Netgear Wireless N 150 Router Wnr612 User Guide
Have a look at the manual Netgear Wireless N 150 Router Wnr612 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Chapter 2: Wireless Configuration | 21 Wireless-N 150 Router WNR612v2 User Manual Adding Wireless Computers That Do Not Support WPS If you set up your network with WPS, and now you want to add a computer that does not support WPS, you must manually configure that computer. For information about how to view the wireless settings for the router, see Manually Configuring Your Wireless Settings on page 14. Because WPA randomly creates the SSID and WPA/WPA2 keys, they might be difficult to type or remember (that is one reason why the network is so secure). You can change the wireless settings so that they are easier for you to remember. If you do that, then you will need to set up the WPS-compatible computers again. Changing wireless settings for the network: Note: Making these changes will cause all wireless computers to be disconnected from network. You will then have to set them up with the new wireless settings. 1. Use an Ethernet cable to connect a computer to the router. That way you will not get disconnected when you change the wireless settings. 2. Log in to the router and select Wireless Settings (see Manually Configuring Your Wireless Settings on page 14). 3. Make the following changes: • Change the wireless network name (SSID) to a meaningful name. • On the WPA/PSK + WPA2/PSK screen, select a passphrase. • Make sure that the Keep Wireless Settings check box is selected in the WPS Settings screen so that your new settings will not be erased if you use WPS. 4. Click Apply so that your changes take effect. Write down your settings. All wireless clients are disassociated and disconnected from the wireless router. 5. For the non-WPS devices that you want to connect, open the networking utility and follow the utility’s instructions to enter the security settings that you selected in Step 3 (the SSID, WPA/PSK + WPA2/PSK security method, and passphrase). 6. For the WPS devices that you want to connect, follow the procedure in WPS Button on page 19 or WPS PIN Entry on page 20. The settings that you configured in Step 3 are broadcast to the WPS devices so that they can connect to the wireless router. Wireless Guest Networks A wireless guest network allows you to provide guests access to your wireless network without prior authorization of each individual guest. You can configure wireless guest networks and specify the security options for each wireless guest network.
22 | Chapter 2: Wireless Configuration Wireless-N 150 Router WNR612v2 User Manual To configure a wireless guest network: 1. In the main menu, under Setup, select Wireless Settings. 2. Select any of the following Wireless settings: • Enable Guest Network – When this check box is selected, the guest network is enabled, and guests can connect to your network using the SSID of this p\ rofile. • Enable SSID Broadcast – If selected, the Wireless Access Point broadcasts its name (SSID) to all Wireless Stations. Stations can adopt the correct SSID f\ or connections to this Access Point. • Allow Guest to access MY Local Network – If selected any user who connects to this SSID can access local networks associated with the router like user\ s in the primary SSID. 3. Give the wireless network a name. The name is case-sensitive and can be up to 32 characters. The same name\ must be assigned to all wireless devices in your network. NETGEAR recommends tha\ t you change the name to a different value. 4. Select a Security option from the list. 5. Click Apply to save your selections. Advanced Wireless Settings This section describes the wireless settings that you can view and speci\ fy in the Advanced Wireless Settings screen, which you access under Advanced in the main me\ nu. To configure the advanced wireless security settings: 1. Log in to the router as described in Logging In to Your Wireless Router on page 7.
Chapter 2: Wireless Configuration | 23 Wireless-N 150 Router WNR612v2 User Manual 2. Select Wireless Settings under Advanced in the main menu. The advanced W\ ireless Settings screen displays: The available settings in this screen are: • Enable Wireless Router Radio. If you disable the wireless router radio, wireless devices cannot connect to the wireless router. If you will not be using \ your wireless network for a period of time, you can clear this check box and disable a\ ll wireless connectivity. • Fragmentation Length, CTS/RTS Threshold, and Preamble Mode. The Fragmentation Length, CTS/RTS Threshold, and Preamble Mode options are reserved for wireless testing and advanced configuration only. Do not ch\ ange these settings. • Transmit Power Control. There are four different settings for transmit power control: 100% (the default), 75%, 50%, and 25%. • WPS Settings . For information about these settings, see Using Push N Connect (WPS) to Configure Your Wireless Network on page 18. • Wireless Card Access List . For information about this list, see Restricting Wireless Access by MAC Address on page 24. . Advanced WPS Settings On the Advanced Wireless Setting screen, these WPS Settings are availabl\ e: • Router’s PIN . The PIN is displayed so that you can use it to configure the router through WPS (Wi-Fi Protected Setup). It is also displayed on the route\ r’s label. • Disable Router’s PIN. If the router’s PIN is disabled, you cannot configure the router’s wireless settings with WPS. However, if your settings are al\ ready configured, you can still add WPS-enabled wireless clients. The router might disable\ the PIN if it detects suspicious attempts to break into your wireless settings; this c\ an happen if the
