Netgear Router WGR614v9 User Manual
Have a look at the manual Netgear Router WGR614v9 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Wireless-G Router WGR614v9 Reference Manual Configuring Basic Connectivity 1-7 v1.1, May 2008 If a login is required by your ISP, the following settings appear in the Basic Settings screen: •Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Ye s, the Basic Settings screen displays. –Internet Service Provider. This drop-down list contains a few ISPs that need special protocols for connection. The list includes: •PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services Figure 1-5 Note: After you finish setting up your router, you will no longer need to launch the ISP’s login program on your computer to access the Internet. When you start an Internet application, your router will automatically log you in. ISP does require login
Wireless-G Router WGR614v9 Reference Manual 1-8 Configuring Basic Connectivity v1.1, May 2008 •Telstra Bigpond, an Australian residential cable modem service •Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services worldwide. –Login and Password. This is the user name and password provided by your ISP. This name and password are used to log in to the ISP server. –Service Name. If your connection is capable of connecting to multiple Internet services, this setting specifies which service to use. –Connection Mode. This drop-down list (shown in Figure 1-5 on page 1-7) selects when the router will connect to and disconnect from the Internet. The list includes: •Always On. The router logs in to the Internet immediately after booting and never disconnects. •Dial on Demand. The router logs in only when outgoing traffic is present and logs out after the idle time-out. •Manually Connect. The router logs in or logs out only when the user clicks Connect or Disconnect in the Router Status screen. –Idle Timeout. Your Internet connection is logged out if there is no data transfer during the specified time interval. Note: The Telstra Bigpond setting is only for older cable modem service accounts still requiring a Bigpond login utility. Telstra has discontinued this type of account. Those with Telstra DSL accounts and newer cable modem accounts should select No for Does Your Internet Connection Require a Login. Figure 1-6 Note: Not all ISPs are listed here. The ones on this list have special requirements.
Wireless-G Router WGR614v9 Reference Manual Configuring Basic Connectivity 1-9 v1.1, May 2008 –Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also. Note: If you enter or change a DNS address, restart the computers on your network so that these settings take effect.
Wireless-G Router WGR614v9 Reference Manual 1-10 Configuring Basic Connectivity v1.1, May 2008
2-1 v1.1, May 2008 Chapter 2 Safeguarding Your Network The Wireless-G Router Model WGR614v9 provides highly effective security features, which are covered in detail in this chapter. This chapter includes the following sections: •“Choosing Appropriate Wireless Security” •“Recording Basic Wireless Settings Setup Information” on page 2-4 •“Changing Wireless Security Settings” on page 2-5 •“Viewing Advanced Wireless Settings” on page 2-10 •“Restricting Wireless Access by MAC Address” on page 2-11 •“Restricting Wireless Access by MAC Address” on page 2-11 •“Changing the Administrator Password” on page 2-14 •“Backing Up Your Configuration” on page 2-15 •“Understanding Your Firewall” on page 2-15 Choosing Appropriate Wireless Security Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11g/n wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement. Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.
Wireless-G Router WGR614v9 Reference Manual 2-2 Safeguarding Your Network v1.1, May 2008 WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. The Wireless-G Router provides two screens for configuring the wireless settings: the basic Wireless Settings screen, which you access under Setup in the main menu (see “Changing Wireless Security Settings” on page 2-5), and the Advanced Wireless Settings screen, which you access under Advanced (see “Changing Wireless Security Settings” on page 2-5). Basic security options are listed in order of increasing effectiveness in Ta b l e 2 - 1 below. Other features that affect security are listed in Table 2-2 on page 2-3. For more details on wireless security methods, see the online document “Wireless Networking Basics” in Appendix B. Note: NETGEAR recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see “Changing the Administrator Password” on page 2-14. Figure 2-1 WGR614v9 1) Open system: easy but no security 2) MAC access list: no data security 3) WEP: security but some performance impact 4) WPA-PSK: strong security 5) WPA2-PSK: very strong security Wireless data security options Range: up to 300 foot radius Note: Use these with other features that enhance security (Table 2-2 on page 2-3).
