Home > Netgear > Router > Netgear Router WGR614v8 User Manual

Netgear Router WGR614v8 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGR614v8 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							54 Mbps Wireless Router WGR614v8 User Manual
    Configuring Internet Connectivity 1-7
    v1.1, May 2008
    If a login is required by your ISP, the following settings appear in the Basic Settings screen: 
    •Does Your Internet Connection Require A Login? If you usually must use a login program 
    such as WinPOET to access the Internet, your Internet connection requires a login. After you 
    select Ye s, the Basic Settings screen displays.
    –Internet Service Provider. This drop-down list contains a few ISPs that need special 
    protocols for connection. The list includes:
    •PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services
    Figure 1-5
    Note: After you finish setting up your router, you will no longer need to launch the 
    ISP’s login program on your computer to access the Internet. When you start 
    an Internet application, your router will automatically log you in.
    ISP does require login 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    1-8 Configuring Internet Connectivity
    v1.1, May 2008
    •Telstra Bigpond, an Australian residential cable modem service
    •Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used 
    by most DSL services worldwide. 
    –Login and Password. This is the user name and password provided by your ISP. This 
    name and password are used to log in to the ISP server.
    –Service Name. If your connection is capable of connecting to multiple Internet services, 
    this setting specifies which service to use.
    –Connection Mode. This drop-down list (shown in Figure 1-5 on page 1-7) selects when 
    the router will connect to and disconnect from the Internet. The list includes:
    •Always On. The router logs in to the Internet immediately after booting and never 
    disconnects.
    •Dial on Demand. The router logs in only when outgoing traffic is present and logs out 
    after the idle time-out.
    •Manually Connect. The router logs in or logs out only when the user clicks Connect 
    or Disconnect in the Router Status screen.
    –Idle Timeout. Your Internet connection is logged out if there is no data transfer during the 
    specified time interval.
    Note: The Telstra Bigpond setting is only for older cable modem service 
    accounts still requiring a Bigpond login utility. Telstra has 
    discontinued this type of account. Those with Telstra DSL accounts 
    and newer cable modem accounts should select No for Does Your 
    Internet Connection Require a Login.
    Figure 1-6
    Note: Not all ISPs are listed here. The ones on this list have special 
    requirements. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    Configuring Internet Connectivity 1-9
    v1.1, May 2008
    –Domain Name Server (DNS) Address. If you know that your ISP does not automatically 
    transmit DNS addresses to the router during login, select Use These DNS Servers, and 
    enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address 
    is available, enter it also.
    Setting Up and Testing Basic Wireless Connectivity
    Follow these instructions to set up and test basic wireless connectivity. Once you have established 
    basic wireless connectivity, you can enable security settings appropriate to your needs.
    1.Select Wireless Settings under Setup in the main menu of the WGR614v8 router.
    Note: If you enter or change a DNS address, restart the computers on your 
    network so that these settings take effect.
    Note: If you use a wireless computer to change wireless settings, you might be 
    disconnected when you click Apply. Reconfigure your wireless adapter to match 
    the new settings, or access the router from a wired computer to make any further 
    changes.
    Figure 1-7 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    1-10 Configuring Internet Connectivity
    v1.1, May 2008
    2.For the wireless network name (SSID), use the default name, or choose a suitable descriptive 
    name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. 
    The default SSID is NETGEAR.
    3.Select the region in which the wireless interface will operate.
    4.Set the channel. The default channel is Auto.
    This field determines which operating frequency is used. It should not be necessary to change 
    the wireless channel unless you notice interference problems with another nearby wireless 
    router or access point. Select a channel that is not being used by any other wireless networks 
    within several hundred feet of your router. For more information about the wireless channel 
    frequencies, click the link to the online document “Wireless Networking Basics” in 
    Appendix B. 
    5.Set the mode to b and g.
    6.For Security Options, select None.
    7.Click Apply to save your changes.
