require you to enter this information into the Router. If you are using a static IP connection type, then you may need to enter a specific DNS address and secondary DNS address for your connection to work properly. If your connection type is Dynamic or PPPoE, it is likely that you do not have to enter a DNS address.PPPoEMost ADSL providers use PPPoE as the connection type. If you use an ADSL modem to connect to the Internet, your ISP may use PPPoE to log you into the service.Your connection type is PPPoE if:1.  Your ISP gave you a user name and password which is required to connect to the Internet.2.  Your ISP gave you software such as WinPoET or Enternet300 that you use to connect to the Internet.
7978Appendixes7978Appendixes3.  You have to double-click on a desktop icon other than your browser to get on the Internet.   To set the Router to use PPPoE, type in your user name and password in the spaces provided. After you have typed in your information, click “Apply Changes”.After you apply the changes, the “Internet Status” indicator will read “connection OK” if your Router is set up properly.PPPoAEnter the PPPoA information in the provided spaces, and click “Next”. Click “Apply” to activate your settings.1.  User name - Enter the user name. (Assigned by your ISP).2.  Password - Enter your password. (Assigned by your ISP).3.  Retype Password - Confirm the password. (Assigned by your ISP).4.  VPI/VCI - Enter your Virtual Path Identifier (VPI) and Virtual Circuit Identifier (VCI) parameter here. (Assigned by your ISP).Disconnect after X...This feature is used to automatically disconnect the Router from your ISP when there is no activity for a specified period of time. For instance, placing a check mark next to this option and entering “5” into the minute field will cause the Router to disconnect from the Internet after five minutes of no Internet activity. This option should be used if you pay for your Internet service by the minute.Channel and SSIDTo change the channel of operation of the Router, select the desired channel from the drop-down menu and select your channel. Click “Apply Changes” to save the setting. You can also change the SSID. The SSID is the equivalent to the wireless network’s name. You can make the SSID anything you want to. If there are other wireless networks in your area, you should give your wireless network a unique name. Click inside of the SSID box and type in a new name. Click “Apply Changes” to make the change.
79Appendixes79section213456789101112ESSID BroadcastMany wireless network adapters currently on the market possess a feature known as site survey. It scans the air for any available network and allows each computer to automatically select a network from the survey. This occurs if the computer’s SSID is set to “ANY”. Your Belkin Router can block this random search for a network. If you disable the “ESSID Broadcast” feature, the only way a computer can join your network is by its SSID being set to the specific name of the network (like WLAN). Be sure that you know your SSID (network name) before enabling this feature. It is possible to make your wireless network nearly invisible. By turning off the broadcast of the SSID, your network will not appear in a site survey. Obviously, turning off the broadcast feature of the SSID helps increase security.EncryptionSetting encryption can help keep your network secure. The Router uses Wired Equivalent Privacy (WEP) and WIFI protested Access (WPA) encrytion to protect to protect your data and features two rates of encryption: 64-bit and 128-bit. Encryption works on a system of keys. The key on the computer must match the key on the Router, and there are two ways to make a key. The easiest is to let the Router’s software convert a passphrase you’ve created into a key. The advanced method is to enter the keys manually.Virtual ServersThis function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, machines from the Internet cannot get to them because they cannot be “seen”. If you need to configure the virtual server function for a specific application, you will need to contact the application vendor to find out which port settings you need. To manually enter settings, enter the IP address in the space provided for the internal machine, the port type (TCP or UDP), and the LAN and public port(s) required to pass. Then select “Enable” and click “Set”. You can only pass one port per internal IP address. Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. It is recommended that you disable the settings when you are not using a specific application.
8180Appendixes8180AppendixesClient IP FiltersThe Router can be configured to restrict access to the Internet, email, or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers.MAC Address FilteringThe MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client on your network to allow network access to each or copy the MAC address by selecting the name of the computer from the “DHCP Client List”. To enable this feature, select “Enable”. Next, click “Apply Changes” to save  the settings.DMZIf you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. This may be necessary if the NAT feature is causing problems with an application such as a game or video conferencing application. Use this feature on a temporary basis. The computer in the DMZ is not protected from hacker attacks. To put a computer in the DMZ, enter the last digits of its LAN IP address in the “Static IP” field and click “Apply Changes” for the change to take effect.If you have only one public (WAN) IP address, then you can leave the public IP to “0.0.0.0”. If you are using multiple public (WAN) IP addresses, it is possible to select which public (WAN) IP address the DMZ host will be directed to. Type in the public (WAN) IP address you wish the DMZ host to direct to, enter the last two digits of the IP address of the DMZ host computer, and click “Apply Changes”.
