Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual BELKIN F5D8235-4. We hope that this BELKIN F5D8235-4 user guide will be useful to you.
Lastmanuals help download the user guide BELKIN F5D8235-4.
Detailed instructions for use are in the User's Guide.
[. . . ] N+ Wireless Router
User Manual
PM00736ea F5D8235-4
English Français DEutsch nEDErl anDs Español italiano
Table of CoNTeNTs
table of contents
sections
1
2
3
4
5
6
7
8
9
10
1 Introduction 1 Advantages of a Wireless Network . 1 Placement of your N+ Wireless Router . . 2 2 Product overview 5 Product Features . 5 3 Knowing your Router 7 Package Contents . [. . . ] 128-bit keys are 26 digits long and can be divided into 13 twodigit numbers . For instance: af 0f 4b C3 d4 = 64-bit key C3 03 0f af 0f 4b b2 C3 d4 4b C3 d4 e7 = 128-bit key In the boxes below, make up your key by writing in two characters between AF and 09 . You will use this key to program the encryption settings on your Router and your wireless computers .
3 Encryption in the Router is now set . Each of your computers on your wireless network will now need to be configured with the same passphrase . Refer to the documentation of your wireless network adapter for information on making this change .
Note to Mac users: Original Apple AirPort products support 64-bit encryption only . Apple AirPort 2 products can support 64-bit or 128-bit encryption . Please check your product to see which version you are using . If you cannot configure your network with 128-bit encryption, try 64-bit encryption .
N+ Wireless Router
44
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
guest access: This option allows guest users access to the Internet while keeping them away from your private network . Guest users should connect to the Belkin N+ Guest network .
security options for guest access: Hotel Style: Users will be redirected to a hotel-style landing page when they first try to access the Internet . They must correctly enter in the passphrase to log in . WPA/WPA2-PSK: This option is similar to the security mode for the main router network . Users must correctly enter the PSK in order to join the guest network .
N+ Wireless Router
45
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
Using the access Point Mode Note: This advanced feature should be employed by advanced users only . The Router can be configured to work as a wireless network access point . Using this mode will defeat the NAT IP sharing feature and DHCP server . In AP mode, the Router will need to be configured with an IP address that is in the same subnet as the rest of the network that you will bridge to . The default IP address is 192 . 168 . 2 . 254 and subnet mask is 255 . 255 . 255 . 0 . 1 Enable the AP mode my selecting "Enable" in the "Use as Access Point only" page . When you select this option, you will be able to change the IP settings .
2 Set your IP settings to match your network . 3 Connect a cable from the WAN port on the Router to your existing network . The Router is now acting as an access point . To access the Router advanced user interface again, type the IP address you specified into your browser's navigation bar . You can set the encryption settings, MAC address filtering, SSID, and channel normally .
N+ Wireless Router
46
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
Configuring the firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: · · · · · · · · · · · · IPSpoofing LandAttackPingofDeath(PoD) DenialofService(DoS) IPwithzerolength SmurfAttack TCPNullScan SYNflood UDPflooding TearDropAttack ICMPdefect RIPdefect Fragmentflooding
The firewall also masks common ports that are frequently used to attack networks . [. . . ] Belkin will repair or replace, at its option, any defective product free of charge (except for shipping charges for the product) . Belkin reserves the right to discontinue any of its products without notice, and disclaims any limited warranty to repair or replace any such discontinued products . In the event that Belkin is unable to repair or replace the product (for example, because it has been discontinued), Belkin will offer either a refund or a credit toward the purchase of another product from Belkin . com in an amount equal to the purchase price of the product as evidenced on the original purchase receipt as discounted by its natural use . [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D8235-4
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D8235-4 will begin.