Administrator An administrator performs the service of maintaining a network. In the case of this Router, the person who sets up the Router and makes changes to the settings.
Client A computer on the network that uses the services of the Router, such as the automatic DHCP server and Firewall.
DHCP The DHCP server function makes setting up a network very easy by assigning IP addresses to each computer on the network. The DHCP Server can be turned off if necessary. Turning off the DHCP server will require you to manually set a Static IP address in each computer on your network. The IP pool is the range of IP addresses set aside for dynamic assignment to the computers on your network. The default is 2-100 (99 computers) if you want to change this number, you can by entering a new starting and ending IP address and clicking on "Apply Changes".
Local Domain Name You can set a local domain name (network name) for your network. There is no need to change this setting unless you have a specific advanced need to do so. You can name the network anything you want such as "MY NETWORK".
Dial-Up A connection which uses the public telephone network.
DNS DNS is an acronym for Domain Name Server. A Domain Name Server is a server located on the Internet that translates URL's (Universal Resource Links) like to IP addresses. Many ISP's do not require you to enter this information into the Router. If you are using a Static IP connection type, then you may need to enter a specific DNS address and secondary DNS address for your connection to work properly. If your connection type is Dynamic or PPPoE, it is likely that you do not have to enter a DNS address.
DSL Modem DSL stands for Digital Subscriber Line. A DSL modem uses your existing phone lines to transmit data at high speeds.
Dynamic IP An IP address that is automatically obtained from a DHCP server.
Ethernet A standard for computer networks. Ethernet networks are connected by special cables and hubs, and move data around at up to 10 million bits per second (Mbps).
Firewall An electronic boundary that prevents unauthorized users from accessing certain files or computers on a network.
Firmware Software stored in memory. Essential programs that remain even when the system is turned off. Firmware is easier to change than hardware but more permanent than software stored on a disk.
IP Address The "IP address" is the Internal IP address of the Router. To access the advanced setup interface, type this IP address into the address bar of your browser. This address can be changed if needed. To Change the IP address, type in the new IP address and click "Apply Changes". The IP address you choose should be a non-routable IP. Examples of a non routable IP are:

192.168.x.x (where x is anything between 0 and 255.)
172.y.x.x (where y is anything from 16 to 31, and x is anything between 0 and 255)
10.x.x.x (where x is anything between 0 and 255.)

ISDN Integrated Services Digital Network. Digital telecommunications lines that can transmit both voice and digital network services up to 128K, and are much faster and more reliable than high-speed analog modems. ISDN lines are offered by many telephone companies.
ISP Internet Service Provider. An ISP is a business that provides connectivity to the Internet for individuals and other businesses or organizations.
ISP Gateway Address (see ISP for definition). The ISP Gateway Address is an IP address for the Internet router located at the ISP's office. This address is required only when using a cable or DSL modem.
LAN Local Area Network. A LAN is a group of computers and devices connected together in a relatively small area (such as a house or an office). Your home network is considered a LAN.
MAC Address MAC stands for Media Access Control. A MAC address is the hardware address of a device connected to a network.
MTU Maximum Transmission Unit. The largest unit of data that can be transmitted on any particular physical medium.
NAT Network Address Translation. This process allows all of the computers on your home network to use one IP address. Using the NAT capability of the Belkin Router home network gateway, you can access the Internet from any computer on your home network without having to purchase more IP addresses from your ISP.
Port A logical channel that is identified by its unique port number. Applications listen on specific ports for information that may be related to it.
PPPoE (Routing Mode, for multiple PCs) Most DSL providers use PPPoE as the connection type. If you use a DSL modem to connect to the Internet, your ISP may use PPPoE to log you into the service. If you have an Internet connection in your home or small office that doesn't require a modem, you may also use PPPoE.

