Home > Netgear > Router > Netgear G Router Wgr614v9 Manual

Netgear G Router Wgr614v9 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear G Router Wgr614v9 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Wireless-G Router WGR614v9 Reference Manual
    Configuring Basic Connectivity 1-7
    v1.1, May 2008
    If a login is required by your ISP, the following settings appear in the Basic Settings screen: 
    •Does Your Internet Connection Require A Login? If you usually must use a login program 
    such as WinPOET to access the Internet, your Internet connection requires a login. After you 
    select Ye s, the Basic Settings screen displays.
    –Internet Service Provider. This drop-down list contains a few ISPs that need special 
    protocols for connection. The list includes:
    •PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services
    Figure 1-5
    Note: After you finish setting up your router, you will no longer need to launch the 
    ISP’s login program on your computer to access the Internet. When you start 
    an Internet application, your router will automatically log you in.
    ISP does require login 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    1-8 Configuring Basic Connectivity
    v1.1, May 2008
    •Telstra Bigpond, an Australian residential cable modem service
    •Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used 
    by most DSL services worldwide. 
    –Login and Password. This is the user name and password provided by your ISP. This 
    name and password are used to log in to the ISP server.
    –Service Name. If your connection is capable of connecting to multiple Internet services, 
    this setting specifies which service to use.
    –Connection Mode. This drop-down list (shown in Figure 1-5 on page 1-7) selects when 
    the router will connect to and disconnect from the Internet. The list includes:
    •Always On. The router logs in to the Internet immediately after booting and never 
    disconnects.
    •Dial on Demand. The router logs in only when outgoing traffic is present and logs out 
    after the idle time-out.
    •Manually Connect. The router logs in or logs out only when the user clicks Connect 
    or Disconnect in the Router Status screen.
    –Idle Timeout. Your Internet connection is logged out if there is no data transfer during the 
    specified time interval.
    Note: The Telstra Bigpond setting is only for older cable modem service 
    accounts still requiring a Bigpond login utility. Telstra has 
    discontinued this type of account. Those with Telstra DSL accounts 
    and newer cable modem accounts should select No for Does Your 
    Internet Connection Require a Login.
    Figure 1-6
    Note: Not all ISPs are listed here. The ones on this list have special 
    requirements. 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    Configuring Basic Connectivity 1-9
    v1.1, May 2008
    –Domain Name Server (DNS) Address. If you know that your ISP does not automatically 
    transmit DNS addresses to the router during login, select Use These DNS Servers, and 
    enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address 
    is available, enter it also.
    Note: If you enter or change a DNS address, restart the computers on your 
    network so that these settings take effect. 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    1-10 Configuring Basic Connectivity
    v1.1, May 2008 
    						
    							2-1
    v1.1, May 2008
    Chapter 2
    Safeguarding Your Network
    The Wireless-G Router Model WGR614v9 provides highly effective security features, which are 
    covered in detail in this chapter. 
    This chapter includes the following sections:
    •“Choosing Appropriate Wireless Security”
    •“Recording Basic Wireless Settings Setup Information” on page 2-4
    •“Changing Wireless Security Settings” on page 2-5
    •“Viewing Advanced Wireless Settings” on page 2-10
    •“Restricting Wireless Access by MAC Address” on page 2-11
    •“Restricting Wireless Access by MAC Address” on page 2-11
    •“Changing the Administrator Password” on page 2-14
    •“Backing Up Your Configuration” on page 2-15
    •“Understanding Your Firewall” on page 2-15
    Choosing Appropriate Wireless Security 
    Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your 
    wireless data transmissions well beyond your walls. Operating an unsecured wireless network 
    creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network 
    to access your computers and files. Indoors, computers can connect over 802.11g/n wireless 
    networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate 
    area to access your network. Use the security features of your wireless equipment that are 
    appropriate to your needs.
    The time it takes to establish a wireless connection can vary depending on both your security 
    settings and router placement. 
    Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, 
    and equipment compatibility. In choosing an appropriate security level, you can also consider the 
    effort compared to the reward for a hacker to break into your network. As a minimum, however, 
    NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured 
    wireless network unless it is your intention to provide free Internet access for the public. 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    2-2 Safeguarding Your Network
    v1.1, May 2008
    WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK 
    encryption can consume more battery power on a notebook computer, and can cause significant 
    performance degradation with a slow computer.
    The Wireless-G Router provides two screens for configuring the wireless settings: the basic 
    Wireless Settings screen, which you access under Setup in the main menu (see “Changing Wireless 
    Security Settings” on page 2-5), and the Advanced Wireless Settings screen, which you access 
    under Advanced (see “Changing Wireless Security Settings” on page 2-5).
    Basic security options are listed in order of increasing effectiveness in Ta b l e 2 - 1 below. Other 
    features that affect security are listed in Table 2-2 on page 2-3. For more details on wireless 
    security methods, see the online document “Wireless Networking Basics” in Appendix B.
    Note: NETGEAR recommends that you change the administration password of your 
    router. Default passwords are well known, and an intruder can use your 
    administrator access to read or disable your security settings. For information 
    about how to change the administrator password, see “Changing the Administrator 
    Password” on page 2-14.
    Figure 2-1
    WGR614v9
    1) Open system: easy but no security
    2) MAC access list: no data security
    3) WEP: security but some performance 
    impact
    4) WPA-PSK: strong security
    5) WPA2-PSK: very strong security
    Wireless data
    security options
    Range: up to 300 foot radius
    Note: Use these with other features that enhance security (Table 2-2 on page 2-3).  
    						
    							Wireless-G Router WGR614v9 Reference Manual
    Safeguarding Your Network 2-3
    v1.1, May 2008 Table 2-1.  Wireless Security Options
    Security Type Description
    None. No wireless security. Recommended only for 
    troubleshooting wireless connectivity. Do not run an 
    unsecured wireless network unless it is your 
    intention to provide free Internet access for the 
    public.
    WEP. Wired Equivalent Privacy.  Wired Equivalent Privacy (WEP) data encryption 
    provides moderate data security. WEP Shared Key 
    authentication and WEP data encryption can be 
    defeated by a determined eavesdropper using 
    publicly available tools.
    For more information, see “Configuring WEP 
    Wireless Security” on page 2-7.
    WPA-PSK (TKIP). WPA-PSK standard encryption 
    with TKIP encryption type.
    WPA2-PSK (AES). Wi-Fi Protected Access version 2 
    with Pre-Shared Key; WPA2-PSK standard 
    encryption with the AES encryption type.
    WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.Wi-Fi Protected Access with Pre-Shared Key (WPA-
    PSK and WPA2-PSK) data encryption provides 
    extremely strong data security, very effectively 
    blocking eavesdropping. Because WPA and WPA2 
    are relatively new standards, older wireless adapters 
    and devices might not support them.
    For more information, see “Configuring WPA-PSK 
    and WPA2-PSK Wireless Security” on page 2-9.
    Table 2-2.  Other Features That Enhance Security
    Security TypeDescription
    Disable the wireless router radio.If you disable the wireless router radio, wireless 
    devices cannot communicate with the router at all. 
    You might disable this when you are away or when 
    other users of your network all use wired 
    connections.
    For more information, see “Viewing Advanced 
    Wireless Settings” on page 2-10.
    Turn off the broadcast of the wireless network 
    name SSID.If you disable the broadcast of the SSID, only 
    devices that know the correct SSID can connect. 
    This nullifies the wireless network discovery feature 
    of some products such as Windows XP, but your data 
    is still fully exposed to an intruder using available 
    wireless eavesdropping tools.
    For more information, see “Viewing Advanced 
    Wireless Settings” on page 2-10. 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    2-4 Safeguarding Your Network
    v1.1, May 2008
    Recording Basic Wireless Settings Setup Information
    Before customizing your wireless settings, print this section, and record the following information. 
