Home > Netgear > Router > Netgear Router WGT624 V2 User Manual

Netgear Router WGT624 V2 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGT624 V2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Wireless Configuration 4-11
    M-10153-01
    How to Configure WEP
    To configure WEP data encryption, follow these steps:
    1.Log in to the WGT624 v2 firewall at its default LAN address of http://192.168.0.1 with its 
    default user name of admin and default password of password, or using whatever LAN 
    address and password you have set up.
    2.Click the Wireless Settings link in the main menu of the WGT624 v2 firewall. 
    3.From the Security Encryption menu drop-down list, select the WEP encryption strength you 
    will use.
    Figure 4-6. Wireless Settings encryption menu
    4.
    You can manually or automatically program the four data encryption keys. These values must 
    be identical on all PCs and Access Points in your network.
    • Automatic - Enter a word or group of printable characters in the Passphrase box and click 
    the Generate button. The four key boxes will be automatically populated with key values.
    • Manual - Enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F) 
    Select which of the four keys will be active.
    Please refer to “Overview of WEP Parameters” on page D-5 for a full explanation of each of 
    these options, as defined by the IEEE 802.11 wireless communication standard.
    5.Click Apply to save your settings.
    Note: If you use a wireless PC configure WEP settings, you will be disconnected when 
    you click on Apply. You must then either configure your wireless adapter to match the 
    wireless router WEP settings or access the wireless router from a wired PC to make any 
    further changes. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    4-12 Wireless Configuration
    M-10153-01 
    						
    							Content Filtering5-1
    M-10153-01
    Chapter 5 
    Content Filtering
    This chapter describes how to use the content filtering features of the 108 Mbps Wireless Firewall 
    Router WGT624 v2 to protect your network. These features can be found by clicking on the 
    Content Filtering heading in the Main Menu of the browser interface. 
    The 108 Mbps Wireless Firewall Router WGT624 v2 provides you with web content filtering 
    options, plus browsing activity reporting and instant alerts via e-mail. Parents and network 
    administrators can establish restricted access policies based on time-of-day, web addresses and 
    web address keywords. You can also block Internet access by applications and services, such as 
    chat or games.
    Blocking Access to Internet Sites
    The WGT624 v2 wireless router allows you to restrict access based on web addresses and web 
    address keywords. Up to 255 entries are supported in the Keyword list. The Block Sites menu is 
    below:
    Figure 5-1:  Block Sites menu 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    5-2Content Filtering
    M-10153-01
    To enable keyword blocking, select either “Per Schedule” or “Always”, then click Apply. If you 
    want to block by schedule, be sure that a time period is specified in the Schedule menu.
    To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply.
    To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply.
    Keyword application examples:
    • If the keyword XXX is specified, the URL  is blocked.
    • If the keyword “.com” is specified, only websites with other domain suffixes (such as .edu or 
    .gov) can be viewed.
    • If you wish to block all Internet browsing access during a scheduled period, enter the keyword 
    “.” and set the schedule in the Schedule menu.
    To specify a Trusted User, enter that PC’s IP address in the Trusted User box and click Apply. You 
    may specify one Trusted User, which is a PC that will be exempt from blocking and logging. Since 
    the Trusted User will be identified by an IP address, you should configure that PC with a fixed IP 
    address.
    Blocking Access to Internet Services
    The WGT624 v2 wireless router allows you to block the use of certain Internet services by PCs on 
    your network. This is called services blocking or port filtering. The Block Services menu is shown 
    below:
    Figure 5-2:  Block Services menu 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Content Filtering5-3
    M-10153-01
    Services are functions performed by server computers at the request of client computers. For 
    example, web servers serve web pages, time servers serve time and date information, and game 
    hosts serve data about other players’ moves. When a computer on your network sends a request for 
    service to a server computer on the Internet, the requested service is identified by a service or port 
    number. This number appears as the destination port number in the transmitted IP packets. For 
    example, a packet that is sent with destination port number 80 is an HTTP (web server) request.
    To enable service blocking, select either Per Schedule or Always, then click Apply. If you want to 
    block by schedule, be sure that a time period is specified in the Schedule menu. 
    To specify a service for blocking, click Add. The Add Services menu will appear, as shown below:
    Figure 5-3:  Add Services menu
    From the Service Type list, select the application or service to be allowed or blocked. The list 
    already displays several common services, but you are not limited to these choices. To add any 
    additional services or applications that do not already appear, select User Defined.