Your connection type is PPPoE if:
1) Your ISP gave you a user name and password which is required to connect to the Internet
2) Your ISP gave you software such as WinPOET, Enternet300 that you use to connect to the Internet
3) You have to double-click on a desktop Icon other than your browser to get on the Internet

To set the Router to use PPPoE, type in your User Name and Password in the spaces provided. If you do not have a Service Name or do not know it, leave the Service Name field blank. After you have typed in your information, click "Apply Changes". After you apply the changes, the Internet Status indicator will read "connection OK" if your Router is set up properly. For more details on configuring your Router to use PPPoE, see the user manual.
Idle Time The Disconnect feature is used to automatically disconnect the router from your ISP when there is no activity for a specified period of time. For instance, placing a checkmark next to this option and entering 5 into the minute field will cause the router to disconnect from the Internet after 5 minutes of no Internet activity. This option should be used if you pay for your Internet service by the minute.
PPPoA (Routing Mode, for multiple PCs)
Disable Internet Sharing(Bridge Mode, for single PC)
Multiple protocol over ATM(Routing Mode, for multiple PCs)
PPTP Point-to-Point Tunneling Protocol. A version of PPP (Point-to-Point Protocol) that has the ability to encapsulate packets of data formatted for one network protocol in packets used by another protocol. This tunneling technique allows TCP/IP data to be transmitted over a non-TCP/IP network. PPTP can be used to join different physical networks using the Internet as an intermediary.
SNTP Simple Network Time Protocol. A communication standard that allows for the transmission of real time information over a network or the Internet.
SPI Stateful Packet Inspection. SPI is the type of corporate-grade Internet security provided by your Belkin Router home network gateway. Using SPI, the gateway acts as a "firewall," protecting your network from computer hackers.
Static IP An IP address that is manually configured and never changes.
Subnet Mask ADVANCED FEATURE! There is no need to change the subnet mask. It is possible to change the subnet mask if necessary. Only make changes to the Subnet Mask if you specifically have a reason to do so.
TCP Transmission Control Protocol. The most common Internet transport layer protocol. TCP is connection-oriented and stream-oriented, and provides for reliable communication over packet-switched networks.
TCP/IP Transmission Control Protocol over Internet Protocol. This is the standard protocol for data transmission over the Internet.
UDP User Datagram Protocol. Communications protocol for the Internet network layer, transport layer, and session layer, which makes it possible to send a datagram message from one computer to an application running in another computer. Unlike TCP, UDP is connectionless and does not guarantee reliable communication; the application itself must process any errors and check for reliable delivery.
WAN Wide Area Network. A network that connects computers located in geographically separate areas, (i.e., different buildings, cities, countries). The Internet is a wide area network.
WAN IP Address The IP address assigned to the router by the ISP.
Channel and SSID To change the channel of operation of the Router, select the desired channel from the drop-down menu and select your channel. Click "Apply Changes" to save the setting. You can also change the SSID. The SSID is the equivalent to the wireless network's name. You can make the SSID anything you want to. If there are other wireless networks in your area, you should give your wireless network a unique name. Click inside of the SSID box and type in a new name. Click "Apply Changes" to make the change.
ESSID Broadcast A feature of wireless networking is the ability for a wireless network adapter in a computer to look for an existing wireless network automatically. This is done by setting the card's SSID setting to "ANY". Your Router is capable of blocking this "random" searching for a network. If you disable the "ESSID Broadcast" feature, the only way a computer can join the network is by setting the computer's SSID to the specific name of the network (like WLAN).Be sure that you know your SSID (network name) before enabling this feature. It is possible to make your wireless network nearly invisible. By turning off the broadcast of the SSID, your network will not appear in a site survey. Site Survey is a feature of many wireless network adapters on the market today. It will scan the "air" for any available network and allow the computer to select the network from the site survey. Turning off the broadcast of the SSID will help increase security
Encryption You can set your encryption settings here. Using encryption can help keep your network secure. WEP is an acronym for Wired Equivalent Privacy. The Router uses WEP encryption to protect your data. Your router features two rates of encryption; 64-bit and 128-bit. Encryption works on a system of keys. The key on the computer must match the key on the Router. There are two ways to make a key. The easiest way is to create the key from a passphrase (like a password).The software in the router will convert your passphrase into a key. The advanced method is to enter the keys manually. WPA(with Server) is an acronym for Wireless Protected Access using a server to distribute keys to the clients: This option requires that a Radius server is running on the network. WPA-PSK(no server): Wireless Protected Access with a Pre-Shared Key: The key is a password, in the form of a word, phrase or series of letters and numbers. The key must be between 8 and 63 characters long and can include spaces and symbols. Each client that connects to the network must use the same key (Pre-Shared Key)
Virtual Servers This function will allow you to route external (Internet) calls for services such as a web server (port 80), FTP server (Port 21), or other applications through your Router to your internal network. Since your internal computers are protected by a firewall, machines from the Internet cannot get to them because they cannot be 'seen'. If you need to configure the Virtual Server function for a specific application, you will need to contact the application vendor to find out which port settings you need. To manually enter settings, enter the IP address in the space provided for the internal machine, the port type (TCP or UDP) select the LAN & Public port(s) required to pass, select Enable and click "Set". You can only pass one port per internal IP address. Opening ports in your firewall can pose a security risk. You can enable and disable settings very quickly. It is recommended that you disable the settings when you are not using a specific application.
