Home > Netgear > Router > Netgear Router WGR614v8 User Manual

Netgear Router WGR614v8 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGR614v8 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							54 Mbps Wireless Router WGR614v8 User Manual
    Safeguarding Your Network 2-15
    v1.1, May 2008
    6.Click Next. The following screen displays, and the Smart Wizard initiates the wireless 
    connection:
    7.Finally, use the WPS feature of the wireless client to establish a connection with the router. 
    Refer to the wireless client documentation for instructions on completing this step.
    Configuring the WPS Settings
    1.Log in to the router as described in “Logging In to Your Wireless Router” on page 1-2.
    2.Select Wireless Settings under Advanced in the main menu.
    Figure 2-9
    Figure 2-10 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    2-16 Safeguarding Your Network
    v1.1, May 2008
    These options are available under WPS Settings:
    •Router’s PIN. The PIN is displayed so that you can use it to configure the router through 
    WPS (Wi-Fi Protected Setup). It is also displayed on the router’s label.
    •Disable Router’s PIN. If the router’s PIN is disabled, you cannot use the router’s WPS 
    PIN method to connect a wireless client. However, you can still use the client’s WPS PIN 
    method. The router might disable the PIN if it detects suspicious attempts to break into 
    your wireless settings; this can happen if the check box is selected. You can enable the PIN 
    by clearing the check box and clicking Apply. Also, you can add WPS-enabled wireless 
    clients using the Push Button method. 
    •Keep Existing Wireless Settings. This check box is automatically selected after WPS is 
    enabled to prevent unwanted settings changes, and is also selected if you have already 
    specified wireless security settings or your SSID without using WPS. When this check 
    box is not selected, adding a new wireless client using the push button or the Add WPS 
    Client screen (see “Push Button Configuration” on page 2-13) changes the router’s SSID 
    and security passphrase. You might need to clear it if you are using certain registrars, such 
    as for a Windows Vista PC, to configure the router through WPS.
    Connecting Additional Wireless Client Devices after WPS Setup
    You can add WPS-enabled and non-WPS-enabled client devices.
    Adding Additional WPS-Enabled Clients
    To add an additional wireless client device that is WPS enabled:
    1.Follow the procedures in “Push Button Configuration” on page 2-13 or “Security PIN Entry” 
    on page 2-14.
    2.For information about how to view a list of all devices connected to your router (including 
    wireless and Ethernet-connected), see “Viewing a List of Attached Devices” on page 6-5.
    Note: Your wireless settings do not change when you add an additional WPS-enabled 
    client unless you have cleared the Keep Existing Wireless Settings check box (in 
    the Wireless Settings screen). If you do clear the check box, a new SSID and a 
    passphrase are generated, and all existing connected wireless clients are 
    disassociated and disconnected from the router. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    Safeguarding Your Network 2-17
    v1.1, May 2008
    Adding Additional Non-WPS-Enabled Clients
    If you are connecting a combination of WPS-enabled clients and clients that are not WPS enabled, 
    you cannot use the WPS setup procedures to add clients that are not WPS enabled. You need to 
    record and then manually enter your security settings (see “Recording Basic Wireless Settings 
    Setup Information” on page 2-5).
    To connect non-WPS-enabled and WPS-enabled clients to the Wireless-G Router:
    1.Restore the router to factory default settings (see “Restoring the Default User Name and 
    Password” on page A-3). 
    After you restore factory settings, all existing connected wireless clients are disassociated and 
    disconnected from the router.
    2.Configure the network name (SSID) and security passphrase of the Wireless-G Router (shown 
    in the Wireless Settings screen) as appropriate, and record that information. See “Viewing 
    Basic Wireless Settings” on page 2-6.
    3.For the non-WPS-enabled devices that you wish to connect, open the networking utility, and 
    follow the utility’s instructions to enter security settings.
    4.For the WPS-enabled devices that you wish to connect, follow the procedures in “Push Button 
    Configuration” on page 2-13 or “Security PIN Entry” on page 2-14.
    5.For information about how to view a list of all devices connected to your router (including 
    wireless and Ethernet connected), see “Viewing a List of Attached Devices” on page 6-5.
    Restricting Wireless Access by MAC Address
    When a Wireless Card Access List is configured and enabled, the router checks the MAC address 
    of any wireless device attempting a connection and allows only connections to computers 
    identified on the trusted computers list. 