    Note: The SSID is case-sensitive; NETGEAR is not the same as nETgear. Also, the 
    SSID of any wireless access adapters must match the SSID you specify in the 
    Wireless-G Router. If they do not match, you will not get a wireless connection 
    to the Wireless-G Router.
    Note: If you are configuring the router from a wireless computer and you change the 
    router’s SSID, channel, or security settings, you will lose your wireless 
    connection when you click Apply. You must then change the wireless settings 
    of your computer to match the router’s new settings. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    Configuring Internet Connectivity 1-11
    v1.1, May 2008
    8.Select Wireless Settings under Advanced in the main menu of the WGR614v8 router.
    9.Make sure that the Enable Wireless Router Radio and Enable SSID Broadcast check boxes 
    are selected.
    10.Click Setup Access List.
    11 .Make sure that the Turn Access Control On check box is not selected.
    12.Configure and test your wireless computer for wireless connectivity.
    Program the wireless adapter of your computer to have the same SSID and channel that you 
    specified in the router, and disable encryption. Check that your computer has a wireless link 
    and can obtain an IP address by DHCP from the router.
    Once your computer has basic wireless connectivity to the router, you can configure the advanced 
    wireless security functions of the computer and router (for more information about security, see 
    Chapter 2, “Safeguarding Your Network”).
    Figure 1-8 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    1-12 Configuring Internet Connectivity
    v1.1, May 2008 
    						
    							2-1
    v1.1, May 2008
    Chapter 2
    Safeguarding Your Network
    The Wireless-G Router Model WGR614v8 provides highly effective security features, which are 
    covered in detail in this chapter. 
    This chapter includes the following sections:
    •“Choosing Appropriate Wireless Security” on page 2-1”
    •“Recording Basic Wireless Settings Setup Information” on page 2-5
    •“Changing Wireless Security Settings” on page 2-6
    •“Viewing Advanced Wireless Settings” on page 2-10
    •“Restricting Wireless Access by MAC Address” on page 2-17
    •“Restricting Wireless Access by MAC Address” on page 2-17
    •“Changing the Administrator Password” on page 2-20
    •“Backing Up Your Configuration” on page 2-21
    •“Understanding Your Firewall” on page 2-21
    Choosing Appropriate Wireless Security 
    Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your 
    wireless data transmissions well beyond your walls. Operating an unsecured wireless network 
    creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network 
    to access your computers and files. Indoors, computers can connect over 802.11g/n wireless 
    networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate 
    area to access your network. Use the security features of your wireless equipment that are 
    appropriate to your needs.
    The time it takes to establish a wireless connection can vary depending on both your security 
    settings and router placement. 
    Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, 
    and equipment compatibility. In choosing an appropriate security level, you can also consider the 
    effort compared to the reward for a hacker to break into your network. As a minimum, however, 
    NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured 
    wireless network unless it is your intention to provide free Internet access for the public. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    2-2 Safeguarding Your Network
    v1.1, May 2008
    WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK 
    encryption can consume more battery power on a notebook computer, and can cause significant 
    performance degradation with a slow computer.
    To configure the wireless network, you can:
    •Manually specify your SSID and your wireless security settings. The Wireless-G Router 
    provides two screens for configuring the wireless settings: the basic Wireless Settings screen, 
    which you access under Setup in the main menu (see “Changing Wireless Security Settings” 
    on page 2-6), and the Advanced Wireless Settings screen.
    •Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/
    WPA2 security on both the router and the client device. If the clients in your network are 
    WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and 
    implement security on both the router and the client device (see “Using Push N Connect (Wi-
    Fi Protected Setup)” on page 2-12).
    Note: NETGEAR recommends that you change the administration password of your 
    router. Default passwords are well known, and an intruder can use your 
    administrator access to read or disable your security settings. For information 
    about how to change the administrator password, see “Changing the Administrator 
    Password” on page 2-20.
