Home > Netgear > Router > Netgear R6100 Ac1200 Dual Band Wifi Router User Manual

Netgear R6100 Ac1200 Dual Band Wifi Router User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear R6100 Ac1200 Dual Band Wifi Router User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Security61
     R6100 WiFi Router
    The Block Services Setup screen displays:
    5.
    From the Service Type list, select the application or service to allow or block. 
    The list displays several common services, but you are not limited to th\
    ese choices. To  add any additional services or applications that do not already appear
     , select User 
    Defined.
    6. If you know that the application uses either 
     TCP or UDP, select the appropriate protocol. If 
    you are not sure, select  TCP/UDB (both).
    7. Enter the starting and ending port numbers. 
    If the application uses a single port number, enter that number in both fields.
    8. Select the radio button for the IP address configuration you want to blo\
    ck, and enter the IP 
    addresses. 
    You can block the specified service for a single computer, a range of computers with  consecutive IP addresses, or all computers on your network.
    9. Click the  Add button.
    Your changes are saved. 
    Port Triggering to Open Incoming Ports
    Some application servers (such as FTP and IRC servers) send replies to\
     multiple port 
    numbers. Using the port triggering function of your router, you can tell the router to open 
    more incoming ports when a particular outgoing port originates a session\
    .
    An example is Internet Relay Chat (IRC). Your computer connects to an IRC server at  destination port 6667. 
     The IRC server not only responds to your originating source port, but 
    also sends an “identify” message to your computer on port 113. Using port triggering, you can 
    tell the router, “When you initiate a session with destination port 6667, you have t\
    o also allow 
    incoming traffic on port 113 to reach the originating computer.” Using steps similar to the 
    preceding example, the following sequence shows the effects of the port triggering rule you 
    have defined:
    1. Y
    ou open an IRC client program to start a chat session on your computer.  
    						
    							Security
    62 R6100 WiFi Router 
    2.Your IRC client composes a request message to an IRC server using a destination port 
    number of 6667, the standard port number for an IRC server process. Your computer then 
    sends this request message to your router.
    3.Your router creates an entry in its internal session table describing this communication 
    session between your computer and the IRC server. Your router stores the original 
    information, performs Network Address Translation (NAT) on the source address and port, 
    and sends this request message through the Internet to the IRC server. 
    4.Noting your port triggering rule and having observed the destination port number of 6667, 
    your router creates an additional session entry to send any incoming port 113 traffic to your 
    computer.
    5.The IRC server sends a return message to your router using the NAT-assigned source port 
    (for example, port 33333) as the destination port. The IRC server also sends an “identify” 
    message to your router with destination port 113.
    6.Upon receiving the incoming message to destination port 33333, your router checks its 
    session table for an active session for port number 33333. Finding an active session, the 
    router restores the original address information replaced by NAT and sends this reply 
    message to your computer.
    7.Upon receiving the incoming message to destination port 113, your router checks its session 
    table and finds an active session for port 113, associated with your computer. The router 
    replaces the message’s destination IP address with your computer’s IP address and 
    forwards the message to your computer.
    8.When you finish your chat session, your router eventually senses a period of inactivity in the 
    communications. The router then removes the session information from its session table, 
    and incoming traffic is no longer accepted on port numbers 33333 or 113.
    To configure port triggering, you need to know which inbound ports the application needs. 
    Also, you need to know the number of the outbound port that will trigger the opening of the 
    inbound ports. You can usually determine this information by contacting the publisher of the 
    application or the relevant user groups or news groups.
    Only one computer at a time can use the triggered application.
    Port Forwarding to Permit External Host 
    Communications
    In both of the preceding examples, your computer initiates an application session with a 
    server computer on the Internet. However, you might need to allow a client computer on the 
    Internet to initiate a connection to a server computer on your network. Normally, your router 
    ignores any inbound traffic that is not a response to your own outbound traffic. You can 
    configure exceptions to this default rule by using the port forwarding feature. 
    A typical application of port forwarding can be shown by reversing the client-server 
    relationship from the previous web server example. In this case, a remote computer’s 
    browser needs to access a web server running on a computer in your local network. Using 
    port forwarding, you can tell the router, “When you receive incoming traffic on port 80 (the 
    standard port number for a web server process), forward it to the local computer at  
    						
