Netgear Router WGT624 V2 User Manual
Have a look at the manual Netgear Router WGT624 V2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Wireless Configuration 4-11 M-10153-01 How to Configure WEP To configure WEP data encryption, follow these steps: 1.Log in to the WGT624 v2 firewall at its default LAN address of http://192.168.0.1 with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. 2.Click the Wireless Settings link in the main menu of the WGT624 v2 firewall. 3.From the Security Encryption menu drop-down list, select the WEP encryption strength you will use. Figure 4-6. Wireless Settings encryption menu 4. You can manually or automatically program the four data encryption keys. These values must be identical on all PCs and Access Points in your network. • Automatic - Enter a word or group of printable characters in the Passphrase box and click the Generate button. The four key boxes will be automatically populated with key values. • Manual - Enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F) Select which of the four keys will be active. Please refer to “Overview of WEP Parameters” on page D-5 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. 5.Click Apply to save your settings. Note: If you use a wireless PC configure WEP settings, you will be disconnected when you click on Apply. You must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired PC to make any further changes.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 4-12 Wireless Configuration M-10153-01
Content Filtering5-1 M-10153-01 Chapter 5 Content Filtering This chapter describes how to use the content filtering features of the 108 Mbps Wireless Firewall Router WGT624 v2 to protect your network. These features can be found by clicking on the Content Filtering heading in the Main Menu of the browser interface. The 108 Mbps Wireless Firewall Router WGT624 v2 provides you with web content filtering options, plus browsing activity reporting and instant alerts via e-mail. Parents and network administrators can establish restricted access policies based on time-of-day, web addresses and web address keywords. You can also block Internet access by applications and services, such as chat or games. Blocking Access to Internet Sites The WGT624 v2 wireless router allows you to restrict access based on web addresses and web address keywords. Up to 255 entries are supported in the Keyword list. The Block Sites menu is below: Figure 5-1: Block Sites menu
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 5-2Content Filtering M-10153-01 To enable keyword blocking, select either “Per Schedule” or “Always”, then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply. To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply. Keyword application examples: • If the keyword XXX is specified, the URL is blocked. • If the keyword “.com” is specified, only websites with other domain suffixes (such as .edu or .gov) can be viewed. • If you wish to block all Internet browsing access during a scheduled period, enter the keyword “.” and set the schedule in the Schedule menu. To specify a Trusted User, enter that PC’s IP address in the Trusted User box and click Apply. You may specify one Trusted User, which is a PC that will be exempt from blocking and logging. Since the Trusted User will be identified by an IP address, you should configure that PC with a fixed IP address. Blocking Access to Internet Services The WGT624 v2 wireless router allows you to block the use of certain Internet services by PCs on your network. This is called services blocking or port filtering. The Block Services menu is shown below: Figure 5-2: Block Services menu
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Content Filtering5-3 M-10153-01 Services are functions performed by server computers at the request of client computers. For example, web servers serve web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with destination port number 80 is an HTTP (web server) request. To enable service blocking, select either Per Schedule or Always, then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To specify a service for blocking, click Add. The Add Services menu will appear, as shown below: Figure 5-3: Add Services menu From the Service Type list, select the application or service to be allowed or blocked. The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. • Configuring a User Defined Service To define a service, first you must determine which port number or range of numbers is used by the application. The service numbers for many common protocols are defined by the Internet Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 5-4Content Filtering M-10153-01 the application. This information can usually be determined by contacting the publisher of the application or from user groups of newsgroups. Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter that number in both boxes. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select Both. • Configuring Services Blocking by IP Address Range Under “Filter Services For”, you can block the specified service for a single PC, a range of PCs (having consecutive IP addresses), or all PCs on your network. Scheduling When Blocking Will Be Enforced The WGT624 v2 wireless router allows you to specify when blocking will be enforced. The Schedule menu is shown below: Figure 5-4: Schedule menu Use this check boxes on this menu to create a schedule for blocking content. Click Apply.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Content Filtering5-5 M-10153-01 •Days to Block. Select days to block by checking the appropriate boxes. Select Everyday to check the boxes for all days. Click Apply. •Time of Day to Block. Select a start and end time in 23:59 format. Select All day for 24 hour blocking. Click Apply. Note: Be sure to select your time zone in the E-Mail menu. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of what websites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User. An example is shown below: Figure 5-5: Logs menu
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 5-6Content Filtering M-10153-01 Log entries are described in Table 5-1 Log action buttons are described in Ta b l e 5 - 2 Table 5-1. Log entry descriptions Field Description Number The index number of the content filter log entries. 128 entries are available numbered from 0 to 127. The log will keep the record of the latest 128 entries. Date and Time The date and time the log entry was recorded. Source IP The IP address of the initiating device for this log entry. Action This field displays whether the access was blocked or allowed. The name or IP address of the website or newsgroup visited or attempted to access. Table 5-2. Log action buttons Field Description Refresh Click this button to refresh the log screen. Clear Log Click this button to clear the log entries. Send Log Click this button to email the log immediately.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Content Filtering5-7 M-10153-01 Configuring E-Mail Alert and Web Access Log Notifications In order to receive logs and alerts by email, you must provide your email information in the E-Mail menu, shown below: Figure 5-6: Email menu • Turn e-mail notification on Check this box if you wish to receive e-mail logs and alerts from the router. • Your outgoing mail server Enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You may be able to find this information in the configuration menu of your e-mail program. If you leave this box blank, log and alert messages will not be sent via e-mail.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 5-8Content Filtering M-10153-01 • Send to this e-mail address Enter the e-mail address to which logs and alerts are sent. This e-mail address will also be used as the From address. If you leave this box blank, log and alert messages will not be sent via e-mail. You can specify that logs are automatically sent to the specified e-mail address with these options: • Send alert immediately Check this box if you would like immediate notification of attempted access to a blocked site. • Send logs according to this schedule Specifies how often to send the logs: None, Hourly, Daily, Weekly, or When Full. – Day for sending log. Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. – Time for sending log. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If the Weekly, Daily or Hourly option is selected and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, the log is cleared from the router’s memory. If the router cannot e-mail the log file, the log buffer may fill up. In this case, the router overwrites the log and discards its contents. If you dont want logs sent, select None from the list in the Send Logs According To This Schedule area. When you turn on e-mail notification and choose None in the Send Logs According to this Schedule list, the alert is sent but not the log. The WGT624 v2 wireless router uses the Network Time Protocol (NTP) to obtain the current time and date from one of several Network Time Servers on the Internet. In order to localize the time for your log entries, you must specify your Time Zone: • Time Zone. Select your local time zone. This setting will be used for the blocking schedule and for time-stamping log entries. • Daylight Savings Time. Check this box if your time zone is currently under daylight savings time. Note: If your region uses Daylight Savings Time, you must manually select Adjust for Daylight Savings Time on the first day of Daylight Savings Time, and unselect it at the end. Enabling Daylight Savings Time will cause one hour to be added to the standard time.