24 | Chapter 2: Wireless Configuration Wireless-N 150 Router WNR612v2 User Manual check box is selected. You can enable the PIN by clearing the check box \ and clicking Apply . • Keep Existing Wireless Settings. This check box is automatically selected after WPS is enabled to prevent unwanted settings changes, and is also selecte\ d if you have already specified wireless security settings or your SSID without u\ sing WPS. When this check box is not selected, adding a new wireless client using the Add WPS Client screen (see Using Push N Connect (WPS) to Configure Your Wireless Network on page 18) changes the router’s SSID and security passphrase. You might need to clear it if you are using certain registrars, such as for a Wind\ ows Vista PC, to configure the router through WPS. Restricting Wireless Access by MAC Address When a Wireless Card Access List is configured and enabled, the router c\ hecks the MAC address of any wireless device attempting a connection and allows only c\ onnections to computers identified on the trusted computers list. The Wireless Card Access List displays a list of wireless computers that\ you allow to connect to the router based on their MAC addresses. These wireless computers mus\ t also have the correct SSID and wireless security settings to access the wireless route\ r. The MAC address is a network device’s unique 12-character physical ad\ dress, containing the hexadecimal characters 0–9, a–f, or A–F only, and separated by \ colons (for example, 00:09:AB:CD:EF:01). It can usually be found on the bottom of the wirele\ ss card or network interface device. If you do not have access to the physical label, you c\ an display the MAC address using the network configuration utilities of the computer. In Wi\ ndowsXP, for example, typing the ipconfig/all command in an MSDOS command prompt window displays the MAC address as Physical Address. You might also find the MAC addresses i\ n the router’s Attached Devices screen. To restrict access based on MAC addresses: 1. Select Wireless Settings under Advanced in the main menu. 2. In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless Card Access List. 3. Click Add to add a wireless device to the wireless access control list. The Wirel\ ess Card Access Setup screen opens and displays a list of currently active wirele\ ss cards and their Ethernet MAC addresses.
Chapter 2: Wireless Configuration | 25 Wireless-N 150 Router WNR612v2 User Manual 4. If the computer you want appears in the Available Wireless Cards list, y\ ou can select the radio button of that computer to capture its MAC address; otherwise, you\ can manually enter a name and the MAC address of the authorized computer. You can usually f\ ind the MAC address on the bottom of the wireless device. Tip: You can copy and paste the MAC addresses from the router’s Attached Devices screen into the MAC Address field of this screen. To do this, configure each wireless computer to obtain a wireless link to the router\ . The computer should then appear in the Attached Devices screen. 5. Click Add to add this wireless device to the Wireless Card Access List. The scree\ n changes back to the list screen. 6. Repeat step 3 through step 5 for each additional device you want to add to the list. 7. Select the Turn Access Control On check box. Note: If you connected wirelessly to the router, make sure your computer is on the access control list before you select Turn Access Control On, and click Apply . Otherwise, you will be disconnected and will have to use another computer that is on the access control list to log in to the router. 8. Click Apply to save your Wireless Card Access List settings. Now, only devices on this list can wirelessly connect to the wireless ro\ uter. Tip: MAC address filtering adds an obstacle against unwanted access to your network, but NETGEAR recommends that you also use wireless security. Without wireless security, your trusted MAC addresses appear in your wireless transmissions, an intruder can read them and impersonate them.
Chapter 3: Protecting Your Network | 26 3. Protecting Your Network 3 This chapter describes how to use the content filtering and reporting fe\ atures of the wireless router to protect your network. This chapter includes the following sections: • Blocking Access to Internet Sites on page 27 • Blocking Access to Internet Services on page 28 • Scheduling Blocking on page 30 • Viewing Logs of Web Access or Attempted Web Access on page 30 • Email Alerts and Web Access Log Notifications on page 31
Chapter 3: Protecting Your Network | 27 Wireless-N 150 Router WNR612v2 User Manual Protecting Access to Your Wireless Router For security reasons, the wireless router has its own user name and pass\ word. Also, after a period of inactivity for a set length of time, the login automatically d\ isconnects. You can use the following procedures to change the wireless router’s password and\ the period for the administrator’s login time-out. Note: The user name and password are not the same as any other user name or password your might use to log in to your Internet connection. NETGEAR recommends that you change this password to a more secure passwo\ rd. The ideal password should contain no dictionary words from any language, and\ should be a mixture of both upper case and lower case letters, numbers, and symbols.\ Your password can be up to 30 characters. Changing the Administrator Password 1. In the main menu, under Maintenance, select Set Password. 2. To change the password, first enter the old password, and then enter the new password twice. 3. Click Apply to save your changes. Note: After changing the password, you are required to log in again to continue the configuration. If you have backed up the wireless router settings previously, you should do a new b\ ackup so that the saved settings file includes the new password. Blocking Access to Internet Sites The Wireless-N 150 Router WNR612v2 allows you to restrict access based o\ n Web addresses and Web address keywords. Up to 255 entries are supported in t\ he Keyword list. Keyword application examples: • If the keyword XXX is specified, the URL www.zzzyyqq.com/xxx.html is blocked. • If the keyword .com is specified, only websites with other domain suffixes (such as .edu, \ .org, or .gov) can be viewed.