    Figure 2-1
    WGR614v8
    1) Open system: easy but no security
    2) MAC access list: no data security
    3) WEP: security but some performance 
    impact
    4) WPA-PSK: strong security
    5) WPA2-PSK: very strong security
    Wireless data
    security options
    Range: up to 300 foot radius
    Note: Use these with other features that enhance security (Table 2-2 on page 2-4).  
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    Safeguarding Your Network 2-3
    v1.1, May 2008
    Basic security options are listed below in order of increasing effectiveness. Other features that 
    affect security are listed in the table that follows this one. For more details on wireless security 
    methods, see the online document “Wireless Networking Basics” in Appendix B.
    Table 2-1.  Wireless Security Options
    Security Type Description
    None. No wireless security. Recommended only for 
    troubleshooting wireless connectivity. Do not run an 
    unsecured wireless network unless it is your 
    intention to provide free Internet access for the 
    public.
    WEP. Wired Equivalent Privacy.  Wired Equivalent Privacy (WEP) data encryption 
    provides moderate data security. WEP Shared Key 
    authentication and WEP data encryption can be 
    defeated by a determined eavesdropper using 
    publicly available tools.
    For more information, see “Configuring WEP 
    Wireless Security” on page 2-7.
    WPA-PSK (TKIP). WPA-PSK standard encryption 
    with TKIP encryption type.
    WPA2-PSK (AES). Wi-Fi Protected Access version 2 
    with Pre-Shared Key; WPA2-PSK standard 
    encryption with the AES encryption type.
    WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.Wi-Fi Protected Access with Pre-Shared Key (WPA-
    PSK and WPA2-PSK) data encryption provides 
    extremely strong data security, very effectively 
    blocking eavesdropping. Because WPA and WPA2 
    are relatively new standards, older wireless adapters 
    and devices might not support them.
    For more information, see “Configuring WPA-PSK 
    and WPA2-PSK Wireless Security” on page 2-9. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    2-4 Safeguarding Your Network
    v1.1, May 2008 Table 2-2.  Other Features That Enhance Security
    Security TypeDescription
    Disable the wireless router radio.If you disable the wireless router radio, wireless 
    devices cannot communicate with the router at all. 
    You might disable this when you are away or when 
    other users of your network all use wired 
    connections.
    For more information, see “Viewing Advanced 
    Wireless Settings” on page 2-10.
    Turn off the broadcast of the wireless network 
    name SSID.If you disable the broadcast of the SSID, only 
    devices that know the correct SSID can connect. 
    This nullifies the wireless network discovery feature 
    of some products such as Windows XP, but your data 
    is still fully exposed to an intruder using available 
    wireless eavesdropping tools.
    For more information, see “Viewing Advanced 
    Wireless Settings” on page 2-10.
    Restrict access based on MAC address.You can restrict access to only trusted computers so 
    that unknown computers cannot wirelessly connect 
    to the Wireless-G Router. MAC address filtering 
    adds an obstacle against unwanted access to your 
    network by the general public, but the data broadcast 
    over the wireless link is fully exposed. This data 
    includes your trusted MAC addresses, which can be 
    read and impersonated by a hacker.
    For more information, see “Restricting Wireless 
    Access by MAC Address” on page 2-17.
    Modify your firewall’s rules.By default, the firewall allows any outbound traffic 
    and prohibits any inbound traffic except for 
    responses to your outbound traffic. However, you 
    can modify the firewall’s rules.
    For more information, see “Understanding Your 
    Firewall” on page 2-21.
    Use the Push N Connect feature (Wi-Fi 
    Protected Setup).Wi-Fi Protected Setup provides easy setup by 
    means of a push button. Older wireless adapters and 
    devices might not support this. Check whether 
    devices are WPS enabled.
    For more information, see “Using Push N Connect 
    (Wi-Fi Protected Setup)” on page 2-12. 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGR614v8 User Manual