Belkin N300 User Manual

Belkin N300 User Manual

High performance wireless n300 vpn
Hide thumbs Also See for N300:

Advertisement

HigH Performance Wireless n300 VPn
User Manual
ROUTER
F9K1004v1 8820-01044 Rev. A00

Advertisement

Table of Contents
loading

Summary of Contents for Belkin N300

  • Page 1 HigH Performance Wireless n300 VPn User Manual ROUTER F9K1004v1 8820-01044 Rev. A00...
  • Page 2: Table Of Contents

    Table Of COnTenTs Introduction… . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 system .
  • Page 3 Table Of COnTenTs firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 VPn .
  • Page 4: Introduction

    INTRODUCTION Package Contents System Requirements • Belkin Wireless N300 VPN Router • RJ-45 Ethernet Based Internet (ADSL or Cable Modem) • Power Adapter • Computer with Wireless Network function • RJ-45 Ethernet LAN Cable • Windows, Mac OS or Linux based operating systems •...
  • Page 5: Introduction

    INTRODUCTION Introduction F9K1004 is a Wireless 11N Gigabit VPN Router with 2 attachable antennas that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. F9K1004 supports various network with superior throughput and performance and unparalleled wireless range. With its WPS function, it helps users to connect their wireless devices with just a push of a button.
  • Page 6: Led Overview

    INTRODUCTION LED Lights Icon Description Color – Blu e Wireless LAN Ligh ts whe n Wirel es s signal is activated . Blinks when Wireless data transfer and blinks when WPS handshake is initialized. Color – Blu e Internet Steady light-up when ethernet port is plugged in. Blinks when data transfer.
  • Page 7: Before You Begin

    Here are some key guidelines to ensure that you have the optimal wireless range. 1. Keep the number of walls and ceilings between the Belkin access point and other network devices to a minimum.
  • Page 8: Computer Settings (Windows Xp/Windows Vista/Windows 7)

    BEFORE YOU BEGIN Computer Settings (Windows XP/Windows Vista/Windows 7) Windows XP Windows Vista Windows 7 • Click Start button and open Control Panel.
  • Page 9 BEFORE YOU BEGIN • Windows XP, click [Network Connection] • Windows Vista, click [View Network Status and Tasks] then [Manage Network Connections] • Windows 7, click [View Network Status and Tasks] then [Change adapter settings]...
  • Page 10 BEFORE YOU BEGIN • Right click on [Local Area Connection] and select [Properties].
  • Page 11 BEFORE YOU BEGIN • Check “Client for Microsoft Networks”, “File and Printer • Select “Internet Protocol (TCP/IP)” and click [Properties] Sharing for Microsoft Networks”, and “Internet Protocol (TCP/IP) is ticked. If not, please install them.
  • Page 12 BEFORE YOU BEGIN • Select “Obtain an IP Address automatically” and “Obtain DNS server address automatically” then click [OK].
  • Page 13: Hardware Installation

    BEFORE YOU BEGIN Hardware Installation This diagram depicts the hardware configuration: 1. Place the unit in an appropriate location after conducting a site survey. 2. Plug one end of the Ethernet cable into the LAN port of the device and another end into your PC/Notebook. 3.
  • Page 14: Configuring Your Router

    IP Address 192.168.2.1 characters (lowercase) of your device WLAN MAC Address. This can be found on the device ID label and is unique for each device. Username / Password admin / admin Wireless Mode Enable Wireless SSID belkin.xxx Wireless Security None...
  • Page 15: Setup Wizard

