Netgear Router WGT624 V4 User Manual
Have a look at the manual Netgear Router WGT624 V4 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
108 Mbps Wireless Router WGT624 v4 Reference Manual Wireless Settings and Security 2-11 v1.0, May 2007 WPA-PSK or WPA2-PSK Wireless Security When you are setting up wireless security, these guidelines will help make the process simpler and easier: • Use an Ethernet cable to connect your computer to the router when you are setting up or changing wireless settings. If you are connected wirelessly and you set up the wireless security, you will lose your wireless connection when you apply the change. • Remember to note what your wireless settings are. For help keeping track of them, see “Information to Gather Before Changing the Wireless Settings” on page 2-3. Wireless Adapter Compatibility If you want to use WPA or WPA2, first make sure that the computers or devices that will connect to your router are able to use this type of wireless security. Each computer or device will need: • A configuration utility that supports WPA or WPA2 for the wireless adapter. • Client software that supports WPA or WPA2. Windows XP Service Pack 2 and Windows XP Service Pack 1 with the WPA patch do include the client software that supports WPA. • The wireless adapter hardware and driver must also support WPA or WPA2. Note: Before setting up wireless security, verify that your wireless connections are set up and working. See “Setting Up Your Wireless Connections” on page 2-2. Note: For instructions for configuring wireless computers or personal digital assistants (PDAs) for WPA-PSK, see the documentation for the product you are using.
108 Mbps Wireless Router WGT624 v4 Reference Manual 2-12 Wireless Settings and Security v1.0, May 2007 Setting Up WPA-PSK or WPA2-PSK To set up WPA-PSK or WPA2-PSK wireless security for the WGT624 v4 wireless router: 1.Click Wireless Settings in the Setup section of the main menu. 2.Select the security option that you want to use: • WPA-PSK [TKIP]. Only computers or devices that use WPA-PSK [TKIP] will be able to connect to the router. WPA2-PSK [AES] devices cannot connect. • WPA2-PSK [AES]. Only computers or devices that use WPA2-PSK [AES] will be able to connect to the router.WPA-PSK [TKIP] devices cannot connect. •WPA-PSK [TKIP] + WPA2-PSK [AES]. This option is recommended, since it is compatible with a greater number of computers and devices. 3.Enter a word or group of 8-63 printable characters in the Passphrase box. 4.Click Apply to save your settings. Figure 2-5 Tip: If you were connected wirelessly to the router, you lost the wireless connection when you clicked Apply. Now you must change the wireless security settings for your computer to match the router settings. Then you will be able to connect to the router.
108 Mbps Wireless Router WGT624 v4 Reference Manual Wireless Settings and Security 2-13 v1.0, May 2007 Restricting Wireless Access by MAC Address To restrict access based on MAC addresses: 1.Log in to the WGT624 v4 wireless router at its default LAN address of http://192.168.1.1 with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. 2.Click the Wireless Settings link in the Advanced section of the main menu. 3.From the Wireless Settings page, click Setup Access List. The Wireless Card Access Setup page opens: 4.Select the Turn Access Control On check box. Note: When configuring the wireless router from a wireless computer whose MAC address is not in the Trusted PC list, if you select Turn Access Control On, you will lose your wireless connection when you click Apply. You must then access the wireless router from a wired computer or from a wireless computer which is on the access control list to make any further changes. Figure 2-6
108 Mbps Wireless Router WGT624 v4 Reference Manual 2-14 Wireless Settings and Security v1.0, May 2007 5.Click Add to add a wireless device to the wireless access control list. The Available Wireless Cards list displays. 6.In the Available Wireless Cards list, either select from the list of cards the WGT624 v4 has found in your area, or enter the MAC address and device name for a device you plan to use. You can usually find the MAC address printed on the wireless adapter. 7.Click Add to add this wireless device to the Wireless Card Access list. The screen changes back to the list screen. Repeat these steps for each additional device you wish to add to the list. 8.Repeat steps 5-7 for each additional device you wish to add to the list. 9.Be sure to click Apply to save your wireless card access list settings. Now, only devices on this list will be allowed to wirelessly connect to the WGT624 v4. Figure 2-7 Tip: You can copy MAC addresses from the Attached Devices page, and then paste them into the MAC Address box. To do this, configure each wireless computer to obtain a wireless link to the wireless router. The computer should then appear in the Attached Devices page.
