Page 46 / 108 Scroll up to view Page 41 - 45
46
Manually Configuring your Router
Setting up a Bridge Between your Router
and a Secondary Access Point
Bridging your Belkin Router to a secondary Access Point requires that you
access the Router’s Advanced Setup Utility and enter the MAC address of the
Access Point in the appropriate area. There are also a few other requirements.
PLEASE BE SURE TO FOLLOW THE STEPS BELOW CAREFULLY.
1.
Set your Access Point to the same channel as the Router.
For
more information on changing channels, see “Wireless - Channel
and SSID” section of this User Manual.
2.
Find the Access Point’s MAC address on the bottom of the
Access Point. There are two MAC addresses on the bottom label.
You will need the MAC address named “WLAN MAC Address”.
The MAC address starts with 0030BD and is followed by six other
numbers or letters (i.e. 0030BD-XXXXXX). Write the MAC address
below. Go to the next step.
3.
Place your secondary Access Point within range of your Wireless
Router and near the area where you want to extend the range
or add the network segment. Typically, indoor range should be
between 100 and 200 feet.
4.
Connect power to your Access Point. Make sure the Access Point
is on and proceed to the next step.
5.
From a computer already connected to your Router, access the
Advanced Setup Utility by opening your browser. In the address
bar, type in “192.168.2.1”. Do not type in “www” or “http://”
before the number. Note: If you have changed your Router’s IP
address, use that IP address.
6.
You will see the Router’s user interface in the browser window.
Click “Wireless Bridge” (2) on the left-hand side of the screen.
You will see the following screen.
FCC ID: K7SF5D7130A
model
# F5D7131
Wireless
Range Extender/
Access Point
IC: 3623A-F5D7130A
Complies with Canada RSS-210
P81807
F5D7131
WLAN MAC Address
Serial #
LAN MAC Address
Page 47 / 108
Manually Configuring your Router
47
section
2
1
3
4
5
6
7
8
9
10
7.
Check the box that says “Enable ONLY specific Access Points to
connect” (1).
8.
In the field named “AP1” (3), type in the MAC address of your
secondary Access Point. When you have typed in the address,
click “Apply Changes”.
9.
Bridging is now set up.
Note
: It may take up to a minute for the bridged connection to
properly establish itself. In some cases it may be necessary to restart
the access point and the router to initiate the bridge.
Page 48 / 108
48
Manually Configuring your Router
Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
• IP Spoofing
• Land Attack
• Ping of Death (PoD)
• Denial of Service (DoS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “Stealth”, meaning that
essentially they do not exist to a would-be hacker. You can turn
the firewall function off if needed; however, it is recommended that
you leave the firewall enabled. Disabling the firewall protection will
not leave your network completely vulnerable to hacker attacks,
but it is recommended that you leave the firewall enabled.
Page 49 / 108
Manually Configuring your Router
49
section
2
1
3
4
5
6
7
8
9
10
Virtual Servers
Virtual servers allow you to route external (Internet) calls for services such
as a web server (port 80), FTP server (Port 21), or other applications,
through your Router to your internal network. Since your internal
computers are protected by a firewall, machines from the Internet cannot
get to them because they cannot be “seen”. If you need to configure
the virtual server function for a specific application, you will need to
contact the application vendor to find out which port settings you
need. You can manually input this port information into the Router.
Choosing an Application
Select your application from the drop-down list. Click “Add”. The settings
will be transferred to the next available space in the screen. Click “Apply
Changes” to save the setting for that application. To remove an application,
select the number of the row that you want to remove then click “Clear”.
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided for
the internal (server) machine, the port(s) required to pass, select the port
type (TCP or UDP), and click “Apply Changes”. Each inbound port entry
has two fields with 5 characters maximum per field that allows a start
and end port range, e.g. [xxxxx]-[xxxxx]. For each entry, you can enter a
single port value by filling in the two fields with the same value (e.g. [7500]-
[7500] or a wide range of ports (e.g. [7500]-[9000]). If you need multiple
single port value or mixture of ranges and a single value, you must use
multiple entries up to the maximum of 20 entries (e.g. 1. [7500]-[7500], 2.
[8023]-[8023], 3. [9000]-[9000]). You can only pass one port per internal
IP address. Opening ports in your firewall can pose a security risk. You
can enable and disable settings very quickly. It is recommended that
you disable the settings when you are not using a specific application.
Page 50 / 108
50
Manually Configuring your Router
Client IP Filters
The Router can be configured to restrict access to the Internet, email, or
other network services at specific days and times. Restriction can be set
for a single computer, a range of computers, or multiple computers.
Access Control
Access control allows users to define the outgoing traffic permitted or denied
access through the WAN interface. The default is to permit all outgoing traffic.
To configure restrictive access to your computers, do the following:
1.
Click “Add PC” on the “Access Control” screen.
2.
Define the appropriate settings for client PC services (as shown
on the following screen).

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top