Belkin F5D7230-4 User Manual page 27

Wireless cable/dsl gateway router
Hide thumbs Also See for F5D7230-4:
Table of Contents

Advertisement

USING THE WEB-BASED ADVANCED USER INTERFACE
Using the Access Point Mode
Note: This advanced feature should be employed by advanced users only. The
Router can be configured to work as a wireless network access point. Using this
mode will defeat the NAT IP sharing feature and DHCP server. In AP mode, the
Router will need to be configured with an IP address that is in the same subnet
as the rest of the network that you will bridge to. The default IP address is
192.168.2.254 and subnet mask is 255.255.255.0. These can be customized for
your need.
1. Enable the AP mode my selecting "Enable" in the "Use as Access Point only"
page. When you select this option, you will be able to change the IP settings.
2. Set your IP settings to match your network. Click "Apply Changes".
3. Connect a cable from the WAN port on the Router to your existing network.
The Router is now acting as an Access Point. To access the Router advanced
user interface again, type the IP address you specified into your browser's
navigation bar. You can set the encryption settings, MAC address filtering, SSID
and channel normally.
50
USING THE WEB-BASED ADVANCED USER INTERFACE
Configuring the Firewall
Your Router is equipped with a firewall that will protect your network from a
wide array of common hacker attacks including:
• IP Spoofing
• Land Attack
• Ping of Death (PoD)
• Denial of Service (DoS)
• IP with zero length
• Smurf Attack
• TCP Null Scan
• SYN flood
• UDP flooding
• Tear Drop Attack
• ICMP defect
• RIP defect
• Fragment flooding
The firewall also masks common ports that are frequently used to attack
networks. These ports appear to be "Stealth" meaning that for all intents and
purposes, they do not exist to a would-be hacker. You can turn the firewall
function off if needed, however, it is recommended that you leave the firewall
enabled. Disabling the firewall protection will not leave your network
completely vulnerable to hacker attacks, but it is recommended that you leave
the firewall enabled.
51

Advertisement

Table of Contents
loading

Table of Contents