Netgear G Router Wgr614v9 Manual
Here you can view all the pages of manual Netgear G Router Wgr614v9 Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 21
Wireless-G Router WGR614v9 Reference Manual Configuring Basic Connectivity 1-7 v1.1, May 2008 If a login is required by your ISP, the following settings appear in the Basic Settings screen: •Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Ye s, the Basic Settings screen displays. –Internet Service Provider. This drop-down list contains a few ISPs that need special...
Page 22
Wireless-G Router WGR614v9 Reference Manual 1-8 Configuring Basic Connectivity v1.1, May 2008 •Telstra Bigpond, an Australian residential cable modem service •Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services worldwide. –Login and Password. This is the user name and password provided by your ISP. This name and password are used to log in to the ISP server. –Service Name. If your connection is capable of connecting to multiple Internet services,...
Page 23
Wireless-G Router WGR614v9 Reference Manual Configuring Basic Connectivity 1-9 v1.1, May 2008 –Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect.
Page 24
Wireless-G Router WGR614v9 Reference Manual 1-10 Configuring Basic Connectivity v1.1, May 2008
Page 25
2-1 v1.1, May 2008 Chapter 2 Safeguarding Your Network The Wireless-G Router Model WGR614v9 provides highly effective security features, which are covered in detail in this chapter. This chapter includes the following sections: •“Choosing Appropriate Wireless Security” •“Recording Basic Wireless Settings Setup Information” on page 2-4 •“Changing Wireless Security Settings” on page 2-5 •“Viewing Advanced Wireless Settings” on page 2-10 •“Restricting Wireless Access by MAC Address” on page 2-11...
Page 26
Wireless-G Router WGR614v9 Reference Manual 2-2 Safeguarding Your Network v1.1, May 2008 WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. The Wireless-G Router provides two screens for configuring the wireless settings: the basic Wireless Settings screen, which you access under Setup in the main menu (see “Changing Wireless...
Page 27
Wireless-G Router WGR614v9 Reference Manual Safeguarding Your Network 2-3 v1.1, May 2008 Table 2-1. Wireless Security Options Security Type Description None. No wireless security. Recommended only for troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. WEP. Wired Equivalent Privacy. Wired Equivalent Privacy (WEP) data encryption provides moderate data security. WEP Shared Key authentication and...
Page 28
Wireless-G Router WGR614v9 Reference Manual 2-4 Safeguarding Your Network v1.1, May 2008 Recording Basic Wireless Settings Setup Information Before customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network...
Page 29
Wireless-G Router WGR614v9 Reference Manual Safeguarding Your Network 2-5 v1.1, May 2008 –Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption keys. Whichever method you use, record the key values in the spaces provided. •Passphrase Method. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters and click Generate. Not all wireless devices support the passphrase method. •Manual Method. These values are not...
Page 30
Wireless-G Router WGR614v9 Reference Manual 2-6 Safeguarding Your Network v1.1, May 2008 The available settings in this screen are: •Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The...