Page 81 / 92 Scroll up to view Page 76 - 80
Appendixes
79
section
2
1
3
4
5
6
7
8
9
10
11
12
ESSID Broadcast
Many wireless network adapters currently on the market possess a feature
known as site survey. It scans the air for any available network and allows
each computer to automatically select a network from the survey. This
occurs if the computer’s SSID is set to “ANY”. Your Belkin Router can block
this random search for a network. If you disable the “ESSID Broadcast”
feature, the only way a computer can join your network is by its SSID being
set to the specific name of the network (like WLAN). Be sure that you know
your SSID (network name) before enabling this feature. It is possible to
make your wireless network nearly invisible. By turning off the broadcast of
the SSID, your network will not appear in a site survey. Obviously, turning
off the broadcast feature of the SSID helps increase security.
Encryption
Setting encryption can help keep your network secure. The Router
uses Wired Equivalent Privacy (WEP) and WIFI protested Access
(WPA) encrytion to protect to protect your data and features two rates
of encryption: 64-bit and 128-bit. Encryption works on a system of
keys. The key on the computer must match the key on the Router,
and there are two ways to make a key. The easiest is to let the
Router’s software convert a passphrase you’ve created into a key.
The advanced method is to enter the keys manually.
Virtual Servers
This function will allow you to route external (Internet) calls for services
such as a web server (port 80), FTP server (Port 21), or other applications
through your Router to your internal network. Since your internal computers
are protected by a firewall, machines from the Internet cannot get to them
because they cannot be “seen”. If you need to configure the virtual server
function for a specific application, you will need to contact the application
vendor to find out which port settings you need.
To manually enter settings, enter the IP address in the space provided for
the internal machine, the port type (TCP or UDP), and the LAN and public
port(s) required to pass. Then select “Enable” and click “Set”. You can only
pass one port per internal IP address. Opening ports in your firewall can
pose a security risk. You can enable and disable settings very quickly. It
is recommended that you disable the settings when you are not using a
specific application.
Page 82 / 92
80
Appendixes
Client IP Filters
The Router can be configured to restrict access to the Internet,
email, or other network services at specific days and times.
Restriction can be set for a single computer, a range of computers,
or multiple computers.
MAC Address Filtering
The MAC address filter is a powerful security feature that allows
you to specify which computers are allowed on the network. Any
computer attempting to access the network that is not specified in
the filter list will be denied access. When you enable this feature, you
must enter the MAC address of each client on your network to allow
network access to each or copy the MAC address by selecting the
name of the computer from the “DHCP Client List”. To enable this
feature, select “Enable”. Next, click “Apply Changes” to save
the settings.
DMZ
If you have a client PC that cannot run an Internet application
properly from behind the firewall, you can open the client up to
unrestricted two-way Internet access. This may be necessary if the
NAT feature is causing problems with an application such as a game
or video conferencing application. Use this feature on a temporary
basis.
The computer in the DMZ is not protected from hacker
attacks.
To put a computer in the DMZ, enter the last digits of its
LAN IP address in the “Static IP” field and click “Apply Changes” for
the change to take effect.
If you have only one public (WAN) IP address, then you can leave
the public IP to “0.0.0.0”. If you are using multiple public (WAN) IP
addresses, it is possible to select which public (WAN) IP address the
DMZ host will be directed to. Type in the public (WAN) IP address
you wish the DMZ host to direct to, enter the last two digits of the IP
address of the DMZ host computer, and click “Apply Changes”.
Page 83 / 92
Appendixes
81
section
2
1
3
4
5
6
7
8
9
10
11
12
Administrator Password
The Router ships with NO password entered. If you wish to add
a password for more security, you can set a password from your
Router’s web-based user interface. Keep your password in a safe
place as you will need this password if you need to log into the
Router in the future. It is
STRONGLY RECOMMENDED
that you set
a password if you plan to use the remote management feature. The
login time-out option allows you to set the period of time that you can
be logged into the Router’s advanced setup interface. The timer starts
when there has been no activity. For example, you have made some
changes in the advanced setup interface, then left your computer
alone without clicking “Logout”.
Assuming the time-out is set to 10 minutes, then 10 minutes after
you leave, the login session will expire. You will have to log into the
Router again to make any more changes. The login time-out option
is for security purposes and the default is set to 10 minutes. Note,
only one computer can be logged into the Router’s advanced setup
interface at a time.
Time and Time Zone
The Router keeps time by connecting to a Simple Network Time
Protocol (SNTP) server. This allows the Router to synchronize the
system clock to the global Internet. The synchronized clock in the
Router is used to record the security log and control client filtering.
Select the time zone that you reside in. If you reside in an area that
observes daylight saving time, then place a check mark in the box
next to “Enable Daylight Saving”. The system clock may not update
immediately. Allow at least 15 minutes for the Router to contact the
time servers on the Internet and get a response.
Remote Management
Before you enable this function,
MAKE SURE YOU HAVE SET THE
ADMINISTRATOR PASSWORD
. Remote management allows you to
make changes to your Router’s settings from anywhere on the Internet.
Page 84 / 92
82
Appendixes
UPnP
UPnP (Universal Plug-and-Play) is a technology that offers seamless
operation of voice messaging, video messaging, games, and other
applications that are UPnP-compliant. Some applications require
the Router’s firewall to be configured in a specific way to operate
properly. This usually requires opening TCP and UDP ports and in
some instances setting trigger ports. An application that is
UPnP-compliant has the ability to communicate with the Router,
basically “telling” the Router which way it needs the firewall
configured. The Router ships with the UPnP feature disabled. If
you are using any applications that are UPnP-compliant, and wish
to take advantage of the UPnP features, you can enable the UPnP
feature. Simply select “Enable” in the “UPnP Enabling” section of the
“Utilities” page. Click “Apply Changes” to save the change.
Page 85 / 92
Appendixes
83
section
2
1
3
4
5
6
7
8
9
10
11
12
Appendix B: Important Factors for Placement and Setup
Note:
While some of the items listed below can affect network
performance, they will not prohibit your wireless network from
functioning; if you are concerned that your network is not operating
at its maximum effectiveness, this checklist may help.
1.
Wireless Router (or Access Point) Placement
Place your Wireless Router (or access point), the central
connection point of your network, as close as possible to the
center of your wireless network devices.
To achieve the best wireless network coverage for your “wireless
clients” (i.e., computers enabled by Belkin Wireless Notebook
Network Cards, Wireless Desktop Network Cards, and Wireless
USB Adapters):
• Ensure that your Wireless Router’s (or access point’s)
networking antennas are parallel to each other, and are
positioned vertically (toward the ceiling). If your Wireless
Router (or access point) itself is positioned vertically, point the
antennas a much as possible in an upward direction.
• In multistory homes, place the Wireless Router (or access
point) on a floor that is as close to the center of the home
as possible. This may mean placing the Wireless Router (or
access point) on an upper floor.
Try not to place the Wireless Router (or access point) near a
cordless 2.4GHz phone.
2.
Avoid Obstacles and Interference
Avoid placing your Wireless Router (or access point) near devices
that may emit radio “noise,” such as microwave ovens. Dense
objects that can inhibit wireless communication include:
• Refrigerators
• Washers and/or dryers
• Metal cabinets
• Large aquariums
• Metallic-based UV tinted windows

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top