28 | Chapter 3: Protecting Your Network Wireless-N 150 Router WNR612v2 User Manual To block access to Internet sites: 1. Select Block Sites under Content Filtering in the main menu. The Block Sites screen displays. 2. Enable keyword blocking by selecting either Per Schedule or Always. To block by schedule, be sure to specify a time period in the Schedule screen. For information about scheduling, see Scheduling Blocking on page 30. Block all access to Internet browsing during a scheduled period by entering a dot (.) as the keyword, and then set a schedule in the Schedule screen. 3. Add a keyword or domain by entering it in the keyword field and clicking Add Keyword. The keyword or domain name then appears the Block sites containing these keywords or domain names list. Delete a keyword or domain name by selecting it from the list and clicki\ ng Delete Keyword. 4. You can specify one trusted user, which is a computer that is exempt fro\ m blocking and logging. Specify a trusted user by entering that computer’s IP addres\ s in the Trusted IP Address fields. Since the trusted user is identified by IP address, you should configure\ that computer with a fixed IP address. 5. Click Apply to save all your settings in the Block Sites screen. Blocking Access to Internet Services The wireless router allows you to block computers on your network from u\ sing Internet services that you specify. This is called service blocking or port filte\ ring. Services are performed by server computers at the request of client computers. For ex\ ample, Web servers serve Web pages, time servers serve time and date information, and game \ hosts serve data about other players’ moves. When a computer on your network requests \ a service from a server computer on the Internet, it is identified by a service number or\ port number. This number appears as the destination port number in the transmitted IP pack\ ets. For example, a packet with destination port number 80 is an HTTP (Web server) request\ .
Chapter 3: Protecting Your Network | 29 Wireless-N 150 Router WNR612v2 User Manual To block access to Internet services: 1. Select Block Services under Content Filtering in the main menu. The Block Services screen displays. 2. In the Services Blocking section of the screen, select either the Per Schedule or Always radio button, and then click Apply. To block by schedule, be sure to specify a time period in the Schedule screen (see Scheduling Blocking on page 30.) To add Internet services you want to block: 1. On the Block Services screen, click Add. 2. The Block Services Setup screen displays. 3. From the Service Type list, select the application or service to be allowed or blocked. 4. To add a service or application to the Service Type list, select User Defined . • Find out which port number or range of numbers the application uses (these numbers often fall within the range 1024 to 65535). You can check the Internet Engineering Task Force (IETF) RFC1700, “Assigned Numbers,” or contact the publisher of the application, or user groups. • Enter the starting port and ending port numbers. If the application uses a single port number, enter that number in both fields. • If you know that the application uses either TCP or UDP, select the appr\ opriate protocol. If you are not sure, select Both. 5. Select the radio button for the IP address configuration you want to blo\ ck, and then enter the IP addresses in the appropriate fields. 6. Click Add to enable your Block Services Setup selections. Blocking Services by IP Address Range In the Filter Services For area, you can block the specified service for\ a single computer, a range of computers (having consecutive IP addresses), or all computers\ on your network.
30 | Chapter 3: Protecting Your Network Wireless-N 150 Router WNR612v2 User Manual Scheduling Blocking The wireless router allows you to specify when blocking is enforced. To schedule blocking: 1. Select Schedule under Content Filtering in the main menu. The Schedule screen displays. 2. Configure the schedule for blocking keywords and services. a. Days to Block . Select days on which you want to apply blocking by selecting the appropriate check boxes. Select Every Day to select the check boxes for all days. Click Apply . b. Time of Day to Block . Select a start and end time in 24-hour format. Select All Day for 24-hour blocking. Click Apply . c. Time Zone. To verify and set the time zone: • Time Zone. To select your local time zone, use the drop-down list. This setting is used for the blocking schedule and for time-stamping log\ entries. • Automatically Adjust for Daylight Savings Time. If your region supports daylight savings time, select this check box. The router will automatica\ lly adjust the time at the start and end of the daylight savings time period. 3. Click Apply to save your settings. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of the websites you have accessed or attemp\ ted to access. Up to 128 entries are stored in the log. Log entries appear only when keyword bloc\ king is enabled and no log entries are made for the trusted user.