User manual BELKIN F5D8636

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual BELKIN F5D8636. We hope that this BELKIN F5D8636 user guide will be useful to you.


BELKIN F5D8636 : Download the complete user guide (6949 Ko)

Manual abstract: user guide BELKIN F5D8636

Detailed instructions for use are in the User's Guide.

[. . . ] N Wireless Modem Router User Manual PM01527ea F5D8636-4 English Français DEutsch nEDErl anDs Español italiano Table of CoNTeNTs table of contents sections 1 2 3 4 5 6 7 8 9 10 1 Introduction . 94 N Wireless Modem Router i INTRodUCTIoN table of contents sections 1 2 3 4 5 6 7 8 9 10 Thank you for purchasing the Belkin N Wireless Modem Router (the Router) . Following are two short sections--the first discusses the benefits of home networking, and the other outlines best practices that maximize your wireless home network range and performance . Please be sure to read through this User Manual completely, and pay special attention to the section entitled "Placement of your N Wireless Modem Router" on page 3 . benefits of a Home Network · · · Share one high-speed Internet connection with all the computers in your home Share resources, such as files and hard drives among all the connected computers in your home Share a single printer with the entire family · · · Share documents, music, video, and digital pictures Store, retrieve, and copy files from one computer to another Simultaneously play games online, check Internet email, and chat advantages of a Wireless Network Here are some of the advantages of setting up a Belkin Wireless Network: · Mobility ­ you'll no longer need a dedicated "computer room"-- now you can work on a networked laptop or desktop computer anywhere within your wireless range Easy installation ­ Belkin's Setup Assistant application makes setup simple Flexibility ­ set up and access printers, computers, and other networking devices from anywhere in your home · Easy Expansion ­ the wide range of Belkin networking products let you expand your network to include devices such as printers and gaming consoles No cabling required ­ you can spare the expense and hassle of retrofitting Ethernet cabling throughout the home or office Widespread industry acceptance ­ choose from a wide range of interoperable networking products . · · · · N Wireless Modem Router 1 INTRodUCTIoN table of contents sections 1 2 3 4 5 6 7 8 9 10 Revolutionary N Wireless Technology with MIMo (N MIMo) Your Belkin N Wireless Modem Router uses a new smart-antenna technology called Multiple Input Multiple Output (MIMO) . [. . . ] Continue to do this until all of the computers you want to add have been entered . Click "Apply Changes" (4) to finish . (2) (3) (4) (1) N Wireless Modem Router 52 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 setting up a deny access list The "Deny Access" list lets you specify computers that you DO NOT want to access the network . Any computer in the list will not be allowed access to the wireless network . Select the "Deny" radio button (1) to begin setting up a list of computers to be denied access to the wireless network . Next, in the "MAC Address" field that is blank (2), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click "<<Add" (3) . Continue to do this until all of the computers you want to deny access to have been entered . Click "Apply Changes" (4) to finish . (2) (3) (4) N Wireless Modem Router 53 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 Configuring the firewall Your Router is equipped with a firewall that will protect your network from a wide array of common hacker attacks including: · · · · · · · · · · · · IP Spoofing Land Attack Ping of Death (PoD) Denial of Service (DoS) IP with zero length Smurf Attack TCP Null Scan SYN flood UDP flooding Tear Drop Attack ICMP defect RIP defect Fragment flooding The firewall also masks common ports that are frequently used to attack networks . These ports appear to be "stealth" meaning that for all intents and purposes, they do not exist to a would-be hacker . You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled . Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled . N Wireless Modem Router 54 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 Configuring Internal forwarding settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network . Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen" . A list of common applications has been provided in case you need to configure the Virtual Server function for a specific application . If your application is not listed, you will need to contact the application vendor to find out which port settings you need . Choosing an application Select your application from the drop-down list . The settings will be transferred to the next available space in the screen . Click "Apply Changes" to save the setting for that application . To remove an application, select the number of the row that you want to remove then click "Clear" . Manually entering settings into the Virtual server To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass (use a comma between multiple ports), select the port type (TCP or UDP), and click "Apply Changes" . It is recommended that you disable the settings when you are not using a specific application . N Wireless Modem Router 55 UsINg THe Web-based adVaNCed UseR INTeRfaCe table of contents sections 1 2 3 4 5 6 7 8 9 10 setting Client IP filters The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times . Restriction can be set for a single computer, a range of computers, or multiple computers . To restrict Internet access to a single computer for example, enter the IP address of the computer you wish to restrict access to in the IP fields (1) . You can also select "Always" to block access all of the time . Select the day to start on top (5), the time to start on top (6), the day to end on the bottom (7), and the time to stop (8) on the bottom . [. . . ] Belkin reserves the right to discontinue any of its products without notice, and disclaims any limited warranty to repair or replace any such discontinued products . In the event that Belkin is unable to repair or replace the product (for example, because it has been discontinued), Belkin will offer either a refund or a credit toward the purchase of another product from Belkin . com in an amount equal to the purchase price of the product as evidenced on the original purchase receipt as discounted by its natural use . All above warranties are null and void if the Belkin product is not provided to Belkin for inspection upon Belkin's request at the sole expense of the purchaser, or if Belkin determines that the Belkin product How to get service . To get service for your Belkin product you must take the following steps: 1 . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F5D8636




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F5D8636 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.