Home > Netgear > Router > Netgear Router WGR614 V5 User Manual

Netgear Router WGR614 V5 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGR614 V5 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Wireless Configuration 4-11
    June 2004 202-10036-01
    How to Configure WPA-PSK Wireless Security
    Note: Not all wireless adapters support WPA. Furthermore, client software is also required. 
    Windows XP and Windows 2000 with service pack 3 do include WPA support. Nevertheless, the 
    wireless adapter hardware and driver must also support WPA. For instructions on configuring 
    wireless computers or PDAs for WPA-PSK security, consult the documentation for the product 
    you are using.
    To configure WPA-PSK, follow these steps:
    1.Click Security Settings in the Setup section of the main menu and select WPA-PSK for the 
    Security Type.
    Figure 4-6: WPA Settings menu
    2.
    Enter a word or group of 8-63 printable characters in the Password Phrase box.
    3.Click Apply to save your settings.
    How to Restrict Wireless Access by MAC Address
    To restrict access based on MAC addresses, follow these steps: 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    4-12 Wireless Configuration
    June 2004 202-10036-01 1.
    Log in to the WGR614 v5 firewall at its default LAN address of http://www.routerlogin.net 
    with its default user name of admin and default password of password, or using whatever 
    LAN address and password you have set up.
    2.Click Advanced Wireless Setup in the main menu of the WGR614 v5 firewall.
    3.From the Wireless Settings menu, click Setup Access List to display the Wireless Access 
    menu shown below.
    Figure 4-7:  Wireless Card Access List Setup
    4.
    Click Add to add a wireless device to the wireless access control list. The Available Wireless 
    Cards list displays.
    Note: When configuring the firewall from a wireless computer whose MAC address is 
    not in the Trusted PC list, if you select Turn Access Control On, you will lose your 
    wireless connection when you click on Apply. You must then access the wireless router 
    from a wired computer or from a wireless computer which is on the access control list to 
    make any further changes. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Wireless Configuration 4-13
    June 2004 202-10036-01 5.
    Click the Turn Access Control On check box.
    6.Then, either select from the list of available wireless cards the WGR614 v5 has found in your 
    area, or enter the MAC address and device name for a device you plan to use. You can usually 
    find the MAC address printed on the wireless adapter.
    Note: You can copy and paste the MAC addresses from the firewall’s Attached Devices menu 
    into the MAC Address box of this menu. To do this, configure each wireless computer to 
    obtain a wireless link to the firewall. The computer should then appear in the Attached 
    Devices menu.
    7.Click Add to add this wireless device to the Wireless Card Access List. The screen changes 
    back to the list screen. Repeat these steps for each additional device you wish to add to the list.
    8.Be sure to click Apply to save your wireless access control list settings.
    Now, only devices on this list will be allowed to wirelessly connect to the WGR614 v5. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    4-14 Wireless Configuration
    June 2004 202-10036-01 
    						
    							Content Filtering5-1
    July 2004 202-10036-01
    Chapter 5 
    Content Filtering
    This chapter describes how to use the content filtering features of the 54 Mbps Wireless Router 
    WGR614 v5 to protect your network. These features can be found by clicking on the Content 
    Filtering heading in the Main Menu of the browser interface. 
    Content Filtering Overview
    The 54 Mbps Wireless Router WGR614 v5 provides you with Web content filtering options, plus 
    browsing activity reporting and instant alerts via e-mail. Parents and network administrators can 
    establish restricted access policies based on time of day, Web addresses and Web address 
    keywords. You can also block Internet access by applications and services, such as chat or games.
    To configure these features of your router, click on the subheadings under the Content Filtering 
    heading in the Main Menu of the browser interface. The subheadings are described below: 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    5-2Content Filtering
    July 2004 202-10036-01
    Blocking Access to Internet Sites
    The WGR614 v5 router allows you to restrict access based on Web addresses and Web address 
    keywords. Up to 255 entries are supported in the Keyword list. The Block Sites menu is shown in 
    Figure 5-1 below:
    Figure 5-1:  Block Sites menu
    To enable keyword blocking, select either “Per Schedule” or “Always”, then click Apply. If you 
    want to block by schedule, be sure that a time period is specified in the Schedule menu.