Client IP filters The Router can be configured to restrict access to the Internet, e-mail or other network services. Restriction can be set for a single computer, a range of computers, or multiple computers. To restrict Internet access to a single computer for example, click "Add PC" enter the description and IP address range of the computer you wish to restrict access to in the "Client PC IP Address" fields. Next select the Service that you want to block by clicking on "Blocking". Click "OK" ". The computers at the IP address range you specified will now be blocked from Internet access.
Schedule Rule To configure the Schedule Rule, specify the Name, Comment, Start Time and End Time that you want to filter on your network. This page defines schedule rule names and activates the schedule for use in the "Access Control" page.
MAC Address Filtering The MAC Address Filter is a powerful security feature that allows you to specify which computers are allowed on the network. Any computer attempting to access the network that is not specified in the filter list will be denied access. When you enable this feature, you must enter the MAC address of each client on your network to allow network access to each or copy the MAC address by selecting the name of the computer from the "DHCP Client List". To enable this feature, select "Enable". Next, click "Apply Changes" to save the settings.
DMZ If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. This may be necessary if the NAT feature is causing problems with an application such as a game or video conferencing application. Use this feature on a temporary basis. The computer in the DMZ is not protected from hacker attacks. To put a computer in the DMZ, enter the last digits of its LAN IP address in the Static IP field and click "Apply Changes" for the change to take effect.
Administrator Password The Router ships with NO password entered. If you wish to add a password for more security, you can set a password here. Keep your password in a safe place as you will need this password if you need to log into the router in the future. It is also recommended that you set a password if you plan to use the Remote management feature of this Router.
The login timeout option allows you to set the period of time that you can be logged into the Router's advanced setup interface. The timer starts when there has been no activity. For example, you have made some changes in the advanced setup interface, then left your computer alone without clicking "Logout". Assuming the timeout is set to 10 minutes, then 10 minutes after you leave, the login session will expire. You will have to login to the router again to make any more changes. The login timeout option is for security purposes and the default is set to 10 minutes. As a note, only one computer can be logged into the Router's advanced setup interface at one time
Time and Time Zone The Router keeps time by connecting to a Simple Network Time Protocol (SNTP) server. This allows the Router to synchronize the system clock to the global Internet. The synchronized clock in the Router is used to record the security log and control client filtering. Select the time zone that you reside in. The system clock may not update immediately. Allow at least 15 minutes for the router to contact the time servers on the Internet and get a response. You cannot set the clock yourself.
Remote Management Before you enable this function, MAKE SURE YOU HAVE SET THE ADMINISTRATOR PASSWORD. Remote management allows you to make changes to your Router's settings from anywhere on the Internet.
UPnP UPnP (Universal Plug-and-Play) is a technology that offer seamless operation of voice messaging, video messaging, games, and other applications that are UPnP compliant. Some applications require the Router's firewall to be configured in a specific way to operate properly. This usually requires opening TCP and UDP ports and in some instances setting trigger ports. An application that is UPnP compliant has the ability to communicate with the Router, basically "telling" the Router which way it needs the firewall configured. The Router ships with the UPnP feature disabled. If you are using any applications that are UPnP compliant, and wish to take advantage of the UPnP features, you can enable the UPnP feature. Simply select "Enable" in the "UPnP Enabling" section of the Utilities page. Click "Apply Changes" to save the change.
Remote Management Remote management allows you to make changes to your Router's settings from anywhere on the Internet. There are two methods of remotely managing the Router. The first is to allow access to the Router from anywhere on the Internet by selecting
ˇ§Any IP address can remotely manage the Routerˇ¨. By typing in your WAN IP address from any computer on the Internet, you will be presented with a login screen where you need to type in the password of your Router. The second method is to allow a specific IP address only to remotely manage the Router. This is more secure, but less convenient. To use this method, enter the IP address you know you will be accessing the Router from in the space provided and select
ˇ§Only this IP address can remotely manage the Routerˇ¨. Before you enable this function, it is STRONGLY RECOMMENDED that you set your administrator password. Leaving the password empty will potentially open your Router to intrusion.
WLAN Wireless Local Area Network. A local area network that connects computers close together via radio (such as 802.11b).
BLOCK ICMP PING Computer hackers use what is known as "Pinging" to find potential victims on the Internet. By pinging a specific IP address and receiving a response from the IP address, a hacker can determine that something of interest might be there. The Router can be set up so it will not respond to an ICMP Ping from the outside. This heightens the level of security of your Router. To turn off the ping response , select "Block ICMP Ping" and click "Apply Changes". The Router will not respond to an ICMP ping.
Protected Mode NOTE: In most situations, best performance(throughput) is achieved with Protected
Mode OFF. If you are operating in an environment with HEAVY 802.11b traffic or
interference, best performance may be achieved with Protected Mode ON.
Turbo Mode Belkin's router supports 2 Turbo modes, 125 High-Speed mode & Frame Bursting
Selecting "125 High-Speed mode" will result in all devices running in 125 High-Speed
mode if all devices are capable of 125 High-Speed mode speeds. If any non-125
High-Speed mode device connects or associates with the network, the router will
automatically shift the entire network back to Frame Bursting Mode.