    							Security
    63  R6100 WiFi Router
    192.168.1.123.” The following sequence shows the effects of the port forwarding rule you 
    have defined:
    1.The user of a remote computer opens a browser and requests a web page from 
    www.example.com, which resolves to the public IP address of your router. The remote 
    computer composes a web page request message with the following destination 
    information: 
    •Destination address. The IP address of www.example.com, which is the address of 
    your router.
    •Destination port number. 80, which is the standard port number for a web server 
    process.
    The remote computer then sends this request message through the Internet to your 
    router.
    2.Your router receives the request message and looks in its rules table for any rules covering 
    the disposition of incoming port 80 traffic. Your port forwarding rule specifies that incoming 
    port 80 traffic should be forwarded to local IP address 192.168.1.123. Therefore, your router 
    modifies the destination information in the request message:
    The destination address is replaced with 192.168.1.123.
    Your router then sends this request message to your local network.
    3.Your web server at 192.168.1.123 receives the request and composes a return message 
    with the requested web page data. Your web server then sends this reply message to your 
    router.
    4.Your router performs Network Address Translation (NAT) on the source IP address, and 
    sends this request message through the Internet to the remote computer, which displays the 
    web page from www.example.com.
    To configure port forwarding, you need to know which inbound ports the application needs. 
    You usually can determine this information by contacting the publisher of the application or 
    the relevant user groups or news groups.
    How Port Forwarding Differs from Port Triggering
    The following points summarize the differences between port forwarding and port triggering:
    •Port triggering can be used by any computer on your network, although only one 
    computer can use it at a time.
    •Port forwarding is configured for a single computer on your network.
    •With port triggering, the router does not need to know the computer’s IP address in 
    advance. The IP address is captured automatically.
    •Port forwarding requires that you specify the computer’s IP address during configuration, 
    and the IP address can never change.
    •Port triggering requires specific outbound traffic to open the inbound ports, and the 
    triggered ports are closed after a period of no activity.
    •Port forwarding is always active and does not need to be triggered. 
    						
    							Security64
    R6100 WiFi Router 
    Set Up Port Forwarding to Local Servers
    The port forwarding feature lets you allow certain types of incoming tra\
    ffic to reach servers on 
    your local network. For example, you might want to make a local web serv\
    er, FTP server, or 
    game server visible and available to the Internet.
    Use the Port Forwarding/Port Triggering screen to configure the router to forward specific 
    incoming protocols to computers on your local network. In addition to se\
    rvers for specific 
    applications, you can also specify a default DMZ server to which all oth\
    er incoming protocols 
    are forwarded.
    Before you start, determine which type of service, application, or game \
    you want to provide, 
    and the local IP address of the computer that will provide the service. \
     The server computer 
    has to always have the same IP address.
    To ensure that your server computer always has the same IP address, use t\
    he reserved IP  address feature of your product. See Address Reservation  on page
      38.
    To forward specific incoming protocols:
    1.Select  ADV
     ANCED > Advanced Setup > Port Forwarding/Port Triggering.
    2.Leave the  Port Forwarding radio button selected as the service type.
    3. In the Service Name list, select the service name.
    If the service does not appear in the list, see  Add a Custom Service on page
      64.
    4. Fill in the Server IP 
     Address field.
    5. Click the  Add button.
    The service appears in the list on the Port Forwarding screen.
    Add a Custom Service
    To define a service, game, or application that does not appear in the Ser\
    vice Name list, first 
    determine which port number or range of numbers the application uses. You can usually 
    determine this information by contacting the publisher of the applicatio\
    n or user groups or 
    news groups. When you have the port number information, follow these ste\
    ps.
    To add a custom service:
    1. Select  ADV
     ANCED > Advanced Setup > Port Forwarding/Port Triggering. 
    						