    Setup Wizard 1. Open a web browser (Internet Explorer/Firefox/Safari) 2. The default username and password are admin. Once you and enter the IP Address http://192.168.2.1 have entered the correct username and password, click the OK button to open the web-base configuration page. Note: If you have changed the default LAN IP Address of the WIRELESS ROUTER, ensure you enter the correct IP Address.
  • Page 16 Setup Wizard 3. You will see this webpage if login is successful. 4. Click Wizard to enter the Setup Wizard. Then click Next to begin the wizard.
  • Page 17 Setup Wizard 5. Select the Operation Mode. Please ensure you have the proper cables connected as described in the Hardware Installation section.
  • Page 18 Setup Wizard ap router Mode a. The device will search for the correct Internet settings automatically. b. The most appropriate WAN type will be determined and selected automatically. If it is incorrect, please select Others to set up the WAN settings manually.
  • Page 19 Setup Wizard c. There are many WAN service types available. Please obtain the correct settings from your Internet Service Provider (ISP).
  • Page 20 Setup Wizard Static ip address If your ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Secondary DNS (if available) of your ISP provider.
  • Page 21 Setup Wizard dynamic ip address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and will reject connections if the MAC address does not match. If your ISP has recorded the MAC address of your computer’s Ethernet LAN card, please connect only the computer with the authorized MAC address, and click the Clone MaC address button.
  • Page 22 Setup Wizard ppp over ethernet ISP requires an account username and password. ppp over ethernet Username Username assigned to you by the ISP Password Password for this username. Service You can assign a name for this service. (Optional) The maximum size of packets. Do not change unless mentioned by the ISP.
  • Page 23 Setup Wizard point-to-point tunneling protocol (pptp) PPTP is used by some ISPs.
  • Page 24 Setup Wizard pptp WaN interface Settings WaN interface type Select whether the ISP is set to Static IP or Dynamic IP address. Hostname This is optional. Only required if specified by ISP MaC address The MAC address that is used to connect to the ISP. pptp Settings Login Username assigned to you by the ISP...
  • Page 25 Setup Wizard Layer-2 tunneling protocol (L2tp) L2TP is used by some ISPs.
  • Page 26 Setup Wizard L2tp WaN interface Settings WaN interface type Select whether the ISP is set to Static IP or Dynamic IP address. Hostname This is optional. Only required if specified by ISP MaC address The MAC address that is used to connect to the ISP. L2tp Settings Login Username assigned to you by the ISP...
  • Page 27 Setup Wizard d. Choose the level of wireless security. Belkin recommends the Highest level of security. Note: 802.11n wireless speeds may not be achievable if the security level is setting the Lowest or Low. SSID Enter the name of your wireless network.
  • Page 28 Setup Wizard e. Check the settings are correct, and then click reboot to apply the settings.
  • Page 29: Vpn Wizard

    VPN Wizard Using the VPN Wizard, you can establish VPN connection easily. Please refer to page 99.
  • Page 30: System

    SYSTEM Status This page will display the status of the device. Status Model Description of this device. Mode The mode the device is currently in. The duration of time the device has been operating without powering down or rebooting. Uptime The device’s system time.
  • Page 31 SYSTEM WAN Settings Attain IP Protocol Method used to connect to the Internet. IP address The WAN IP Address of the device. Subnet Mask The WAN Subnet Mask of the device. MAC address The MAC address of the device’s WAN Interface. Primary and Secondary DNS Primary and Secondary DNS servers assigned to the WAN connection.
  • Page 32 SYSTEM LAN Settings IP address The LAN IP Address of the device. Subnet Mask The LAN Subnet Mask of the device. DHCP Server Whether the DHCP server is Enabled or Disabled. MAC address The MAC address of the device’s LAN Interface.
  • Page 33 SYSTEM WLAN Settings Channel The wireless channel in use. The SSID (Network Name) of the wireless network. ESSID (up to 4 SSIDs are supported) Security Wireless encryption is enabled for this SSID. BSSID The MAC address of this SSID. The number of wireless clients connected to this SSID. Associated Clients...
  • Page 34: Lan

    SYSTEM This page allows you to modify the device’s LAN settings.
  • Page 35 SYSTEM LAN IP IP address The LAN IP Address of this device. IP Subnet Mask The LAN Subnet Mask of this device. 802.1d Spanning Tree When Enabled, the Spanning Tree protocol will prevent network loops in your LAN network.
  • Page 36 SYSTEM DHCP Server DHCP Server The DHCP Server automatically allocates IP addresses to your LAN device. Lease Time The duration of time that the DHCP server will allocate each IP address to a LAN device. Start / End IP The range of IP addresses that the DHCP server will allocate to a LAN device. Domain name The domain name for this LAN network.
  • Page 37 SYSTEM Two DNS servers can be assigned for use by your LAN device. There are four modes available. DNS Servers From ISP The DNS server IP address is assigned from your ISP. User-Defined The DNS server IP address is assigned manually. DNS Relay LAN clients are assigned the device’s IP address as the DNS server.
  • Page 38: Dhcp

