Page 46 / 91 Scroll up to view Page 41 - 45
44
N+ Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Setting WEP Encryption
Note to Mac users
: The “Passphrase” option will not operate with
Apple® AirPort®° To configure encryption for your Mac computer, set
the encryption using the manual method described in the next section°
1�
Select “128-bit WEP” or “64-bit WEP” from the drop-down menu°
2�
After selecting your WEP encryption mode, you can enter you WEP
key manually by typing in the hex WEP key manually, or you can
type a passphrase in the “PassPhrase” field and click “Generate” to
create a WEP key from the passphrase° Click “Apply Changes” to
finish° You must now set all of your clients to match these settings°
Using a Hexadecimal Key
A hexadecimal key is a mixture of numbers and letters from A–F and
0–9° 64-bit keys are 10 digits long and can be divided into five two-digit
numbers° 128-bit keys are 26 digits long and can be divided into 13 two-
digit numbers°
For instance:
AF 0F 4B C3 D4 = 64-bit key
C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 =
128-bit key
In the boxes below, make up your key by writing in two characters
between A–F and 0–9° You will use this key to program the encryption
settings on your Router and your wireless computers°
Note to Mac users
: Original Apple AirPort products support 64-bit
encryption only° Apple AirPort 2 products can support 64-bit or 128-bit
encryption° Please check your product to see which version you are
using° If you cannot configure your network with 128-bit encryption, try
64-bit encryption°
3�
Encryption in the Router is now set° Each of your computers on
your wireless network will now need to be configured with the same
passphrase° Refer to the documentation of your wireless network
adapter for information on making this change°
Downloaded from
www.Manualslib.com
manuals search engine
Page 47 / 91
45
N+ Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Guest Access
: This option allows guest users access to the Internet
while keeping them away from your private network° By default, this
option is enabled° Guest users should connect to the Belkin N+ Guest
network°
Security options for Guest Access:
Hotel Style: Users will be redirected to a hotel-style landing page when
they first try to access the Internet° They must correctly enter in the
passphrase to log in°
WPA/WPA2-PSK: This option is similar to the security mode for the main
router network° Users must correctly enter the PSK in order to join the
guest network°
Downloaded from
www.Manualslib.com
manuals search engine
Page 48 / 91
46
N+ Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Using the Access Point Mode
Note
: This advanced feature should be employed by advanced users
only° The Router can be configured to work as a wireless network
access point° Using this mode will defeat the NAT IP sharing feature and
DHCP server° In AP mode, the Router will need to be configured with an
IP address that is in the same subnet as the rest of the network that you
will bridge to° The default IP address is 192°168°2°254 and subnet mask
is 255°255°255°0° These can be customized for your need°
1�
Enable the AP mode my selecting “Enable” in the “Use as Access
Point only” page° When you select this option, you will be able to
change the IP settings°
2�
Set your IP settings to match your network° Click “Apply Changes”°
3�
Connect a cable from the WAN port on the Router to your existing
network°
The Router is now acting as an access point° To access the Router
advanced user interface again, type the IP address you specified into
your browser’s navigation bar° You can set the encryption settings, MAC
address filtering, SSID, and channel normally°
Downloaded from
www.Manualslib.com
manuals search engine
Page 49 / 91
47
N+ Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks° These ports appear to be “stealth” meaning that for
all intents and purposes, they do not exist to a would-be hacker° You
can turn the firewall function off if needed; however, it is recommended
that you leave the firewall enabled° Disabling the firewall protection will
not leave your network completely vulnerable to hacker attacks, but it is
recommended that you leave the firewall enabled°
Downloaded from
www.Manualslib.com
manuals search engine
Page 50 / 91
48
N+ Wireless Router
SECTIONS
Table of Contents
1
2
3
4
5
7
8
9
10
6
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring Internal Forwarding Settings
The Virtual Servers function will allow you to route external (Internet)
calls for services such as a web server (port 80), FTP server (Port 21), or
other applications through your Router to your internal network° Since
your internal computers are protected by a firewall, computers outside
your network (over the Internet) cannot get to them because they cannot
be “seen”° A list of common applications has been provided in case you
need to configure the Virtual Server function for a specific application°
If your application is not listed, you will need to contact the application
vendor to find out which port settings you need°
Choosing an Application
Select your application from the drop-down list° Click “Add”° The
settings will be transferred to the next available space in the screen°
Click “Apply Changes” to save the setting for that application° To remove
an application, select the number of the row that you want to remove
then click “Clear”°
Manually Entering Settings into the Virtual Server
To manually enter settings, enter the IP address in the space provided
for the internal (server) machine, the port(s) required to pass (use a
comma between multiple ports), select the port type (TCP or UDP),
and click “Apply Changes”° You can only pass one port per internal IP
address° Opening ports in your firewall can pose a security risk° You can
enable and disable settings very quickly° It is recommended that you
disable the settings when you are not using a specific application°
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top