192.168.x.x (where x is anything between 0 and 255.)
10.x.x.x (where x is anything between 0 and 255.)
172.y.x.x (where y is anything from 16 to 31, and x is anything between 0 and 255.)
There is no need to change the subnet mask. It is possible to change the subnet mask if necessary. Only make changes to the Subnet Mask if you specifically have a reason to do so.
Setting MAC Address Control
The MAC address filter is a powerful security feature that allows you to specify which computers are allowed on the wireless network. Note: This list applies only to wireless computers. This list can be configured so any computer attempting to access the wireless network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client (computer) to which you want to allow network access.
Setting up an Allow Access List
1. Select the "Allow" radio button (1) to begin setting up a list of computers allowed to connect to the wireless network.
2. Next, in the "MAC Address" field that is blank (3), type in the MAC address of the wireless computer you want to be able to access the wireless network, then click "Add" (4).
3. Continue to do this until all of the computers you want to add have been entered.
4. Click "Apply Changes" (5) to finish.
Setting up a Deny Access List
The "Deny Access" list lets you specify computers that you DO NOT want to access the network. Any computer in the list will not be allowed access to the wireless network. All others will.
1. Select the "Deny" radio button (2) to begin setting up a list of computers to be denied access to the wireless network.
2. Next, in the "MAC Address" field that is blank (3), type in the MAC address of the wireless computer you want to deny access to the wireless network, then click "Add" (4).
3. Continue to do this until all of the computers you want to deny access to have been entered.
4. Click "Apply Changes" (5) to finish.
To change the channel of operation of the Router, select the desired channel from the drop-down menu and select your channel. Click "Apply Changes" to save the setting. You can also change the SSID. The SSID is the equivalent to the wireless network's name. You can make the SSID anything you want to. If there are other wireless networks in your area, you should give your wireless network a unique name. The default is belkin54g. To change the SSID, click inside of the SSID box and type in a new name. Click "Apply Changes" to make the change.
This mode will allow you to wirelessly extend the range of your wireless network. The Universal Repeater is compatible with most 802.11b or 802.11g Wireless Access Point or Wireless Router. To enable "Repeater Mode", check the "Enable Universal Repeater Mode" box.
The Site Survey page will show you a list of available wireless networks. Select the wireless network you wish to connect to. Click the connect button to connect to the desired wireless network.
It is possible to make your wireless network nearly invisible. By turning off the broadcast of the SSID, your network will not appear in a site survey. Site Survey is a feature of many wireless network adapters on the market today. It will scan the "air" for any available network and allow the computer to select the network from the site survey. Turning off the broadcast of the SSID will help increase security.
Use as Access Point
When using the Wireless G Universal Range Extender as an Access Point, you must specify an IP address for the Access Point. This IP address must fall into the same range as the network that you will be connecting it to. To access the advanced setup interface of the Router again, type in the IP address in the web browser and login.
The Router ships with NO password entered. If you wish to add a password for more security, you can set a password here. Keep your password in a safe place, as you will need this password if you need to log into the router in the future. It is also recommended that you set a password if you plan to use the Remote management feature of this Router.
The login timeout option allows you to set the period of time that you can be logged into the Router's advanced setup interface. The timer starts when there has been no activity. For example, you have made some changes in the advanced setup interface, then left your computer alone without clicking "Logout". Assuming the timeout is set to 10 minutes, then 10 minutes after you leave, the login session will expire. You will have to login to the router again to make any more changes. The login timeout option is for security purposes and the default is set to 10 minutes. As a note, only one computer can be logged into the Router's advanced setup interface at one time.
Automatic Firmware Update Notification
The Router has the capability built-in to automatically check for a new version of firmware and alert you that the new firmware is available. When you log into the Router advanced interface, the router will perform a check to see if new firmware is available. If new firmware is available, you will be notified. You can choose to download the new version or ignore it. The router ships with this feature disabled. If you want to enable it, select "Enable" and click "Apply Changes".
Using Encryption can help secure your wireless network. Only one type of security may be selected at a time. Therefore the customer must select a mode that is supported on all network devices on the wireless network. This Belkin product has 5 possible Security settings:
1) Disabled. No encryption is enabled in this mode. Open networks where all users are welcome sometimes prefer to not enable encryption.
2) WPA-Personal (PSK) - Home (no server). WPA (Wireless protected Access) PSK (Pre-Shared Key) is a recent standards-based security technique where each packet of information is encrypted with a different code, or key. Since the key is constantly changing, WPA is very secure. There are two types of WPA, WPA-PSK (Pre-Shared Key), and WPA-Radius Server. Obviously the difference being that one requires a server and one does not. WPA-PSK is for home and small business users who do not have a server. The PSK encryption key is generated automatically from a string of characters or Pass Phrase. Obviously the biggest security risk in WPA PSK is if someone finds out your Pass Phrase.
a. TKIP verses AES. WPA setup requires the user to select whether to encrypt using TKIP or AES. The WPA standard specifies TKIP, so that is the default. Additionally TKIP should provide better compatibility between wireless products from different vendors since many wireless products will never be upgraded to AES. AES is a new encryption technique based on the un-ratified 802.11i standard. New WPA standards are being considered using AES. Although AES is not as popular, some users may prefer to use this technique. Either way, all networks devices must use the same technique.
b. Pre-Shared Key. Enter any word or phrase up to 40 characters. The same PSK must also be used for every other wireless network device on the network. Watch out for upper and lower case differences ("n" is different than "N".) Remember, the easiest way to break your security is for someone to guess your PSK.
3) 128-bit WEP. Until recently, 128-bit WEP (Wired Equivalent Privacy) was the standard for wireless encryption. If not all of your wireless devices support WPA, 128bit WEP still offers very good security option. It will require you to enter hex numbers, or you can generate them automatically.
4) 64-bit WEP. Belkin only recommends 64-bit mode on networks where some devices do not support either WPA or 128bit WEP.
5) WPA2. This method offers AES encryption dynamic encryption keys. Enter the Passphrase, which can have 8 to 63 characters. Then enter the Key Renewal period, which instructs the Router how often it should change the encryption keys.