    The Wireless Card Access List displays a list of wireless computers that you allow to connect to 
    the router based on their MAC addresses. These wireless computers must also have the correct 
    SSID and wireless security settings to access the wireless router.
    The MAC address is a network device’s unique 12-character physical address, containing the 
    hexadecimal characters 0–9, a–f, or A–F only, and separated by colons (for example, 
    00:09:AB:CD:EF:01). It can usually be found on the bottom of the wireless card or network 
    interface device. If you do not have access to the physical label, you can display the MAC address  
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    2-18 Safeguarding Your Network
    v1.1, May 2008
    using the network configuration utilities of the computer. In WindowsXP, for example, typing the 
    ipconfig/all command in an MSDOS command prompt window displays the MAC address as 
    Physical Address. You might also find the MAC addresses in the router’s Attached Devices screen.
    To restrict access based on MAC addresses:
    1.Select Wireless Settings under Advanced in the main menu.
    2.In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless 
    Card Access List.
    3.Click Add to add a wireless device to the wireless access control list. The Wireless Card 
    Access Setup screen opens and displays a list of currently active wireless cards and their 
    Ethernet MAC addresses.
    Figure 2-11
    Figure 2-12 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    Safeguarding Your Network 2-19
    v1.1, May 2008
    4.If the computer you want appears in the Available Wireless Cards list, you can select the radio 
    button of that computer to capture its MAC address; otherwise, you can manually enter a name 
    and the MAC address of the authorized computer. You can usually find the MAC address on 
    the bottom of the wireless device.
    5.Click Add to add this wireless device to the Wireless Card Access List. The screen changes 
    back to the list screen. 
    6.Repeat step 3 through step 5 for each additional device you want to add to the list.
    7.Select the Turn Access Control On check box.
    8.Click Apply to save your Wireless Card Access List settings.
    Now, only devices on this list can wirelessly connect to the Wireless-G Router.
    Tip: You can copy and paste the MAC addresses from the router’s Attached Devices 
    screen into the MAC Address field of this screen. To do this, configure each 
    wireless computer to obtain a wireless link to the router. The computer should 
    then appear in the Attached Devices screen.
    Note: When configuring the router from a wireless computer whose MAC address is 
    not in the Trusted PC list, if you select Turn Access Control On, you lose 
    your wireless connection when you click Apply. You must then access the 
    wireless router from a wired computer or from a wireless computer that is on 
    the access control list to make any further changes.
    Wa r n i n g :  MAC address filtering adds an obstacle against unwanted access to your 
    network by the general public. However, because your trusted MAC 
    addresses appear in your wireless transmissions, an intruder can read them 
    and impersonate them. Do not rely on MAC address filtering alone to secure 
    your network. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    2-20 Safeguarding Your Network
    v1.1, May 2008
    Changing the Administrator Password
    The default password for the router’s Web Configuration Manager is password. NETGEAR 
    recommends that you change this password to a more secure password. 
    To change the administrator password:
    1.On the main menu, under Maintenance, select Set Password to display the Set Password 
    screen.
    2.To change the password, first enter the old password, then enter the new password twice. 
    3.Click Apply.
    Tip: Before changing the router password, back up your configuration settings with the 
    default password of password. If you save the settings with a new password, and 
    then you later forget the new password, you will have to reset the router back to the 
    factory defaults, and log in using the default password of password. This means you 
    will have to re-enter all the router configuration settings. For information about how 
    to back up your settings, see “Backing Up and Restoring the Configuration” on 
    page 6-6.
    Figure 2-13 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    Safeguarding Your Network 2-21
    v1.1, May 2008
    Backing Up Your Configuration
    The configuration settings of the Wireless-G Router are stored within the router in a configuration 
    file. You can back up (save) this file and retrieve it later. NETGEAR recommends that you save 
    your configuration file after you complete the configuration. If the router fails or becomes 
    corrupted, or an administrator password is lost, you can easily re-create your configuration by 
    restoring the configuration file.
    For instructions on saving and restoring your configuration file, see “Managing the Configuration 
    File” on page 6-6.
    Understanding Your Firewall
    Your Wireless-G Router Model WGR614v8 contains a true firewall to protect your network from 
    attacks and intrusions. A firewall is a device that protects one network from another while 
    allowing communication between the two. Using a process called Stateful Packet Inspection, the 
    firewall analyzes all inbound and outbound traffic to determine whether or not it will be allowed to 
    pass through.
