Page 51 / 92 Scroll up to view Page 46 - 50
Manually Configuring your Router
49
section
2
1
3
4
5
6
7
8
9
10
11
12
Connecting your Computer to a Wireless Network that Requires
WPA (with radius server)
1.
Double-click the “Signal Indicator” icon to bring up the “Wireless
Network” screen. The “Advanced” button will allow you to view
and configure more options of your wireless card.
2.
Under the “Wireless Networks” tab, select a network name from
the “Available networks” list and click “Configure”.
3.
Under “Network Authentication” select WPA.
4.
Under the “Authentication” tab, select the settings that are
indicated by your network administrator.
5.
Click “OK” to save the settings.
Setting Up WPA for a Non-Belkin Wireless Desktop and Wireless
Notebook Cards
For non-Belkin WPA Wireless Desktop and Wireless Notebook
Cards that are not equipped with WPA-enabled software, a file from
Microsoft called “Windows XP Support Patch for Wireless Protected
Access” is available as a free download.
Please Note:
The file that Microsoft has made available works only
with Windows XP. Other operating systems are not supported at
this time.
Page 52 / 92
50
Manually Configuring your Router
Important:
You also need to ensure that the wireless card manufacturer supports WPA
and that you have downloaded and installed the latest driver from their support site.
Supported Operating Systems:
• Windows XP Professional
• Windows XP Home Edition
Setting Up Windows XP Wireless Network Utility to Use WPA-PSK
In order to use WPA-PSK, ensure you are using Windows Wireless Network Utility by
doing the following:
5.
For a home or small business user,
select “WPA-PSK” under “Network
Authentication”.
Note:
Select “WPA” if you are using this
computer to connect to a corporate network
that supports an authentication server such
as a radius server. Please consult your
network administrator for further information.
1.
Under Windows XP, click “Start >
Control Panel >
Network Connections”.
2.
Right-click on “Wireless Network
Connection”, and
select “Properties”.
3.
Clicking on the “Wireless Networks”
tab will display the following
screen. Ensure the “Use Windows
to configure my wireless network
settings” check box is checked.
4.
Under the “Wireless Networks” tab,
click the “Configure” button, and you
will see the following screen.
Page 53 / 92
Manually Configuring your Router
51
section
2
1
3
4
5
6
7
8
9
10
11
12
6.
Select “TKIP” or “AES” under “Data Encryption”. This setting will have to be
identical to the Router that you set up.
7.
Type in your encryption key in the
“Network Key” box.
Important:
Enter your Pre-Shared key.
This can be from eight to 63 characters
and can be letters, numbers, or symbols.
This same key must be used on all of the
clients that you set up.
8.
Click “OK” to apply settings.
Wireless Bridge
Wireless Bridging or Wireless Distribution System (WDS) is used to connect Wireless
Routers and Access points together to extend a network.
Click on the Drop
down menu next
to ‘Bridge Mode’
to select either:
Auto:
Automatically scan
for Access Points
to connect to.
Once the scan is
complete a list of
available Access
Points will appear.
Simply select the
Access Point to
bridge to by ticking
the box. Please
note that the area
scan can take a
few seconds.
Manual:
To enter the wireless MAC address(es) of the Access Points to bridge with, manually.
Disabled:
To disable Wireless Bridging
Page 54 / 92
52
Manually Configuring your Router
1
Wireless channels must match between Router and AP.
2
Security settings (WEP) must match between Router and AP.
3
If MAC filtering is enabled, user must be sure to add the WLAN MAC
address(es) of the Router/AP in order to allow communication with each
other.
4
If using a network protected by WPA, the SSID on both Access Points
must be the same.
Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including:
IP Spoofing
Land Attack
Ping of Death (PoD)
Denial of Service (DoS)
IP with zero length
Smurf Attack
TCP Null Scan
SYN flood
UDP flooding
Tear Drop Attack
ICMP defect
RIP defect
Fragment flooding
The firewall also masks common ports that are frequently used to
attack networks. These ports appear to be “Stealth”, meaning that
essentially they do not exist to a would-be hacker. You can turn the
firewall function off if needed; however, it is recommended that you
leave the firewall enabled. Disabling the firewall protection will not
leave your network completely vulnerable to hacker attacks, but it is
recommended that you leave the firewall enabled.
Page 55 / 92
Manually Configuring your Router
53
section
2
1
3
4
5
6
7
8
9
10
11
12
Virtual Servers
Virtual servers allow you to route external (Internet) calls for services such
as a web server (port 80), FTP server (Port 21), or other applications,
through your Router to your internal network. Since your internal
computers are protected by a firewall, machines from the Internet cannot
get to them because they cannot be “seen”. If you need to configure the
virtual server function for a specific application, you will need to contact
the application vendor to find out which port settings you need. You can
manually input this port information into the Router.
Choosing an Application
A list of popular applications has been included to choose from. Click
on “Select a Service” then select your application from the drop-down
list. The settings will be transferred to the first row available. Click
“Add” to save the setting for that application.
Manually Entering Settings into the Virtual Server
To manually enter settings, click on “Custom Server” and enter a
name for the server. Enter the Server IP address in the space provided
for the internal machine and the port(s) required to pass. Then select
the protocol type (TCP or UDP), and then click “Add”.
Opening ports in your firewall can pose a security risk. You can enable
and disable settings very quickly. It is recommended that you disable
the settings when you are not using a specific application.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top