Home | Help | Logout     Internet Status:
LAN Setup
 
 
Internet WAN
 
 
 
Wireless
 
 
 
Firewall
 
 
 
 
 
 
Utilities
 
 
 
 
 
 

 Help
 
 
 
GLOSSARY OF TERMS
 
 
Administrator An administrator performs the service of maintaining a network.In the case of this Router, the person who sets up the Router and makes changes to the settings.
  top
 
 
Administrator Password The Router ships with NO password entered. If you wish to add a password for more security, you can set a password here. Keep your password in a safe place as you will need this password if you need to log into the router in the future. It is also recommended that you set a password if you plan to use the Remote management feature of this Router.
The login timeout option allows you to set the period of time that you can be logged into the Router's advanced setup interface. The timer starts when there has been no activity. For example, you have made some changes in the advanced setup interface, then left your computer alone without clicking "Logout". Assuming the timeout is set to 10 minutes, then 10 minutes after you leave, the login session will expire. You will have to login to the router again to make any more changes. The login timeout option is for security purposes and the default is set to 10 minutes. As a note, only one computer can be logged into the Router's advanced setup interface at one time
  top
 
 
Channel and SSID Click "Apply Changes" to save the setting. You can also change the SSID. The SSID is the equivalent to the wireless network's name. You can make the SSID anything you want to. If there are other wireless networks in your area, you should give your wireless network a unique name. Click inside of the SSID box and type in a new name. Click "Apply Changes" to make the change.
  top
 
 
Client A computer on the network that uses the services of the Router, such as the automatic DHCP server and Firewall.
  top
 
 
Client IP filters The Router can be configured to restrict access to the Internet, e-mail or other network services at specific days and times. Restriction can be set for a single computer, a range of computers, or multiple computers. To restrict Internet access to a single computer for example, click "Add PC" enter the description and IP address range of the computer you wish to restrict access to in the "Client PC IP Address" fields. Next select the Service that you want to block by clicking on "Blocking". Click "OK" ". The computers at the IP address range you specified will now be blocked from Internet access.
  top
 
 
DHCP The DHCP server function makes setting up a network very easy by assigning IP addresses to each computer on the network. The DHCP Server can be turned off if necessary. Turning off the DHCP server will require you to manually set a Static IP address in each computer on your network. The IP pool is the range of IP addresses set aside for dynamic assignment to the computers on your network. The default is 2-100 (99 computers) if you want to change this number, you can by entering a new starting and ending IP address and clicking on "Apply Changes".
  top
 
 
Disable Internet Sharing(Bridge Mode, for single PC)
  top
 
 
Disconnect after X... The Disconnect feature is used to automatically disconnect the router from your ISP when there is no activity for a specified period of time. For instance, placing a checkmark next to this option and entering 5 into the minute field will cause the router to disconnect from the Internet after 5 minutes of no Internet activity. This option should be used if you pay for your Internet service by the minute.
  top
 
 
DMZ If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. This may be necessary if the NAT feature is causing problems with an application such as a game or video conferencing application. Use this feature on a temporary basis. The computer in the DMZ is not protected from hacker attacks. To put a computer in the DMZ, enter the last digits of its LAN IP address in the Static IP field and click "Apply Changes" for the change to take effect.
  top
 
 
DNS DNS is an acronym for Domain Name Server. A Domain Name Server is a server located on the Internet that translates URL's (Universal Resource Links) like www.belkin.com to IP addresses. Many ISP's do not require you to enter this information into the Router. If you are using a Static IP connection type, then you may need to enter a specific DNS address and secondary DNS address for your connection to work properly. If your connection type is Dynamic or PPPoE, it is likely that you do not have to enter a DNS address.
  top
 
 
DSL Modem DSL stands for Digital Subscriber Line. A DSL modem uses your existing phone lines to transmit data at high speeds.
  top
 
 
Dynamic IP An IP address that is automatically obtained from a DHCP server.
  top
 
 
Encryption Using Encryption can help secure your wireless network. Only one type of security may be selected at a time. Therefore the customer must select a mode that is supported on all network devices on the wireless network. This Belkin product has 5 possible Security settings:

1) Disabled. No encryption is enabled in this mode. Open networks where all users are welcome sometimes prefer to not enable encryption.

