Netgear Router WGT624 V3 User Manual
Have a look at the manual Netgear Router WGT624 V3 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Configuring the Internet and Wireless Settings 3-9 202-10090-01, April 2005 Usually, select Use Default MAC Address. If your ISP requires MAC authentication, then select either Use Computer MAC address to disguise the Routers MAC address with the Computers own MAC address or Use This MAC Address to manually type the MAC address for a different computer. The format for the MAC address is XX:XX:XX:XX:XX:XX. This value may be changed if the Use Computer MAC Address is selected once a value has already been set in the Use This MAC Address selection. Click Test to connect to the NETGEAR Web site. If you connect successfully, your settings work and you may click Logout to exit these pages and... enjoy surfing the net! If you dont connect successfully, 1.Go through the settings and make sure youve selected the correct options and typed everything correctly. 2.Contact your ISP to verify the configuration information. 3.Read the Troubleshooting section in the Router Installation Guide. 4.On the Router GearBox CD, read the Troubleshooting Guide or the Troubleshooting section in the Reference Manual. 5.Contact NETGEAR Technical Support.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 3-10 Configuring the Internet and Wireless Settings 202-10090-01, April 2005 Wireless Settings To change the Internet settings, click Wireless Settings on the left menu bar. One of the following screens appears: Figure 3-7: Wireless Settings screens NOTE: To ensure proper agency compliance and compatibility between similar products in your area; the operating channel & region must be set correctly. •Placement of the Router to Optimize Wireless Connectivity: The operating distance or range of your wireless connection can vary significantly based on the physical placement of the router. For best results, place your router: – Near the center of the area in which your PCs will operate – In an elevated location such as a high shelf – Away from potential sources of interference, such as PCs, microwaves, and cordless phones – With the Antenna tight and in the upright position – Away from large metal surfaces Wireless Settings: No securityWireless Settings: WEP securityWireless Settings: WPA-PSK security
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Configuring the Internet and Wireless Settings 3-11 202-10090-01, April 2005 Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the router. •Name (SSID): Enter a value of up to 32 alphanumeric characters. The same Name (SSID) must be assigned to all wireless devices in your network. The default SSID is NETGEAR, but NETGEAR strongly recommends that you change your networks Name (SSID) to a different value. This value is also case-sensitive. For example, NETGEAR is not the same as NETGEAr. •Region: Select your region from the drop-down list. This field displays the region of operation for which the wireless interface is intended. It may not be legal to operate the router in a region other than the region shown here. If your country or region is not listed, please check with your local government agency or check our web site for more information on which channels to use. •Channel: This field determines which operating frequency will be used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point. •Mode: Select the desired wireless mode. The options are: –g & b: Both 802.11g and 802.11b wireless stations can be used. –g only: Only 802.11g wireless stations can be used. –b only: All 802.11b wireless stations can be used. 802.11g wireless stations can still be used if they can operate in 802.11b mode. –108 Mbps only: Only compatible 802.11g wireless stations that support 108 Mbps can connect. –Auto 108 Mbps: All 802.11g, 802.11b and NETGEAR 108 Mbps wireless stations can be used. Note: If you select 108 Mbps mode, the WGT624 will only use channel 6. The default is g & b, which allows both g and b wireless stations to access this device. •Security Options –Disable: no data encryption –WEP (Wired Equivalent Privacy): use WEP 64 or 128 bit data encryption •Authentication Type: Normally this can be left at the default value of Automatic. If that fails, select the appropriate value - Open System or Shared Key Check your wireless cards documentation to see what method to use.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 3-12 Configuring the Internet and Wireless Settings 202-10090-01, April 2005 •Encryption Strength: Select the WEP Encryption level: 64-bit (sometimes called 40-bit) encryption 128-bit encryption •Security Encryption (WEP) Key: If WEP is enabled, you can manually or automatically program the four data encryption keys. These values must be identical on all PCs and Access Points in your network. •Automatic Key Generation (Passphrase): Enter a word or group of printable characters in the Passphrase box and click the Generate button to automatically configure the WEP Key(s). If encryption strength is set to 64 bit, then each of the four key boxes will automatically be populated with key values. If encryption strength is set to 128 bit, then only the selected WEP key box will automatically be populated with key values. •Manual Entry Mode: Select which of the four keys will be used and enter the matching WEP key information for your network in the selected key box. For 64 bit WEP: Enter ten hexadecimal digits (any combination of 0-9, A-F). For 128 bit WEP: Enter twenty-six hexadecimal digits (any combination of 0-9, A-F). –WPA-PSK (Wi-Fi Protected Access Pre-Shared Key): use WPA-PSK standard encryption •Security Encryption (WPA-PSK): Enter a word or group of printable characters in the Passphrase box. The Passphrase must be 8 to 63 characters in length.
