Belkin N300 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Belkin N300 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Belkin N300, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Belkin N300 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Belkin N300. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Belkin N300 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Belkin N300
- Den Namen des Produzenten und das Produktionsjahr des Geräts Belkin N300
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Belkin N300
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Belkin N300 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Belkin N300 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Belkin finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Belkin N300 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Belkin N300, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Belkin N300 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    User Manual F9K1 00 4v1 88 20 -0104 4 Rev . A0 0 HigH P erf ormance Wirel ess n300 VPn R O U T ER[...]

  • Seite 2

    T ABLE OF CONTENTS Syst em ................................................. 27 Status ..................................................... 27 LAN ....................................................... 31 DHCP ...................................................... 35 Schedule ................................................... 38 Log ............[...]

  • Seite 3

    T ABLE OF CONTENTS Firewall ................................................ 69 Enable ..................................................... 69 Adva nced .................................................. 69 DMZ ....................................................... 70 Denial of Ser vice ( DoS) ....................................... 70 MAC Filter[...]

  • Seite 4

    1 INTRODUCTION Package Contents • Belkin Wireless N300 VPN Rout er • Power Adapter • RJ- 4 5 Et her net L AN Cab le • CD -ROM with User Manual and Setup Wizard • Qui ck Gu ide System Require ments • RJ- 45 Etherne t Based Int ernet (ADSL or Cable Modem ) • Computer with Wireless Network funct ion • Windows , Mac OS or Linux bas ed o[...]

  • Seite 5

    2 INTRODUCTION Introduction F9K 1004 is a Wir eless 1 1 N Gigabit VPN Router with 2 attachable ante nnas tha t deliv ers up to 6x faster speeds and 3x ex tended coverage than 802. 1 1g devices. F9K 1 004 supports various network with superior throughput and performance and unparalleled wireless range. With its WPS function, it he lps users to conne[...]

  • Seite 6

    3 INTRODUCTION LED Lights Icon Description Wireless LAN C ol or – B lu e Ligh t s w he n W i rel es s signal is a c t iv a ted . Internet WA N C ol or – B lu e LAN L A N C ol or – B lu e Ligh t s w he n w i red ne t w or k d ev i c e is c onne c ted t o R J - 4 5 po r t. B li n ks w h e n d at a t r an s fe r o cc u r s o n R J - 4 5 p o r t.[...]

  • Seite 7

    4 BEFO RE YOU BEGI N Be fore you Be gin This section will guide you through the installation process. Pla cem ent of t he F9 K 1 0 04 i s ver y imp or ta nt to avoi d poo r signal reception and performance. A void pla cing the device in enclosed spa ces such as a closet or cabinet. . Considerat ions for Wireless Installat ion The operating distance[...]

  • Seite 8

    5 BEFO RE YOU BEGI N • Click Start button and open Control Panel. Computer Sett ings (Window s XP/Windows Vista / Windo ws 7) Windows XP Windows Vista Win dows 7[...]

  • Seite 9

    6 BEFO RE YOU BEGI N • Windows XP , click [Network Connection ] • Window s Vista, click [View Network Status and T asks ] then [Man age Network Connections ] • Windows 7 , click [View Network Status and T asks] then [Chang e adap ter settings][...]

  • Seite 10

    7 BEFO RE YOU BEGI N • Right click on [Local Area Connection ] and select [ Properties] .[...]

  • Seite 11

    8 BEFO RE YOU BEGI N • Ch eck “ Clie nt for Mi cro sof t Net wor ks”, “ Fil e and Pr inte r Sharing for Microsoft Networks” , and “Internet Protocol (TC P / IP) is ti cked. I f n ot, pl eas e i nst all th em. • Select “Internet Prot ocol (T CP/I P)” and click [Properties ][...]

  • Seite 12

    9 BEFO RE YOU BEGI N • Select “Obtain an IP Addr ess aut omatically” and “ Ob tain DNS ser ver address automatically ” then click [OK].[...]

  • Seite 13

    10 BEFO RE YOU BEGI N Hardware Installation 1. Place the unit in an appropriate location after conducting a site survey . 2 . Plu g o ne end of t he Ethe rne t c abl e into th e LA N p or t of the device and another end into your PC/Notebook. 3. Plug one end of another Ethernet c able to WAN port of the device and the other end into you cable/DSL m[...]

  • Seite 14

    11 CONFIGURING Y OUR ROUTER Th is se cti on wi ll sho w you how t o con fig ure th e dev ice using the w eb- based configuration interface. Please use your wireless ne t work adapter to connect the W IRELESS ROUTER. Note: x x x rep res ente d in th e wire les s SSI D above i s the l ast 3 ch arac ter s (lowe rca se) of you r devi ce WL AN MAC Ad dr[...]

  • Seite 15

    12 SETUP WIZARD 1. Open a w eb browser (Internet Explorer /Firefox/Safari) an d ente r the IP A ddre ss ht tp: / /192. 168. 2. 1 Note: If you h ave ch ange d the d efau lt L AN IP Ad dre ss of th e WIR ELESS R OUTER , ens ure yo u ente r the c orr ect I P Addr ess . 2. The default username and passw ord are admin . Once you have entered the correct[...]

  • Seite 16

    13 SETUP WIZARD 3. Y ou will see this w ebpage if login is successful. 4. Clic k Wizard to ente r the S etup W iza rd. Th en cl ick N ext to b egi n the wi zar d.[...]

  • Seite 17

    14 SETUP WIZARD 5. Select the Operation Mode . Please ensure you hav e the proper cables connected as described in the Hardware Installation section.[...]

  • Seite 18

    15 SETUP WIZARD a. The device will sear ch for the correct Internet settings aut omatically. b. The most appropriate W AN type will be determined and selected automa tically. If it is incorrect, please select Others to set u p the WAN se tt ing s manu all y . AP Rout er Mode[...]