    SYSTEM DHCP This page shows the status of the DHCP server and also allows you to control how the IP addresses are allocated.
  • Page 39 SYSTEM The DHCP Client Table shows the LAN clients that have been allocated an IP address from the DHCP Server DHCP Client Table IP address The LAN IP address of the client. MAC address The MAC address of the client’s LAN interface. Expiration Time The time that the allocated IP address will expire.
  • Page 40 SYSTEM You can also manually specify the IP address that will be allocated to a LAN client by associating the IP address with its MAC address. Type the IP address you would like to manually assign to a specific MAC address and click Add to add the condition to the Static DHCP Table.
  • Page 41: Schedule

    SYSTEM Schedule This page allows you to setup the schedule times that the Firewall and Power Saving features will be activated / deactivated. Click Add to create a Schedule entry.
  • Page 42 SYSTEM Schedule Schedule Description Assign a name to the schedule. Service The service provides for the schedule. Days Define the Days to activate or deactivate the schedule. Define the Time of day to activate or deactivate the schedule. Time of day Please use a 24-hour clock format.
  • Page 43: Log

    SYSTEM This page displays the system log of the device. When powered down or rebooted, the log will be cleared. Save Save the log to a file. Clear Clear the log. Refresh Update the log.
  • Page 44: Language

    SYSTEM Language This page allows you to change the Language of the User Interface.
  • Page 45: Internet

    INTERNET The Internet section allows you to manually set the WAN type connection and its related settings. Status This page shows the current status of the device’s WAN connection.
  • Page 46: Dynamic Ip Address

    INTERNET Dynamic IP Address The IP Address is allocated automatically. However some ISP’s will also recognize the MAC address and will reject connections if the MAC address does not match. If your ISP has recorded the MAC address of your computer’s Ethernet LAN card, please connect only the computer with the authorized MAC address, and click the Clone MAC button.
  • Page 47: Static Ip Address

    INTERNET Static IP Address If your ISP Provider has assigned you a fixed IP address, enter the assigned IP address, Subnet mask, Default Gateway IP address, and Primary DNS and Secondary DNS (if available) of your ISP provider. Static IP Address IP address Assign an IP address Manually.
  • Page 48: Ppp Over Ethernet (Pppoe)

    INTERNET PPP over Ethernet ISP requires an account username and password...
  • Page 49 INTERNET PPP over Ethernet (PPPoE) Username Username assigned to you by the ISP Password Password for this username. Service You can assign a name for this service. (Optional) The maximum size of packets. Do not change unless mentioned by the ISP. Authentication type Select whether the ISP uses PAP or CHAP methods for authentication.
  • Page 50: Point-To-Point Tunneling Protocol (Pptp)

    INTERNET Point-to-Point Tunneling Protocol (PPTP) PPTP is used by some ISPs.
  • Page 51 INTERNET Point-to-Point Tunneling Protocol (PPTP) WAN Interface Type Select whether the ISP is set to Static IP or will allocate a Dynamic IP address. Hostname This is optional. Only required if specified by ISP. MAC address The MAC Address that is used to connect to the ISP. Username Username assigned to you by the ISP.
  • Page 52: Layer-2 Tunneling Protocol (L2Tp)

    INTERNET Layer-2 Tunneling Protocol (L2TP) L2TP is used by some ISPs..
  • Page 53 INTERNET Layer-2 Tunneling Protocol (L2TP) WAN Interface Type Select whether the ISP is set to Static IP or will allocate a Dynamic IP address. Hostname This is optional. Only required if specified by ISP MAC address The MAC Address that is used to connect to the ISP. Username Username assigned to you by the ISP Password...
  • Page 54: Wireless

    WIRELESS The Wireless section allows you to configure the Wireless settings. Basic This page shows the current status of the device’s Wireless settings.
  • Page 55 WIRELESS Basic Radio Enable or Disable the device’s wireless signal. Mode Select between Access Point or Wireless Distribution System (WDS) modes. Select the types of wireless clients that the device will accept. Band e.g.: 2.4 GHz (B+G+N) Only 802.11b and 11g clients will be allowed. Select the number of SSID’s (Wireless Network names) you would like.
  • Page 56: Wireless Distribution System (Wds)