2) WPA PSK - Home (no server). WPA (Wireless protected Access) PSK is a recent standards-based security technique where each packet of information is encrypted with a different code, or key. Since the key is constantly changing, WPA is very secure. There are two types of WPA, WPA-PSK (Pre-Shared Key), and WPA-Radius Server. Obviously the difference being that one requires a server and one does not. WPA-PSK is for home and small business users who do not have a server. The PSK encryption key is generated automatically from a string of characters or Pass Phrase. Obviously the biggest security risk in WPA PSK is if someone finds out your Pass Phrase.

a. TKIP verses AES. WPA setup requires the user to select whether to encrypt using TKIP or AES. The WPA standard specifies TKIP, so that is the default. Additionally TKIP should provide better compatibility between wireless products from different vendors since many wireless products will never be upgraded to AES. AES is a new encryption technique based on the un-ratified 802.11i standard. New WPA standards are being considered using AES. Although AES is not as popular, some users may prefer to use this technique. Either way, all networks devices must use the same technique.

b. Pre-Shared Key. Enter any word or phrase up to 40 characters. The same PSK must also be used for every other wireless network device on the network. Watch out for upper and lower case differences ('n' is different than 'N'.) Remember, the easiest way to break your security is for someone to guess your PSK.

3) 128-bit WEP. Until recently, 128-bit WEP (Wired Equivalent Privacy) was the standard for wireless encryption. If not all of your wireless devices support WPA, 128bit WEP still offers very good security option. It will require you to enter hex numbers, or you can generate them automatically.

4) 64-bit WEP. Belkin only recommends 64-bit mode on networks where some devices do not support either WPA or 128bit WEP.

5) WPA - Radius Server. (This mode is accessed from the Advanced Button). WPA server is only for networks using a Radius Server. All parameters for this mode should be obtained from the administrator of your Radius Server. Unlike WPA PSK, WPA server passes the key from the server to the clients instead of generating it automatically.
  top
 
 
ESSID Broadcast A feature of wireless networking is the ability for a wireless network adapter in a computer to look for an existing wireless network automatically. This is done by setting the card's SSID setting to "ANY". Your Router is capable of blocking this "random" searching for a network. If you disable the "ESSID Broadcast" feature, the only way a computer can join the network is by setting the computer's SSID to the specific name of the network (like WLAN).Be sure that you know your SSID (network name) before enabling this feature. It is possible to make your wireless network nearly invisible. By turning off the broadcast of the SSID, your network will not appear in a site survey. Site Survey is a feature of many wireless network adapters on the market today. It will scan the "air" for any available network and allow the computer to select the network from the site survey. Turning off the broadcast of the SSID will help increase security
  top
 
 
Ethernet A standard for computer networks. Ethernet networks are connected by special cables and hubs, and move data around at up to 10 million bits per second (Mbps).
  top
 
 
Firewall An electronic boundary that prevents unauthorized users from accessing certain files or computers on a network.
  top
 
 
Firmware Software stored in memory. Essential programs that remain even when the system is turned off.Firmware is easier to change than hardware but more permanent than software stored on a disk.
  top
 
 
IP Address The "IP address" is the Internal IP address of the Router. To access the advanced setup interface, type this IP address into the address bar of your browser. This address can be changed if needed. To Change the IP address, type in the new IP address and click "Apply Changes". The IP address you choose should be a non-routable IP. Examples of a non routable IP are:

192.168.x.x (where x is anything between 0 and 255.)
10.x.x.x (where x is anything between 0 and 255.)

  top
 
 
ISDN Integrated Services Digital Network.Digital telecommunications lines that can transmit both voice and digital network services up to 128K, and are much faster and more reliable than high-speed analog modems.ISDN lines are offered by many telephone companies.
  top
 
 
ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations.
 
