Page 41 / 94 Scroll up to view Page 36 - 40
39
G Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
6
7
8
9
10
5
MANUALLY CONFIGURING YOUR ROUTER
Setting WPA/WPA2-PSK (no server)
From the “Allowed Client Type” drop-down menu, select
“WPA/WPA2”�
For “Authentication”, select “Pre-shared Key” for typical home/
SOHO use� This setting will have to be identical on the clients that
you set up�
Enter your pre-shared key� This can be from eight to 63 characters
and can be letters, numbers, or symbols� This same key must be
used on all of the clients that you set up� For example, your pre-
shared key might be something like: “Smith family network key”�
Click “Apply Changes” to finish� You must now set all clients to
match these settings�
WPA Setup
Note:
To use WPA security, all your clients must be upgraded to
drivers and software that support it� At the time of this User Manual’s
publication, a security patch download is available free from Microsoft�
This patch works only with the Windows XP operating system� You also
need to download the latest driver for your Belkin Wireless G Desktop
or Notebook Card from the Belkin support site� Other operating systems
are not supported at this time� Microsoft’s patch only supports devices
with WPA-enabled drivers such as Belkin 802�11g products�
There are two types of WPA security: WPA-PSK (no server) and WPA
(with radius server)� WPA-PSK (no server) uses a so-called pre-shared
key (PSK) as the security key� A pre-shared key is a password that is
between eight and 63 characters long� It can be a combination of letters,
numbers, and other characters� Each client uses the same key to access
the network� Typically, this mode will be used in a home environment�
WPA (with radius server) is a configuration wherein a radius server
distributes the keys to the clients automatically� This is typically used
in a business environment� WPA2 is the second generation of WPA,
offering a more advanced encryption technique over WPA�
Page 42 / 94
40
G Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
6
7
8
9
10
5
MANUALLY CONFIGURING YOUR ROUTER
Wireless Range Extension and Bridging
What is a Wireless Bridge?
A wireless bridge is actually an operation “mode” you can use to extend
the range of your wireless network, or add an extension of your network
in another area of your office or home without running cables�
Note:
We can make no guarantees that this feature will interoperate with
hardware from other wireless manufacturers�
Note:
Please make sure to download the latest firmware version for the
Router for optimal performance at: http://web�belkin�com/support�
Adding Another Network Segment Wirelessly
Connecting a network switch or hub to the Router’s RJ45 jack will allow
a number of computers connected to the switch access to the rest of
the network�
Setting up a Bridge Between your Router and a Secondary
Access Point
Bridging your Belkin Router to a secondary access point requires that
you access the Router’s Advanced Setup Utility and enter the MAC
address of the access point in the appropriate area� There are also a few
other requirements�
PLEASE BE SURE TO FOLLOW THE STEPS BELOW CAREFULLY�
Set your access point to the same channel as the Router� For more
information on changing channels, see the “Wireless - Channel and
SSID” section of this User Manual�
Find the access point’s MAC address on the bottom of the access
point� There are two MAC addresses on the bottom label� You will
need the MAC address named “WLAN MAC Address”� The MAC
address starts with “0030BD” and is followed by six other numbers
or letters (i�e�, 0030BD-XXXXXX)� Write the MAC address below�
Go to the next step�
Place your secondary access point within range of your Router
and near the area where you want to extend the range or add the
network segment� Typically, indoor range should be between 100
and 200 feet�
Connect power to your access point� Make sure the access point is
on and proceed to the next step�
From a computer already connected to your Router, access the
Advanced Setup Utility by opening your browser� In the address
bar, type in “192�168�2�1”� Do not type in “www” or “http://” before
the number�
Note:
If you have changed your Router’s IP address,
use that IP address�
Page 43 / 94
41
G Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
6
7
8
9
10
5
MANUALLY CONFIGURING YOUR ROUTER
You will see the Router’s user interface in the browser window�
Click “Wireless Bridge”
(2)
on the left-hand side of the screen� You
will see the following screen�
Check the box that says, “Enable ONLY specific Access Points
to connect”
(1)
In the field named “AP1”
(3)
, type in the MAC address of your
secondary access point� When you have typed in the address,
click “Apply Changes”�
Bridging is now set up�
Note:
It may take up to a minute for the bridged connection to properly
establish itself� In some cases, it may be necessary to restart the access
point and the Router to initiate the bridge�
(1)
(3)
(2)
Page 44 / 94
42
G Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
6
7
8
9
10
5
MANUALLY CONFIGURING YOUR ROUTER
Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack
Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to attack
networks� These ports appear to be “Stealth”, meaning that essentially
they do not exist to a would-be hacker� You can turn the firewall function
off if needed; however, it is recommended that you leave the firewall
enabled� Disabling the firewall protection will not leave your network
completely vulnerable to hacker attacks, but it is recommended that you
leave the firewall enabled�
Virtual Servers
Virtual servers allow you to route external (Internet) calls for services
such as a web server (port 80), FTP server (Port 21), or other
applications, through your Router to your internal network� Since your
internal computers are protected by a firewall, machines from the
Internet cannot get to them because they cannot be “seen”� If you need
to configure the virtual server function for a specific application, you will
need to contact the application vendor to find out which port settings
you need� You can manually input this port information into the Router�
Page 45 / 94
43
G Wireless Modem Router
SECTIONS
Table of Contents
1
2
3
4
6
7
8
9
10
5
MANUALLY CONFIGURING YOUR ROUTER
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided
for the internal (server) machine, the port(s) required to pass, the port
type (TCP or UDP), and click “Apply Changes”� Each inbound port entry
has two fields with five characters maximum per field that allows a start
and end port range (e�g�, [xxxxx]-[xxxxx])� For each entry, you can enter
a single port value by filling in the two fields with the same value (e�g�,
[7500]-[7500]) or a wide range of ports (e�g�, [7500]-[9000])� If you need
multiple single-port values or a mixture of ranges and a single value,
you must use multiple entries up to the maximum of 20 entries (e�g�, 1�
[7500]-[7500], 2� [8023]-[8023], 3� [9000]-[9000])� You can only pass one
port per internal IP address� Opening ports in your firewall can pose
a security risk� You can enable and disable settings very quickly� It is
recommended that you disable the settings when you are not using a
specific application�
Choosing an Application
Select your application from the drop-down list� Click “Add”� The
settings will be transferred to the next available space in the screen�
Click “Apply Changes” to save the setting for that application� To remove
an application, select the number of the row that you want to remove,
then click “Clear”�

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top