  • Seite 19

    16 SETUP WIZARD c. There are man y W AN service t ypes available. Please obtain the correct settings from your Int ernet Servi ce Provider (I SP) .[...]

  • Seite 20

    17 SETUP WIZARD Static IP A ddress If yo ur ISP P rovi der h as as sig ned y ou a fix ed IP ad dre ss, en ter th e assigned IP address, Subnet mask, Default Gatewa y IP ad dress, and Primary DNS and S econdar y DNS (if av ailable) of your ISP provider .[...]

  • Seite 21

    18 SETUP WIZARD Th is wi ll rep lac e the AP R oute r MAC add res s to th e computer MA C address. The correct MA C address is used to initiate the connection t o the ISP . Dynamic IP Address Hostname This is op tional. Only requi red if specified by ISP MAC T he MAC Ad dres s tha t is us ed to co nne ct to t he IS P . Dynamic IP Address The IP Add[...]

  • Seite 22

    19 SETUP WIZARD PPP ove r Eth ern et ISP requir es an account username and password. PPP ove r Eth ern et Username Username assigned to you by the I SP Password P assword for this username. Service Y ou can assign a name f or this service. ( Optional) MTU Th e ma xim um siz e of pac kets . Do not change unless men tioned by the ISP .[...]

  • Seite 23

    20 SETUP WIZARD Point-to -Point T unn eling P rotocol (PPTP) PPT P is us ed by so me IS Ps.[...]

  • Seite 24

    21 SETUP WIZARD PP TP WAN Int er fac e Se tt ings W AN Interface T ype Se lec t whet her t he IS P is set t o Sta tic IP or Dy nam ic IP ad dre ss. Hostname This is op tional. Only requi red if specified by ISP MAC address Th e MAC add res s that i s use d to co nne ct to th e ISP . PPTP Settings Login Username assigned t o you b y the ISP Pass wor[...]

  • Seite 25

    22 SETUP WIZARD L ayer- 2 T unn eli ng Pro toc ol (L 2TP) L 2TP is u sed by s ome I SPs.[...]

  • Seite 26

    23 SETUP WIZARD L2TP W AN Interface Sett ings W AN Interface T ype Se lec t whet her t he IS P is set t o Sta tic IP or Dy nam ic IP ad dre ss. Hostname This is op tional. Only requi red if specified by ISP MAC address Th e MAC add res s that i s use d to co nne ct to th e ISP . L2TP Settings Login Username assigned t o you b y the ISP Pass word Pa[...]

  • Seite 27

    24 SETUP WIZARD d. Choose the lev el of wireless security. Belkin recommends the Highest level of security. Note: 8 02. 1 1 n w irel ess s pee ds may n ot be a chie vabl e if t he se cur it y level i s set ti ng th e Lowes t or Low. SSID Enter the name of your wi reless network. Key Ent er th e sec uri ty key fo r your w ire les s net wor k.[...]

  • Seite 28

    25 SETUP WIZARD e. Chec k the s et tin gs ar e cor rec t, an d then click Reboot to apply the settings.[...]

  • Seite 29

    26 VPN Wizard Usi ng th e VPN Wi zar d, you c an est ab lish V PN co nne cti on ea sil y . Pl eas e refer t o page 9 9.[...]

  • Seite 30

    27 SY STEM Status Th is pag e wil l dis play t he st atus o f the d evi ce. Status Model Description of this device. Mode Th e mod e the d evic e is cu rre ntl y in. Uptime The duration of time the device has been operating without powering do wn or rebooting . Current Date/ Time Th e devi ce’s syst em ti me. If t his i s inc orre ct , ple ase s [...]

  • Seite 31

    28 SY STEM W AN Settings Attain IP Protocol Method used to connect t o the Int ernet. IP address Th e W AN I P Addr ess o f the de vic e. Subnet Mask Th e W AN S ubn et Ma sk of th e devi ce. MAC address Th e MAC add res s of the d evi ce’s W AN I nter fa ce. Primary and Secondar y DNS Primary and Secondary DNS ser vers assigned to the WA N conne[...]

  • Seite 32

    29 SY STEM LAN Settings IP address Th e LA N IP Add ress o f the d evic e. Subnet Mask Th e LA N Subn et Ma sk of t he dev ice. DHCP Ser v er Whether the DHCP ser ver is Enabled or Disabled. MAC address Th e MAC add res s of the d evi ce’s LA N Inte rf ace.[...]

  • Seite 33

    30 SY STEM WLAN Settings Channel The wireless channel in use. ESSID Th e SSID (N etw ork N ame) of th e wir ele ss net wo rk. (up to 4 SS IDs ar e sup por ted ) Securit y Wireless encr yption is enabled for this SSID . BSSID Th e MAC add res s of thi s SSI D . Associated Clients The number of wireless clien ts connected to this SSID .[...]

  • Seite 34

    31 SY STEM LAN Th is pag e all ows you t o mod if y the d evic e’s LAN set tin gs.[...]

  • Seite 35

    32 SY STEM L AN IP IP address Th e LA N IP Add ress o f thi s devi ce. IP Subnet Mask Th e LA N Subn et Ma sk of t his d evic e. 802. 1 d Spanning T ree When Enabled , the Spanning T ree prot ocol will prev ent network loops in your LAN network.[...]

  • Seite 36

    33 SY STEM DHCP Ser v er DHCP Ser v er The D HCP Se r ver aut omat ic all y allo cat es IP ad dre sse s to your L AN d evi ce. Lease Time Th e dur atio n of ti me th at the D HCP s er ver wi ll al loc ate ea ch IP ad dre ss to a L AN dev ic e. St ar t / End I P Th e ran ge of IP addr ess es th at the D HCP s er ver wi ll al loc ate to a L AN de vic[...]

