Home > Netgear > Router > Netgear Router WGR614v9 User Manual

Netgear Router WGR614v9 User Manual

Here you can view all the pages of manual Netgear Router WGR614v9 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 21

Wireless-G Router WGR614v9 Reference Manual
Configuring Basic Connectivity 1-7
v1.1, May 2008
If a login is required by your ISP, the following settings appear in the Basic Settings screen: 
•Does Your Internet Connection Require A Login? If you usually must use a login program 
such as WinPOET to access the Internet, your Internet connection requires a login. After you 
select Ye s, the Basic Settings screen displays.
–Internet Service Provider. This drop-down list contains a few ISPs that need special...

Page 22

Wireless-G Router WGR614v9 Reference Manual
1-8 Configuring Basic Connectivity
v1.1, May 2008
•Telstra Bigpond, an Australian residential cable modem service
•Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used 
by most DSL services worldwide. 
–Login and Password. This is the user name and password provided by your ISP. This 
name and password are used to log in to the ISP server.
–Service Name. If your connection is capable of connecting to multiple Internet services,...

Page 23

Wireless-G Router WGR614v9 Reference Manual
Configuring Basic Connectivity 1-9
v1.1, May 2008
–Domain Name Server (DNS) Address. If you know that your ISP does not automatically 
transmit DNS addresses to the router during login, select Use These DNS Servers, and 
enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address 
is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your 
network so that these settings take effect. 

Page 24

Wireless-G Router WGR614v9 Reference Manual
1-10 Configuring Basic Connectivity
v1.1, May 2008 

Page 25

2-1
v1.1, May 2008
Chapter 2
Safeguarding Your Network
The Wireless-G Router Model WGR614v9 provides highly effective security features, which are 
covered in detail in this chapter. 
This chapter includes the following sections:
•“Choosing Appropriate Wireless Security”
•“Recording Basic Wireless Settings Setup Information” on page 2-4
•“Changing Wireless Security Settings” on page 2-5
•“Viewing Advanced Wireless Settings” on page 2-10
•“Restricting Wireless Access by MAC Address” on page 2-11...

Page 26

Wireless-G Router WGR614v9 Reference Manual
2-2 Safeguarding Your Network
v1.1, May 2008
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK 
encryption can consume more battery power on a notebook computer, and can cause significant 
performance degradation with a slow computer.
The Wireless-G Router provides two screens for configuring the wireless settings: the basic 
Wireless Settings screen, which you access under Setup in the main menu (see “Changing Wireless...

Page 27

Wireless-G Router WGR614v9 Reference Manual
Safeguarding Your Network 2-3
v1.1, May 2008 Table 2-1.  Wireless Security Options
Security Type Description
None. No wireless security. Recommended only for 
troubleshooting wireless connectivity. Do not run an 
unsecured wireless network unless it is your 
intention to provide free Internet access for the 
public.
WEP. Wired Equivalent Privacy.  Wired Equivalent Privacy (WEP) data encryption 
provides moderate data security. WEP Shared Key 
authentication and...

Page 28

Wireless-G Router WGR614v9 Reference Manual
2-4 Safeguarding Your Network
v1.1, May 2008
Recording Basic Wireless Settings Setup Information
Before customizing your wireless settings, print this section, and record the following information. 
If you are working with an existing wireless network, the person who set up or is responsible for 
the network can provide this information. Otherwise, you must choose the settings for your 
wireless network. Either way, record the settings for your wireless network...

Page 29

Wireless-G Router WGR614v9 Reference Manual
Safeguarding Your Network 2-5
v1.1, May 2008
–Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption 
keys. Whichever method you use, record the key values in the spaces provided.
•Passphrase Method. ______________________________ These characters are 
case-sensitive. Enter a word or group of printable characters and click Generate. Not 
all wireless devices support the passphrase method.
•Manual Method. These values are not...

Page 30

Wireless-G Router WGR614v9 Reference Manual
2-6 Safeguarding Your Network
v1.1, May 2008
The available settings in this screen are:
•Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 
32 alphanumeric characters. When more than one wireless network is active, different wireless 
network names provide a way to separate the traffic. For a wireless device to participate in a 
particular wireless network, it must be configured with the SSID for that network. The...
Start reading Netgear Router WGR614v9 User Manual

Related Manuals for Netgear Router WGR614v9 User Manual

All Netgear manuals