 
 
ISP Gateway Address (see ISP for definition). The ISP Gateway Address is an IP address for the Internet router located at the ISP's office.This address is required only when using a cable or DSL modem.
  top
 
 
LAN Local Area Network. A LAN is a group of computers and devices connected together in a relatively small area (such as a house or an office).Your home network is considered a LAN.
  top
 
 
Local Domain Name You can set a local domain name (network name) for your network. There is no need to change this setting unless you have a specific advanced need to do so. You can name the network anything you want such as "MY NETWORK".
  top
 
 
MAC Address MAC stands for Media Access Control. A MAC address is the hardware address of a device connected to a network.
  top
 
 
MAC Address Filtering The MAC Address Filter is a powerful security feature that allows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client on your network to allow network access to each or copy the MAC address by selecting the name of the computer from the "DHCP Client List". To enable this feature, select "Enable". Next, click "Apply Changes" to save the settings.
  top
 
 
MTU Maximum Transmission Unit. The largest unit of data that can be transmitted on any particular physical medium.
  top
 
 
MTU Setting The MTU setting should never be changed unless your ISP gives you a specific MTU setting. Making changes to the MTU setting can cause problems with your Internet connection including disconnection from the Internet, slow Internet access and problems with Internet applications working properly.
  top
 
 
Multiple protocol over ATM(Routing Mode, for multiple PCs)
  top
 
 
NAT Network Address Translation. This process allows all of the computers on your home network to use one IP address.Using the NAT capability of the HomeConnect home network gateway, you can access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP.
  top
 
 
PPPoA (Routing Mode, for multiple PCs)
  top
 
 
PPPoE (Routing Mode, for multiple PCs) Most DSL providers use PPPoE as the connection type. If you use a DSL modem to connect to the Internet, your ISP may use PPPoE to log you into the service. If you have an Internet connection in your home or small office that doesn't require a modem, you may also use PPPoE.

Your connection type is PPPoE if:
1) Your ISP gave you a user name and password which is required to connect to the Internet
2) Your ISP gave you software such as WinPOET, Enternet300 that you use to connect to the Internet
3) You have to double-click on a desktop Icon other than your browser to get on the Internet

To set the Router to use PPPoE, type in your User Name and Password in the spaces provided. If you do not have a Service Name or do not know it, leave the Service Name field blank. After you have typed in your information, click "Apply Changes". After you apply the changes, the Internet Status indicator will read "connection OK" if your Router is set up properly. For more details on configuring your Router to use PPPoE, see the user manual.
  top
 
 
Port A logical channel that is identified by its unique port number. Applications listen on specific ports for information that may be related to it.
  top
 
 
Remote Management Before you enable this function, MAKE SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management allows you to make changes to your Router's settings from anywhere on the Internet.
  top
 
 
Schedule Rule To configure the Schedule Rule, specify the Name, Comment, Start Time and End Time that you want to filter on your network. This page defines schedule rule names and activates the schedule for use in the "Access Control" page.
  top
 
 
SNTP Simple Network Time Protocol. A communication standard that allows for the transmission of real time information over a network or the Internet.
  top
 
 
SPI Stateful Packet Inspection. SPI is the type of corporate-grade Internet security provided by your HomeConnect home network gateway.Using SPI, the gateway acts as a "firewall," protecting your network from computer hackers.
  top
 
 
Static IP (IPoA) An IP address that is manually configured and never changes. Short for Internet Protocol over ATM, designed in an attempt to make IP subnets map directly onto ATM networks in the same way that IP subnets map onto VLANs. Notice that DHCP client is not supported over IPoA. You must enter the WAN interface IP address, the remote end IP address for the default gateway setup, and the DNS server addresses provided by the ISP. Also you must enter VCI, VPI and Encapsulation values.

