|
GLOSSARY OF TERMS
|
|
top |
|
|
Administrator An administrator performs
the service of maintaining a network. In the case of this Router,
the person who sets up the Router and makes changes to the
settings.
|
|
|
Client
A computer on the network that uses the services of the Router,
such as the automatic DHCP server and Firewall.
|
|
|
DHCP
The DHCP server function makes setting up a network very easy by
assigning IP addresses to each computer on the network. The DHCP
Server can be turned off if necessary. Turning off the DHCP server
will require you to manually set a Static IP address in each
computer on your network. The IP pool is the range of IP addresses
set aside for dynamic assignment to the computers on your network.
The default is 2-100 (99 computers) if you want to change this
number, you can by entering a new starting and ending IP address
and clicking on "Apply Changes".
|
|
top |
|
|
Local
Domain Name You can set a local domain
name (network name) for your network. There is no need to change
this setting unless you have a specific advanced need to do so.
You can name the network anything you want such as "MY NETWORK".
|
|
top |
|
Dial-Up
A connection which uses the public telephone network.
|
|
|
|
DNS
DNS is an acronym for Domain Name Server. A Domain Name Server is
a server located on the Internet that translates URL's (Universal
Resource Links) like www.belkin.com to IP addresses. Many ISP's do
not require you to enter this information into the Router. If you
are using a Static IP connection type, then you may need to enter
a specific DNS address and secondary DNS address for your
connection to work properly. If your connection type is Dynamic or
PPPoE, it is likely that you do not have to enter a DNS address.
|
|
top |
|
|
DSL Modem
DSL stands for Digital Subscriber Line. A DSL modem uses your
existing phone lines to transmit data at high speeds.
|
|
top |
|
|
Dynamic IP
An IP address that is automatically obtained from a DHCP server.
|
|
|
Ethernet
A standard for computer networks. Ethernet networks are connected
by special cables and hubs, and move data around at up to 10
million bits per second (Mbps).
|
|
top |
|
|
Firewall
An electronic boundary that prevents unauthorized users from
accessing certain files or computers on a network.
|
|
|
Firmware
Software stored in memory. Essential programs that remain even
when the system is turned off. Firmware is easier to change than
hardware but more permanent than software stored on a disk.
|
|
|
IP Address
The "IP address" is the Internal IP address of the Router. To
access the advanced setup interface, type this IP address into the
address bar of your browser. This address can be changed if
needed. To Change the IP address, type in the new IP address and
click "Apply Changes". The IP address you choose should be a
non-routable IP. Examples of a non routable IP are:
192.168.x.x (where x is anything between 0 and 255.)
172.y.x.x (where y is
anything from 16 to 31, and x is anything between 0 and 255)
10.x.x.x (where x is anything between 0 and 255.)
|
|
top |
|
|
ISDN
Integrated Services Digital Network. Digital telecommunications
lines that can transmit both voice and digital network services up
to 128K, and are much faster and more reliable than high-speed
analog modems. ISDN lines are offered by many telephone companies.
|
|
|
ISP
Internet Service Provider. An ISP is a business that provides
connectivity to the Internet for individuals and other businesses
or organizations.
|
|
|
|
|
ISP Gateway
Address (see ISP for definition). The
ISP Gateway Address is an IP address for the Internet router
located at the ISP's office. This address is required only when
using a cable or DSL modem.
|
|
top |
|
|
LAN
Local Area Network. A LAN is a group of computers and devices
connected together in a relatively small area (such as a house or
an office). Your home network is considered a LAN.
|
|
top |
|
|
MAC Address
MAC stands for Media Access Control. A MAC address is the hardware
address of a device connected to a network.
|
|
top |
|
|
MTU
Maximum Transmission Unit. The largest unit of data that can be
transmitted on any particular physical medium.
|
|
|
NAT
Network Address Translation. This process allows all of the
computers on your home network to use one IP address. Using the
NAT capability of the Belkin Router home network gateway, you can
access the Internet from any computer on your home network without
having to purchase more IP addresses from your ISP.
|
|
top |
|
|
Port
A logical channel that is identified by its unique port number.
Applications listen on specific ports for information that may
be related to it.
|
|
|
PPPoE
(Routing Mode, for multiple PCs) Most
DSL providers use PPPoE as the connection type. If you use a DSL
modem to connect to the Internet, your ISP may use PPPoE to log
you into the service. If you have an Internet connection in your
home or small office that doesn't require a modem, you may also
use PPPoE.
Your connection type is PPPoE if:
1) Your ISP gave you a user name and password which is required to
connect to the Internet
2) Your ISP gave you software such as WinPOET, Enternet300 that
you use to connect to the Internet
3) You have to double-click on a desktop Icon other than your
browser to get on the Internet
To set the Router to use PPPoE, type in your User Name and
Password in the spaces provided. If you do not have a Service Name
or do not know it, leave the Service Name field blank. After you
have typed in your information, click "Apply Changes". After you
apply the changes, the Internet Status indicator will read
"connection OK" if your Router is set up properly. For more
details on configuring your Router to use PPPoE, see the user
manual.
|
|
top |
|
|
|
Idle Time The Disconnect feature is
used to automatically disconnect the router from your ISP when
there is no activity for a specified period of time. For instance,
placing a checkmark next to this option and entering 5 into the
minute field will cause the router to disconnect from the Internet
after 5 minutes of no Internet activity. This option should be
used if you pay for your Internet service by the minute.
|
|
|
PPPoA
(Routing Mode, for multiple PCs)
|
|
|
Disable
Internet Sharing(Bridge Mode, for single PC)
|
|
|
Multiple
protocol over ATM(Routing Mode, for multiple PCs)
|
|
|
PPTP
Point-to-Point Tunneling Protocol. A version of PPP
(Point-to-Point Protocol) that has the ability to encapsulate
packets of data formatted for one network protocol in packets used
by another protocol. This tunneling technique allows TCP/IP data
to be transmitted over a non-TCP/IP network. PPTP can be used to
join different physical networks using the Internet as an
intermediary.
|
|
|
SNTP
Simple Network Time Protocol. A communication standard that allows
for the transmission of real time information over a network or the
Internet.
|
|
|
SPI
Stateful Packet Inspection. SPI is the type of corporate-grade
Internet security provided by your Belkin Router home network
gateway. Using SPI, the gateway acts as a "firewall," protecting
your network from computer hackers.
|
|
top |
|
|
Static IP
An IP address that is manually configured and never changes.
|
|
|
Subnet Mask
ADVANCED FEATURE! There is no need to change the subnet mask. It
is possible to change the subnet mask if necessary. Only make
changes to the Subnet Mask if you specifically have a reason to do
so.
|
|
top |
|
|
TCP
Transmission Control Protocol. The most common Internet transport
layer protocol. TCP is connection-oriented and stream-oriented,
and provides for reliable communication over packet-switched
networks.
|
|
|
TCP/IP
Transmission Control Protocol over Internet Protocol. This is the
standard protocol for data transmission over the Internet.
|
|
top |
|
|
UDP
User Datagram Protocol. Communications protocol for the Internet
network layer, transport layer, and session layer, which makes it
possible to send a datagram message from one computer to an
application running in another computer. Unlike TCP, UDP is
connectionless and does not guarantee reliable communication; the
application itself must process any errors and check for reliable
delivery.
|
|
|
WAN
Wide Area Network. A network that connects computers located in
geographically separate areas, (i.e., different buildings, cities,
countries). The Internet is a wide area network.
|
|
top |
|
|
WAN IP
Address The IP address assigned to the
router by the ISP.
|
|
|
Channel and
SSID To change the channel of operation
of the Router, select the desired channel from the drop-down menu
and select your channel. Click "Apply Changes" to save the
setting. You can also change the SSID. The SSID is the equivalent
to the wireless network's name. You can make the SSID anything you
want to. If there are other wireless networks in your area, you
should give your wireless network a unique name. Click inside of
the SSID box and type in a new name. Click "Apply Changes" to make
the change.
|
|
|
ESSID
Broadcast A feature of wireless
networking is the ability for a wireless network adapter in a
computer to look for an existing wireless network automatically.
This is done by setting the card's SSID setting to "ANY". Your
Router is capable of blocking this "random" searching for a
network. If you disable the "ESSID Broadcast" feature, the only
way a computer can join the network is by setting the computer's
SSID to the specific name of the network (like WLAN).Be sure that
you know your SSID (network name) before enabling this feature. It
is possible to make your wireless network nearly invisible. By
turning off the broadcast of the SSID, your network will not
appear in a site survey. Site Survey is a feature of many wireless
network adapters on the market today. It will scan the "air" for
any available network and allow the computer to select the network
from the site survey. Turning off the broadcast of the SSID will
help increase security
|
|
|
Encryption
You can set your encryption settings here. Using encryption can
help keep your network secure. WEP is an acronym for Wired
Equivalent Privacy. The Router uses WEP encryption to protect your
data. Your router features two rates of encryption; 64-bit and
128-bit. Encryption works on a system of keys. The key on the
computer must match the key on the Router. There are two ways to
make a key. The easiest way is to create the key from a passphrase
(like a password).The software in the router will convert your
passphrase into a key. The advanced method is to enter the keys
manually. WPA(with Server) is an acronym for Wireless Protected
Access using a server to distribute keys to the clients: This
option requires that a Radius server is running on the network.
WPA-PSK(no server): Wireless Protected Access with a Pre-Shared
Key: The key is a password, in the form of a word, phrase or
series of letters and numbers. The key must be between 8 and 63
characters long and can include spaces and symbols. Each client
that connects to the network must use the same key (Pre-Shared
Key)
|
|
|
|
Virtual
Servers This function will allow you to
route external (Internet) calls for services such as a web server
(port 80), FTP server (Port 21), or other applications through
your Router to your internal network. Since your internal
computers are protected by a firewall, machines from the Internet
cannot get to them because they cannot be 'seen'. If you need to
configure the Virtual Server function for a specific application,
you will need to contact the application vendor to find out which
port settings you need. To manually enter settings, enter the IP
address in the space provided for the internal machine, the port
type (TCP or UDP) select the LAN & Public port(s) required to
pass, select Enable and click "Set". You can only pass one port
per internal IP address. Opening ports in your firewall can pose a
security risk. You can enable and disable settings very quickly.
It is recommended that you disable the settings when you are not
using a specific application.
|
|
|
Client IP
filters The Router can be configured to
restrict access to the Internet, e-mail or other network services
at specific days and times. Restriction can be set for a single
computer, a range of computers, or multiple computers. To restrict
Internet access to a single computer for example, click "Add PC"
enter the description and IP address range of the computer you
wish to restrict access to in the "Client PC IP Address" fields.
Next select the Service that you want to block by clicking on
"Blocking". Click "OK" ". The computers at the IP address range
you specified will now be blocked from Internet access.
|
|
|
|
Schedule
Rule To configure the Schedule Rule,
specify the Name, Comment, Start Time and End Time that you want
to filter on your network. This page defines schedule rule names
and activates the schedule for use in the "Access Control" page.
|
|
|
MAC Address
Filtering The MAC Address Filter is a
powerful security feature that allows you to specify which
computers are allowed on the network. Any computer attempting to
access the network that is not specified in the filter list will
be denied access. When you enable this feature, you must enter the
MAC address of each client on your network to allow network access
to each or copy the MAC address by selecting the name of the
computer from the "DHCP Client List". To enable this feature,
select "Enable". Next, click "Apply Changes" to save the settings.
|
|
|
|
DMZ
If you have a client PC that cannot run an Internet application
properly from behind the firewall, you can open the client up to
unrestricted two-way Internet access. This may be necessary if the
NAT feature is causing problems with an application such as a game
or video conferencing application. Use this feature on a temporary
basis. The computer in the DMZ is not protected from hacker
attacks. To put a computer in the DMZ, enter the last digits of
its LAN IP address in the Static IP field and click "Apply
Changes" for the change to take effect.
|
|
|
Administrator Password The Router ships
with NO password entered. If you wish to add a password for more
security, you can set a password here. Keep your password in a
safe place as you will need this password if you need to log into
the router in the future. It is also recommended that you set a
password if you plan to use the Remote management feature of this
Router.
The login timeout option allows you to set the period of time that
you can be logged into the Router's advanced setup interface. The
timer starts when there has been no activity. For example, you
have made some changes in the advanced setup interface, then left
your computer alone without clicking "Logout". Assuming the
timeout is set to 10 minutes, then 10 minutes after you leave, the
login session will expire. You will have to login to the router
again to make any more changes. The login timeout option is for
security purposes and the default is set to 10 minutes. As a note,
only one computer can be logged into the Router's advanced setup
interface at one time
|
|
|
|
|
|
Remote Management
Remote management allows you to make changes to your Router's settings from anywhere on the Internet. There are
two methods of remotely managing the Router. The first is to allow access to the Router from anywhere on the Internet by selecting ˇ§Any IP address can remotely
manage the Routerˇ¨. By typing in your WAN IP address from any computer on the
Internet, you will be presented with a login screen where you need to type in the
password of your Router. The second method is to allow a specific IP address only
to remotely manage the Router. This is more secure, but less convenient. To use
this method, enter the IP address you know you will be accessing the Router
from in the space provided and select ˇ§Only this IP address can remotely manage
the Routerˇ¨. Before you enable this function, it is STRONGLY RECOMMENDED that
you set your administrator password. Leaving the password empty will potentially
open your Router to intrusion.
