User manual BELKIN F5D8636

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual BELKIN F5D8636. We hope that this BELKIN F5D8636 user guide will be useful to you.

Lastmanuals help download the user guide BELKIN F5D8636.


Mode d'emploi BELKIN F5D8636
Download
Manual abstract: user guide BELKIN F5D8636

Detailed instructions for use are in the User's Guide.

[. . . ] N Wireless Modem Router User Manual PM01527ea F5D8636-4 English Français DEutsch nEDErl anDs Español italiano Table of CoNTeNTs table of contents sections 1 2 3 4 5 6 7 8 9 10 1 Introduction . . 1 Placement of your N Wireless Modem Router . . 9 Setup Assistant Software System Requirements . . 9 4 Connecting and Configuring your Modem Router . [. . . ] 128-bit keys are 26 digits long and can be divided into 13 two-digit numbers . For instance: af 0f 4b C3 d4 = 64-bit key C3 03 0f af 0f 4b b2 C3 d4 4b C3 d4 e7 = 128-bit key In the boxes below, make up your key by writing in two characters between A­F and 0­9 . You will use this key to program the encryption settings on your Router and your wireless computers . Note to Mac users: Original Apple AirPort products support 64-bit encryption only . Apple AirPort 2 products can support 64-bit or 128-bit encryption . Please check your product to see which version you are using . If you cannot configure your network with 128-bit encryption, try 64-bit encryption . N Wireless Modem Router 51 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 setting MaC address Control The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network . Note: This list applies only to wireless computers . This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access . When you enable this feature, you must enter the MAC address of each client (computer) to which you want to allow network access . The "Block" feature lets you turn on and off access to the network easily for any computer without having to add and remove the computer's MAC address from the list . Select the "Allow" radio button (1) to begin setting up a list of computers allowed to connect to the wireless network . Next, in the "MAC Address" field that is blank (2), type in the MAC address of the wireless computer you want to be able to access the wireless network, then click "<<Add" (3) . Continue to do this until all of the computers you want to add have been entered . Click "Apply Changes" (4) to finish . (2) (3) (4) (1) N Wireless Modem Router 52 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 setting up a deny access list The "Deny Access" list lets you specify computers that you DO NOT want to access the network . Any computer in the list will not be allowed access to the wireless network . Select the "Deny" radio button (1) to begin setting up a list of computers to be denied access to the wireless network . Next, in the "MAC Address" field that is blank (2), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click "<<Add" (3) . Continue to do this until all of the computers you want to deny access to have been entered . Click "Apply Changes" (4) to finish . (2) (3) (4) N Wireless Modem Router 53 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 Configuring the firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: · · · · · · · · · · · · IP Spoofing Land Attack Ping of Death (PoD) Denial of Service (DoS) IP with zero length Smurf Attack TCP Null Scan SYN flood UDP flooding Tear Drop Attack ICMP defect RIP defect Fragment flooding The firewall also masks common ports that are frequently used to attack networks . These ports appear to be "stealth" meaning that for all intents and purposes, they do not exist to a would-be hacker . You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled . Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled . N Wireless Modem Router 54 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 Configuring Internal forwarding settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network . Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen" . [. . . ] All above warranties are null and void if the Belkin product is not provided to Belkin for inspection upon Belkin's request at the sole expense of the purchaser, or if Belkin determines that the Belkin product How to get service . To get service for your Belkin product you must take the following steps: 1 . Contact Belkin Tech Support at the number listed on page 93, within 15 days of the Occurrence . Be prepared to provide the following information: a . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D8636

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D8636 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag