background image

Page 9

The router’s advanced management interface contains 15 main menu items as described in the following list.

Note: 

To ensure proper 

screen refresh after a 

command entry, check 

that Internet Explorer 

5.0 is configured as 

follows: Under the menu 

Tools/Internet Options/

General/Temporary 

Internet Files/Settings, 

the setting for ‘Check for 

newer versions of stored 

pages’ should be ‘Every 

visit to the page.’

Commonly Requested Features

Noted in this section is a quick reference guide to 
the most commonly requested advanced features 
and should save you the time of needing to read the 
entire section for the necessary features you are 
interested in. 

Setting up Wireless (Page 44)

This section will explain the basics of turning on the 
Wireless Functions in your router, if you should require 
this service it is also suggested you look into the 
Setting up Wireless Security area as well.

Setting up Wireless Security (Page 44)

This section describes the 2 forms of Wireless security 
available and allows you to choose either or both 
types of security in order to protect your network 
from outside access.

Option 1: MAC address filtering (Page 21)  
MAC Address Filtering uses a unique code that 
each computer has in order to create a list of 
computers that will be allowed onto your network.

Option 2: Wireless encryption (Page 22) 
Wireless encryption uses a code much like a secret 
password in order to ensure only those computers 
which know the password are able to access your 
network.

Setting up VoIP (Page 44)

This section will guide you through the basics of 
setting up your VoIP service on your network

Setting/Adjusting Quality of Service (Page 50)

If you are having problems with the quality of your 
Voice service due to large amounts of network traffic 
you may adjust your Quality of Service in this section.

Port Forwarding (Page 27)

Some programs will require you to direct certain port 
numbers to your computer in order to bypass the 
built in Firewall.

Should there be any further features within the 
product you would like to use please find a more 
extensive list on the next page.

Chapter 5 :

   Advanced Setup

 

 

 

 

BoB

TM

 Advanced Setup Method

Summary of Contents for Bob

Page 1: ...BoBTM 4 port wireless VoIP router ...

Page 2: ...g Pg 1 1 Password Setting Pg 1 2 Remote Management Pg 1 2 DNS Pg 1 3 WAN Pg 1 3 ATM PVC Pg 1 4 ATM Interface Pg 1 5 Clone MAC Address Pg 1 6 LAN Pg 1 7 VLAN Pg 1 8 VLAN Access Control Pg 1 9 Channel and SSID Pg 20 Wireless Access Control Pg 2 1 Security Pg 22 WEP Pg 23 WPA WPA2 Pg 24 WDS Pg 25 NAT Pg 25 Address Mapping Pg 26 Port Forwarding Pg 27 Special Applications Pg 28 Route Pg 30 RIP Paramete...

Page 3: ... Pg 49 QoS Pg 50 Edit Traffic Class Pg 5 1 Traffic Statistics Pg 52 DDNS Pg 52 USB Pg 53 Configuration Tools Pg 55 Firmware Upgrade Pg 55 Diagnostic Utility Pg 56 Reset Pg 56 Status Pg 57 DHCP Client LOG Pg 58 Security Log Pg 58 Appendices Pg 59 A1 Troubleshooting Pg 6 1 A2 Troubleshooting Pg 62 B Cables Pg 63 C Specification Pg 64 Glossary 1 Pg 65 Glossary 2 Pg 66 Belkin International Inc Limited...

Page 4: ...ake Voice over Internet Protocol VoIP phone calls The following is a list of features that make BoBTM an ideal solution for your home or small office and will contain important information on how to get what you want out of BoBTM so please read carefully before setting him up Chapter 1 Introduction BoBTM 4 port integrated wireless router ...

Page 5: ...IP addresses to each computer automatically so there is no need for a complicated networking setup DMZ Host Support DMZ Host Support allows a networked computer to be fully exposed to the Internet This function is used when NAT and firewall security prevent an Internet application from functioning correctly NAT IP Address Sharing Your router employs Network Address Translation NAT to share the sin...

Page 6: ...k layer encryption IPSec can support large encryption networks such as the Internet by using digital certificates for device authentication Wired Wireless LAN The router provides access for up to 4 by 10 100 Mbps wired devices and up to an additional 32 wireless devices making it easy to create a network in small offices or homes 802 11b 802 11g 802 11n wireless standards are supported MAC Address...

Page 7: ...the LED shown here will light A solid light means a computer or a network enabled device is connected When information is being sent over the port the LED blinks rapidly Off Your computer is not connected On Your computer is connected Wireless Status LED The Wireless status LED shows you when the router s wireless is enabled On Wireless enabled Orange Solid the router has detected a problem with a...

Page 8: ... the restore is complete LAN Ports The Ethernet port is RJ45 10 100 auto negotiation Connect your net work enabled computers or any networking devices to this port Phone Two Port Phone Port connects to standard analogue telephone set or fax machine PSTN Failover Port The Optional RJ 11 port is for connection to your PSTN Home Phone line to provide Normal Phone call backup for when VoIP is unavaila...

Page 9: ...10 Mbps Ethernet or 100 Mbps Fast Ethernet as well as the transmission mode to half duplex or full duplex Use twisted pair cabling to connect any of the LAN ports on the router to an Ethernet adapter on your PC Otherwise cascade the LAN port on the router to an Ethernet hub or switch and then connect your PC or other network equipment to the hub or switch When inserting an RJ 45 connector be sure ...

Page 10: ... user name and password The router s management interface consists of a Setup Wizard and an Advanced Setup section Setup Wizard Use the Setup Wizard to quickly set up the router Advanced Setup Advanced Setup supports more advanced functions like hacker attack detection IP and MAC address filtering virtual server setup virtual DMZ host as well as other functions Note If you would like to add any ad...

Page 11: ... VOIP Parameter Setting Firstly you need to tick one of the VoIP account boxes For instance if you wish to use VoIP port 2 on the back of the router then tick the box for VoIP account 2 Then you must enter your VoIP account details and click on SAVE SETTINGS Phone Number Enter your VoIP account phone number from your ISP Password Enter your VoIP account password for your ISP Register Click to regi...

Page 12: ...ss security available and allows you to choose either or both types of security in order to protect your network from outside access Option 1 MAC address filtering Page 21 MAC Address Filtering uses a unique code that each computer has in order to create a list of computers that will be allowed onto your network Option 2 Wireless encryption Page 22 Wireless encryption uses a code much like a secre...

Page 13: ...eatures on your router as well as having 4 sub menus Channel SSID This area includes the most basic of router functions and allows you to give a unique name to your network as well as allowing you to change the channel your wireless is running on in case it is accidentally sharing the same channel as another wireless appliance in the area Access Control Access Control or MAC address filtering as i...

Page 14: ...nDNS and TZO USB Page 53 You can plug in your USB hard drive or memory stick and share these resources on your home network Tools Page 55 Contains options to back up and restore the current configuration restore all configuration settings to the factory defaults update system firmware or reset the system each under its own menu Status Page 43 Provides WAN connection type and status firmware and ha...

Page 15: ...ement access is only available to users on your local network However you can also manage the router from outside your network via remote management by checking the Enabled check box You can set a HOST ADDRESS which will only allow that computer to use remote management The port field should be left as the default setting of 8080 unless you need to change it After any changes are made you must cli...

Page 16: ...n be connected to your ISP in one of the following ways ATM PVC Clone MAC Note If you check Enabled and specify an IP address of 0 0 0 0 any host can manage the router For remote management via a WAN IP address you need to connect using port 8080 Simply enter WAN IP address followed by 8080 in the address field of your web browser for example http 212 120 68 20 8080 This applies unless you change ...

Page 17: ...Specifies how to handle multiple protocols at the ATM transport layer VC MUX Point to Point Protocol over ATM Virtual Circuit Multiplexer null encapsulation allows only one protocol running per virtual circuit with less overhead LLC Point to Point Protocol over ATM Logical Link Control LLC allows multiple protocols running over one virtual circuit using slightly more overhead Protocol Protocol use...

Page 18: ...ing 1483 Routing allows a simple low cost connection to the Internet via a standard Ethernet port The router looks up the network address for each packet seen on the LAN port If the address is listed in the routing table as local it is filtered If the address is listed under the ADSL port it is forwarded Or if the address is not found then it is automatically forwarded to the default router i e th...

Page 19: ...Burst Size are configurable Connect Type Sets connection mode to always connected automatic or manual connection Idle Time Enter the maximum idle time for the Internet connection in minutes After this time has been exceeded the connection will be terminated Username Enter user name Password Enter password Confirm password Confirm Password MTU Leave the Maximum Transmission Unit MTU at the default ...

Page 20: ...s to be on that VLAN then you would change the WLAN setting on this page from Default to the one you created called Test DHCP SERVER DHCP Option 60 Vendor ID If you wish you can specify the Name of your DHCP Server Optional Lease Time Specify the length of time that the DHCP will assign an IP address to a computer for IP Address Pool Start IP Specify the start IP address of the DHCP pool Do not in...

Page 21: ...bility to the Internet IGMP Snooping enable disable the feature to block unnecessary IP multicast traffic flooding among VLAN ports without the specific multicast membership This feature is working based on snooping IGMP Join Leave messages among the VLAN ports to update the bridging forwarding database IGMP Snooping is extremely useful in saving bandwidth of flow speed interfaces ex WLAN to impro...

Page 22: ...ys be assigned as it is on this screen Wireless The router also operates as a wireless access point allowing wireless computers to communicate with each other To configure this function you need to enable the wireless function and you may also setup the security options if needed Wireless Settings Check Enable or Disable and click SAVE SETTINGS This will turn the wireless function on or off and en...

Page 23: ...g as an access point the gateway can be configured for roaming clients by setting the SSID and wireless channel See the description of the parameters below Parameter Description SSID Service Set ID The SSID must be the same on the router and all of its wireless clients The SSID is the name of your wireless Show or hide the broadcasting of the SSID Show SSID broadcasting on the wireless network for...

Page 24: ...in the filtering table may connect to the router See the description of the Access Control features below Parameter Description Enable MAC Filtering Enable or disable the MAC filtering function Access Rule for registered MAC address When MAC filtering is enabled all registered MAC addresses are controlled by this Access Rule MAC Filtering Table Enter the MAC addresses of the network card you wish ...

Page 25: ...bled WEP Only WPA and or WPA2 WPA and 802 1x Using 8021x security requires support to do so from your OS or other third party radius server software and is not recommended unless you are familiar with setting up such systems Security Client Support Implementation Considerations WEP Built in support on all 802 11b and 802 11g devices WPA Requires WPA enabled system and network card Some wireless ca...

Page 26: ...its for each 64 bit key or enter 26 digits for the single 128 bit key A hexadecimal digit is a number or letter in the range 0 9 or A F Default Key ID Select the default key Default Recommended 1 Passphrase For automatic key generation check the Passphrase box enter a Passphrase and click SAVE SETTINGS When you return to this screen the Passphrase will be gone and the single 128Bit or the 4 64Bit ...

Page 27: ...red key in a SOHO network See the description of the WPA settings below Field Default Parameter Description Cipher suite TKIP One of the security mechanisms used by WPA for frame body and CRC frame encryption Authentication 802 1x for an enterprise network with a RADIUS server installed Pre shared Key for a SOHO network without any authentication server installed Pre shared key type Passphrase Inp...

Page 28: ...control over the TCP UDP port openings in the router s firewall This section can be used to support several Internet based applications such as web email FTP and Telnet NAT Settings NAT allows one or more public IP addresses to be shared by multiple internal users Enter the Public IP address you wish to share into the Global IP field Enter a range of internal IPs that will share the global IP Enab...

Page 29: ... a limited number of public IP addresses to be translated into multiple private IP addresses for use on the internal LAN network This also hides the internal network for increased privacy and security Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 30: ...cated at another internal IP address For example if you set Type Public Port to TCP 80 HTTP or web and the LAN IP Address LAN Port to 10 1 1 2 80 then all HTTP requests from outside users will be transferred to 10 1 1 2 on port 80 Therefore by just entering the IP address provided by the ISP Internet users can access the service they need at the local address to which you redirect them There is a ...

Page 31: ... UDP and then enter the ports that the application requires The ports may be in the format 7 11 57 or in a range e g 72 96 or a combination of both e g 7 11 57 72 96 Popular applications requiring multiple ports are listed in the Popular Applications field From the drop down list choose the application and then choose a row number to copy this data into Note Choosing a row that already contains da...