To set the Router to use IPoA, type in all the parameters in the spaces provided. After you have typed in your information, click "Apply Changes". After you apply the changes, the Internet Status indicator will read "connection OK" if your Router is set up properly. For more details on configuring your Router to use IPoA (Static IP), see the user manual.
  top
 
 
Subnet Mask ADVANCED FEATURE! There is no need to change the subnet mask. It is possible to change the subnet mask if necessary. Only make changes to the Subnet Mask if you specifically have a reason to do so.
  top
 
 
TCP Transmission Control Protocol. The most common Internet transport layer protocol.TCP is connection-oriented and stream-oriented, and provides for reliable communication over packet-switched networks.
  top
 
 
TCP/IP Transmission Control Protocol over Internet Protocol. This is the standard protocol for data transmission over the Internet.
  top
 
 
Time and Time Zone The Router keeps time by connecting to a Simple Network Time Protocol (SNTP) server. This allows the Router to synchronize the system clock to the global Internet. The synchronized clock in the Router is used to record the security log and control client filtering. Select the time zone that you reside in. If you reside in an area that observes Daylight Saving, then place a checkmark in the box next to "Enable Daylight Saving". The system clock may not update immediately. Allow at least 15 minutes for the router to contact the time servers on the Internet and get a response. You cannot set the clock yourself.
  top
 
 
UDP User Datagram Protocol.Communications protocol for the Internet network layer, transport layer, and session layer, which makes it possible to send a datagram message from one computer to an application running in another computer.Unlike TCP, UDP is connectionless and does not guarantee reliable communication; the application itself must process any errors and check for reliable delivery.
  top
 
 
UPnP UPnP (Universal Plug-and-Play) is a technology that offer seamless operation of voice messaging, video messaging, games, and other applications that are UPnP compliant. Some applications require the Router's firewall to be configured in a specific way to operate properly. This usually requires opening TCP and UDP ports and in some instances setting trigger ports. An application that is UPnP compliant has the ability to communicate with the Router, basically "telling" the Router which way it needs the firewall configured. The Router ships with the UPnP feature disabled. If you are using any applications that are UPnP compliant, and wish to take advantage of the UPnP features, you can enable the UPnP feature. Simply select "Enable" in the "UPnP Enabling" section of the Utilities page. Click "Apply Changes" to save the change.
  top
 
 
URL Blocking To configure the URL Blocking feature, specify the websites (www.somesite.com) and or keywords you want to filter on your network. Click "Apply" to activate the change. To complete this configuration, you will need to create or modify an access rule in the "Access Control" section. To modify an existing rule, click the "Edit" option next to the rule you want to modify. To create a new rule, click on the "Add PC" option. From the "Access Control Add PC" section check the option for "WWW with URL Blocking" in the Client PC Service table to filter out the websites and keywords specified.
  top
 
 
Virtual ServersThis function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, machines from the Internet cannot get to them because they cannot be 'seen'. If you need to configure the Virtual Server function for a specific application, you will need to contact the application vendor to find out which port settings you need. To manually enter settings, enter the IP address in the space provided for the internal machine, the port type (TCP or UDP) select the LAN & Public port(s) required to pass, select Enable and click "Set". You can only pass one port per internal IP address. Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. It is recommended that you disable the settings when you are not using a specific application.
  top
 
 
WAN Wide Area Network. A network that connects computers located in geographically separate areas, (i.e., different buildings, cities, countries).The Internet is a wide area network.
  top
 
 
WAN IP Address The IP address assigned to the router by the ISP.
  top
 
  top
 
 
ADSL Asymmetric Digital Subscriber Line are used to deliver high-rate digital data over existing ordinary phone-lines. Using a new modulation technology cakked Discrete Multitone (DMT), ADSL facilitates the simultaneous use of normal telephone services, ISDN, and high speed data transmission, eg., video.
  top
 
 
QoS The bandwidth gap between LAN and WAN may significantly degrade performance of critical network applications, such as VoIP, gaming, and VPN.This QoS function allows users to classify traffic of applications and provides them with differentiated services (Diffserv).
  top
 
 
Traffic Mapping Define a class by its traffic type, and local and remote addresses using the ADVANCED CONFIG button if necessary. Then set the Diffserv forwarding group this class is mapped to. Finally, select the outgoing VC that traffic of this class would be routed to. The classify rule then takes effect for all the new established connections.
  top