User Manual
Page 3
...OS® 8.x, 9.x & v10.x, AppleTalk®, Linux®, Windows® 98SE, ME, NT, 2000 and XP and others. Product Overview Belkin Broadband Voice Modem/Router - 1 Port Part # F1PI210ENau Compatibility with both PC and Mac® Computers The Modem supports a variety of a network.... Host Support DMZ Host Support allows a networked computer to be fully exposed to each computer automatically so there is equipped with a firewall that will assign IP addresses to the Internet. There are in Dynamic Host Configuration Protocol (DHCP) Built-In Dynamic Host Configuration Protocol...
...OS® 8.x, 9.x & v10.x, AppleTalk®, Linux®, Windows® 98SE, ME, NT, 2000 and XP and others. Product Overview Belkin Broadband Voice Modem/Router - 1 Port Part # F1PI210ENau Compatibility with both PC and Mac® Computers The Modem supports a variety of a network.... Host Support DMZ Host Support allows a networked computer to be fully exposed to each computer automatically so there is equipped with a firewall that will assign IP addresses to the Internet. There are in Dynamic Host Configuration Protocol (DHCP) Built-In Dynamic Host Configuration Protocol...
User Manual
Page 5
... (SIP) support Voice Activity Detection (VAD) conserves bandwidth Quality of the signal into Internet Protocol (IP) packets. These IP packets are very low due to firewalls and the use of Network Address Translation (NAT), which delivers the bandwidth required to come close to Internet services such as a session that supports TCP...
... (SIP) support Voice Activity Detection (VAD) conserves bandwidth Quality of the signal into Internet Protocol (IP) packets. These IP packets are very low due to firewalls and the use of Network Address Translation (NAT), which delivers the bandwidth required to come close to Internet services such as a session that supports TCP...
User Manual
Page 11
... details. 19 section Setting/adjusting quality of service (Page 75) If you are able to access your computer in order to bypass the built in Firewall. LAN (Page 31) The LAN menu itself has a number of special fields in which know the password are having problems with their host name and...
... details. 19 section Setting/adjusting quality of service (Page 75) If you are able to access your computer in order to bypass the built in Firewall. LAN (Page 31) The LAN menu itself has a number of special fields in which know the password are having problems with their host name and...
User Manual
Page 12
NAT (Page 43) • Shares a single ISP account with a dynamic WAN IP Address. Firewall (Page 52) • Configures a variety of security and specialized functions including: Access Control, URL blocking, Internet access control scheduling, Intruder detection, and DMZ. 20 Advanced ... or disable the Universal Plug and Play function. These work as VoIP, VPN, nominated IP Addresses and ports etc. A route determines the way in the firewall.
NAT (Page 43) • Shares a single ISP account with a dynamic WAN IP Address. Firewall (Page 52) • Configures a variety of security and specialized functions including: Access Control, URL blocking, Internet access control scheduling, Intruder detection, and DMZ. 20 Advanced ... or disable the Universal Plug and Play function. These work as VoIP, VPN, nominated IP Addresses and ports etc. A route determines the way in the firewall.
User Manual
Page 13
... Method Status (Page 82) • Provides WAN connection type and status, firmware and hardware version numbers, system IP settings, as well as DHCP, NAT, and firewall information. • Displays the number of time an inactive login session will only 23 section
... Method Status (Page 82) • Provides WAN connection type and status, firmware and hardware version numbers, system IP settings, as well as DHCP, NAT, and firewall information. • Displays the number of time an inactive login session will only 23 section
User Manual
Page 16
... default router (i.e. Bridged data is automatically forwarded to change it is a standardized layer 2 technology. If the address is listed in the routing table as VoIP, Firewall, and QoS etc. • PPPoA: Point-to-Point Protocol over Ethernet is a common connection method used in minutes) After this time has been exceeded the...
... default router (i.e. Bridged data is automatically forwarded to change it is a standardized layer 2 technology. If the address is listed in the routing table as VoIP, Firewall, and QoS etc. • PPPoA: Point-to-Point Protocol over Ethernet is a common connection method used in minutes) After this time has been exceeded the...
User Manual
Page 23
... installed. • Pre-shared Key: It is a number or letter in the range 0-9 or A-F.) Pre-shared Key: Specify in Passphrase style or in the router's firewall. Field Default Parameter Description Cipher suite TKIP One of the WPA settings below. Authentication: • 802.1x: It is for frame body and CRC frame...
... installed. • Pre-shared Key: It is a number or letter in the range 0-9 or A-F.) Pre-shared Key: Specify in Passphrase style or in the router's firewall. Field Default Parameter Description Cipher suite TKIP One of the WPA settings below. Authentication: • 802.1x: It is for frame body and CRC frame...
User Manual
Page 28
... The subnetwork associated with zero length, Smurf Attack, UDP port loopback, 2 Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance and we advise leaving it enabled to protect your network. 3 Note: After you check the radio button in... value indicated in the update and enters the network in the destination address used for details.) The VoIP Router can also limit the access of firewall features. 5 Access Control 6 7 Access Control allows users to a "1" is to which the next hop of the host number. S = Static route....
... The subnetwork associated with zero length, Smurf Attack, UDP port loopback, 2 Snork Attack, TCP null scan, and TCP SYN flooding. The firewall does not significantly affect system performance and we advise leaving it enabled to protect your network. 3 Note: After you check the radio button in... value indicated in the update and enters the network in the destination address used for details.) The VoIP Router can also limit the access of firewall features. 5 Access Control 6 7 Access Control allows users to a "1" is to which the next hop of the host number. S = Static route....
User Manual
Page 30
... Add Schedule Rule to detect and prevent certain types of network attacks such as shown on the Access Control page. Intrusion Detection The VoIP Router's firewall inspects packets at a scheduled time. Each access control rule may filter Internet access for a schedule rule (as Denial-of-Service (DoS) attacks. 56 57 section...
... Add Schedule Rule to detect and prevent certain types of network attacks such as shown on the Access Control page. Intrusion Detection The VoIP Router's firewall inspects packets at a scheduled time. Each access control rule may filter Internet access for a schedule rule (as Denial-of-Service (DoS) attacks. 56 57 section...
User Manual
Page 31
...packets are blocked except those types marked with a connection to a network device are checked, only the particular type of packets, stateful inspection firewalls also close off ports until a connection to protect your network. If you wish to use Stateful Packet 2 Inspection (SPI) for FTP ... all communications are initiated by the recipient computer and 6 are using dynamic port numbers. Parameter Description Enable SPI and Anti-DoS firewall protection: The Intrusion Detection feature of the VoIP Router limits the access of allowed incomplete TCP/UDP sessions per min.) LOW: ...
...packets are blocked except those types marked with a connection to a network device are checked, only the particular type of packets, stateful inspection firewalls also close off ports until a connection to protect your network. If you wish to use Stateful Packet 2 Inspection (SPI) for FTP ... all communications are initiated by the recipient computer and 6 are using dynamic port numbers. Parameter Description Enable SPI and Anti-DoS firewall protection: The Intrusion Detection feature of the VoIP Router limits the access of allowed incomplete TCP/UDP sessions per min.) LOW: ...
User Manual
Page 32
.... 60 61 By default it is detected as incomplete. Community If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. Maximum half-open fragmentation packet number from the same host. Adding a client to...
.... 60 61 By default it is detected as incomplete. Community If you have a client PC that cannot run an Internet application properly from behind the firewall, you can open the client up to unrestricted two-way Internet access. Maximum half-open fragmentation packet number from the same host. Adding a client to...
User Manual
Page 43
... version numbers, as well as information on DHCP clients connected to your unit become unresponsive for the VoIP Router, as well as DHCP Server and Firewall status. Renew Click on this button to delete the access log. ATM PVC: Displays ATM connection type and status. Clear: Click on this button to...
... version numbers, as well as information on DHCP clients connected to your unit become unresponsive for the VoIP Router, as well as DHCP Server and Firewall status. Renew Click on this button to delete the access log. ATM PVC: Displays ATM connection type and status. Clear: Click on this button to...
User Manual
Page 49
... the password • Be sure to them. If you are pinging) has been configured for TCP/IP. • Disable any installed Firewalls 7 Troubleshooting Symptom Action Management Problems Cannot connect using has not been disabled. • Check the network cabling between the VoIP Router, the... on the attached device is Off Action • Check connections between the management station and the VoIP Router. • Disable any installed Firewalls. • Disable any attached LAN devices. • Be sure the device you want to restore the factory defaults. Note: All settings...
... the password • Be sure to them. If you are pinging) has been configured for TCP/IP. • Disable any installed Firewalls 7 Troubleshooting Symptom Action Management Problems Cannot connect using has not been disabled. • Check the network cabling between the VoIP Router, the... on the attached device is Off Action • Check connections between the management station and the VoIP Router. • Disable any installed Firewalls. • Disable any attached LAN devices. • Be sure the device you want to restore the factory defaults. Note: All settings...
User Manual
Page 51
Appendices FXS Interface 2 FXS ports Indicator Panel Line, Phone 1-2, VoIP, USB (F1PI210ENau only), LAN 1-4 (4 port F1PI241ENau & F1PI241ENau only), WLAN (F1PI241EGau only), Online, ADSL, PWR (power) Dimensions 16 x 120 x 190 mm (0.63 x 4.72 x 7.48 in ...developed and standardized by Ethernet, Fast Ethernet, or Gigabit Ethernet. G.711 U/A law, G.729, G.723.1 Dynamic IP Address Configuration - DHCP, DNS, DDNS Firewall - Collision Domain Single CSMA/CD LAN segment. CSMA/CD CSMA/CD (Carrier Sense Multiple Access/Collision Detect) is 6 connected. Codecs supported - Their interference ...
Appendices FXS Interface 2 FXS ports Indicator Panel Line, Phone 1-2, VoIP, USB (F1PI210ENau only), LAN 1-4 (4 port F1PI241ENau & F1PI241ENau only), WLAN (F1PI241EGau only), Online, ADSL, PWR (power) Dimensions 16 x 120 x 190 mm (0.63 x 4.72 x 7.48 in ...developed and standardized by Ethernet, Fast Ethernet, or Gigabit Ethernet. G.711 U/A law, G.729, G.723.1 Dynamic IP Address Configuration - DHCP, DNS, DDNS Firewall - Collision Domain Single CSMA/CD LAN segment. CSMA/CD CSMA/CD (Carrier Sense Multiple Access/Collision Detect) is 6 connected. Codecs supported - Their interference ...