81Appendixes81section213456789101112Administrator PasswordThe Router ships with NO password entered. If you wish to add a password for more security, you can set a password from your Router’s web-based user interface. Keep your password in a safe place as you will need this password if you need to log into the Router in the future. It is STRONGLY RECOMMENDED that you set a password if you plan to use the remote management feature. The login time-out option allows you to set the period of time that you can be logged into the Router’s advanced setup interface. The timer starts when there has been no activity. For example, you have made some changes in the advanced setup interface, then left your computer alone without clicking “Logout”.Assuming the time-out is set to 10 minutes, then 10 minutes after you leave, the login session will expire. You will have to log into the Router again to make any more changes. The login time-out option is for security purposes and the default is set to 10 minutes. Note, only one computer can be logged into the Router’s advanced setup interface at a time.Time and Time ZoneThe Router keeps time by connecting to a Simple Network Time Protocol (SNTP) server. This allows the Router to synchronize the system clock to the global Internet. The synchronized clock in the Router is used to record the security log and control client filtering. Select the time zone that you reside in. If you reside in an area that observes daylight saving time, then place a check mark in the box next to “Enable Daylight Saving”. The system clock may not update immediately. Allow at least 15 minutes for the Router to contact the time servers on the Internet and get a response.Remote ManagementBefore you enable this function, MAKE SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management allows you to make changes to your Router’s settings from anywhere on the Internet.
8382Appendixes8382AppendixesUPnPUPnP (Universal Plug-and-Play) is a technology that offers seamless operation of voice messaging, video messaging, games, and other applications that are UPnP-compliant. Some applications require the Router’s firewall to be configured in a specific way to operate properly. This usually requires opening TCP and UDP ports and in some instances setting trigger ports. An application that is  UPnP-compliant has the ability to communicate with the Router, basically “telling” the Router which way it needs the firewall configured. The Router ships with the UPnP feature disabled. If you are using any applications that are UPnP-compliant, and wish to take advantage of the UPnP features, you can enable the UPnP feature. Simply select “Enable” in the “UPnP Enabling” section of the “Utilities” page. Click “Apply Changes” to save the change.
83Appendixes83section213456789101112Appendix B: Important Factors for Placement and SetupNote: While some of the items listed below can affect network performance, they will not prohibit your wireless network from functioning; if you are concerned that your network is not operating at its maximum effectiveness, this checklist may help.1. Wireless Router (or Access Point) Placement   Place your Wireless Router (or access point), the central connection point of your network, as close as possible to the center of your wireless network devices.   To achieve the best wireless network coverage for your “wireless clients” (i.e., computers enabled by Belkin Wireless Notebook Network Cards, Wireless Desktop Network Cards, and Wireless USB Adapters): •  Ensure that your Wireless Router’s (or access point’s) networking antennas are parallel to each other, and are positioned vertically (toward the ceiling). If your Wireless Router (or access point) itself is positioned vertically, point the antennas a much as possible in an upward direction. •  In multistory homes, place the Wireless Router (or access point) on a floor that is as close to the center of the home as possible. This may mean placing the Wireless Router (or access point) on an upper floor.•  Try not to place the Wireless Router (or access point) near a cordless 2.4GHz phone.2.   Avoid Obstacles and Interference   Avoid placing your Wireless Router (or access point) near devices that may emit radio “noise,” such as microwave ovens. Dense objects that can inhibit wireless communication include: •  Refrigerators•  Washers and/or dryers•  Metal cabinets•  Large aquariums•  Metallic-based UV tinted windows
8584Appendixes8584Appendixes  If your wireless signal seems weak in some spots, make sure that objects such as these are not blocking the signal’s path (between your computers and Wireless Router or access point).3.   Cordless Phones  If the performance of your wireless network is impaired after attending to the above issues, and you have a cordless phone: •  Try moving cordless phones away from Wireless Routers (or access points) and your wireless-enabled computers. •  Unplug and remove the battery from any cordless phone that operates on the 2.4GHz band (check manufacturer’s information). If this fixes the problem, your phone may  be interfering. •  If your phone supports channel selection, change the channel on the phone to the farthest channel from your wireless network. For example, change the phone to channel 1 and move your Wireless Router (or access point) to channel 11. See your phone’s user manual for detailed instructions. •  If necessary, consider switching to a 900MHz or 5GHz cordless phone.4.   Choose the “Quietest” Channel for your Wireless Network   In locations where homes or offices are close together, such as apartment buildings or office complexes, there may be wireless networks nearby that can conflict with yours.   Use the Site Survey capabilities found in the Wireless LAN Utility of your wireless adapter to locate any other wireless networks that are available (see your wireless adapter’s manual), and move your Wireless Router (or access point) and computers to a channel as far away from other networks as possible.  Experiment with more than one of the available channels, in order to find the clearest connection and avoid interference from neighboring cordless phones or other wireless devices.   For Belkin wireless networking products, use the detailed Site Survey and wireless channel information included in your  User Manual.