    To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply.
    To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply.
    Keyword application examples:
    • If the keyword “XXX” is specified, the URL  is blocked. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Content Filtering5-3
    July 2004 202-10036-01
    • If the keyword “.com” is specified, only Web sites with other domain suffixes (such as .edu or 
    .gov) can be viewed.
    • If you wish to block all Internet browsing access during a scheduled period, enter the keyword 
    “.” and set the schedule in the Schedule menu.
    To specify a Trusted User, enter that PC’s IP address in the Trusted User box and click Apply.
    You may specify one Trusted User, which is a PC that will be exempt from blocking and 
    logging. Since the Trusted User will be identified by an IP address, you should configure that 
    PC with a fixed IP address.
    Blocking Access to Internet Services
    The WGR614 v5 router allows you to block the use of certain Internet services by PCs on your 
    network. This is called services blocking or port filtering. The Block Services menu is shown 
    below:
    Figure 5-2:  Block Services menu
    Services are functions performed by server computers at the request of client computers. For 
    example, Web servers serve Web pages, time servers serve time and date information, and game 
    hosts serve data about other players’ moves. When a computer on your network sends a request for 
    service to a server computer on the Internet, the requested service is identified by a service or port 
    number. This number appears as the destination port number in the transmitted IP packets. For 
    example, a packet that is sent with destination port number 80 is an HTTP (Web server) request.
    To enable service blocking, select either Per Schedule or Always, then click Apply. If you want to 
    block by schedule, be sure that a time period is specified in the Schedule menu.  
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    5-4Content Filtering
    July 2004 202-10036-01
    To specify a service for blocking, click Add. The Add Services menu will appear, as shown below:
    Figure 5-3:  Add Services menu
    From the Service Type list, select the application or service to be allowed or blocked. The list 
    already displays several common services, but you are not limited to these choices. To add any 
    additional services or applications that do not already appear, select User Defined.
    Configuring a User Defined Service
    To define a service, first you must determine which port number or range of numbers is used by 
    the application. The service numbers for many common protocols are defined by the Internet 
    Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service 
    numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of 
    the application. This information can usually be determined by contacting the publisher of the 
    application or from user groups of newsgroups.
    Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter 
    that number in both boxes.
    If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are 
    not sure, select Both. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Content Filtering5-5
    July 2004 202-10036-01
    Configuring Services Blocking by IP Address Range
    Under “Filter Services For”, you can block the specified service for a single computer, a range of 
    computers (having consecutive IP addresses), or all computers on your network.
    Scheduling When Blocking Will Be Enforced
    The WGR614 v5 router allows you to specify when blocking will be enforced. The Schedule menu 
    is shown below:
    Figure 5-4:  Schedule menu
    • Use this schedule for blocking content. Check this box if you wish to enable a schedule for 
    Content Filtering. Click Apply.
    • Days to Block. Select days to block by checking the appropriate boxes. Select Everyday to 
    check the boxes for all days. Click Apply.
    • Time of Day to Block. Select a start and end time in 23:59 format. Select All day for 24 hour 
    blocking. Click Apply.
    Be sure to select your Time Zone in the E-Mail menu. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    5-6Content Filtering
    July 2004 202-10036-01
    Viewing Logs of Web Access or Attempted Web Access
    The log is a detailed record of what Web sites you have accessed or attempted to access. Up to 128 
    entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and 
    no log entries will be made for the Trusted User. An example is shown below:
    Figure 5-5:  Logs menu
    Log entries are described in Table 5-1
    Table 5-1. Log entry descriptions
    Field Description
    Number The index number of the content filter log entries. 128 entries 
    are available numbered from 0 to 127. The log will keep the 
    record of the latest 128 entries.
    Date and Time The date and time the log entry was recorded.
    Source IP The IP address of the initiating device for this log entry.
    Action This field displays whether the access was blocked or allowed.
    The name or IP address of the Web site or newsgroup visited or 
    attempted to access. 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGR614 V5 User Manual