|
|
|
WLAN
Wireless Local Area Network. A local area network that connects
computers close together via radio (such as 802.11b).
|
|
top |
|
|
|
BLOCK ICMP PING
Computer hackers use what is known as "Pinging" to find potential
victims on the Internet. By pinging a specific IP address and
receiving a response from the IP address, a hacker can determine
that something of interest might be there. The Router can be set up
so it will not respond to an ICMP Ping from the outside. This
heightens the level of security of your Router. To turn off the ping
response , select "Block ICMP Ping" and click "Apply Changes". The
Router will not respond to an ICMP ping.
|
|
top |
|
|
|
Protected Mode
NOTE: In most situations, best performance(throughput) is achieved with Protected
Mode OFF. If you are operating in an environment with HEAVY 802.11b traffic or
interference, best performance may be achieved with Protected Mode ON.
|
|
top |
|
Turbo Mode
Belkin's router supports 2 Turbo modes, 125 High-Speed mode & Frame Bursting mode.
Selecting "125 High-Speed mode" will result in all devices running in 125 High-Speed
mode if all devices are capable of 125 High-Speed mode speeds. If any non-125
High-Speed mode device connects or associates with the network, the router will
automatically shift the entire network back to Frame Bursting Mode.
Selecting "Frame Bursting" will result in all devices capable of Frame Bursting to
function in frame bursting mode, and all clients not capable to operate in normal
802.11g modes. Frame Bursting mode supports both Frame Bursting enabled devices
and non Frame Bursting enabled devices simutaneously. Frame Bursting mode is
based on the unreleased 802.11e specification.
Selecting "off" will disable all turbo modes.
|
|
top |
|
Time and Time Zone
The Router keeps time by connecting to a Simple Network Time Protocol (SNTP)
server. This allows the Router to synchronize the system clock to the global Internet.
The synchronized clock in the Router is used to record the securoty log and control
client filtering. Select the time zone that you reside in. If you reside in an area that
observes Daylight Saving, the place a checkmark in the box next to "Enable
Daylight Saving". The system clock may not update immediately. Allow at least 15
minutes for the to contact the time servers on the Internet and get a response.
You cannot set the clock yourself.
|
|
top |
|
UPNP
UPNP (Universal Plug-and-Play) is a technology that offers seamless operation of
voice messaging, video message, games, and other applications that are UPnP
compliant. Some applications require the Router's firewall to be configured in a
specific way to operate properly. This usually requires opening TCP and UDP ports
and in some instances settings trigger ports. An application that is UPnP compliant has
the ability to communicate with the Router, basically "telling" the Router which way it
needs the firewall configured. The Router shipped with UPnP feature disabled. If you
are using any application that are UPnP compliant, and wish to take advantage of the
UPnP features, you can enable the UPnP feature. Simply select "Enable" in the "UPnP
Enabling" section of the Utilities page. Click "Apply Changes" to save the change.
|
|
top |
|
Wireless Bridge
Wireless Bridging or Wireless Distribution System (WDS)
is used to connect Wireless Routers and Access points together to extend a network.
Please make sure you check the following:
1) Wireless channels must match between Router and AP.
2) Security settings (WEP) must match between Router and AP.
3) If MAC filtering is enabled, user must be sure to add the WLAN MAC address(es)
of the Router/AP in order to allow communication with each other.
4) If using a network protected by WPA, the SSID on both Access Points must be the same.
Click on the Drop down menu next to 'Bridge Mode' to select either:
Auto: Automatically scan for Access Points to connect to. Once the scan is complete a list of
available Access Points will appear. Simply select the Access Point to bridge to by ticking the
box. Please note that the area scan can take a few seconds.
Manual: To enter the wireless MAC address(es) of the Access Points to bridge with, manually.
Disabled: To disable Wireless Bridging
|
|
top |