    • Configuring a User Defined Service
    To define a service, first you must determine which port number or range of numbers is used by 
    the application. The service numbers for many common protocols are defined by the Internet 
    Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service 
    numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of  
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    5-4Content Filtering
    M-10153-01
    the application. This information can usually be determined by contacting the publisher of the 
    application or from user groups of newsgroups.
    Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter 
    that number in both boxes.
    If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are 
    not sure, select Both.
    • Configuring Services Blocking by IP Address Range
    Under “Filter Services For”, you can block the specified service for a single PC, a range of PCs 
    (having consecutive IP addresses), or all PCs on your network.
    Scheduling When Blocking Will Be Enforced
    The WGT624 v2 wireless router allows you to specify when blocking will be enforced. The 
    Schedule menu is shown below:
    Figure 5-4:  Schedule menu
    Use this check boxes on this menu to create a schedule for blocking content. Click Apply. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Content Filtering5-5
    M-10153-01
    •Days to Block. Select days to block by checking the appropriate boxes. Select Everyday to 
    check the boxes for all days. Click Apply.
    •Time of Day to Block. Select a start and end time in 23:59 format. Select All day for 24 hour 
    blocking. Click Apply.
    Note: Be sure to select your time zone in the E-Mail menu.
    Viewing Logs of Web Access or Attempted Web Access
    The log is a detailed record of what websites you have accessed or attempted to access. Up to 128 
    entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and 
    no log entries will be made for the Trusted User. An example is shown below:
    Figure 5-5:  Logs menu 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    5-6Content Filtering
    M-10153-01
    Log entries are described in Table 5-1
    Log action buttons are described in Ta b l e  5 - 2
    Table 5-1. Log entry descriptions
    Field Description
    Number The index number of the content filter log entries. 128 entries 
    are available numbered from 0 to 127. The log will keep the 
    record of the latest 128 entries.
    Date and Time The date and time the log entry was recorded.
    Source IP The IP address of the initiating device for this log entry.
    Action This field displays whether the access was blocked or allowed.
    The name or IP address of the website or newsgroup visited or 
    attempted to access.
    Table 5-2. Log action buttons
    Field Description
    Refresh Click this button to refresh the log screen.
    Clear Log Click this button to clear the log entries.
    Send Log Click this button to email the log immediately. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Content Filtering5-7
    M-10153-01
    Configuring E-Mail Alert and Web Access Log Notifications
    In order to receive logs and alerts by email, you must provide your email information in the E-Mail 
    menu, shown below:
    Figure 5-6:  Email menu
    • Turn e-mail notification on 
    Check this box if you wish to receive e-mail logs and alerts from the router.
    • Your outgoing mail server  
    Enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You 
    may be able to find this information in the configuration menu of your e-mail program. If you 
    leave this box blank, log and alert messages will not be sent via e-mail. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    5-8Content Filtering
    M-10153-01
    • Send to this e-mail address  
    Enter the e-mail address to which logs and alerts are sent. This e-mail address will also be used 
    as the From address. If you leave this box blank, log and alert messages will not be sent via 
    e-mail. 
    You can specify that logs are automatically sent to the specified e-mail address with these options:
    • Send alert immediately 
    Check this box if you would like immediate notification of attempted access to a blocked site.
    • Send logs according to this schedule 
    Specifies how often to send the logs: None, Hourly, Daily, Weekly, or When Full. 
    – Day for sending log. Specifies which day of the week to send the log. Relevant when the 
    log is sent weekly or daily.
    – Time for sending log. Specifies the time of day to send the log. Relevant when the log is 
    sent daily or weekly.
    If the Weekly, Daily or Hourly option is selected and the log fills up before the specified 
    period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, 
    the log is cleared from the router’s memory. If the router cannot e-mail the log file, the log 
    buffer may fill up. In this case, the router overwrites the log and discards its contents. If you 
    dont want logs sent, select None from the list in the Send Logs According To This Schedule 
    area. When you turn on e-mail notification and choose None in the Send Logs According to 
    this Schedule list, the alert is sent but not the log.
    The WGT624 v2 wireless router uses the Network Time Protocol (NTP) to obtain the current time 
    and date from one of several Network Time Servers on the Internet. In order to localize the time 
    for your log entries, you must specify your Time Zone:
    • Time Zone. Select your local time zone. This setting will be used for the blocking schedule 
    and for time-stamping log entries.
    • Daylight Savings Time. Check this box if your time zone is currently under daylight savings 
    time.
    Note: If your region uses Daylight Savings Time, you must manually select Adjust for 
    Daylight Savings Time on the first day of Daylight Savings Time, and unselect it at the 
    end. Enabling Daylight Savings Time will cause one hour to be added to the standard time.  
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGT624 V2 User Manual