  • Seite 37

    34 SY STEM DNS Servers Fro m IS P Th e DNS se r ver IP ad dre ss is a ssi gne d fro m your I SP . User-Defined The DNS server IP address is assigned manually . DNS Relay L AN cl ient s are a ssi gne d the d evi ce’s IP add res s as th e DNS s er ver. T wo DNS s er ver s can b e as sig ned fo r use by yo ur L AN dev ic e. There are four modes a va[...]

  • Seite 38

    35 SY STEM DHCP Th is pag e sho ws the s tat us of th e DHC P ser ver a nd al so al lows yo u to co ntro l how th e IP ad dres ses are al loc ated .[...]

  • Seite 39

    36 SY STEM DHCP Client T able IP address Th e LA N IP add res s of th e cli ent. MAC address Th e MAC add res s of the c lie nt ’ s L AN i nter fac e. Expirati on Time The time that the allocat ed IP addr ess will e xpire. Refresh Cl ick t his b ut ton to up date t he DH CP Cli ent T a ble. Th e DHCP C lie nt T abl e show s the L AN c lie nts t h[...]

  • Seite 40

    37 SY STEM Y ou can also manually specif y the IP address that will be allocated to a L AN cl ien t by as soc iati ng th e IP ad dres s wit h its M AC addr ess . T yp e the IP a ddr ess yo u woul d like to m anu all y as sig n to a sp eci fic M AC addre ss an d cli ck Ad d to add t he co ndi tio n to th e Stat ic DH CP T abl e.[...]

  • Seite 41

    38 SY STEM Sche dule This page allows y ou to se tup the schedule times that the Firewall an d Power Sa vin g featu res w ill b e acti vate d / deac ti vated . Cli ck Ad d to cre ate a Sc hed ule e ntr y .[...]

  • Seite 42

    39 SY STEM Schedul e Schedule Description Assign a name to the schedule. Service The service provides for the schedule. Days De fin e the D ays to ac tiva te or de act ivat e the s che dule. Ti me of da y Def ine t he Ti me of da y to act ivat e or dea cti vate t he sc hed ule. Please use a 24-hour clock f ormat.[...]

  • Seite 43

    40 SY STEM Log This page displays the system log of the device. When powered down or rebooted, the log will be cleared. Log Save S ave the l og to a fi le. Clear Clear the log. Refresh Update the log.[...]

  • Seite 44

    41 SY STEM Language Th is pag e all ows you t o cha nge t he La ngu age o f the Us er In ter fac e.[...]

  • Seite 45

    42 INTERNET The Internet section allows you to manually set the W AN type connection and its related settings. Status Th is pag e sho ws the c urr ent s tatu s of th e devi ce’s WAN con nec tio n.[...]

  • Seite 46

    43 INTERNET Dynamic IP Address The IP Address is allocated automa tically . Howe ver some ISP ’s wil l als o reco gni ze the M AC addr ess a nd wi ll rej ect connections if the MAC address does no t match. If yo ur ISP h as re cor ded t he MAC ad dre ss of yo ur co mput er’s Ethernet LAN card , please connect only the computer with the authoriz[...]

  • Seite 47

    44 INTERNET Static IP A ddress If yo ur ISP P rovi der h as as sig ned y ou a fix ed IP ad dre ss, en ter th e assigned IP address, Subnet mask, Default Gatewa y IP ad dress, and Primary DNS and S econdar y DNS (if av ailable) of your ISP provider . Static IP Address IP address Assign an IP address M anually . IP Subnet Mask Specify an IP addr ess?[...]

  • Seite 48

    45 INTERNET PPP over Eth erne t ISP requir es an account username and password[...]

  • Seite 49

    46 INTERNET PPP over Ethern et (PPPoE) Username Username assigned to you by the ISP Pass word Password for this username . Service Y ou can assign a name for this se r vice. (Optional) MTU Th e ma xim um siz e of pac kets. Do not change unless men tioned by the ISP . Authentication type Select whe ther the ISP uses P AP or CHAP me thods for a uthen[...]

  • Seite 50

    47 INTERNET Point -to - Point T unn eling Pr otoco l (PPTP) PPT P is us ed by so me IS Ps.[...]

  • Seite 51

    48 INTERNET Point-to -Point T unne ling P rotocol (PPTP) W AN Interface T ype Se lec t whet her t he IS P is set t o Sta tic IP or wil l all oca te a Dyn ami c IP ad dres s. Hostname This is op tional. Only requi red if specified by ISP . MAC address Th e MAC Addr ess t hat i s use d to con nec t to th e ISP . Username Username assigned to you by t[...]

  • Seite 52

    49 INTERNET Laye r-2 T unne ling Prot ocol (L 2TP) L 2TP is u sed by s ome I SPs..[...]

  • Seite 53

    50 INTERNET L ayer- 2 T unn eli ng Pro toc ol (L 2TP) W AN Interface T ype Se lec t whet her t he IS P is set t o Sta tic IP or wil l all oca te a Dyn ami c IP ad dres s. Hostname This is op tional. Only requi red if specified by ISP MAC address Th e MAC Addr ess t hat i s use d to con nec t to th e ISP . Username Username assigned to you by the IS[...]

  • Seite 54

    51 WIRELESS The Wireless section allows you to configure the Wireless settings. Basic Th is pag e sho ws the c urr ent s tatu s of th e devi ce’s Wir ele ss se tt ing s.[...]