    WIRELESS Wireless Distribution System (WDS) Use WDS to connect Access Point wirelessly. Doing so extends a wired infrastructure to locations where cabling is not possible or inefficient to implement. Note that compatibility between different brands and models is not guaranteed. It is recommended that the WDS network be created using the same models for maximum compatibility.
  • Page 57: Advanced

    WIRELESS Advanced This page allows you to configure wireless advance settings. It is recommended the default settings are used unless the user has experience with these functions.
  • Page 58 WIRELESS Advanced Specifies the size of the packet per fragment. This function can reduce the chance of packet collision. Fragment Threshold However when this value is set too low, there will be increased overheads resulting in poor performance. When the packet size is smaller than the RTS Threshold, then the packet will be sent RTS Threshold without an RTS/CTS handshake which may result in an incorrect transmission.
  • Page 59: Security

    WIRELESS Security This page allows you to set the wireless security settings.
  • Page 60 WIRELESS Security SSID Selection Select the SSID that the security settings will apply to. If Disabled, the device will not broadcast the SSID. It will be invisible to wireless clients. Broadcast SSID Wi-Fi Multi-Media is a Quality of Service protocol which prioritizes traffic in the order according to voice, video, best effort, and background.
  • Page 61 WIRELESS IEEE 802.1x is an authentication protocol. Every user must use a valid account to login to this Access Point before accessing the wireless LAN. The authentication is processed by a RADIUS server. This mode only authenticates users by IEEE 802.1x, but it does not encrypt the data during communication.
  • Page 62 WIRELESS WEP Encryption: WEP Encryption Authentication Type Please ensure that your wireless clients use the same authentication type. ASCII: regular text (recommended) Key type HEX: for advanced users Select the desired option, and ensure the wireless clients use the same setting. •...
  • Page 63 WIRELESS WPA RADIUS Encryption: WPA RADIUS Encryption Select the WPA encryption you would like. WPA type Please ensure that your wireless clients use the same settings. RADIUS Server IP address Enter the IP address of the RADIUS Server. RADIUS Server Port Enter the port number used for connections to the RADIUS server.
  • Page 64 WIRELESS WPA Pre-Shared Key Encryption: WPA Pre-Shared Key Encryption Authentication Type Please ensure that your wireless clients use the same authentication type. Select the WPA encryption you would like. WPA type Please ensure that your wireless clients use the same settings. Pre-shared Key Type Select whether you would like to enter the Key in HEX or Passphrase format.
  • Page 65: Filter

    WIRELESS Filter This page allows you to create filters to control which wireless clients can connect to this device by only allowing the MAC addresses entered into the Filtering Table.
  • Page 66 WIRELESS Wireless Filter Check the box to Enable Wireless Access Control. Enable Wireless Access Control When Enabled, only wireless clients on the Filtering Table will be allowed. Enter a name or description for this entry. Description MAC address Enter the MAC address of the wireless client that you wish to allow a connection. Click this button to add the entry.
  • Page 67: Wi-Fi Protected Setup (Wps)

    WIRELESS Wi-Fi Protected Setup (WPS) WPS feature is follows the Wi-Fi Alliance WPS standard and it eases the setup of security-enabled Wi-Fi networks in the home and small office environment. It reduces the user steps required to configure a network and supports two methods that are familiar to most consumers for configuring a network and enabling security.
  • Page 68 WIRELESS Wi-Fi Protected Setup (WPS) Check to Enable the WPS feature. WPS Button Check to Enable the WPS push button. Wi-Fi Protected Setup Information Shows whether the WPS function is Configured or Un-configured. WPS Current Status Configured means that WPS has been used to authorize a connection between the device and wireless clients.
  • Page 69 WIRELESS Initializing WPS Feature There are two methods to initialize the WPS feature: Push Button and Pin Code methods. 1. WPS Push Button Method 2. Pin Code Method Push the WPS button on the F9K1004, the Wireless LED Note the Pin code of your WIRELESS ROUTER device. light will start to flash when WPS process is ready.
  • Page 70: Client List

