Page 6 / 101 Scroll up to view Page 1 - 5
Introduction
4
2.
Avoid Obstacles and Interference
Avoid placing your Router near devices that may emit radio
“noise,” such as microwave ovens. Dense objects that can inhibit
wireless communication include:
• Refrigerators
• Washers and/or dryers
• Metal cabinets
• Large aquariums
• Metallic-based, UV-tinted windows
If your wireless signal seems weak in some spots, make sure that
objects such as these are not blocking the signal’s path (between
your computers and Router).
3.
Cordless Phones
If the performance of your wireless network is impaired after
attending to the above issues, and you have a cordless phone:
• Try moving cordless phones away from your Router and your
wireless-enabled computers.
• Unplug and remove the battery from any cordless phone
that operates on the 2.4GHz band (check manufacturer’s
information). If this fixes the problem, your phone may
be interfering.
• If your phone supports channel selection, change the channel
on the phone to the farthest channel from your wireless
network. For example, change the phone to channel 1 and
move your Router to channel 11. See your phone’s user
manual for detailed instructions.
• If necessary, consider switching to a 900MHz or 5GHz
cordless phone.
Page 7 / 101
1
section
Introduction
9
2
3
4
5
6
7
8
10
5
4.
Choose the “Quietest” Channel for your Wireless Network
In locations where homes or offices are close together, such as
apartment buildings or office complexes, there may be wireless
networks nearby that can conflict with yours.
Use the Site Survey capabilities found in the Wireless Utility of
your wireless adapter to locate any other wireless networks that
are available (see your wireless adapter’s user manual), and move
your Router and computers to a channel as far away from other
networks as possible.
• Experiment with more than one of the available channels, in
order to find the clearest connection and avoid interference
from neighboring cordless phones or other wireless devices.
• For Belkin wireless networking products, use the detailed Site
Survey and wireless channel information included with your
wireless network card. See your network card’s user guide for
more information.
These guidelines should allow you to cover the maximum
possible area with your Router. Should you need to cover an
even wider area, we suggest the Belkin Wireless Range
Extender/Access Point.
Page 8 / 101
Introduction
6
5.
Secure Connections, VPNs, and AOL
Secure connections typically require a user name and
password, and are used where security is important. Secure
connections include:
• Virtual Private Network (VPN) connections, often used to connect
remotely to an office network
• The “Bring Your Own Access” program from America Online (AOL),
which lets you use AOL through broadband provided by another
cable or DSL service
• Most online banking websites
• Many commercial websites that require a user name and password to
access your account
Secure connections can be interrupted by a computer’s power
management setting, which causes it to “go to sleep.” The simplest
solution to avoid this is to simply reconnect by rerunning the VPN or
AOL software, or by re-logging into the secure website.
A second alternative is to change your computer’s power management
settings so it does not go to sleep; however, this may not be
appropriate for portable computers. To change your power management
setting under Windows, see the “Power Options” item in the Control
Panel.
If you continue to have difficulty with Secure Connections, VPNs, and
AOL, please review the steps above to be sure you have addressed
these issues.
Page 9 / 101
1
section
Introduction
9
2
3
4
5
6
7
8
10
7
Free Tech Support*
You can find additional support information on our website at
www.belkin.com through the tech-support area.
If you want to contact technical support by phone, please call the
number you need from the list below*.
*Local rates apply.
Country
Number
Internet adress
AUSTRIA
0820 200766
BELGIUM
07 07 00 073
CZECH REPUBLIC
239 000 406
DENMARK
701 22 403
FINLAND
00800 - 22 35 54 60
FRANCE
08 - 25 54 00 26
GERMANY
0180 - 500 57 09
GREECE
00800 - 44 14 23 90
HUNGARY
06 - 17 77 49 06
ICELAND
800 8534
IRELAND
0818 55 50 06
ITALY
02 - 69 43 02 51
LUXEMBOURG
34 20 80 85 60
NETHERLANDS
0900 - 040 07 90
0.10 per minute
NORWAY
81 50 0287
POLAND
00800 - 441 17 37
PORTUGAL
707 200 676
RUSSIA
495 580 9541
SOUTH AFRICA
0800 - 99 15 21
SPAIN
902 - 02 43 66
SWEDEN
07 - 71 40 04 53
SWITZERLAND
08 - 48 00 02 19
UNITED KINGDOM
0845 - 607 77 87
OTHER COUNTRIES
+44 - 1933 35 20 00
Page 10 / 101
Product Overview
8
Product Features
In minutes you will be able to share your Internet connection and
network your computers. The following is a list of features that make
your new Belkin N Wireless Modem Router an ideal solution for your
home or small office network.
Works with Both PCs and Mac
®
Computers
The Router supports a variety of networking environments including
Mac OS
®
8.x, 9.x, X v10.x, Linux
®
, Windows
®
98, Me, NT
®
, 2000, XP,
and Vista
. All that is needed is an Internet browser and a network
adapter that supports TCP/IP (the standard language of the Internet).
Patent-Pending Network Status Display
Lighted LEDs on the front of the Router indicate which functions
are in operation. You’ll know at-a-glance whether your Router is
connected to the Internet. This feature eliminates the need for
advanced software and status-monitoring procedures.
Web-Based Advanced User Interface
You can set up the Router’s advanced functions easily through your
web browser, without having to install additional software onto the
computer. There are no disks to install or keep track of and, best
of all, you can make changes and perform setup functions from any
computer on the network quickly and easily.
NAT IP Address Sharing
Your Router employs Network Address Translation (NAT) to share the
single IP address assigned to you by your Internet Service Provider
while saving the cost of adding additional IP addresses to your
Internet service account.
SPI Firewall
Your Router is equipped with a firewall that will protect your network
from a wide array of common hacker attacks including IP Spoofing,
Land Attack, Ping of Death (PoD), Denial of Service (DoS), IP with
zero length, Smurf Attack, TCP Null Scan, SYN flood, UDP flooding,
Tear Drop Attack, ICMP defect, RIP defect, and fragment flooding.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top