  • Seite 55

    52 WIRELESS Basic Radio Enable or Disable the device ’s wireless signal. Mode Select between Access Point or Wireless Distribution System (WD S) modes. Band Select the t ypes of wireless clients that the device will a ccept. e.g .: 2 .4 GH z (B+G +N) On ly 80 2. 1 1b and 1 1g cli ents w ill b e all owed. Enable SSID # Sele ct t he nu mber o f SSI[...]

  • Seite 56

    53 WIRELESS Wireless Distribution System (WDS ) Use WD S to connect Access Point wirelessly . Doing so extends a wired infrastructure to locations where cabling is not possible or inefficient to impl ement. Note that compatibility between different brands and models is not guaran teed. It is recommended that the WDS network be created using the sam[...]

  • Seite 57

    54 WIRELESS Adv anced Th is pag e all ows you t o con fig ure wi rel ess a dvan ce settings. It is recommended the default settings are used unless the user has experience with these functions.[...]

  • Seite 58

    55 WIRELESS Adv anced Fragment Threshold Specifies the size of the packe t per fragment. This function can reduce the chance of packe t collision. Howe ver when this value is set too lo w, there will be increased overheads resulting in poor per formance. RTS Threshold When the packet size is s maller than the RTS Threshold, then the p acket wil l b[...]

  • Seite 59

    56 WIRELESS Securit y Th is pag e all ows you t o set th e wir ele ss se cur it y set ti ngs.[...]

  • Seite 60

    57 WIRELESS Securit y SSID Selection Sel ect t he SSI D tha t the s ecu rit y set ti ngs w ill a ppl y to. Broadcast SSID If Di sab led, t he de vic e will not br oadc as t the SS ID. It wi ll be i nvis ibl e to wir ele ss cl ien ts. WMM Wi -Fi M ult i- Medi a is a Q uali ty o f Ser v ice p roto col w hic h pri ori tize s traf fi c in the order acc[...]

  • Seite 61

    58 WIRELESS IEEE 802. 1 x is an authentication pro tocol. Ev er y user must use a vali d account to login to this Access P oint befor e accessing the wireless L AN. The authentication is processed by a RADIUS server . This mode only authenticates users b y IEEE 802. 1 x, but it does not encrypt the data during communication. 802. 1 x Authentication[...]

  • Seite 62

    59 WIRELESS WEP Encryption: WEP Encryption Authentication T ype Please ensure that your wireless clients use the same authentication type. Key t yp e ASCII : regular te x t (recommended) HEX: for advanced users Ke y Length Select the desired option, and ensure the wireless clients use the same setting. • 64 Bit - d ata i s enc ry pted , usin g th[...]

  • Seite 63

    60 WIRELESS WP A RADIUS Encryption: WP A RADIUS Encryption W PA t y p e Se lec t the WPA en cr ypt ion yo u woul d like. Please ensure that your wireless clients use the same settings. R ADI US Se rve r IP ad dre ss Ente r the I P add ress o f the R ADI US Ser ve r . RADIUS Server Port En ter t he po rt n umb er us ed fo r con nec ti ons to t he R [...]

  • Seite 64

    61 WIRELESS WP A Pre- Shared K ey Encryption: WP A Pre- Shared K ey Encryption Authentication T ype Please ensure that your wireless clients use the same authentication type. W PA t y p e Se lec t the WPA en cr ypt ion yo u woul d like. Please ensure that your wireless clients use the same settings. Pre - sh are d Key T ype Se lec t whet her y ou w[...]

  • Seite 65

    62 WIRELESS Filter Th is pag e all ows you t o cre ate fil ter s to co ntro l whi ch wireless clients can connect to this device by only allowing the MA C addresses entered int o the Filt ering T able.[...]

  • Seite 66

    63 WIRELESS Wireles s Filter Enable Wireless Access Control Check the box to Enable Wir eless Access Control . When Enabled , only wireless clients on the Filt ering T able will be allowed . Description Enter a name or description for this entry . MAC address Ente r the M AC addr ess o f the w irel ess c lie nt th at you w ish to a llow a c onn ec [...]

  • Seite 67

    64 WIRELESS Wi- Fi Protected Se tup (WPS ) WPS fe atu re is fo llow s the Wi -F i All ian ce WPS s tan dar d and it eases the setup o f security- enabled Wi- Fi networks in the home and small office environment. It re duc es th e use r step s req uire d to co nfi gure a n et work a nd supports two methods that are familiar t o most consumers for co[...]

  • Seite 68

    65 WIRELESS Wi- Fi P rote cted Setup (WPS) WPS Che ck to E nab le the W PS fea ture. WPS Button Check t o Enable the WPS push button. Wi- Fi P rote cted Setup Information WPS Current Status Shows whether the W PS function is Configured or Un-configured. Configured means that WPS has been used to authoriz e a connection between the de vice and wirel[...]

  • Seite 69

    66 WIRELESS Initializ ing WPS Feature There are two methods t o initialize the WPS feature : Push Button and Pin Code methods. 1. WPS Pu sh Bu tto n Met ho d Pus h the W PS bu tto n on th e F9K 100 4, the W ire les s LED li ght wi ll st ar t to fl ash w hen WP S pro ces s is re ady. While the Wireless LED is flashing on the F9K 1004, press the WPS [...]

  • Seite 70

    67 WIRELESS Client List This page shows the wireless clients tha t are co nne cted t o the WI RELES S ROUT ER dev ice.[...]

  • Seite 71

    68 WIRELESS Poli cy Th is pag e all ows you t o con fig ure th e acc ess policies for each SSID (wireless network) . Policy W AN Connection Allow wireless clients on this SSID to access the WA N port which typically is an Internet connection. Communication between Wireless clients Dictates whethe r or not each wireless cli ent can communicat e with[...]