85Appendixes85section213456789101112   These guidelines should allow you to cover the maximum possible area with your Wireless Router (or access point). Should you need to cover an even wider area, we suggest the Belkin Wireless Range Extender/Access Point.5. Secure Connections, VPNs, and AOL   Secure connections typically require a user name and password, and are used where security is important. Secure connections include:•   Virtual Private Network (VPN) connections, often used to connect remotely to an office network•   The “Bring Your Own Access” program from America Online (AOL), which lets you use AOL through broadband provided by another cable or DSL service•   Most online banking websites•   Many commercial websites that require a user name and password to access your account   Secure connections can be interrupted by a computer’s power management setting, which causes it to “go to sleep.” The simplest solution to avoid this is to simply reconnect by rerunning the VPN or AOL software, or by re-logging into the secure website.  A second alternative is to change your computer’s power management settings so it does not go to sleep; however, this may not be appropriate for portable computers. To change your power management setting under Windows, see the “Power Options” item in the Control Panel.  If you continue to have difficulty with Secure Connections, VPNs, and AOL, please review the steps in the previous pages to be sure you have addressed these issues.Appendix C: Internet Connection Setting TableThe table on the next page provides references to select and configure Internet connection in setting up your ADSL connection. Many ISPs use different settings depending on the region and equipment they use. You may try the setting for the ISPs in your region. If it does not work, please contact your ISP for your specific setting.
87868786Country Connection ProtocolVPI/VCI Encapsulation ISPsEuropeFrance PPPoE 8/35 LLC VariousGermany PPPoE 1/32 LLC T-Online,  variousHolland  1483 Bridged0/350/320/34LLCLLCLLCBBNed, XS4allVersatel DHCPBaby XL, Tiscali (start/ Surf/ Family/ Live) PPPoA 8/48 VC MUX KPN, Hetnet, HCCNet, Tiscali (lite/ Basis/Plus) WanadooPPPoA 0/32 VC MUX Versatel PPP, ZonnetPPPoE 8/35 LLC VariousBelgium PPPoA 8/35 LLC Belgacom, Tiscali, ScarletItaly PPPoE or PPPoA8/35 VC MUX TINSpain PPPoE or 1483 Bridged8/32 LLC TelefonicaSweden 1483 Bridged3/35 LLC TeliaUK PPPoA 0/38 VC MUX BT, Freeserve, Tiscali, AOL*AsiaAustralia PPPoE or PPPoA8/35 LLC VariousNew Zealand PPPoE or PPPoA0/100 VC MUX VariousSingapore PPPoE 0/100 LLC SingNet, Pacific InternetAppendixes
87Information87section213456789101112Caution: Exposure to Radio Frequency Radiation. The radiated output power of this device is far below the FCC radio frequency exposure limits. Nevertheless, the device shall be used in such a manner that the potential for human contact during normal operation  is minimized.When connecting an external antenna to the device, the antenna shall be placed in such a manner to minimize the potential for human contact during normal operation. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) during normal operation.Federal Communications Commission Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.This equipment generates, uses, and can radiate radio frequency energy.  If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures:FCC StatementDECLARATION OF CONFORMITY WITH FCC RULES FOR ELECTROMAGNETIC COMPATIBILITYWe, Belkin Corporation, of 501 West Walnut Street, Compton, CA 90220, declare under our sole responsibility that the product,F5D9630-4to which this declaration relates,complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.    This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.Belkin declares that F5D9630-4 ( FCC ID: K7SF5D9630-4 ) is limited in CH1~CH11 for 2.4 GHz by specified firmware controlled in U.S.A.