Wireless-G Router WGR614v9 Reference Manual Safeguarding Your Network 2-3 v1.1, May 2008 Table 2-1. Wireless Security Options Security Type Description None. No wireless security. Recommended only for troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public. WEP. Wired Equivalent Privacy. Wired Equivalent Privacy (WEP) data encryption provides moderate data security. WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. For more information, see “Configuring WEP Wireless Security” on page 2-7. WPA-PSK (TKIP). WPA-PSK standard encryption with TKIP encryption type. WPA2-PSK (AES). Wi-Fi Protected Access version 2 with Pre-Shared Key; WPA2-PSK standard encryption with the AES encryption type. WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.Wi-Fi Protected Access with Pre-Shared Key (WPA- PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. For more information, see “Configuring WPA-PSK and WPA2-PSK Wireless Security” on page 2-9. Table 2-2. Other Features That Enhance Security Security TypeDescription Disable the wireless router radio.If you disable the wireless router radio, wireless devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see “Viewing Advanced Wireless Settings” on page 2-10. Turn off the broadcast of the wireless network name SSID.If you disable the broadcast of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless network discovery feature of some products such as Windows XP, but your data is still fully exposed to an intruder using available wireless eavesdropping tools. For more information, see “Viewing Advanced Wireless Settings” on page 2-10.
Wireless-G Router WGR614v9 Reference Manual 2-4 Safeguarding Your Network v1.1, May 2008 Recording Basic Wireless Settings Setup Information Before customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided. •Wireless Network Name (SSID). ______________________________ The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is case- sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In some configuration utilities (such as in Windows XP), the term “wireless network name” is used instead of SSID. •If WEP Authentication is used, circle one: Open System, Shared Key, or Auto. –WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key size must be the same for the wireless adapters and the wireless router. Restrict access based on MAC address.You can restrict access to only trusted computers so that unknown computers cannot wirelessly connect to the Wireless-G Router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see “Restricting Wireless Access by MAC Address” on page 2-11. Modify your firewall’s rules.By default, the firewall allows any outbound traffic and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewall’s rules. For more information, see “Understanding Your Firewall” on page 2-15. Note: If you select Shared Key, the other devices in the network will not connect unless they are also set to Shared Key and are configured with the correct key. Table 2-2. Other Features That Enhance Security Security TypeDescription
Wireless-G Router WGR614v9 Reference Manual Safeguarding Your Network 2-5 v1.1, May 2008 –Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption keys. Whichever method you use, record the key values in the spaces provided. •Passphrase Method. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters and click Generate. Not all wireless devices support the passphrase method. •Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10 hexadecimal digits (any combination of 0–9, a–f, or A–F). For 128-bit WEP, enter 26 hexadecimal digits. Key 1: ___________________________________ Key 2: ___________________________________ Key 3: ___________________________________ Key 4: ___________________________________ • If WPA-PSK or WPA2-PSK authentication is used: –Passphrase. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters. When you use WPA-PSK, the other devices in the network will not connect unless they are also set to WPA-PSK and are configured with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the network will not connect unless they are also set to WPA2-PSK and are configured with the correct passphrase. Use the procedures described in the following sections to specify the Wireless-G Router. Store this information in a safe place. Changing Wireless Security Settings This section describes the wireless settings that you can view and configure in the Wireless Settings screen, which you access under Setup in the main menu. Viewing Basic Wireless Settings To specify the wireless security settings of your router: 1.Log in to the router as described in “Logging In to Your Wireless Router” on page 1-2. 2.Select Wireless Settings under Setup in the main menu.
Wireless-G Router WGR614v9 Reference Manual 2-6 Safeguarding Your Network v1.1, May 2008 The available settings in this screen are: •Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The WGR614v9 default SSID is NETGEAR. You can disable this broadcast as described in “Viewing Advanced Wireless Settings” on page 2-10. •Region. This field identifies the region where the Wireless-G Router can be used. It might not be legal to operate the wireless features of the wireless router in a region other than one of those identified in this field. Figure 2-2 Note: The region selection feature might not be available in all countries.