Page 32: ... Table with the most up to date values The content of the NAT Mapping Table is described as follows Protocol protocol of the flow Local IP local LAN host s IP address for the flow Local Port local LAN host s port number for the flow Pseudo IP translated IP address for the flow Pseudo Port translated port number for the flow Peer IP remote WAN host s IP address for the flow Peer Port remote WAN hos...

Page 33: ... set a static route Gateway Displays the WAN IP address of the gateway to the remote network Configure Allows you to modify or delete configuration settings Click Add or Edit to display the following page and add a new static route to the list Index Displays the number of the route Network Address Enter the IP address of the remote computer for which to set a static route Subnet Mask Enter the sub...

Page 34: ...sion of data traffic Authentication Required None No authentication Password A password authentication key is included in the packet If this does not match what is expected the packet will be discarded This method provides very little security as it is possible to learn the authentication key by watching RIP packets MD5 An algorithm that is used to verify data integrity through the creation of a 1...

Page 35: ...on address used for routing to specific subnets Each bit that corresponds to a 1 is part of the subnet mask number each bit that corresponds to 0 is part of the host number Gateway The IP address of the router at the next hop to which frames are forwarded Interface The local interface through which the next hop of this route is reached Metric When a router receives a routing update that contains a...

Page 36: ...ing IP Spoofing Land Attack Ping of Death IP with zero length Smurf Attack UDP port loopback Snork Attack TCP null scan and TCP SYN flooding The firewall does not significantly affect system performance and we advise leaving it enabled to protect your network You can select a pre defined firewall level from the drop down list Available options are High Medium Low Level User Defined Select User Def...

Page 37: ...access of hosts within the local area network LAN The MAC Filtering Table allows the router to enter up to 32 MAC addresses that are not allowed access to the WAN port The following items are displayed on the Access Control Parameter Description Enable Filtering Enables or disables the filtering function Normal Filtering Table Displays the IP address or an IP address range filtering table Click Ad...

Page 38: ...ot below will block all email sending and receiving Define the appropriate settings for client PC services as shown above Click OK to save your settings The added PC will now appear in the Access Control page Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 39: ...The router can also limit the access of hosts within the local area network LAN The MAC Filtering Table allows the router to enter up to 32 MAC addresses that are allowed access to the WAN port All other devices will be denied access Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 40: ...you want to modify To create a new rule click on the Add PC option From the Access Control Page Add PC section check the option for WWW with URL Blocking in the Client PC Service table to filter out the web sites and keywords selected below on a specific PC The router allows the user to block access to web sites from a particular PC by entering either a full URL address or just a keyword This feat...

Page 41: ...ess Control page Click Add Schedule Rule to add a new rule and bring up the following page Edit Schedule Rule You can create and edit schedule rules on this page Define the appropriate settings for a schedule rule as shown on the above screen The rule in the screen shot above prohibits emailing after 3 00pm to 11 00pm Upon completion click OK to save your schedule rules Chapter 5 Advanced Setup Bo...

Page 42: ... with a check in the Stateful Packet Inspection section at the top of the screen Stateful Packet Inspection This option allows you to select different application types that are using dynamic port numbers If you wish to use Stateful Packet Inspection SPI for blocking packets click on the Yes radio button in the Enable SPI and Anti DoSfirewall protection field and then check the inspection type tha...

Page 43: ...ber from same host Incomplete TCP UDP sessions detect sensitive time period of time before an incomplete TCP UDP session is detected as incomplete Maximum half open fragmentation packet number from same host Maximum number of incomplete TCP UDP sessions from the same host Half open fragmentation detect sensitive time period Length of time before a half open fragmentation session is detected as hal...

Page 44: ...ork called a Network Management Station NMS can be used to access this information Access rights to the agent are controlled by community strings To communicate with the router the NMS must first submit a valid community string for authentication Parameter Description Community A Community name authorised for management access Access Management access is restricted to Read or Write Valid Enables o...

Page 45: ...and includes enhancements to v1 that are universally accepted These include a get bulk command to reduce network management traffic when retrieving a sequence of MIB variables and a more elaborate set of error codes for improved reporting to a Network Management Station ADSL ADSL Parameters We recommend leaving the Operation Mode at the default Automatic setting unless you are having line sync iss...

Page 46: ... correction techniques to handle noise Interleaving slows the data flow and may not be optimal for real time signals such as video transmission Fast Path CRC indicates the number of Fast Path Cyclic Redundancy Check Error errors Interleaved Path indicates the number of Interleaved Path Cyclic Redundancy Error Check errors Loss of Signal Momentary signal discontinuities Defect Loss of Frame Failure...