  • Seite 72

    69 FIREW ALL Enable This page allows y ou to E nable / Disable the Firew all features . If En abl ed Fi rewal l ser vi ce, t he De nial o f Ser v ice (D oS) and S PI (Sta tefu l Packe t Insp ec tio n ) fe atur es wi ll als o be en abl ed. Adv anced Y ou c an ch oos e whet her t o all ow VPN ( Vir tua l Pri vate Net wor k) pac kets to p ass t hro ug[...]

  • Seite 73

    70 FIREW ALL DMZ If e nab led t his fe atur e, all ows th e DMZ co mpu ter on yo ur L AN to be exposed to all users on the In ternet. • Thisallo wsalmostany applicationtobeused ontheser v er . • Th e“ DMZP C” wil lre cei veal lUn kno wnc onn ect ion san dda ta. •  Ift[...]

  • Seite 74

    71 FIREW ALL MAC Filter Y ou can choose whether t o Deny or Allow those comput ers listed in theMA CFiltering tableaccesstothe Internet. MAC Filter Enable MA C filtering Checkthis boxto EnabletheMA Cfiltering feature . De ny all c lie nts w ith M AC add res ses lis te d bel ow to ac ces s th e net wor k [...]

  • Seite 75

    72 FIREW ALL IP Filter Y ou can choose whether t o Deny or Allow computers with IP Addresses listed from accessing certain Ports. This can be used to contr ol which Internet applications the computers can a ccess. Y ou may need to hav e knowledge of what Int ernet ports the applications use. IP Filter Enable IP filtering Check thisboxto ?[...]

  • Seite 76

    73 FIREW ALL URL Filter Y ou c an de ny acc ess t o cer ta in web site s by bl ock ing key wo rds in t he URL weba ddress. For example ,“ga mer”hasbeen added tothe URLBloc kingT able. Any  webaddr essthatincludes“gamer”willbeblock ed.[...]

  • Seite 77

    74 ADV ANCED The Adv anced section allows y ou to configur e the Adv anced settings of the router . Network Ad dress T ranslat ion (NA T ) Th is pag e all ows you t o Enab le / Di sab le th e Net wor k Addr ess T ranslation (NA T ) and Network T urbine featu res. NA T is required to share one Internet account with multiple L AN users. Enabling Netw[...]

  • Seite 78

    75 ADV ANCED Port Mapping Port Mapping allo ws you t o redirect a par ticular range of po r ts to a co mpu ter o n your L AN n etwo rk . Thi s help s you host servers behind the NA T and Firewall . Port Mapping Enable Port Mapping Check this box to Enable the Port Mapping fea ture. Description Enter a name or description to help y ou identify this [...]

  • Seite 79

    76 ADV ANCED Por t For wardi ng Port Forwarding allo ws you t o redirect a par ticular public po rt to a com pute r on you r LA N net work . Th is he lps you host servers behind the NA T and Firewall . In t he exam ple b elow, th ere i s a WEB Se rve r ru nnin g on po r t 80 on t he L AN. For s ec urit y re aso ns, t he Adm ini stra tor wo uld li k[...]

  • Seite 80

    77 ADV ANCED Por t T r igge r If you use Internet applications which use non-standard connections or p or t num ber s, you m ay fin d that t hey do n ot fu nct ion c orr ect ly be cau se th ey are b loc ked by th e Wire les s Rou ter ’ s f irewa ll. A Port T r igger will be required for these applications to work. P o r t Tr i g g e r Enable Port[...]

  • Seite 81

    78 ADV ANCED App lica tion L ayer Ga teway (ALG ) Ce rt ain a ppl icat ion s may re qui re th e use of t he ALG fe atur e to function correctl y . If you use any of the applications listed, please check and select it to enable this f eature.[...]

  • Seite 82

    79 ADV ANCED Uni versa l Plug an d Play (UPnP) The UPnP function allows aut omatic discovery and configuration of UPnP enabled de vices on your network. It also provides automatic por t f or warding for supported applications to seamlessly bypass the Fir ewall. Un iver sal P lug an d Play (U PnP) Enable the UPnP Feat ure Check this box to Enable th[...]

  • Seite 83

    80 ADV ANCED Qu alit y of Se rvi ce (QoS) Qo S refe rs to t he ca pabi lit y of a n etw ork to p rovi de be tte r ser v ice to select ed network traffic. This is to ensure that applications get enough Internet bandwidth for a pleasant user experience. If not, then the performance and user experience of time sensitive transmissions such as voice and[...]

  • Seite 84

    81 ADV ANCED Priority Queue Method Bandwidth priority is set to either High or Low . The transmissions in the High queue will be pr ocessed first. Unlimited Priority Que ue Lo cal I P Addr es s T raf fi c to th is IP ad dres s wil l not b e af fect ed by Qo S rul es. Hi gh / Low Pr ior it y Que ue Protocol The t yp e of net wor k pro toco l. Hi gh [...]

  • Seite 85

    82 ADV ANCED Bandwidth Allocation Method Y ou can set the maximum amount of bandwidth a cert ain pro toc ol wil l use a t one t ime. O r you ca n set a m ini mum am oun t of bandwidth that will be guaranteed to a certain protocol. Bandwidth Allocation Ty p e Set the QoS rules to apply to transmissions tha t are Do wnloaded/Uploaded or Both directio[...]

  • Seite 86

    83 ADV ANCED Routing If yo ur WIR ELESS R OUTER d evi ce is c onn ect ed to a network with different subnets, then this feature wil l allow the different subnets to communicate with each other . Static Routing Enable Static Routing Check this box to Enable the Static Router feature. De sti nat ion L A N IP Enter t he IP a ddre ss of t he de sti nat[...]

