Netgear R6300v2 Smart Wifi Router Ac1750 Dual Band Gigabit User Manual
Have a look at the manual Netgear R6300v2 Smart Wifi Router Ac1750 Dual Band Gigabit User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Security 71 R6300v2 Smart WiFi Router Because Live Parental Controls uses free OpenDNS accounts, you are promp\ ted to log in or create a free account. 10. Select a radio button as follows: • If you already own an OpenDNS account, leave the Ye s radio button selected. • If you did not yet create an OpenDNS account, select the No radio button. If you are creating an account, the following screen displays. a. Complete the fields. b. Click the Next button.
Security 72 R6300v2 Smart WiFi Router After you log on or create your account, the filtering level screen disp\ lays. 11. Select a radio button for a filtering level and click the Next button.
Security 73 R6300v2 Smart WiFi Router 12. Click the Take me to the status screen button. Parental Controls are now set up for the router. 13. T o enable Parental Controls, click the Enable Live Parental Controls button. Keyword Blocking of HTTP Traffic Use keyword blocking to prevent certain types of HTTP traffic from accessing your network. The blocking can be always or according to a schedule. To set up keyword blocking: 1. Select ADV ANCED > Security > Block Sites. 2. Select one of the keyword blocking options: • Per Schedule. Turn on keyword blocking according to the Schedule screen settings. (See Schedule Blocking on page 83.) • Always . Turn on keyword blocking all the time, independent of the Schedule screen\ .
Security 74 R6300v2 Smart WiFi Router 3. In the Keyword field, enter a keyword or domain, click the Add Keyword button, and click the Apply button. The Keyword list supports up to 32 entries. Here are some sample entries: •Specify XXX to block http://www.badstuff.com/xxx.html. •Specify .com if you want to allow only sites with domain suffixes such as .edu or .gov. •Enter a period (.) to block all Internet browsing access. To delete a keyword or domain: 1. Select the keyword you want to delete from the list. 2. Click Delete Keyword. 3. Click the Apply button. To specify a trusted computer: You can exempt one computer from blocking. This computer must have a fixed IP address. 1. In the Trusted IP Address field, enter the IP address. 2. Click the Apply button. Block Services (Port Filtering) Services are functions that server computers perform at the request of client computers. For example, web servers serve web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on the Internet sends a request for service to a server computer, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with the destination port number 80 is an HTTP (web server) request. The service numbers for many common protocols are defined by the Internet Engineering Task Force (IETF at http://www.ietf.org/) and published in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024 - 65535 by the authors of the application. Although the router already holds a list of many service port numbers, you are not limited to these choices. You can often determine port number information by contacting the publisher of the application, by asking user groups or newsgroups, or by searching. The Block Services screen lets you add and block specific Internet services by computers on your network. This is called service blocking or port filtering. To add a service for blocking, first determine which port number or range of numbers the application uses.
Security 75 R6300v2 Smart WiFi Router To block services: 1. Select ADV ANCED > Security > Block Services. 2. Select either Per Schedule or Always. 3. If you selected Per Schedule, specify a time period in the Schedule scre\ en. 4. Click the Add button. The Block Services Setup screen displays: 5. From the Service Type list, select the application or service to allow or block. The list displays several common services, but you are not limited to th\ ese choices. To add any additional services or applications that do not already appear , select User Defined. 6. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select TCP/UDP (Both). 7. Enter the starting and ending port numbers. If the application uses a single port number, enter that number in both fields. 8. Select the radio button for the IP address configuration you want to blo\ ck, and enter the IP addresses.
Security 76 R6300v2 Smart WiFi Router You can block the specified service for a single computer, a range of computers with consecutive IP addresses, or all computers on your network. 9. Click the Add button. Your changes are saved. Port Triggering to Open Incoming Ports Some application servers (such as FTP and IRC servers) send replies to multiple port numbers. Using the port triggering function of your router, you can tell the router to open more incoming ports when a particular outgoing port originates a session. An example is Internet Relay Chat (IRC). Your computer connects to an IRC server at destination port 6667. The IRC server not only responds to your originating source port, but also sends an “identify” message to your computer on port 113. Using port triggering, you can tell the router, “When you initiate a session with destination port 6667, you have to also allow incoming traffic on port 113 to reach the originating computer.” Using steps similar to the preceding example, the following sequence shows the effects of the port triggering rule you have defined: 1. You open an IRC client program to start a chat session on your computer. 2. Your IRC client composes a request message to an IRC server using a destination port number of 6667, the standard port number for an IRC server process. Your computer then sends this request message to your router. 3. Your router creates an entry in its internal session table describing this communication session between your computer and the IRC server. Your router stores the original information, performs Network Address Translation (NAT) on the source address and port, and sends this request message through the Internet to the IRC server. 4. Noting your port triggering rule and having observed the destination port number of 6667, your router creates an additional session entry to send any incoming port 113 traffic to your computer. 5. The IRC server sends a return message to your router using the NAT-assigned source port (for example, port 33333) as the destination port. The IRC server also sends an “identify” message to your router with destination port 113. 6. Upon receiving the incoming message to destination port 33333, your router checks its session table to determine whether a session is active for port number 33333. Finding an active session, the router restores the original address information replaced by NAT and sends this reply message to your computer. 7. Upon receiving the incoming message to destination port 113, your router checks its session table and finds an active session for port 113 associated with your computer. The router replaces the message’s destination IP address with your computer’s IP address and forwards the message to your computer. 8. When you finish your chat session, your router eventually senses a period of inactivity in the communications. The router then removes the session information from its session table, and incoming traffic is no longer accepted on port numbers 33333 or 113.