    If you are working with an existing wireless network, the person who set up or is responsible for 
    the network can provide this information. Otherwise, you must choose the settings for your 
    wireless network. Either way, record the settings for your wireless network in the spaces provided.
    •Wireless Network Name (SSID). ______________________________ The SSID identifies 
    the wireless network. You can use up to 32 alphanumeric characters. The SSID is case-
    sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In 
    some configuration utilities (such as in Windows XP), the term “wireless network name” is 
    used instead of SSID. 
    •If WEP Authentication is used, circle one: Open System, Shared Key, or Auto. 
    –WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key 
    size must be the same for the wireless adapters and the wireless router.
    Restrict access based on MAC address.You can restrict access to only trusted computers so 
    that unknown computers cannot wirelessly connect 
    to the Wireless-G Router. MAC address filtering 
    adds an obstacle against unwanted access to your 
    network by the general public, but the data broadcast 
    over the wireless link is fully exposed. This data 
    includes your trusted MAC addresses, which can be 
    read and impersonated by a hacker.
    For more information, see “Restricting Wireless 
    Access by MAC Address” on page 2-11.
    Modify your firewall’s rules.By default, the firewall allows any outbound traffic 
    and prohibits any inbound traffic except for 
    responses to your outbound traffic. However, you 
    can modify the firewall’s rules.
    For more information, see “Understanding Your 
    Firewall” on page 2-15.
    Note: If you select Shared Key, the other devices in the network will not connect 
    unless they are also set to Shared Key and are configured with the correct key.
    Table 2-2.  Other Features That Enhance Security
    Security TypeDescription 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    Safeguarding Your Network 2-5
    v1.1, May 2008
    –Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption 
    keys. Whichever method you use, record the key values in the spaces provided.
    •Passphrase Method. ______________________________ These characters are 
    case-sensitive. Enter a word or group of printable characters and click Generate. Not 
    all wireless devices support the passphrase method.
    •Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10 
    hexadecimal digits (any combination of 0–9, a–f, or A–F). For 128-bit WEP, enter 
    26 hexadecimal digits.
    Key 1: ___________________________________ 
    Key 2: ___________________________________ 
    Key 3: ___________________________________ 
    Key 4: ___________________________________ 
    • If WPA-PSK or WPA2-PSK authentication is used:
    –Passphrase. ______________________________ These characters are case-sensitive. 
    Enter a word or group of printable characters. When you use WPA-PSK, the other devices 
    in the network will not connect unless they are also set to WPA-PSK and are configured 
    with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the 
    network will not connect unless they are also set to WPA2-PSK and are configured with 
    the correct passphrase. 
    Use the procedures described in the following sections to specify the Wireless-G Router. Store this 
    information in a safe place.
    Changing Wireless Security Settings
    This section describes the wireless settings that you can view and configure in the Wireless 
    Settings screen, which you access under Setup in the main menu.
    Viewing Basic Wireless Settings
    To specify the wireless security settings of your router:
    1.Log in to the router as described in “Logging In to Your Wireless Router” on page 1-2.
    2.Select Wireless Settings under Setup in the main menu. 
    						
    							Wireless-G Router WGR614v9 Reference Manual
    2-6 Safeguarding Your Network
    v1.1, May 2008
    The available settings in this screen are:
    •Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 
    32 alphanumeric characters. When more than one wireless network is active, different wireless 
    network names provide a way to separate the traffic. For a wireless device to participate in a 
    particular wireless network, it must be configured with the SSID for that network. The 
    WGR614v9 default SSID is NETGEAR. You can disable this broadcast as described in 
    “Viewing Advanced Wireless Settings” on page 2-10. 
    •Region. This field identifies the region where the Wireless-G Router can be used. It might not 
    be legal to operate the wireless features of the wireless router in a region other than one of 
    those identified in this field.
    Figure 2-2
    Note: The region selection feature might not be available in all countries. 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear G Router Wgr614v9 Manual