    							Security65
     R6100 WiFi Router
    2.
    Select the Port Forwarding radio button as the service type.
    3. Click the  Add Custom Service button.
    4.In the Service Name field, enter a descriptive name. 
    5. In the Protocol field, select the protocol. If you are unsure, select  TCP/UDP.
    6. In the External port range field, specify the port or port range. 
    7. Either select the  Use the same port range for internal port check box or fill in the Internal 
    IP address field.
    8. Click the  Apply button. 
    The service appears in the list in the Port Forwarding/Port Triggering screen.
    Edit or Delete a Port Forwarding Entry
    To edit or delete a port forwarding entry:
    1. Select  ADV
     ANCED > Advanced Setup > Port Forwarding/Port Triggering .
    2. Select the Port Forwarding radio button as the service type
    3. In the table, select the radio button next to the service name.
    4. Click the  Edit Service or  Delete Service button.
    Application Example: Make a Local Web Server Public
    If you host a web server on your local network, you can use port forward\
    ing to allow web 
    requests from anyone on the Internet to reach your web server. 
    To make a local web server public:
    1.Assign your web server either a fixed IP address or a dynamic IP address\
     using DHCP 
    address reservation. 
    In this example, your router always gives your web server an IP address \
    of 192.168.1.33. 
    2. In the Port Forwarding/Port 
     Triggering screen, configure the router to forward the HTTP 
    service to the local address of your web server at  192.168.1.33. 
    HTTP (port 80) is the standard protocol for web servers. 
    						
    							Security66
    R6100 WiFi Router 
    3.
    (Optional) Register a host name with a Dynamic DNS service, and config\
    ure your router to 
    use the name. 
    To access your web server from the Internet, a remote user has to know th\
    e IP address  that your ISP assigned. However
     , if you use a Dynamic DNS service, the remote user can 
    reach your server by a user-friendly Internet name, such as mynetgear.dyndns.org.
    Set Up Port Triggering
    Port triggering is a dynamic extension of port forwarding that is useful\
     in these cases:
    • More than one local computer needs port forwarding for the same applicat\
    ion (but not 
    simultaneously).
    • An application needs to open incoming ports that are dif
     ferent from the outgoing port.
    When port triggering is enabled, the router monitors outbound traffic looking for a specified 
    outbound “trigger” port. When the router detects outbound traf
     fic on that port, it remembers 
    the IP address of the local computer that sent the data. The router then temporarily opens the 
    specified incoming port or ports and forwards incoming traffic on the triggered ports to the 
    triggering computer. 
    Port forwarding creates a static mapping of a port number or range to a \
    single local computer. 
    Port triggering can dynamically open ports to any computer that needs th\
    em and can close 
    the ports when they are no longer needed.
    If you use applications such as multiplayer gaming, peer-to-peer connect\
    ions, real-time 
    communications such as instant messaging, or remote assistance (a featu\
    re in Windows XP), 
    you should also enable Universal Plug and Play (UPnP).
    To configure port triggering, you need to know which inbound ports the ap\
    plication needs,  and the number of the outbound port that will trigger the opening of the\
     inbound ports. 
     You 
    can usually determine this information by contacting the publisher of th\
    e application or user 
    groups or news groups.
    To enable port triggering: 
    1. Select  ADV
     ANCED > Advanced Setup > Port Forwarding/Port Triggering.
    2. Select the  Port T
     riggering radio button.
    3.Clear the Disable Port Triggering check box. 
    						