    WIRELESS Client List This page shows the wireless clients that are connected to the WIRELESS ROUTER device.
  • Page 71: Policy

    WIRELESS Policy This page allows you to configure the access policies for each SSID (wireless network). Policy WAN Connection Allow wireless clients on this SSID to access the WAN port which typically is an Internet connection. Communication between Dictates whether or not each wireless client can communicate with each other in this Wireless clients SSID.
  • Page 72: Firewall

    firewall The Firewall section allows you to set the access control and Firewall settings. enable advanced This page allows you to Enable / Disable the Firewall features. You can choose whether to allow VPN (Virtual Private Network) packets to pass through the Firewall. If Enabled Firewall service, the Denial of Service (DoS) and SPI (Stateful Packet Inspection) features will also be enabled.
  • Page 73: Dmz

    firewall Denial of Service (DoS) If enabled this feature, allows the DMZ computer on your LAN to be Denial of Service (Denial of Service) is a type of Internet exposed to all users on the Internet. attack that sends a high amount of data to you with the intent to overload your Internet connection.
  • Page 74: Mac Filter

    firewall MaC filter You can choose whether to Deny or Allow those computers listed in the MAC Filtering table access to the Internet. MaC filter enable MaC filtering Check this box to Enable the MAC filtering feature. Deny all clients with MaC addresses When selected, the computers listed in the MAC Filtering table will be Denied access to the Internet. listed below to access the network allow all clients with MaC addresses When selected, only the computers listed in the MAC Filtering listed below to access the network table will be Allowed access to the Internet.
  • Page 75: Ip Filter

    firewall iP filter You can choose whether to Deny or Allow computers with IP Addresses listed from accessing certain Ports. This can be used to control which Internet applications the computers can access. You may need to have knowledge of what Internet ports the applications use.
  • Page 76: Url Filter

    firewall Url filter You can deny access to certain websites by blocking keywords in the URL web address. For example, “gamer” has been added to the URL Blocking Table. Any web address that includes “gamer” will be blocked.
  • Page 77: Advanced

    advanced The Advanced section allows you to configure the Advanced settings of the router. network address Translation (naT) This page allows you to Enable / Disable the Network Address Translation (NAT) and Network Turbine features. NAT is required to share one Internet account with multiple LAN users. Enabling Network Turbine will speed up your NAT throughput.
  • Page 78: Port Mapping

    advanced Port Mapping Port Mapping allows you to redirect a particular range of ports to a computer on your LAN network. This helps you host servers behind the NAT and Firewall. Port Mapping enable Port Mapping Check this box to Enable the Port Mapping feature. description Enter a name or description to help you identify this entry.
  • Page 79: Port Forwarding

    advanced Port Forwarding Port Forwarding allows you to redirect a particular public port to a computer on your LAN network. This helps you host servers behind the NAT and Firewall. In the example below, there is a WEB Server running on port 80 on the LAN.
  • Page 80: Port Trigger

    advanced Port Trigger If you use Internet applications which use non-standard connections or port numbers, you may find that they do not function correctly because they are blocked by the Wireless Router’s firewall. A Port Trigger will be required for these applications to work. Port Trigger enable Port Forwarding Check this box to Enable the Port Trigger feature.
  • Page 81: Application Layer Gateway (Alg)

    advanced application Layer Gateway (aLG) Certain applications may require the use of the ALG feature to function correctly. If you use any of the applications listed, please check and select it to enable this feature.
  • Page 82: Universal Plug And Play (Upnp)

    advanced Universal Plug and Play (UPnP) The UPnP function allows automatic discovery and configuration of UPnP enabled devices on your network. It also provides automatic port forwarding for supported applications to seamlessly bypass the Firewall. Universal Plug and Play (UPnP) enable the UPnP Feature Check this box to Enable the UPnP feature to allow supported devices to be visible on the network.
  • Page 83: Quality Of Service (Qos)