Selecting "Frame Bursting" will result in all devices capable of Frame Bursting to
function in frame bursting mode, and all clients not capable to operate in normal
802.11g modes. Frame Bursting mode supports both Frame Bursting enabled devices
and non Frame Bursting enabled devices simultaneously. Frame Bursting mode is
based on the unreleased 802.11e specification.
Selecting "off" will disable all turbo modes.
Time and Time Zone The Router keeps time by connecting to a Simple Network Time Protocol (SNTP)
server. This allows the Router to synchronize the system clock to the global Internet.
The synchronized clock in the Router is used to record the security log and control
client filtering. Select the time zone that you reside in. The system clock may not
update immediately. Allow at least 15 minutes for the to contact the time servers on the
Internet and get a response. You cannot set the clock yourself.
Wireless Bridge Wireless Bridging or Wireless Distribution System (WDS)
is used to connect Wireless Routers and Access points together to extend a network.

Please make sure you check the following:
1) Wireless channels must match between Router and AP.
2) Security settings (WEP) must match between Router and AP.
3) If MAC filtering is enabled, user must be sure to add the WLAN MAC address(es)
of the Router/AP in order to allow communication with each other.
4) If using a network protected by WPA, the SSID on both Access Points must be the same.

Click on the Drop down menu next to 'Bridge Mode' to select either:

Auto: Automatically scan for Access Points to connect to. Once the scan is complete a list of
available Access Points will appear. Simply select the Access Point to bridge to by ticking the
box. Please note that the area scan can take a few seconds.

Manual: To enter the wireless MAC address(es) of the Access Points to bridge with, manually.

Disabled: To disable Wireless Bridging