Netgear Router WGR614v8 User Manual
Have a look at the manual Netgear Router WGR614v8 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
54 Mbps Wireless Router WGR614v8 User Manual Configuring Internet Connectivity 1-7 v1.1, May 2008 If a login is required by your ISP, the following settings appear in the Basic Settings screen: •Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Ye s, the Basic Settings screen displays. –Internet Service Provider. This drop-down list contains a few ISPs that need special protocols for connection. The list includes: •PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services Figure 1-5 Note: After you finish setting up your router, you will no longer need to launch the ISP’s login program on your computer to access the Internet. When you start an Internet application, your router will automatically log you in. ISP does require login
54 Mbps Wireless Router WGR614v8 User Manual 1-8 Configuring Internet Connectivity v1.1, May 2008 •Telstra Bigpond, an Australian residential cable modem service •Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services worldwide. –Login and Password. This is the user name and password provided by your ISP. This name and password are used to log in to the ISP server. –Service Name. If your connection is capable of connecting to multiple Internet services, this setting specifies which service to use. –Connection Mode. This drop-down list (shown in Figure 1-5 on page 1-7) selects when the router will connect to and disconnect from the Internet. The list includes: •Always On. The router logs in to the Internet immediately after booting and never disconnects. •Dial on Demand. The router logs in only when outgoing traffic is present and logs out after the idle time-out. •Manually Connect. The router logs in or logs out only when the user clicks Connect or Disconnect in the Router Status screen. –Idle Timeout. Your Internet connection is logged out if there is no data transfer during the specified time interval. Note: The Telstra Bigpond setting is only for older cable modem service accounts still requiring a Bigpond login utility. Telstra has discontinued this type of account. Those with Telstra DSL accounts and newer cable modem accounts should select No for Does Your Internet Connection Require a Login. Figure 1-6 Note: Not all ISPs are listed here. The ones on this list have special requirements.
54 Mbps Wireless Router WGR614v8 User Manual Configuring Internet Connectivity 1-9 v1.1, May 2008 –Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also. Setting Up and Testing Basic Wireless Connectivity Follow these instructions to set up and test basic wireless connectivity. Once you have established basic wireless connectivity, you can enable security settings appropriate to your needs. 1.Select Wireless Settings under Setup in the main menu of the WGR614v8 router. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect. Note: If you use a wireless computer to change wireless settings, you might be disconnected when you click Apply. Reconfigure your wireless adapter to match the new settings, or access the router from a wired computer to make any further changes. Figure 1-7
54 Mbps Wireless Router WGR614v8 User Manual 1-10 Configuring Internet Connectivity v1.1, May 2008 2.For the wireless network name (SSID), use the default name, or choose a suitable descriptive name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. The default SSID is NETGEAR. 3.Select the region in which the wireless interface will operate. 4.Set the channel. The default channel is Auto. This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless router or access point. Select a channel that is not being used by any other wireless networks within several hundred feet of your router. For more information about the wireless channel frequencies, click the link to the online document “Wireless Networking Basics” in Appendix B. 5.Set the mode to b and g. 6.For Security Options, select None. 7.Click Apply to save your changes. Note: The SSID is case-sensitive; NETGEAR is not the same as nETgear. Also, the SSID of any wireless access adapters must match the SSID you specify in the Wireless-G Router. If they do not match, you will not get a wireless connection to the Wireless-G Router. Note: If you are configuring the router from a wireless computer and you change the router’s SSID, channel, or security settings, you will lose your wireless connection when you click Apply. You must then change the wireless settings of your computer to match the router’s new settings.