8988Information8988Information    •  Reorient or relocate the receiving antenna.     •   Increase the distance between the equipment and the receiver.     •    Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.    •   Consult the dealer or an experienced radio/TV            technician for help.  Modifications The FCC requires the user to be notified that any changes or modifications to this device that are not expressly approved by Belkin Corporation may void the user’s authority to operate the equipment.Canada-Industry Canada (IC) The wireless radio of this device complies with RSS 210 Industry Canada. This Class B digital apparatus complies with Canadian ICES-003.Cet appareil numérique de la classe B conforme á la norme NMB-003 du Canada.Europe-European Union Notice Radio products with the CE 0682 or CE alert marking  comply with the R&TTE Directive (1995/5/EC) issued by the  Commission of the European Community.         Compliance with this directive implies conformity to the following European Norms (in brackets are the equivalent international standards).      •  EN 60950 (IEC60950) – Product Safety     •  EN 300 328 Technical requirement for radio equipment     •  ETS 300 826 General EMC requirements for radio equipment.To determine the type of transmitter, check the identification label on your Belkin product.Products with the CE marking comply with the EMC Directive (89/336/EEC) and the Low Voltage Directive (72/23/EEC) issued by the Commission of the European Community. Compliance with these directives implies conformity to the following European Norms (in brackets are the equivalent international standards).    •  EN 55022 (CISPR 22) – Electromagnetic Interference     •  EN 55024 (IEC61000-4-2,3,4,5,6,8,11) – Electromagnetic Immunity     •  EN 61000-3-2 (IEC610000-3-2) – Power Line Harmonics     •  EN 61000-3-3 (IEC610000) – Power Line Flicker     •  EN 60950 (IEC60950) – Product SafetyProducts that contain the radio transmitter are labeled with CE 0682 or CE alert marking and may also carry the CE logo.
89Information89section213456789101112This symbol on the product or on its packaging indicates that this product must not be disposed of with your other household waste. Instead, it is your responsibility to dispose of your waste equipment by handing it over to a designated collection point for the recycling of waste electrical and electronic equipment. The separate collection and recycling of your waste equipment at the time of disposal will help to conserve natural resources and ensure that it is recycled in a manner that protects human health and the environment. For more information about where you can drop off your waste equipment for recycling, please contact your local city office, your household waste disposal service or the shop where you purchased the product.Belkin Corporation Limited Lifetime Product WarrantyBelkin Corporation warrants this product against defects in materials and workmanship for its lifetime. If a defect is discovered, Belkin will, at its option, repair or replace the product at no charge provided it is returned during the warranty period, with transportation charges prepaid, to the authorized Belkin dealer from whom you purchased the product. Proof of purchase may be required. This warranty does not apply if the product has been damaged by accident, abuse, misuse, or misapplication; if the product has been modified without the written permission of Belkin; or if any Belkin serial number has been removed or defaced.THE WARRANTY AND REMEDIES SET FORTH ABOVE ARE EXCLUSIVE IN LIEU OF ALL OTHERS, WHETHER ORAL OR WRITTEN, EXPRESSED OR IMPLIED. BELKIN SPECIFICALLY DISCLAIMS ANY AND ALL IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.No Belkin dealer, agent, or employee is authorized to make any modification, extension, or addition to this warranty.BELKIN IS NOT RESPONSIBLE FOR SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OF WARRANTY, OR UNDER ANY OTHER LEGAL THEORY, INCLUDING BUT NOT LIMITED TO, LOST PROFITS, DOWNTIME, GOODWILL, DAMAGE TO OR REPROGRAMMING OR REPRODUCING ANY PROGRAM OR DATA STORED IN, OR USED WITH, BELKIN PRODUCTS.Some states do not allow the exclusion or limitation of incidental or consequential damages or exclusions of implied warranties, so the above limitations or exclusions may not apply to you. This warranty gives you specific legal rights, and you may also have other rights that vary from state to state.
IC statement Operation is subject to the following two conditions: 1) This device may not cause interference and 2) This device must accept any interference, including interference that may cause undesired operation of the device. IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. REN (Ringer Equivalent Numbers) Statement ''NOTICE: The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.'' Attachment Limitations Statement ''Notice: This equipment meets telecommunications network protective, operational and safety requirements as prescribed in the appropriate Terminal Equipment Technical Requirements document(s). This is confirmed by marking the equipment with the Industry Canada certification number. The Department does not guarantee the equipment will operate to the user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. The customer should be aware that compliance with the above conditions may not
prevent degradation of service in some situations. Repairs to certified equipment should be coordinated by a representative designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. Caution: Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.''

Navigation menu