Netgear Router WGR614 V5 User Manual
Have a look at the manual Netgear Router WGR614 V5 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Wireless Configuration 4-11 June 2004 202-10036-01 How to Configure WPA-PSK Wireless Security Note: Not all wireless adapters support WPA. Furthermore, client software is also required. Windows XP and Windows 2000 with service pack 3 do include WPA support. Nevertheless, the wireless adapter hardware and driver must also support WPA. For instructions on configuring wireless computers or PDAs for WPA-PSK security, consult the documentation for the product you are using. To configure WPA-PSK, follow these steps: 1.Click Security Settings in the Setup section of the main menu and select WPA-PSK for the Security Type. Figure 4-6: WPA Settings menu 2. Enter a word or group of 8-63 printable characters in the Password Phrase box. 3.Click Apply to save your settings. How to Restrict Wireless Access by MAC Address To restrict access based on MAC addresses, follow these steps:
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 4-12 Wireless Configuration June 2004 202-10036-01 1. Log in to the WGR614 v5 firewall at its default LAN address of http://www.routerlogin.net with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. 2.Click Advanced Wireless Setup in the main menu of the WGR614 v5 firewall. 3.From the Wireless Settings menu, click Setup Access List to display the Wireless Access menu shown below. Figure 4-7: Wireless Card Access List Setup 4. Click Add to add a wireless device to the wireless access control list. The Available Wireless Cards list displays. Note: When configuring the firewall from a wireless computer whose MAC address is not in the Trusted PC list, if you select Turn Access Control On, you will lose your wireless connection when you click on Apply. You must then access the wireless router from a wired computer or from a wireless computer which is on the access control list to make any further changes.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Wireless Configuration 4-13 June 2004 202-10036-01 5. Click the Turn Access Control On check box. 6.Then, either select from the list of available wireless cards the WGR614 v5 has found in your area, or enter the MAC address and device name for a device you plan to use. You can usually find the MAC address printed on the wireless adapter. Note: You can copy and paste the MAC addresses from the firewall’s Attached Devices menu into the MAC Address box of this menu. To do this, configure each wireless computer to obtain a wireless link to the firewall. The computer should then appear in the Attached Devices menu. 7.Click Add to add this wireless device to the Wireless Card Access List. The screen changes back to the list screen. Repeat these steps for each additional device you wish to add to the list. 8.Be sure to click Apply to save your wireless access control list settings. Now, only devices on this list will be allowed to wirelessly connect to the WGR614 v5.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 4-14 Wireless Configuration June 2004 202-10036-01
Content Filtering5-1 July 2004 202-10036-01 Chapter 5 Content Filtering This chapter describes how to use the content filtering features of the 54 Mbps Wireless Router WGR614 v5 to protect your network. These features can be found by clicking on the Content Filtering heading in the Main Menu of the browser interface. Content Filtering Overview The 54 Mbps Wireless Router WGR614 v5 provides you with Web content filtering options, plus browsing activity reporting and instant alerts via e-mail. Parents and network administrators can establish restricted access policies based on time of day, Web addresses and Web address keywords. You can also block Internet access by applications and services, such as chat or games. To configure these features of your router, click on the subheadings under the Content Filtering heading in the Main Menu of the browser interface. The subheadings are described below:
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 5-2Content Filtering July 2004 202-10036-01 Blocking Access to Internet Sites The WGR614 v5 router allows you to restrict access based on Web addresses and Web address keywords. Up to 255 entries are supported in the Keyword list. The Block Sites menu is shown in Figure 5-1 below: Figure 5-1: Block Sites menu To enable keyword blocking, select either “Per Schedule” or “Always”, then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply. To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply. Keyword application examples: • If the keyword “XXX” is specified, the URL is blocked.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Content Filtering5-3 July 2004 202-10036-01 • If the keyword “.com” is specified, only Web sites with other domain suffixes (such as .edu or .gov) can be viewed. • If you wish to block all Internet browsing access during a scheduled period, enter the keyword “.” and set the schedule in the Schedule menu. To specify a Trusted User, enter that PC’s IP address in the Trusted User box and click Apply. You may specify one Trusted User, which is a PC that will be exempt from blocking and logging. Since the Trusted User will be identified by an IP address, you should configure that PC with a fixed IP address. Blocking Access to Internet Services The WGR614 v5 router allows you to block the use of certain Internet services by PCs on your network. This is called services blocking or port filtering. The Block Services menu is shown below: Figure 5-2: Block Services menu Services are functions performed by server computers at the request of client computers. For example, Web servers serve Web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with destination port number 80 is an HTTP (Web server) request. To enable service blocking, select either Per Schedule or Always, then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule menu.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 5-4Content Filtering July 2004 202-10036-01 To specify a service for blocking, click Add. The Add Services menu will appear, as shown below: Figure 5-3: Add Services menu From the Service Type list, select the application or service to be allowed or blocked. The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. Configuring a User Defined Service To define a service, first you must determine which port number or range of numbers is used by the application. The service numbers for many common protocols are defined by the Internet Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of the application. This information can usually be determined by contacting the publisher of the application or from user groups of newsgroups. Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter that number in both boxes. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select Both.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Content Filtering5-5 July 2004 202-10036-01 Configuring Services Blocking by IP Address Range Under “Filter Services For”, you can block the specified service for a single computer, a range of computers (having consecutive IP addresses), or all computers on your network. Scheduling When Blocking Will Be Enforced The WGR614 v5 router allows you to specify when blocking will be enforced. The Schedule menu is shown below: Figure 5-4: Schedule menu • Use this schedule for blocking content. Check this box if you wish to enable a schedule for Content Filtering. Click Apply. • Days to Block. Select days to block by checking the appropriate boxes. Select Everyday to check the boxes for all days. Click Apply. • Time of Day to Block. Select a start and end time in 23:59 format. Select All day for 24 hour blocking. Click Apply. Be sure to select your Time Zone in the E-Mail menu.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 5-6Content Filtering July 2004 202-10036-01 Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of what Web sites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User. An example is shown below: Figure 5-5: Logs menu Log entries are described in Table 5-1 Table 5-1. Log entry descriptions Field Description Number The index number of the content filter log entries. 128 entries are available numbered from 0 to 127. The log will keep the record of the latest 128 entries. Date and Time The date and time the log entry was recorded. Source IP The IP address of the initiating device for this log entry. Action This field displays whether the access was blocked or allowed. The name or IP address of the Web site or newsgroup visited or attempted to access.