Content Filtering4-1 202-10090-01, April 2005 Chapter 4 Content Filtering This chapter describes how to use the content filtering features of the WGT624 v3 108 Mbps Wireless Firewall Router to protect your network. These features can be found by clicking on the Content Filtering heading in the Main Menu of the browser interface. The WGT624 v3 108 Mbps Wireless Firewall Router provides you with web content filtering options, plus browsing activity reporting and instant alerts via e-mail. Parents and network administrators can establish restricted access policies based on time-of-day, web addresses and web address keywords. You can also block Internet access by applications and services, such as chat or games. Blocking Access to Internet Sites The WGT624 v3 wireless router allows you to restrict access based on web addresses and web address keywords. Up to 255 entries are supported in the Keyword list. The Block Sites menu is below: Figure 4-1: Block Sites menu
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 4-2Content Filtering 202-10090-01, April 2005 To enable keyword blocking, select either “Per Schedule” or “Always”, then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply. To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply. Keyword application examples: • If the keyword XXX is specified, the URL is blocked. • If the keyword “.com” is specified, only websites with other domain suffixes (such as .edu or .gov) can be viewed. • If you wish to block all Internet browsing access during a scheduled period, enter the keyword “.” and set the schedule in the Schedule menu. To specify a Trusted User, enter that PC’s IP address in the Trusted User box and click Apply. You may specify one Trusted User, which is a PC that will be exempt from blocking and logging. Since the Trusted User will be identified by an IP address, you should configure that PC with a fixed IP address. Blocking Access to Internet Services The WGT624 v3 wireless router allows you to block the use of certain Internet services by PCs on your network. This is called services blocking or port filtering. The Block Services menu is shown below: Figure 4-2: Block Services menu
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Content Filtering4-3 202-10090-01, April 2005 Services are functions performed by server computers at the request of client computers. For example, web servers serve web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with destination port number 80 is an HTTP (web server) request. To enable service blocking, select either Per Schedule or Always, then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To specify a service for blocking, click Add. The Add Services menu will appear, as shown below: Figure 4-3: Add Services menu From the Service Type list, select the application or service to be allowed or blocked. The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. • Configuring a User Defined Service To define a service, first you must determine which port number or range of numbers is used by the application. The service numbers for many common protocols are defined by the Internet Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of the application. This information can usually be determined by contacting the publisher of the application or from user groups of newsgroups.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 4-4Content Filtering 202-10090-01, April 2005 Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter that number in both boxes. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select Both. • Configuring Services Blocking by IP Address Range Under “Filter Services For”, you can block the specified service for a single PC, a range of PCs (having consecutive IP addresses), or all PCs on your network. Scheduling When Blocking Will Be Enforced The WGT624 v3 wireless router allows you to specify when blocking will be enforced. The Schedule menu is shown below: Figure 4-4: Schedule menu Use this check boxes on this menu to create a schedule for blocking content. Click Apply. •Days to Block. Select days to block by checking the appropriate boxes. Select Everyday to check the boxes for all days. Click Apply.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Content Filtering4-5 202-10090-01, April 2005 •Time of Day to Block. Select a start and end time in 23:59 format. Select All day for 24 hour blocking. Click Apply. Note: Be sure to select your time zone in the E-Mail menu. Configuring E-Mail Alert and Web Access Log Notifications In order to receive logs and alerts by email, you must provide your email information in the E-Mail menu, shown below: Figure 4-5: Email menu • Turn e-mail notification on Check this box if you wish to receive e-mail logs and alerts from the router. • Send to this e-mail address Enter the e-mail address to which logs and alerts are sent. This e-mail address will also be used as the From address. If you leave this box blank, log and alert messages will not be sent via e-mail.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 4-6Content Filtering 202-10090-01, April 2005 • Your outgoing mail server Enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You may be able to find this information in the configuration menu of your e-mail program. If you leave this box blank, log and alert messages will not be sent via e-mail. • My Mail Server Requires Authentication Select this checkbox and enter the user name and password for this email account, as required. You can specify that logs are automatically sent to the specified e-mail address with these options: • Send alert immediately Check this box if you would like immediate notification of attempted access to a blocked site. • Send logs according to this schedule Specifies how often to send the logs: None, Hourly, Daily, Weekly, or When Full. – Day for sending log. Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. – Time for sending log. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If the Weekly, Daily or Hourly option is selected and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, the log is cleared from the router’s memory. If the router cannot e-mail the log file, the log buffer may fill up. In this case, the router overwrites the log and discards its contents. If you dont want logs sent, select None from the list in the Send Logs According To This Schedule area. When you turn on e-mail notification and choose None in the Send Logs According to this Schedule list, the alert is sent but not the log. The WGT624 v3 wireless router uses the Network Time Protocol (NTP) to obtain the current time and date from one of several Network Time Servers on the Internet. In order to localize the time for your log entries, you must specify your Time Zone: • Time Zone. Select your local time zone. This setting will be used for the blocking schedule and for time-stamping log entries. • Daylight Savings Time. Check this box to automatically adjust for daylight savings time. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of what websites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User. An example is shown below: