User manual BELKIN F6D3230-4

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual BELKIN F6D3230-4. We hope that this BELKIN F6D3230-4 user guide will be useful to you.


BELKIN F6D3230-4 : Download the complete user guide (18549 Ko)

You may also download the following manuals related to this product:

   BELKIN F6D3230-4 Quick Start (191 ko)
   BELKIN F6D3230-4 Supplementary Guide (424 ko)

Manual abstract: user guide BELKIN F6D3230-4

Detailed instructions for use are in the User's Guide.

[. . . ] Dual-Band Wireless A+G Router Share your broadband Internet connection User Manual F6D3230-4 Table of Contents 1 Introduction . 107 Introduction section Thank you for purchasing the Belkin Dual-Band Wireless A+G Router (the Router). The following two short sections discuss the benefits of home networking and outline best practices for maximizing your wireless home network range and performance. Please be sure to read through this User Manual completely, and pay special attention to the section entitled "Placement of your Router for Optimal Performance" on page 2. [. . . ] You can turn the firewall function off if needed; however, it is recommended that you leave the firewall enabled. Disabling the firewall protection will not leave your network completely vulnerable to hacker attacks, but it is recommended that you leave the firewall enabled. 56 Using the Web-Based Advanced User Interface 1 2 3 section Configuring Internal Forwarding Settings The Virtual Servers function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, computers outside your network (over the Internet) cannot get to them because they cannot be "seen". A list of common applications has been provided in case you need to configure the Virtual Server function for a specific application. If your application is not listed, you will need to contact the application vendor to find out which port settings you need. 4 5 6 7 8 9 Choosing an Application Select your application from the drop-down list. The settings will be transferred to the next available space in the screen. Click "Apply Changes" to save the setting for that application. To remove an application, select the number of the row that you want to remove then click "Clear". Manually Entering Settings into the Virtual Server To manually enter settings, enter the IP address in the space provided for the internal (server) machine, the port(s) required to pass (use a comma between multiple ports), and then select the port type (TCP or UDP) and click "Apply Changes". It is recommended that you disable the settings when you are not using a specific application. 57 Using the Web-Based Advanced User Interface Setting Client IP Filters The Router can be configured to restrict access to the Internet, email, or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers. To restrict Internet access to a single computer, for example, enter the IP address of the computer you wish to restrict access to in the IP fields (1). You can also select "Always" to block access all of the time. Select the day to start on top (5), the time to start on top (6), the day to end on the bottom (7), and the time to stop (8) on the bottom. The computer at the IP address you specified will now be blocked from Internet access at the times you specified. Note: Be sure you have selected the correct time zone under "Utilities> System Settings> Time Zone". (5) (6) (1) (2) (3) 58 (4) (7) (8) (9) Using the Web-Based Advanced User Interface 1 2 3 section Enabling the Demilitarized Zone (DMZ) The DMZ feature allows you to specify one computer on your network to be placed outside of the firewall. This may be necessary if the firewall is causing problems with an application such as a game or video conferencing application. The computer in the DMZ is NOT protected from hacker attacks. 4 5 6 7 To put a computer in the DMZ, enter the last digits of its IP address in the IP field and select "Enable". If you are using multiple static WAN IP addresses, it is possible to select which WAN IP address the DMZ host will be directed to. Type in the WAN IP address you wish the DMZ host to direct to, enter the last two digits of the IP address of the DMZ host computer, select "Enable" and click "Apply Changes". 8 9 Blocking an ICMP Ping Computer hackers use what is known as "pinging" to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP ping from the outside. This heightens your Router's security level. (1) To turn off the ping response, select "Block ICMP Ping" (1) and click "Apply Changes". The Router will not respond to an ICMP ping. 59 Using the Web-Based Advanced User Interface Utilities The "Utilities" screen lets you manage different parameters of the Router and perform certain administrative functions. Parental Control See the included Parental Control User Manual for more information on the Parental Control feature. Restarting the Router Sometimes it may be necessary to restart or reboot the Router if it begins working improperly. [. . . ] Canada-Industry Canada (IC) The wireless radio of this device complies with RSS 139 & RSS 210 Industry Canada. Cet appareil numérique de la classe B conforme á la norme NMB-003 du Canada. Europe-European Union Notice Radio products with the CE 0682 or CE alert marking comply with the R&TTE Directive (1995/5/EC) issued by the Commission of the European Community. Compliance with this directive implies conformity to the following European Norms (in brackets are the equivalent international standards). [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE BELKIN F6D3230-4




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual BELKIN F6D3230-4 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.