108 Mbps Wireless Router WGT624 v4 Reference Manual Wireless Settings and Security 2-15 v1.0, May 2007 Advanced Wireless Settings Log in to the WGT624 v4 wireless router at its default LAN address of http://192.168.1.1 with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. To go to advanced wireless settings, click the Wireless Settings link in the Advanced section of the main menu. The Advanced Wireless Settings page appears: •Enable Wireless Router Radio. If you disable the wireless router radio, wireless devices cannot connect to the WGT624 v4. •Enable SSID Broadcast. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. Disabling SSID broadcast nullifies the wireless network ‘discovery’ feature of some products such as Windows XP. •Enable WMM. Wi-Fi Multimedia (WMM) is a Quality of Service (QoS) feature that prioritizes wireless data packets based on four access categories: voice, video, best effort, and background. Applications without WMM and applications that do not require QoS, are assigned to the best-effort category, which receives a lower priority than voice and video. To receive the benefits of WMM QoS: – The application must support WMM. – You must enable WMM in your WGT624 v4 wireless router. – You must enable WMM in the wireless adapter in your computer. Figure 2-8
108 Mbps Wireless Router WGT624 v4 Reference Manual 2-16 Wireless Settings and Security v1.0, May 2007 •Wireless Card Access List. When the Trusted PCs Only radio button is selected, the WGT624 v4 checks the MAC address of the wireless station and allows only connections to computers identified on the trusted computers list. • 108Mbps Settings. –Disable Advanced 108Mbps Features: Disables data compression, packet bursting, and large frame support. –Enable eXtended Range: Provides significantly longer range than basic 802.11, maintaining connectivity even when signals have to pass through dense walls, floors, or other barriers. XR products require no additional configuration and are fully compatible with standard 802.11 technologies. Note: If the current wireless mode is Auto 108 Mbps, then this feature cannot be changed. It is to ensure the highest throughput when in Auto 108 Mbps wireless mode. Note: The Fragmentation Threshold, CTS/RTS Threshold, and Preamble Mode options are reserved for wireless testing and advanced configuration only. Do not change these settings.
3-1 v1.0, May 2007 Chapter 3 Content Filtering This chapter describes how to use the WGT624 v4 wireless router content filtering features to protect your network. The WGT624 v4 wireless router provides you with Web content filtering options, plus browser activity reporting and instant alerts via e-mail. You can establish restricted-access policies based on time of day, Web addresses and web address keywords. You can also block Internet access by applications and services, such as chat or games. Log in to the router at its default LAN address of http://www.routerlogin.net with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. The content filtering features are on the router’s main menu. Blocking Access to Internet Sites You can restrict access based on Web addresses and web address keywords. Up to 255 entries are supported in the Keyword list. The Block Sites page is shown below: • To enable keyword blocking, select either Per Schedule or Always, and then click Apply. If you want to block by schedule, be sure that a time period is specified in the Schedule page. Figure 3-1
108 Mbps Wireless Router WGT624 v4 Reference Manual 3-2Content Filtering v1.0, May 2007 • To add a keyword or domain, type it in, click Add Keyword, and then click Apply. • To delete a keyword or domain, select it from the list, click Delete Keyword, and then click Apply. • To specify a trusted user, enter that computer’s IP address in the Trusted User box and then click Apply. You may specify one trusted user, which is a computer that will be exempt from blocking and logging. Since the trusted user will be identified by an IP address, you should configure that computer with a fixed IP address. Keyword Application Examples • If the keyword “XXX” is specified, the URL is blocked. • If the keyword “.com” is specified, only websites with other domain suffixes (such as .edu or .gov) can be viewed. • If you want to block all Internet browsing access during a scheduled period, enter the keyword “.” and set the schedule in the Schedule page. Blocking Services (Port Filtering) You can block the use of certain Internet services by computers on your network. This is called services blocking or port filtering. Services are functions performed by server computers at the request of client computers. For example, Web servers serve Web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with destination port number 80 is an HTTP (Web server) request.
108 Mbps Wireless Router WGT624 v4 Reference Manual Content Filtering3-3 v1.0, May 2007 Blocking Access to Internet Services To block access to Internet services: 1.Click Block Access to go to the Block Services page: 2.Select the Services Blocking setting that you want: •Never. Do not block services. •Per Schedule. Block services based on the schedule. Make sure that you specify a time period in the Schedule page. •Always. Always block services. 3.Click Apply. Adding a Service to be Blocked To specify a service for blocking: 1.On the Block Sites page, click Add. The Block Services Setup page appears: Figure 3-2 Figure 3-3
108 Mbps Wireless Router WGT624 v4 Reference Manual 3-4Content Filtering v1.0, May 2007 2.From the Service Type drop-down list, select the application or service to be allowed or blocked. The list displays several common services, but you are not limited to these choices. 3.To add any additional services or applications that do not already appear, select User Defined. See “Creating a User-Defined Service Type” on page 3-4. 4.You can use the Filter Services for settings to block the specified service for a single computer, a range of computers (having consecutive IP addresses), or all computers on your network. Creating a User-Defined Service Type You will need to enter the protocol, starting point, and ending point for the service type. •Protocol. If you know that the application uses either TCP or UDP, select the appropriate protocol. If you are not sure, select TCP/UDP. •Starting Point and Ending Point. Enter the starting port and ending port numbers. If the application uses a single port number, enter that number in both boxes. To define a service, you must determine which port number or range of numbers the application uses. The service numbers for many common protocols are defined by the Internet Engineering Task Force (IETF) and published in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of the application. This information can usually be determined by contacting the publisher of the application or from user groups or news groups. •Filter Services For. You can block the specified service for a single computer, a range of computers (having consecutive IP addresses), or all computers on your network.