Page 47: ... pre configured for the iiNet VoIP service iiNet and Belkin will only provide support for use with the iiNet VoIP service See below for a description of the parameters Parameter Description Phone 1 2 Enable Enable disable phone 1 and or 2 Phone Number Your phone number Display Name Your name often the same as your phone number SIP Domain From your VoIP provider Sip Server From your VoIP provider U...

Page 48: ...that receives SIP requests from a client and then forwards the requests on the client s behalf Proxy servers receive SIP messages and forward them to the next SIP server in the network A series of proxy and redirect servers receive requests from a client and decide where to send these requests Proxy servers can provide functions such as authentication authorization network access control routing r...

Page 49: ... the router you may try different settings to determine the best audio quality you obtain from the combination of your network connection and your used audio device head set or hand set The default codec sequence is listed below You can use the Up and Down buttons to change priority G 711 A law G 711 U law 1 2 1 2 See the below for a description of the parameters Parameter Description Support Call...

Page 50: ...ng issues with phone system menus faxing over IP etc Caller ID Mode Use DTMF Caller ID Mode Enabling this option enabled the Dual Tone Multi Frequency touch tone mode for Caller ID Inter Digit Delay This is the delay time before processing the dialled digits This will delay the VoIP unit dial the telephone number after the digits have been entered T 38 Mode 38 is the standard for sending faxes ove...

Page 51: ...n Code field and confirm in the Repeat New Pin Code field Press Apply to apply these changes VoIP Status and Call Logs View the VoIP status for both FXS ports on this page Click Refresh to update this page This page displays the Port Type SIP URL and Registration status of the router See the table below for a description of the parameters Parameter Description Port Type Displays the port type SIP ...

Page 52: ...m factors intelligent appliances and wireless devices UPnP enables seamless proximity network in addition to control and data transfer among networked devices in the home office and everywhere in between Enable or disable UPnP features Enable or disable the UPnP function Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 53: ...module function Enables or disables QoS Diffserv Forwarding Groups You can set the minimum amount of bandwidth you want allocated for certain QOS groups in a Percentage The different groups allow you to manage your different types of connections more efficiently Up to 16 rules can be defined to classify traffic into Diffserv forwarding groups and outgoing VCs Click on Add Traffic Class or click on...

Page 54: ... Advanced Config for more advance options Map to Forwarding Group Choose which QoS group you wish to have the rule mapped to which determines how much bandwidth is to be allocated with this rule Direct to VC Choose which ATM connection you wish to have the rule mapped to The default setting of By Routing should be used Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 55: ... DDNS With a DDNS Dynamic DNS connection you can host your own web site email server FTP site and more at your own location even if you have a dynamic IP address Parameter Description Dynamic DNS Enable or disable the DDNS function Provider Select which provider you wish to use for your DDNS service either DynDNS or TZO Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 56: ...uter Advanced Setup USB File Server This page allows you to enable or disable the File Server features NetBIOS SMB share protocol can be used in Windows 95 98 NT 4 0 2000 XP or other Operating Systems supporting the NetBIOS SMB protocol You need to select which partition maximum 4 partitions and folder you want to share You could specify username password and security level for each share resource...

Page 57: ...re You can specify different passwords and security levels for different users FTP Server and File Server share the same partition share limitation If you see the error message Partition share number exceed when you select some partitions check the File Server partition share status Advanced Setup USB Web Server This function allows you to share your mass storage through HTTP protocol After you en...

Page 58: ... backup configuration file To restore the factory settings check Restore router to Factory Defaults and click NEXT You will be asked to confirm your decision Click APPLY to proceed or CANCEL to go back Firmware Upgrade Use this screen to update the firmware or user interface to the latest versions Download the file to your hard drive from the Belkin web site or from another source Then click Brows...

Page 59: ...TE button Ping results will then show on the screen Reset Perform a reset from this page Should your unit become unresponsive for any reason you can simply perform a reset from this page Performing a reset will reboot the device Your configuration settings will remain the same Chapter 5 Advanced Setup BoBTM Advanced Setup Method ...

Page 60: ...onnect from the WAN Renew Click on this button to establish a connection to the WAN GATEWAY Displays system IP settings as well as DHCP Server and Firewall status INFORMATION Displays the number of attached clients the firmware versions the physical MAC address for each media interface and for the router as well as the hardware version and serial number ATM PVC Displays ATM connection type and sta...

Page 61: ... be able to connect to the BoBTM 4 port integrated wireless router by entering 10 1 1 1 into your Internet browsers address bar Should this not work please first determine how your ISP issues your IP address Many ISPs issue these numbers automatically using Dynamic Host Configuration Protocol DHCP Other ISPs provide a static IP address and associated numbers which you must enter manually How your ...

Page 62: ...face in order to make the required changes Configuring Your Computer in Windows 2000 DHCP IP Configuration On the Windows desktop click Start Settings Network and Dial Up Connections Click the icon that corresponds to the connection to your router The connection status screen will open Click Properties 2 1 2 3 Double click Internet Protocol TCP IP If Obtain an IP address automatically and Obtain D...

Page 63: ...oxes For future reference you may record the configured information in the following table TCP IP Configuration Setting IP Address ____ ____ ____ ____ Subnet Mask ____ ____ ____ ____ Default Gateway ____ ____ ____ ____ Preferred DNS Server ____ ____ ____ ____ Alternate DNS Server ____ ____ ____ ____ 1 2 3 4 5 Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your web browser is ...

Page 64: ...P tab Verify that your IP Address is now 10 1 1 xxx your Subnet Mask is 255 0 0 0 or 255 255 255 0 and your Default Gateway is 10 1 1 1 These values confirm that your router is functioning Close the Network window 1 1 2 1 2 Now your computer is configured to connect to the router Disable HTTP Proxy You need to verify that the HTTP Proxy feature of your web browser is disabled This is so that your ...

Page 65: ...ections for possible defects replace any defective adapter or cable if necessary Network Connection Problems Cannot ping the router from the attached LAN or the router cannot ping any device on the attached LAN Verify that the IP addresses are properly configured For most applications you should use the router s DHCP function to dynamically assign IP addresses to hosts on the attached LAN However ...

Page 66: ...t connections use only twisted pair cables with RJ 45 connectors that conform to FCC standards Specification Cable Types and Specification Cable Type Max Length Connector 100 BASE T Cat 3 4 5100 ohm UTP 100m 328 ft RJ 45 100 BASE TX Cat 5 100 ohm UTP 100m 328 ft RJ 45 Appendices Appendix B Cables ...

Page 67: ...PI210ENau only WAN Interface 1 ADSL RJ 11 port FXO Interface 1 FXO port FXS Interface Indicator Panel Line Phone 1 2 VoIP USB LAN 1 4 Wireless Internet power Dimensions 67 5 x 214 x 177 5 mm L x W x H Input Power 12V 1 5A Management Web management Advanced Features VoIP QoS VAD call waiting call forwarding caller ID jitter buffer Codec supported G 711 U A Law Dynamic IP Address Configuration DHCP ...

Page 68: ...e that does not forward traffic Ethernet A network communication system developed and standardized by DEC Intel and Xerox using baseband transmission CSMA CD access logical bus topology and coaxial cable The successor IEEE 8023 standard provides for integration into the OSI model and extends the physical layer and media with repeaters and implementations that operate on fiber thin coax and twisted...

Page 69: ...tween network nodes MIB An acronym for Management Information Base It is a set of database objects that contains information about the device RJ 45 Connector A connector for twisted pair wiring Straight through Port An RJ 45 port which does not cross the receive and transmit signals internally MDI so it can be connected with straight through twisted pair cable to any device having a crossover port...

Page 70: ...py of original receipt Your Belkin Customer Service Representative will then instruct you on how to forward your receipt and Belkin product and how to proceed with your claim 1 2 Belkin reserves the right to review the damaged Belkin product All costs of shipping the Belkin product to Belkin for inspection shall be borne solely by the purchaser If Belkin determines in its sole discretion that it i...

Page 71: ...u iiNet Business Support 13 24 49 bizsupport iinet net au Belkin 1800 235 546 Open 24 hours a day 7 days a week F1PI243EGau 2009 Belkin International Inc All rights reserved All trade names are registered trademarks of respective manufacturers listed ...

Reviews: