User manual BELKIN F5D7631-4-ETEL

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual BELKIN F5D7631-4-ETEL. We hope that this BELKIN F5D7631-4-ETEL user guide will be useful to you.


BELKIN F5D7631-4-ETEL : Download the complete user guide (224 Ko)

Manual abstract: user guide BELKIN F5D7631-4-ETEL

Detailed instructions for use are in the User's Guide.

[. . . ] Works with Both PCs and Mac® Computers The Wireless ADSL Modem Router supports a variety of networking environments including Mac OS® 8. x, 9. x, X v10. x, AppleTalk®, Linux®, Windows® 95, 98, Me, NT®, 2000, and XP, and others. All that is needed is an Internet browser and a network adapter that supports TCP/IP (the standard language of the Internet). Front-Panel LED Display Lighted LEDs on the front of the Router indicate which functions are in operation. You'll know at-a-glance whether your Router is connected to the Internet. [. . . ] After selecting your WEP encryption mode, you can enter you WEP key manually by typing in the HEX WEP key manually, or you can type in a Passphrase in the Passphrase field and click "Generate" to create a WEP key from the passphrase. Each of your computers on your wireless network will now need to be configured with the same passphrase. Refer to the documentation of your wireless network adapter for information on making this change. Using a Hexadecimal Key A hexadecimal key is a mixture of numbers and letters from A­F and 0­9. For instance: AF 0F 4B C3 D4 = 64-bit key C3 03 0F AF 0F 4B B2 C3 D4 4B C3 D4 E7 = 128-bit key In the boxes below, make up your key by writing in two characters between A­F and 0­9. You will use this key to program the encryption settings on your Router and your wireless computers. 32 UNDERSTANDING THE WEB-BASED USER INTERFACE Note to Mac users: Original Apple AirPort products support 64-bit encryption only. If you cannot configure your network with 128-bit encryption, try 64-bit encryption. Firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: · · · · · · · · · · · · · IP Spoofing Land Attack Ping of Death (PoD) Denial of Service (DoS) IP with zero length Smurf Attack TCP Null Scan SYN flood UDP flooding Tear Drop Attack ICMP defect RIP defect Fragment flooding The firewall also masks common ports that are frequently used to attack networks. These ports appear to be "Stealth", meaning that essentially they do not exist to a would-be hacker. You can turn the firewall function off if needed, however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled. 33 UNDERSTANDING THE WEB-BASED USER INTERFACE Application Gateways Settings Application gateways let you select ports to be open for certain applications to work properly with the Network Address Translation (NAT) feature of the Router. When you enable this feature, you must enter the MAC address of each client on your network to allow network access to each, or copy the MAC address by selecting the name of the computer from the "DHCP Client List". Next, click "Apply Changes" to save the settings. 38 UNDERSTANDING THE WEB-BASED USER INTERFACE DMZ (Demilitarized Zone) If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. This may be necessary if the NAT feature is causing problems with an application such as a game or video conferencing application. The computer in the DMZ is not protected from hacker attacks. 39 UNDERSTANDING THE WEB-BASED USER INTERFACE To put a computer in the DMZ, enter the last digits of its LAN IP address in the Static IP field and click "Apply Changes" for the change to take effect. If you are using multiple Public (WAN) IP addresses, it is possible to select which Public (WAN) IP address the DMZ host will be directed to. Type in the Public (WAN) IP address you wish the DMZ host to direct to, enter the last two digits of the IP address of the DMZ host computer, and click "Apply Changes". Utilities The Utilities screen lets you manage different parameters of the Router and perform certain administrative functions. Restart Router Sometimes it may be necessary to restart or reboot the Router if it begins working improperly. Restarting or rebooting the Router will NOT delete any of your configuration settings. 40 UNDERSTANDING THE WEB-BASED USER INTERFACE Restarting the Router to Restore Normal Operation 1. Click "OK" to restart your Router. Restore Factory Defaults Using this option will restore all of the settings in the Router to the factory (default) settings. It is recommended that you back up your settings before you restore all of the defaults. 1. Click "OK" to restore factory defaults. 41 UNDERSTANDING THE WEB-BASED USER INTERFACE Saving/Backup Current Settings You can save your current configuration by using this feature. [. . . ] Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. Caution: Exposure to Radio Frequency Radiation. The radiated output power of this device is far below the FCC radio frequency exposure limits. Nevertheless, the device shall be used in such manner that the potential for human contact normal operation is minimized. When connecting an external antenna to the device, the antenna shall be placed in such a manner to minimize the potential for human contact during normal operation. In order to avoid the possibility of exceeding the FCC radio frequency exposure limits, human proximity to the antenna shall not be less than 20cm (8 inches) during normal operation. Federal Communications Commission Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D7631-4-ETEL




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D7631-4-ETEL will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.