Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual BELKIN F5D8231-4V1. We hope that this BELKIN F5D8231-4V1 user guide will be useful to you.
Lastmanuals help download the user guide BELKIN F5D8231-4V1.
Detailed instructions for use are in the User's Guide.
[. . . ] N1 Wireless Router
User Manual
F5D8231-4
Table of Contents
1. 1 Placement of your N1 Wireless Router . 10 Setup Assistant Software System Requirements . Connecting and Configuring your Router . [. . . ] Select the "Allow" radio button (1) to begin setting up a list of
computers allowed to connect to the wireless network.
2.
Next, in the "MAC Address" field that is blank (3), type in the MAC address of the wireless computer you want to be able to access the wireless network, then click "<<Add" (4). Continue to do this until all of the computers you want to add have been entered. Click "Apply Changes" (5) to finish.
3. 4.
Setting up a Deny Access List
The "Deny Access" list lets you specify computers that you DO NOT want to access the network. Any computer in the list will not be allowed access to the wireless network. 2.
Select the "Deny" radio button (2) to begin setting up a list of computers to be denied access to the wireless network. Next, in the "MAC Address" field that is blank (3), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click "<<Add" (4). Continue to do this until all of the computers you want to deny access to have been entered. Click "Apply Changes" (5) to finish.
3. 4.
(1) (2) (3) (5) (4)
54
Using the Web-Based Advanced User Interface
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: · · · · · · · · · · · · IP Spoofing Land Attack Ping of Death (PoD) Denial of Service (DoS) IP with zero length Smurf Attack TCP Null Scan SYN flood UDP flooding Tear Drop Attack ICMP defect RIP defect Fragment flooding
The firewall also masks common ports that are frequently used to attack networks. These ports appear to be "stealth" meaning that for all intents and purposes, they do not exist to a would-be hacker. You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled.
55
Using the Web-Based Advanced User Interface
1 2 3 4 5
section
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen". A list of common applications has been provided in case you need to configure the Virtual Server function for a specific application. If your application is not listed, you will need to contact the application vendor to find out which port settings you need.
6 7 8 9 10
Choosing an Application
Select your application from the drop-down list. The settings will be transferred to the next available space in the screen. Click "Apply Changes" to save the setting for that application. To remove an application, select the number of the row that you want to remove then click "Clear".
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass (use a comma between multiple ports), select the port type (TCP or UDP), and click "Apply Changes". You can only pass one port per internal IP address. Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. [. . . ] Belkin will repair or replace, at its option, any defective product free of charge (except for shipping charges for the product). All above warranties are null and void if the Belkin product is not provided to Belkin Corporation for inspection upon Belkin's request at the sole expense of the purchaser, or if Belkin Corporation determines that the Belkin product has been improperly installed, altered in any way, or tampered with. The Belkin Product Warranty does not protect against acts of God (other than lightning) such as flood, earthquake, war, vandalism, theft, normal-use wear and tear, erosion, depletion, obsolescence, abuse, damage due to low voltage disturbances (i. e. brownouts or sags), non-authorized program, or system equipment modification or alteration. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D8231-4V1
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D8231-4V1 will begin.