Security 77 R6300v2 Smart WiFi Router To configure port triggering, you need to know which inbound ports the application needs. Also, you need to know the number of the outbound port that you want to trigger the opening of the inbound ports. You can usually determine this information by contacting the publisher of the application or the relevant user groups or news groups. Only one computer at a time can use the triggered application. Port Forwarding to Permit External Host Communications In both of the preceding examples, your computer initiates an application session with a server computer on the Internet. However, you might need to allow a client computer on the Internet to initiate a connection to a server computer on your network. Normally, your router ignores any inbound traffic that is not a response to your own outbound traffic. You can configure exceptions to this default rule by using the port forwarding feature. A typical application of port forwarding can be shown by reversing the client-server relationship from the previous web server example. In this case, a remote computer’s browser needs to access a web server running on a computer in your local network. Using port forwarding, you can tell the router, “When you receive incoming traffic on port 80 (the standard port number for a web server process), forward it to the local computer at 192.168.1.123.” The following sequence shows the effects of the port forwarding rule you have defined: 1. The user of a remote computer opens a browser and requests a web page from www.example.com, which resolves to the public IP address of your router. The remote computer composes a web page request message with the following destination information: Destination address. The IP address of www.example.com, which is the address of your router. Destination port number. 80, which is the standard port number for a web server process. The remote computer then sends this request message through the Internet to your router. 2. Your router receives the request message and looks in its rules table for any rules covering the disposition of incoming port 80 traffic. Your port forwarding rule specifies that incoming port 80 traffic should be forwarded to local IP address 192.168.1.123. Therefore, your router modifies the destination information in the request message: The destination address is replaced with 192.168.1.123. Your router then sends this request message to your local network. 3. Your web server at 192.168.1.123 receives the request and composes a return message with the requested web page data. Your web server then sends this reply message to your router. 4. Your router performs Network Address Translation (NAT) on the source IP address, and sends this request message through the Internet to the remote computer, which displays the web page from www.example.com.
Security 78 R6300v2 Smart WiFi Router To configure port forwarding, you need to know which inbound ports the application needs. You usually can determine this information by contacting the publisher of the application or the relevant user groups or news groups. How Port Forwarding Differs from Port Triggering The following points summarize the differences between port forwarding and port triggering: •Any computer on your network can use port triggering, although only one computer can use it at a time. •Port forwarding is configured for a single computer on your network. •With port triggering, the router does not need to know the computer’s IP address in advance. The IP address is captured automatically. •Port forwarding requires that you specify the computer’s IP address during configuration, and the IP address can never change. •Port triggering requires specific outbound traffic to open the inbound ports, and the triggered ports are closed after a period of no activity. •Port forwarding is always active and does not need to be triggered. Set Up Port Forwarding to Local Servers The port forwarding feature lets you allow certain types of incoming traffic to reach servers on your local network. For example, you might want to make a local web server, FTP server, or game server visible and available to the Internet. Use the Port Forwarding/Port Triggering screen to configure the router to forward specific incoming protocols to computers on your local network. In addition to servers for specific applications, you can also specify a default DMZ server to which all other incoming protocols are forwarded. Before you start, determine which type of service, application, or game you want to provide, and the local IP address of the computer that will provide the service. The server computer has to always have the same IP address. To ensure that your server computer always has the same IP address, use the reserved IP address feature of your product. See Set Up Address Reservation on page 36.
Security 79 R6300v2 Smart WiFi Router To forward specific incoming protocols: 1. Select ADV ANCED > Advanced Setup > Port Forwarding/Port Triggering . 2. Leave the Port Forwarding radio button selected as the service type. 3. Click the Add button. A list of services displays. If the service that you want to add is not \ in the list, see Add a Custom Service on page 80. 4. Fill in the Server IP Address field. 5. Click the Add button. The service appears in the list on the Port Forwarding/Port Triggering screen.
Security 80 R6300v2 Smart WiFi Router Add a Custom Service To define a service, game, or application that does not appear in the Ser\ vice Name list, first determine which port number or range of numbers the application uses. You can usually determine this information by contacting the publisher of the applicatio\ n or user groups or news groups. When you have the port number information, follow these ste\ ps. To add a custom service: 1. Select ADV ANCED > Advanced Setup > Port Forwarding/Port Triggering. 2. Select the Port Forwarding radio button as the service type. 3. Click the Add Custom Service button. 4. In the Service Name field, enter a descriptive name. 5. In the Service Type field, select the protocol. If you are unsure, select TCP/UDP. 6. In the External Starting Port field, enter the beginning port number . • If the application uses a single port, enter the same port number in the\ External Ending Port field. • If the application uses a range of ports, enter the ending port number o\ f the range in the External Ending Port field. 7. Specify the internal ports by one of these methods: • Leave the Use the same port range for Internal port check box selected. • Fill in the Internal Starting Port and Internal Ending Port fields. 8. Fill in the Internal IP address field, or select the radio button for an\ attached device listed in the table. 9. Click the Apply button. The service appears in the list in the Port Forwarding/Port Triggering screen.