Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual BELKIN F5D8636. We hope that this BELKIN F5D8636 user guide will be useful to you.
Lastmanuals help download the user guide BELKIN F5D8636.
Detailed instructions for use are in the User's Guide.
[. . . ] N Wireless Modem Router
User Manual
PM01527ea F5D8636-4
English Français DEutsch nEDErl anDs Español italiano
Table of CoNTeNTs
table of contents
sections
1
2
3
4
5
6
7
8
9
10
1 Introduction . . 1 Placement of your N Wireless Modem Router . . 9 Setup Assistant Software System Requirements . . 9 4 Connecting and Configuring your Modem Router . [. . . ] 128-bit keys are 26 digits long and can be divided into 13 two-digit numbers .
For instance: af 0f 4b C3 d4 = 64-bit key C3 03 0f af 0f 4b b2 C3 d4 4b C3 d4 e7 = 128-bit key In the boxes below, make up your key by writing in two characters between AF and 09 . You will use this key to program the encryption settings on your Router and your wireless computers .
Note to Mac users: Original Apple AirPort products support 64-bit encryption only . Apple AirPort 2 products can support 64-bit or 128-bit encryption . Please check your product to see which version you are using . If you cannot configure your network with 128-bit encryption, try 64-bit encryption .
N Wireless Modem Router
51
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
setting MaC address Control
The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network . Note: This list applies only to wireless computers . This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access . When you enable this feature, you must enter the MAC address of each client (computer) to which you want to allow network access . The "Block" feature lets you turn on and off access to the network easily for any computer without having to add and remove the computer's MAC address from the list . Select the "Allow" radio button (1) to begin setting up a list of computers allowed to connect to the wireless network . Next, in the "MAC Address" field that is blank (2), type in the MAC address of the wireless computer you want to be able to access the wireless network, then click "<<Add" (3) . Continue to do this until all of the computers you want to add have been entered . Click "Apply Changes" (4) to finish .
(2) (3) (4)
(1)
N Wireless Modem Router
52
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
setting up a deny access list The "Deny Access" list lets you specify computers that you DO NOT want to access the network . Any computer in the list will not be allowed access to the wireless network . Select the "Deny" radio button (1) to begin setting up a list of computers to be denied access to the wireless network . Next, in the "MAC Address" field that is blank (2), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click "<<Add" (3) . Continue to do this until all of the computers you want to deny access to have been entered . Click "Apply Changes" (4) to finish .
(2)
(3) (4)
N Wireless Modem Router
53
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
Configuring the firewall
Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: · · · · · · · · · · · · IP Spoofing Land Attack Ping of Death (PoD) Denial of Service (DoS) IP with zero length Smurf Attack TCP Null Scan SYN flood UDP flooding Tear Drop Attack ICMP defect RIP defect Fragment flooding The firewall also masks common ports that are frequently used to attack networks . These ports appear to be "stealth" meaning that for all intents and purposes, they do not exist to a would-be hacker . You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled . Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled .
N Wireless Modem Router
54
UsINg THe Web-based adVaNCed UseR INTeRfaCe
table of contents
sections
1
2
3
4
5
6
7
8
9
10
Configuring Internal forwarding settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network . Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen" . [. . . ] All above warranties are null and void if the Belkin product is not provided to Belkin for inspection upon Belkin's request at the sole expense of the purchaser, or if Belkin determines that the Belkin product How to get service . To get service for your Belkin product you must take the following steps: 1 . Contact Belkin Tech Support at the number listed on page 93, within 15 days of the Occurrence . Be prepared to provide the following information: a . [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D8636
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D8636 will begin.