    advanced Quality of Service (QoS) QoS refers to the capability of a network to provide better service to selected network traffic. This is to ensure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user experience of time sensitive transmissions such as voice and video could be very poor.
  • Page 84 advanced Priority Queue Method Bandwidth priority is set to either High or Low. The transmissions in the High queue will be processed first. Unlimited Priority Queue Traffic to this IP address will not be affected by QoS rules. Local IP address High / Low Priority Queue Protocol The type of network protocol.
  • Page 85 advanced Bandwidth allocation Method You can set the maximum amount of bandwidth a certain protocol will use at one time. Or you can set a minimum amount of bandwidth that will be guaranteed to a certain protocol. Bandwidth allocation Type Set the QoS rules to apply to transmissions that are Downloaded/Uploaded or Both directions.
  • Page 86: Routing

    advanced Routing If your WIRELESS ROUTER device is connected to a network with different subnets, then this feature will allow the different subnets to communicate with each other. Static Routing enable Static Routing Check this box to Enable the Static Router feature. destination Lan IP Enter the IP address of the destination LAN.
  • Page 87 advanced destination Subnet Mask Gateway Interface 192.168.11.0 255.255.255.0 192.168.2.216 192.168.10.0 255.255.255.0 192.168.2.103 For example, if Client3 wants to send an IP data packet to 192.168.10.2 (Client 2), it will use the above table to determine that it has to go via 192.168.2.103 (Router 2) If it sends Packets to 192.168.11.11 (Client 1) will go via 192.168.2.216 (Router 1)
  • Page 88: Vpn

    A Virtual Private Network (VPN) provides a secure connection between two or more computers or protected networks over the public Internet. It provides authentication to ensure that the information is going to and from the correct parties. It provides security to protect the information from being viewed or being tampered with en route.
  • Page 89: Status

    Status This page displays the connect status of VPN connection. You can select one of them to connect or disconnect the VPN connection. Note: If connection type is remote dial-in (Client to Site or L2TP over IPSec), you can’t disconnect this session manually.
  • Page 90: Profile Setting

    Profile Setting This page allows you to Enable, Add, Edit and Delete VPN profiles. Profile Setting Enable Check the box to Enable the VPN profile. Click this button to add the entry. Edit Select one profile and click this button to edit the entry. Delete Selected Delete the selected entries.
  • Page 91: Ipsec

    IPSec IPSec (Internet Protocol Security) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPSec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
  • Page 92 General Name Enter a name for your VPN policy. Connection Type Supports IPSec, L2TP over IPSec and L2TP methods to establish VPN connection. Authentication Type Supports pre-shared key method for authentication. Shared Key Enter the Shared Key in box. (example: 1234567890) Confirm Enter your Shared Key again for verification.
  • Page 93 SA (Security Association) A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA may include attributes such as: cryptographic algorithms and mode; traffic encryption keys; and parameters for the network data to be passed over the connection.
  • Page 94 SA (Security Association) IKE (Phase 1) Proposal Select Main Mode or Aggressive Mode for IKE Phase 1 negotiation. • Main Mode: Select this option to configure the standard negotiation parameters Exchange for IKE Phase 1 of the VPN Tunnel. (Recommended Setting) •...
  • Page 95 Network This page allows you to configure the VPN server and local/remote subnet. Network Security Gateway Type Security Gateway Type supports IP Address and Domain Name. Select one of them. Security Gateway The IP address or domain name of the VPN server. Local Network Enter the local (LAN) subnet and mask.
  • Page 96 Advanced This page allows you to configure advanced VPN settings. Advanced Enabling NAT Traversal allows IPSec traffic from this endpoint to traverse through the translation process during NAT. The remote VPN endpoint must also support NAT Traversal this feature and it must be enabled to function properly over the VPN. Enable DPD (Dead Peer Detection) to delete the VPN tunnel if there is no traffic Dead Peer Detection detected.
  • Page 97: L2Tp Over Ipsec

    L2TP over IPSec L2TP over IPSec VPNs enable a business to transport data over the Internet, while still maintaining a high level of security to protect data. You can use this type of secure connection for small or remote office clients that need access to the corporate network.
  • Page 98: L2Tp