54 Mbps Wireless Router WGR614v8 User Manual Configuring Internet Connectivity 1-11 v1.1, May 2008 8.Select Wireless Settings under Advanced in the main menu of the WGR614v8 router. 9.Make sure that the Enable Wireless Router Radio and Enable SSID Broadcast check boxes are selected. 10.Click Setup Access List. 11 .Make sure that the Turn Access Control On check box is not selected. 12.Configure and test your wireless computer for wireless connectivity. Program the wireless adapter of your computer to have the same SSID and channel that you specified in the router, and disable encryption. Check that your computer has a wireless link and can obtain an IP address by DHCP from the router. Once your computer has basic wireless connectivity to the router, you can configure the advanced wireless security functions of the computer and router (for more information about security, see Chapter 2, “Safeguarding Your Network”). Figure 1-8
54 Mbps Wireless Router WGR614v8 User Manual 1-12 Configuring Internet Connectivity v1.1, May 2008
2-1 v1.1, May 2008 Chapter 2 Safeguarding Your Network The Wireless-G Router Model WGR614v8 provides highly effective security features, which are covered in detail in this chapter. This chapter includes the following sections: •“Choosing Appropriate Wireless Security” on page 2-1” •“Recording Basic Wireless Settings Setup Information” on page 2-5 •“Changing Wireless Security Settings” on page 2-6 •“Viewing Advanced Wireless Settings” on page 2-10 •“Restricting Wireless Access by MAC Address” on page 2-17 •“Restricting Wireless Access by MAC Address” on page 2-17 •“Changing the Administrator Password” on page 2-20 •“Backing Up Your Configuration” on page 2-21 •“Understanding Your Firewall” on page 2-21 Choosing Appropriate Wireless Security Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11g/n wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.
54 Mbps Wireless Router WGR614v8 User Manual 2-2 Safeguarding Your Network v1.1, May 2008 WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. To configure the wireless network, you can: •Manually specify your SSID and your wireless security settings. The Wireless-G Router provides two screens for configuring the wireless settings: the basic Wireless Settings screen, which you access under Setup in the main menu (see “Changing Wireless Security Settings” on page 2-6), and the Advanced Wireless Settings screen. •Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/ WPA2 security on both the router and the client device. If the clients in your network are WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement security on both the router and the client device (see “Using Push N Connect (Wi- Fi Protected Setup)” on page 2-12). Note: NETGEAR recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see “Changing the Administrator Password” on page 2-20. Figure 2-1 WGR614v8 1) Open system: easy but no security 2) MAC access list: no data security 3) WEP: security but some performance impact 4) WPA-PSK: strong security 5) WPA2-PSK: very strong security Wireless data security options Range: up to 300 foot radius Note: Use these with other features that enhance security (Table 2-2 on page 2-4).
54 Mbps Wireless Router WGR614v8 User Manual Safeguarding Your Network 2-3 v1.1, May 2008 Basic security options are listed below in order of increasing effectiveness. Other features that affect security are listed in the table that follows this one. For more details on wireless security methods, see the online document “Wireless Networking Basics” in Appendix B. Table 2-1. Wireless Security Options Security Type Description None. No wireless security. Recommended only for troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. WEP. Wired Equivalent Privacy. Wired Equivalent Privacy (WEP) data encryption provides moderate data security. WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. For more information, see “Configuring WEP Wireless Security” on page 2-7. WPA-PSK (TKIP). WPA-PSK standard encryption with TKIP encryption type. WPA2-PSK (AES). Wi-Fi Protected Access version 2 with Pre-Shared Key; WPA2-PSK standard encryption with the AES encryption type. WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.Wi-Fi Protected Access with Pre-Shared Key (WPA- PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. For more information, see “Configuring WPA-PSK and WPA2-PSK Wireless Security” on page 2-9.
54 Mbps Wireless Router WGR614v8 User Manual 2-4 Safeguarding Your Network v1.1, May 2008 Table 2-2. Other Features That Enhance Security Security TypeDescription Disable the wireless router radio.If you disable the wireless router radio, wireless devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see “Viewing Advanced Wireless Settings” on page 2-10. Turn off the broadcast of the wireless network name SSID.If you disable the broadcast of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless network discovery feature of some products such as Windows XP, but your data is still fully exposed to an intruder using available wireless eavesdropping tools. For more information, see “Viewing Advanced Wireless Settings” on page 2-10. Restrict access based on MAC address.You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the Wireless-G Router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see “Restricting Wireless Access by MAC Address” on page 2-17. Modify your firewall’s rules.By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewall’s rules. For more information, see “Understanding Your Firewall” on page 2-21. Use the Push N Connect feature (Wi-Fi Protected Setup).Wi-Fi Protected Setup provides easy setup by means of a push button. Older wireless adapters and devices might not support this. Check whether devices are WPS enabled. For more information, see “Using Push N Connect (Wi-Fi Protected Setup)” on page 2-12.