    By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for 
    responses to your outbound traffic. However, you can modify the firewall’s rules to achieve the 
    following behavior:
    •Blocking sites. Block access from your network to certain Web locations based on Web 
    addresses and Web address keywords. This feature is described in “Blocking Access to 
    Internet Sites” on page 3-1.
    •Blocking services. Block the use of certain Internet services by specific computers on your 
    network. This feature is described in “Blocking Access to Internet Services” on page 3-3.
    •Scheduled blocking. Block sites and services according to a daily schedule. This feature is 
    described in “Scheduling Blocking” on page 3-5.
    Tip: Before saving your configuration file, change the administrator password to the 
    default, password. Then change it again after you have saved the configuration file. 
    If you save the file with a new password, and then you later forget the new 
    password, you will have to reset the router back to the factory defaults and log in 
    using the default password of password. This means you will have to re-enter all the 
    router configuration settings. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    2-22 Safeguarding Your Network
    v1.1, May 2008
    •Allow inbound access to your server. To allow inbound access to resources on your local 
    network (for example, a Web server or remote desktop program), you can open the needed 
    services by configuring port forwarding as described in “Changing the MTU Size” on 
    page 5-20.
    •Allow certain games and applications to function correctly. Some games and applications 
    need to allow additional inbound traffic in order to function. Port triggering can dynamically 
    allow additional service connections, as described in “Changing the MTU Size” on page 5-20. 
    Another feature to solve application conflicts with the firewall is Universal Plug and Play 
    (UPnP), described in “Using Universal Plug and Play” on page 5-12. 
    						
    							3-1
    v1.1, May 2008
    Chapter 3
    Restricting Access From Your Network
    This chapter describes how to use the content filtering and reporting features of the Wireless-G 
    Router Model WGR614v8 to protect your network. You can find these features by selecting the 
    items under Content Filtering in the main menu of the browser interface. 
    This chapter includes the following sections:
    •“Content Filtering Overview” on page 3-1”
    •“Blocking Access to Internet Sites”
    •“Blocking Access to Internet Services” on page 3-3
    •“Scheduling Blocking” on page 3-5
    •“Viewing Logs of Web Access or Attempted Web Access” on page 3-6
    •“Configuring E-mail Alert and Web Access Log Notifications” on page 3-7
    •“Setting the Time” on page 3-8
    Content Filtering Overview
    The Wireless-G Router Model WGR614v8 provides you with Web content filtering options, plus 
    browser activity reporting and instant alerts through e-mail. Parents and network administrators 
    can establish restricted access policies based on time of day, Web addresses, and Web address 
    keywords. You can also block applications and services, such as chat rooms or games.
    To configure these features of your router, select the items under Content Filtering in the main 
    menu of the browser interface. This chapter describes the screens that display.
    Blocking Access to Internet Sites
    The Wireless-G Router allows you to restrict access based on Web addresses and Web address 
    keywords. Up to 255 entries are supported in the Keyword list.Keyword application examples:
    • If the keyword XXX is specified, the URL www.zzzyyqq.com/xxx.html is blocked.
    • If the keyword .com is specified, only websites with other domain suffixes (such as .edu, .org, 
    or .gov) can be viewed. 
    						
    							54 Mbps Wireless Router WGR614v8 User Manual
    3-2 Restricting Access From Your Network
    v1.1, May 2008
    To block access to Internet sites:
    1.Select Block Sites under Content Filtering in the main menu. The Block Sites screen displays.
    2.Enable keyword blocking by selecting either Per Schedule or Always. 
    To block by schedule, be sure to specify a time period in the Schedule screen. For information 
    about scheduling, see “Scheduling Blocking” on page 3-5.
    Block all access to Internet browsing during a scheduled period by entering a dot (.) as the 
    keyword, and then set a schedule in the Schedule screen.
    3.Add a keyword or domain by entering it in the keyword field and clicking Add Keyword. The 
    keyword or domain name then appears the Block sites containing these keywords or domain 
    names list. 
    Delete a keyword or domain name by selecting it from the list and clicking Delete Keyword.
    4.You can specify one trusted user, which is a computer that is exempt from blocking and 
    logging. Specify a trusted user by entering that computer’s IP address in the Trusted IP 
    Address fields.
    Since the trusted user is identified by IP address, you should configure that computer with a 
    fixed IP address.
    5.Click Apply to save all your settings in the Block Sites screen.
    Figure 3-1 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGR614v8 User Manual