    L2TP Network L2TP Network Select the desired authentication Assign the VPN Server IP address. Authentication protocol (PAP, CHAP, MSCHAP_V2). Server IP (example: 192.168.99.1) Select MSCHAP_V2 by default Select accounts form available Users to Assign a range of IP addresses. The assigned member for authentication.
  • Page 99 L2TP General L2TP (The Layer 2 Tunnel Protocol) is a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. General Name Enter a name for your VPN policy...
  • Page 100 L2TP Network L2TP Network Select the desired authentication Assign the VPN Server IP address. Authentication protocol (PAP, CHAP, MSCHAP_V2). Server IP (example: 192.168.99.1) Select MSCHAP_V2 by default Select accounts form available to member Assign a range of IP addresses. The assigned for authentication.
  • Page 101: User Setting

    User Setting This page display the available users of VPN connection. You can add and delete the VPN available users here. You can enter the user name and password then click Add button to add a user. You can select users in Current VPN User Table then click Delete Selected button to delete users.
  • Page 102: Wizard

    Wizard You can use Wizard to create a VPN profile easily. 1. Click Next button to begin the wizard. 2. Enter the VPN policy name then click the Next button to next page.
  • Page 103 3. You can select [IPSec] or [L2TP over IPSec] or [L2TP] in this a. IPSec page then click the Next button to go to the next page. If you You can select [Client to Site] or [Site to Site] in this page select [IPSec] then go to step “a.”...
  • Page 104 Enter the Security Gateway and remote network. Then b. L2TP over IPSec click the Next button to go to the next page. Enter the username, password and VPN server IP setting. Then click the Next button to go to the next page.
  • Page 105 c. L2TP 4. Enter the shared key for the VPN connection Enter the username, password and VPN server IP setting. Then click the Next button to go to the next page.
  • Page 106 5. Setup successful, enable this policy immediately. If you don’t want to enable this policy, you can un-check the box. Then click the Apply button to apply the settings.
  • Page 107 How to establish an L2TP over IPSec VPN connection on Windows XP 1. Click the Start button and open Control Panel. 2. Click [Network Connections], double click [New Connection Wizard] then click the Next button.
  • Page 108 3. Select [Connect to the network at my 4. Select [Virtual Private Network connection] workplace] then click the Next button. then click the Next button.
  • Page 109 5. Enter the [Company Name] then click the Next button. 6. Select [Do not dial the initial connection] then click the Next button.
  • Page 110 7. Enter the VPN server IP address then click the Next button. 8. Select [Do not use my smart card] then click the Next button.
  • Page 111 9. Click the Finish button to complete the wizard. 10. Click the Properities button.
  • Page 112 11. In Security, select [Advanced (custom settings)] 12. Check [Unencrypted password (PAP)] and [Challenge Handshake then click the Settings button. Authentication Protocol (CHAP)] then click the OK button.
  • Page 113 13. Click [IPSec Settings] then check [Use pre-shared key for 14. In Networking, select [L2TP IPSec VPN] then click the OK button. authentication], Enter the Key then click the OK button.
  • Page 114 15. Click the Connect button to connect VPN connection. 16. You can see that the VPN Connection has been established...
  • Page 115 How to establish an L2TP over IPSec VPN connection in Windows 7 1. Click the Start button and open Control Panel. 2. Click [View Network Status and Tasks] then [Set up a new connection or network]...
  • Page 116 3. Click [Connect to a workplace] then [Use my Internet connection (VPN)]...
  • Page 117 4. Enter the VPN server IP address: [Internet address], 5. Enter the correct User name and Password [Destination name] and check [Don’t connect now; just set then click the Create button. it up so I can connect later], then click the Next button.
  • Page 118 7. Click [Change adapter settings] in Step 2, then select VPN 6. Click the Close button to close the VPN connection settings. Connection and click [Change settings of this connection]...
  • Page 119 8. Change Type of VPN to [Layer 2 Tunneling Protocol with IPSec 9. Click the Advanced settings button and select (L2TP/IPSec)] and check [Unencrypted password (PAP)] in Security. [Use preshared key for authentication] and enter the correct key. Then click the OK button.
  • Page 120 10. Double click the VPN Connection then click the Connect button. 11. You can see that the VPN Connection has been established.
  • Page 121: Tools

    TOOLS This section allows you to configure certain device system settings. Admin This page allows you to change the system password and to configure remote management. Change Password Old Password: Enter the current password. New Password: Enter your new password. Repeat New Password: Enter your new password again for verification.
  • Page 122: Time

    TOOLS Time This page allows you to set the system time. Time Time Setup: Select the method you want to set the time. Time Zone: Select the time zone for your current location. Enter the address of the Network Time Protocol (NTP) Server to NTP Time Server: automatically synchronize with a server on the Internet.
  • Page 123: Dynamic Dns (Ddns)

    TOOLS Dynamic DNS (DDNS) This free service is very useful when combined with the Virtual Server feature. It allows Internet users to connect to your Virtual Servers using a URL, rather than an IP Address. This also solves the problem of having a dynamic IP address. With a dynamic IP address, your IP address may change whenever you connect, which makes it difficult to connect to you.
  • Page 124 TOOLS DDNS Services work as follows: 1. You must register for the service at one of the listed DDNS Service providers. 2. After registration, use the Service provider’s normal procedure to obtain your desired Domain name. 3. Enter your DDNS data on the F9K1004’s DDNS screen, and enable the DDNS feature.
  • Page 125: Power

    TOOLS Power This page allows you to Enable or Disable the wireless LAN power saving features.
  • Page 126: Diagnosis

    TOOLS Diagnosis This page allows you to determine if the WIRELESS ROUTER device has an active Internet connection. Diagnosis Address to Ping: Enter the IP address you would like to Ping. Ping Result: Results of the Ping test.
  • Page 127: Firmware

    TOOLS Firmware The firmware (software) in the F9K1004 can be upgraded using your Web Browser. Go to http://www.belkin.com/support/ , to download available firmware update for the F9K1004. To perform the Firmware Upgrade: 1. Click the Browse button and navigate to the location of the upgrade file.
  • Page 128: Back-Up

    TOOLS Back-up Back-up Restore to factory default: Restores the device to its factory default settings. Backup Settings: Save the current configuration settings to a file. Restores a previously saved configuration file. Restore Settings: Click Browse to select the file. Then Upload to load the settings.
  • Page 129: Reset

    TOOLS Reset In some circumstances it may be required to force the device to reboot.
  • Page 130: Technical Support, Warranty, Fcc Statement

    Technical SupporT, WarranTy, Fcc STaTemenT Technical Support http://www.belkin.com/support http://www.belkin.com/uk/support australia http://www.belkin.com/au/support new Zealand http://www.belkin.com/au/support Singapore 1800 622 1130 europe http://www.belkin.com/uk/support...
  • Page 131 What is not covered by this warranty? 2-year product Warranty All above warranties are null and void if the Belkin product is not provided to Belkin for inspection upon Belkin’s request at the sole expense of the purchaser, or if Belkin determines that the Belkin product has been improperly installed, altered What this warranty covers.
  • Page 132 Belkin reserves the right to review the damaged Belkin product. All costs of shipping the Belkin product to Belkin for inspection To get service for your Belkin product you shall be borne solely by the purchaser. If Belkin determines,...
  • Page 133 Some states do not allow limitations on how long an implied warranty lasts, so the above limitations may not apply to you. IN NO EVENT SHALL BELKIN BE LIABLE FOR INCIDENTAL, SPECIAL, DIRECT, INDIRECT, CONSEQUENTIAL OR MULTIPLE DAMAGES SUCH AS, BUT NOT LIMITED TO,...
  • Page 134: Fcc Statement

    For elecTromaGneTic compaTiBiliTy against harmful interference in a residential installation. We, Belkin International, Inc., of 12045 E. Waterfront Drive, Playa Vista, CA 90094, declare under our sole responsibility that the device, This equipment generates, uses, and can radiate radio frequency F9K1004v1, complies with Part 15 of the FCC Rules.
  • Page 135 Technical SupporT, WarranTy, Fcc STaTemenT canada-industry canada (ic) The wireless radio of this device complies with RSS 139 & RSS 210 Industry Canada. This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
  • Page 136 © 2012 Belkin International, Inc. All rights reserved. All trade names are registered trademarks of respective manufacturers listed. Safari is a trademark of Apple Inc., registered in the U.S. and other countries. Internet Explorer is either a registered trademark or...

This manual is also suitable for:

N300 vpnF9k1004

Table of Contents