    							Security67
     R6100 WiFi Router
    If the Disable Port Triggering check box is selected after you configure port triggering, 
    port triggering is disabled. However, any port triggering configuration information that you 
    specified is saved even though it is not used.
    4. In the Port 
     Triggering Timeout field, enter a value up to 9999 minutes. 
    This value controls the inactivity timer for the designated inbound port\
    s. The inbound  ports close when the inactivity time expires. 
     This is required because the router cannot be 
    sure when the application has terminated.
    To add a port triggering service:
    1. On the Port Forwarding/Port 
     Triggering screen, click the Add Service button.
    2.In the Service Name field, type a descriptive service name. 
    3. In the Service User list, select  Any, or select Single address and enter the IP address of 
    one computer
     .
    • Any  (the default), allows any computer on the Internet to use this servic\
    e. 
    • Single address restricts the service to a particular computer
     . 
    4. Select the service type, either  TCP or UDP or  TCP/UDP (both). If you are not sure, select 
    TCP/UDP
     .
    5. In the 
    Triggering Port field, enter the number of the outbound traffic port that will cause the 
    inbound ports to be opened. 
    6. Enter the inbound connection port information in the Connection 
     Type, Starting Port, and 
    Ending Port fields.
    7. Click the  Apply button.
    The service appears in the Port Triggering Portmap Table. 
    8. Make sure that you enable port triggering so that the service that you a\
    dded will be used. 
    						
    							Security68
    R6100 WiFi Router 
    Schedule Blocking
    You can specify the days and time that you want to block Internet access.\
    To schedule blocking:
    1.
    Select  ADV
     ANCED > Security > Schedule.
    2.Set up the schedule for blocking keywords and services.
    • Days to Block. Select days on which you want to apply blocking by selecting the 
    appropriate check boxes, or select the Every Day  check box to select the check 
    boxes for all days. 
    • T
    ime of Day to Block . Select a start and end time in 24-hour format, or select the  All 
    Day check box for 24-hour blocking. 
    3. Select your time zone from the list. If you use daylight savings time, s\
    elect the 
    Automatically adjust for daylight savings time  check box. 
    4. Click the  Apply button. 
    Your settings are saved. 
    						
    							Security69
     R6100 WiFi Router
    Security Event Email Notifications
    To receive logs and alerts by email, provide your email information in th\
    e E-mail screen, and 
    specify which alerts you want to receive and how often. 
    To set up email notifications:
    1. Select  ADV
     ANCED > Security >  E-mail.
    2. Select the Turn Email Notification On  check box.
    3. In the 
    Your Outgoing Mail Server field, enter the name of your ISP’s outgoing (SMTP) mail 
    server (such as mail.myISP.com). 
    You might be able to find this information in the configuration screen of\
     your email  program. If you leave this field blank, log and alert messages are not s\
    ent.
    4. Enter the email address to which logs and alerts are sent in the Send to\
     
     This Email Address 
    field. 
    This email address is also used for the From address. If you leave this \
    field blank, log and  alert messages are not sent.
    5. If your outgoing email server requires authentication, select the  My Mail Server requires 
    authentication  check box. Fill in the User Name and Password fields for the outgoing e\
    mail 
    server
    
    .
    6. (Optional) Select the Send Alerts 
     Immediately check box.
    Email alerts are sent immediately when someone attempts to visit a block\
    ed site.
    7. (Optional) Fill in the fields in the Send logs according to this sched\
    ule section of the screen.
    Logs are sent automatically. If the log fills up before the specified time, the log is emailed. 
    After the log is sent, the log is cleared from the router memory
     . If the router cannot email 
    the log file, the log buffer might fill up. In this case, the router overwrites the log and 
    discards its contents.
    8. Click the  Apply button.
    Your settings are saved. 
    						
    							70
    7
    7.   Administration
    Manage your network
    This chapter describes the router settings for administering and maintaining your router and 
    home network. 
    This chapter includes the following sections:
    •Upgrade the Router Firmware 
    •View Router Status 
    •Specify Logs Settings 
    •Manage the Configuration File 
    •Change the Password 
    •Password Recovery 
    For information about upgrading or checking the status of your router over the Internet, see 
    Remote Management on page 92. For information about monitoring Internet traffic, see Traffic 
    Meter on page 104. 
    						
    All Netgear manuals Comments (5)

    Related Manuals for Netgear R6100 Ac1200 Dual Band Wifi Router User Manual