  • Seite 87

    84 ADV ANCED For ex amp le, if C lien t3 wa nts to s end a n IP dat a pac ket to 192. 1 6 8. 1 0. 2 (Cli ent 2), it wil l use th e above t abl e to det erm ine t hat it h as to g o via 192. 168. 2. 103 (Rou ter 2) If i t sen ds Pac kets to 192. 168. 1 1 . 1 1 (Clie nt 1 ) wi ll go v ia 1 9 2. 1 6 8.2 .216 (Route r 1 ) Destination Subnet Mask Gatewa[...]

  • Seite 88

    85 VPN A Virtual Privat e Network (VPN) provides a secure connection between two or more computers or protected networks over the public Internet. It provides authentication to ensure that the informa tion is go ing to a nd fr om th e cor rec t par ti es. It p rov ides s ecu rit y to p rote ct the informa tion from being vie wed or being tampered w[...]

  • Seite 89

    86 VPN Status Th is pag e dis play s the c onn ect s tat us of VPN c onn ec tio n. Y ou ca n select one of them to connect or disconnect the VPN connection. Note: I f con nec tio n ty pe is r emo te dia l-i n (Clie nt to Si te or L 2TP over IPSec ), you can’t disconnect this session manually .[...]

  • Seite 90

    87 VPN Profile Sett ing Th is pag e all ows you t o Enable, Add, Edit and Delete VP N profiles. Profile Sett ing Enable Check the box to Enable the VPN profi le. Add Cl ick t his b ut ton to ad d the e ntr y. Edit Se lec t one p rof ile an d cli ck t his bu tt on to ed it th e ent ry. Delete Selected Delet e the selected entries. Delete All Delete [...]

  • Seite 91

    88 VPN IPSec IPS ec (In tern et Pro toc ol Sec uri ty) i s a prot oco l sui te for s ecu rin g Internet Protocol ( IP) communications by a uthenticating and en cr ypt ing e ach IP p acket o f a com mun ica tio n ses sio n. IPSe c also includes pro tocols for establishing mutual authentication between agents at the beginning of the session and negot[...]

  • Seite 92

    89 VPN General Name Ent er a nam e for yo ur VPN p oli cy . Connection T ype Supports IPS ec, L 2T P over IP Sec a nd L 2TP methods to establish VPN connection. Authentication T ype Supports pre- shared k ey method for authentication . Shared K ey Enter the Shared Key i n box. (e xample: 12 34 567 890) Confirm Enter y our Shared K ey again for veri[...]

  • Seite 93

    90 VPN SA ( Security Association) A Security Association ( SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA ma y include attributes such as: cryptographic algorithms and mode; traf fic encr yption keys ; an d para mete rs fo r the n etw ork d ata to b e pas sed o ver th e con[...]

  • Seite 94

    91 VPN SA ( Security Association) IK E (Pha se 1 ) Pr opo sal Exchange Select Main Mode or Aggr essive Mode f or IKE Phase 1 negotiation. • Main Mode: Select this option to configure the standard negotiation parameters for I KE Ph ase 1 of t he VP N T unn el. (Re co mme nde d Set tin g) • Aggressive Mode: S ele ct th is op tio n to con fig ure [...]

  • Seite 95

    92 VPN Net work Th is pag e all ows you t o con fig ure th e VPN server and local/remote subnet. Net work Securit y Gatewa y T ype Security Gatewa y T ype suppor ts IP Address and Domain Name. S elect one of them. Securit y Gatewa y Th e IP add res s or do mai n nam e of the V PN ser ve r . Local Netwo rk Ente r the l oca l (LA N) sub net a nd ma s[...]

  • Seite 96

    93 VPN Adv anced Th is pag e all ows you t o con fig ure ad van ced VP N set tin gs. Adv anced NA T T raversal Enabling NA T T raversal allow s IPSec traffic fr om this endpoint to tra verse through the translation process during NA T . The remote VPN endpoint must also su ppor t th is fea ture a nd it m ust b e ena ble d to fun cti on pr ope rly o[...]

  • Seite 97

    94 VPN L 2TP over IPS ec L2TP ov er IPSec VP Ns enable a business to transport data over the Interne t, while still maintaining a high level of security to pr otec t dat a. Y ou c an us e thi s ty pe of s ecu re co nne cti on for smal l or remot e office clients tha t need access t o the co rpo rate n etw ork . Y ou ca n als o use L 2TP ov er IPS e[...]

  • Seite 98

    95 VPN L2TP N etwor k L2TP Authentication Select the desired authentication pro toc ol (P AP , CHAP , MSCH AP _ V2). Se lec t MSCH AP _V2 by def ault Accou nt Select accounts f orm available Users to member for authentication. Y ou should set these av ailable users in user setting page. Net work Server IP Assign the VPN Server IP address. ( e x a m[...]

  • Seite 99

    96 VPN L2TP L2TP (The Lay er 2 T unnel Prot ocol) is a tunneling prot ocol used to support virtual private networks (VPNs ). It does not provide any encry ption or confidentiality by itself ; it relies on an encryption protocol that it passes within the tunnel to pro vide privacy . General General Name Ent er a nam e for yo ur VPN p oli cy Connecti[...]

  • Seite 100

    97 VPN L2TP N etwor k L2TP Authentication Select the desired authentication pro toc ol (P AP , CHAP , MSCH AP _ V2). Se lec t MSCH AP _V2 by def ault Accou nt Select accounts f orm available to member for authen tication. Y ou should set these available users in user se t ting page. Net work Server IP Assign the VPN Server IP address. ( e x a m p l[...]

  • Seite 101

    98 VPN User Setting This page display the a vailable users of VPN connection. Y ou can add and delete the V PN available users here. Y ou can ent er the user name and password then click Add button to add a user . Y ou can select users in C urrent VPN User T ab le then click Delete Selected button to delete users. User Settin g Name Us er’s na me[...]

  • Seite 102

    99 VPN Y ou c an us e Wiza rd to c reate a V PN pro fil e eas ily. 1. C lic k Next but ton to begin the wizard. 2. Enter the VPN policy name then click the N ex t b ut ton to n ext p age. Wizard[...]

  • Seite 103

    10 0 VPN 3. Y ou c an se lec t [IPS ec] or [L 2TP o ver IPS ec] or [L 2TP ] in th is pag e the n cli ck th e Nex t but ton to g o to th e nex t pag e. If you se lec t [IPS ec] the n go to st ep “a .” I f you se lec t [L2 TP over I PSe c] th en go to s tep “ b.” i f you se lec t [L 2TP] t hen g o to ste p “c.” a. IP Sec Y ou c an se lec [...]

  • Seite 104

    101 VPN b. L 2TP o ver IP Sec Enter the username, passw ord and VP N server IP setting. Th en cl ick t he Nex t but ton t o go to t he nex t pag e. Ente r the S ecu rit y Ga teway an d rem ote net wo rk. T hen cl ick t he Nex t but ton t o go to th e nex t pag e.[...]

  • Seite 105

    10 2 VPN c. L2TP Enter the username, passw ord and VP N ser v er IP setting. Th en cl ick t he Nex t but ton t o go to th e nex t pag e. 4 . Ente r the s har ed key for t he VPN con nec tio n[...]

  • Seite 106

    10 3 VPN 5. Setup successful, enable this policy immediately . If you don’t w ant to enable this policy , you can un- check the box. Th en cl ick t he Apply button t o apply the se t tings.[...]

  • Seite 107

    10 4 VPN 1. Click the Start button and open Con trol Panel. How t o est ab lish a n L2 TP over I PS ec VPN connection on Windows XP 2. Click [Ne t work Connections], double click [New Connection Wizard] then click the Nex t button.[...]

  • Seite 108

    10 5 VPN 3. S ele ct [Co nne ct to th e net wor k at my workplace ] then click the Nex t button. 4. Select [Vir tual P rivate Network connection ] then click the Nex t button.[...]

  • Seite 109

    10 6 VPN 5. Enter the [Company Name] then click the Nex t button. 6. Select [Do not dial the initial connection ] then click the Nex t button.[...]

  • Seite 110

    10 7 VPN 7. Ent er th e VPN se rv er IP ad dres s th en cli ck t he Nex t button. 8. Se lec t [Do no t use my s mar t ca rd] t hen c lic k the N ext button.[...]

  • Seite 111

    10 8 VPN 9. Cl ick t he Finish button to complete the wizard. 10 . Cli ck th e Pr operities button.[...]

  • Seite 112

    10 9 VPN 11. In Security , select [ Advanced ( custom se t tings ) ] then click the Settings button. 12 . Check [Unencrypted password (P AP) ] and [Challenge Handshake Authentication Protocol ( CHAP )] then click the OK button.[...]

  • Seite 113

    11 0 VPN 13 . C lic k [IPS ec Set ti ngs] t hen c hec k [Use p re- sha red key f or authentication ], Ent er the K ey then click the OK but ton . 14 . I n Net work ing , sel ect [L 2T P IPSe c VPN] t hen c lic k the OK button.[...]

  • Seite 114

    111 VPN 15 . C lic k the Connec t but ton to connect VP N connection. 16 . Y ou can see tha t the VP N Connection has been established[...]

  • Seite 115

    112 VPN 1. Click the Start button and open Control P anel. 2. Cli ck [ Vie w Net wor k Stat us an d T ask s] then [Set u p a new co nne ct ion or n et work] How t o est ab lish a n L2 TP over I PS ec VPN connection in Windows 7[...]

  • Seite 116

    113 VPN 3. Cl ick [C onn ect to a work pla ce] the n [Use my In ternet connection (VPN) ][...]

  • Seite 117

    114 VPN 4. En ter th e VPN se rv er IP ad dre ss: [In tern et add res s], [Destination name ] and check [Don’t connect no w; just se t it u p so I ca n con nec t late r], the n cli ck th e Next but ton. 5. Enter the correct User name and Password then click the Create button.[...]

  • Seite 118

    115 VPN 6. Cl ick t he Close button to close the VPN connection settings. 7. Clic k [Cha nge a dapte r set ti ngs] in S tep 2, t hen s ele ct V PN Connection and click [ Change settings of this connection ][...]

  • Seite 119

    11 6 VPN 8. Ch ang e T ype of VPN to [L ayer 2 T un nel ing Pr otoc ol wi th IP Sec (L 2TP/IP Sec)] and c hec k [Une ncr yp ted pa sswo rd (PAP) ] in S ecu rit y. 9. C lic k the Advanced settings button and select [Use pr eshared key for authentication ] and ent er th e cor rec t key . Th en cl ick t he OK button.[...]

  • Seite 120

    117 VPN 10 . Dou ble c lick the VPN Connection then click the Connect button. 11. Y ou can see that the V PN Connection has been established.[...]

  • Seite 121

    11 8 TOOL S This section allow s you t o configure certain device s ystem settings. Admin Th is pag e all ows you t o cha nge t he sys tem pa sswo rd and to configure remo te management. Change Pass word Ol d Pas sword : Enter the current password. Ne w Pass word: Enter y our new passw ord. Repeat New P assword: En ter your new password again for v[...]

  • Seite 122

    11 9 TOOL S Time Th is pag e all ows you t o set th e sys tem ti me. Time Ti me Se tup: Select the method y ou want to set the time. Time Zone: Select the time zone f or your current location. NTP T ime Server: E nter t he add res s of th e Net work T ime P roto col (N TP) Ser ve r to automatically s ynchronize with a ser ver on the Int ernet. Dayl[...]

  • Seite 123

    12 0 TOOL S Dynamic DNS ( DDNS) This free ser vice is very useful when combined with the Virtual Se rve r feat ure. I t allo ws Inte rne t use rs to c onn ect to y our Vi rt ual S er vers u sin g a URL , rat her t han a n IP Addr ess . This also solves the pr oblem of ha ving a dynamic I P address. W ith a dy nam ic IP ad dre ss, yo ur IP ad dre ss[...]

  • Seite 124

    12 1 TOOL S DD NS Se rv ice s work a s fol lows: 1 . Y o u must r egi ster f or th e ser vi ce at o ne of the listed DDNS Service providers. 2. After registration, use the Service provider’ s normal procedure t o obtain y our desired Do main name. 3. En ter you r DDNS d ata o n the F9 K 1004’s DD NS screen, and enable the D DNS featu re. 4. The[...]

  • Seite 125

    12 2 TOOL S Power This page allows y ou to E nable or Disable the wireless LAN po wer saving features.[...]

  • Seite 126

    12 3 TOOL S Diagnosis Th is pag e all ows you t o dete rmi ne if t he WIR ELESS ROU TER dev ic e has a n act ive In tern et co nne cti on. Diagnosis Add res s to Pin g: Ente r the I P add ress y ou wou ld like t o Ping . Ping Result: Results of the Ping t est.[...]

  • Seite 127

    12 4 TOOL S T o pe r form t he Fi rmwa re Up grad e: 1 . Cl ick t he Br owse b ut ton an d nav igat e to the location of the upgrade file. 2. Select the upgrade file. Its name will appear in t he fie ld nex t to t he Br owse B ut ton. 3. Click the Apply button to comple te the firm ware upgrade . Note: The Wireless Router is unav ailable during the[...]

  • Seite 128

    12 5 TOOL S Back-up Back-up Restore to factor y default: Re sto res th e dev ice to i ts fa ctor y d efau lt set ti ngs . Backup Settings: Save t he cu rre nt con fig ura tio n set tin gs to a f ile. Restore Settings: Restores a pre viously saved configuration file. Cli ck Br owse to s ele ct th e fil e. The n Upload to load t he se tt ing s.[...]

  • Seite 129

    12 6 TOOL S Reset In s ome c ircu mst anc es it m ay be re qui red to fo rce th e dev ice to r ebo ot.[...]

  • Seite 130

    12 7 TECHNIC AL SUPPORT , W ARRANT Y , FCC ST A TEMENT T echni cal Support US http:/ /w ww. belkin.com/support UK http:/ /w ww. belkin.com/uk /su ppor t Australia http:/ /w ww. belkin.com/au/support New Zealand http:/ /w ww. belkin.com/au/support Singapore 1800 6 22 1 1 3 0 Europ e http:/ /w ww. belkin.com/uk /su ppor t[...]

  • Seite 131

    12 8 TECHNIC AL SUPPORT , W ARRANT Y , FCC ST A TEMENT Belkin International, Inc., Limited 2- Y ear Product W arranty Wh at th is wa rran ty c over s. Belkin Int ernational, Inc. (“Belkin”) warrants t o the original purchaser of this Belkin prod uct that the product shall be free of def ects in design, assembly , material, or workmanship. Wh at[...]

  • Seite 132

    12 9 TECHNIC AL SUPPORT , W ARRANT Y , FCC ST A TEMENT How to get service. T o get s er vi ce for y our Be lki n pro duc t you mu st ta ke the fo llow ing s teps: 1. Co ntac t Be lkin Inter nat ion al, In c., at 1204 5 E. Wate rf ront Dr ive, Pl aya Vis ta , CA 90 094, At tn: C usto mer S er vi ce, or ca ll (80 0)-2 23- 55 46, w ith in 15 days of t[...]

  • Seite 133

    13 0 TECHNIC AL SUPPORT , W ARRANT Y , FCC ST A TEMENT How s ta te law r ela tes t o the w arr ant y. THIS W ARRANT Y CONT AINS THE SOLE WARRANTY OF BELKIN. THERE ARE NO OTHE R W ARR ANTIES, EXPRESSED OR, EXCEPT A S REQUIRED B Y LAW , IMPLIED , INCL UDING THE IMPLIED WARRANT Y OR CONDITI ON OF QUALITY , MERCHANT AB ILITY OR FITNESS FOR A P ARTICUL [...]

  • Seite 134

    131 TECHNIC AL SUPPORT , W ARRANT Y , FCC ST A TEMENT FCC St ate ment DECLARATION OF CONFORMITY WITH FCC RULES FOR ELE CTROMAGNETIC COMP A TIBILIT Y We, Bel kin I nter nat ion al, In c., of 1204 5 E. Water f ront D riv e, Playa Vista, CA 90 094, declare under our sole responsibility that the device, F 9 K100 4 v1, com pli es wit h Par t 15 of the F[...]

  • Seite 135

    13 2 TECHNIC AL SUPPORT , W ARRANT Y , FCC ST A TEMENT Canada- Industry Canada (IC ) The wireless radio of this device complies with RSS 1 3 9 & RSS 210 Indu str y Ca nad a. Th is Cl ass B d igi tal apparatus complies with Canadian IC ES- 003. Operation is subject to the f ollowing two conditions : ( 1 ) th is dev ice m ay not c ause i nter fe [...]

  • Seite 136

    © 20 1 2 Belkin Int ernational, Inc. All rights reser ved . All tra de names are registered trademarks o f respective manufacturers listed . Safari is a trademark of Apple Inc., registered in the U.S. and other coun tries. Internet Ex plorer is either a registered trademark or trademark of Microsoft Corporation in the United Stat es and/or o ther [...]