Page 41 / 90 Scroll up to view Page 36 - 40
Wireless Cable Modem Gateway CGD24G User Manual
Wireless Configuration
2-17
v1.1, May 2009
How to Configure Wireless Security for a Wireless Guest Network
After you have completed
step 5
in the previous section, the screen expands and the security
options for the guest network display.
Wireless security is disabled by default. NETGEAR strongly recommends that you implement
wireless security for the guest network.
To configure wireless security for the guest network that you selected, enter the security options,
and then click
Apply
to save your changes. This process is very similar to configuring wireless
security for the gateway. For more information, see
“Configuring WEP (Wired Equivalent
Privacy) Wireless Security” on page 2-6
and
“Configuring WPA or WPA2 Wireless Security” on
page 2-8
.
Note:
To restore all guest network settings, including the wireless security settings, to
their default settings, click
Restore Guest Network Settings
.
Figure 2-9
Page 42 / 90
Wireless Cable Modem Gateway CGD24G User Manual
2-18
Wireless Configuration
v1.1, May 2009
Configuring Wi-Fi Multimedia
Wi-Fi Multimedia (WMM), also referred to as Wireless Multimedia, is a subset of the 802.11e
standard. WMM allows wireless traffic to have a range of priorities, depending on the kind of data.
Time-dependent information, like video, audio, or voice will have a higher priority than normal
traffic.With WMM you can configure quality of service (QoS) to prioritize multimedia traffic in
four access categories: voice, video, best effort, and background. For WMM to function correctly,
wireless clients must also support WMM.
To configure WMM:
1.
Log in to the gateway using its default address of
or at whatever IP address
the unit is currently configured. Use the default user name of
admin
and default password of
password
, or the password you have set up.
2.
In the main menu, under Setup, select
Wi-Fi Multimedea
. The Wi-Fi Multimedia (WMM)
screen displays.
3.
Configure the following WMM settings:
WMM Support
. Select the WMM mode:
On
. WMM is enabled
Off
. WMM is disabled.
No-Acknowledgement
. When the wireless communication quality is good, you do not
need an acknowledgement message (ACK) to confirm the reception of a packet. Disabling
acknowledgement messages might improve the efficiency of packet transmission. When
the wireless communication quality is poor, enable acknowledgement messages so that
you are notified when a package is lost.
On
. Acknowledgement messages are enabled.
Figure 2-10
Page 43 / 90
Wireless Cable Modem Gateway CGD24G User Manual
Wireless Configuration
2-19
v1.1, May 2009
Off
. Acknowledgement messages are disabled.
Power Save Support
. Select the power save mode to conserve battery power in smaller
devices that are connected to the gateway:
On
. Power save support is enabled.
Off
. Power save support is disabled.
4.
Click
Apply
to save your settings.
Turning on Access Control to Restrict Access by MAC
Address
By default, any wireless PC that is configured with the correct SSID and WEP/WPA settings will
be allowed to access to your wireless network. For increased security, you can restrict access to the
wireless network to only allow specific PCs based on their MAC addresses.
You can restrict access to only trusted PCs so that unknown PCs cannot wirelessly connect to the
CGD24G gateway. MAC address filtering adds an obstacle against unwanted access to your
network, but the data broadcast over the wireless link is fully exposed.
To restrict access based on MAC addresses:
1.
Log in to the gateway using its default address of
or at whatever IP address
the unit is currently configured. Use the default user name of
admin
and default password of
password
, or the password you have set up.
2.
In the main menu, under Setup, select
Wireless Settings
. In the Wireless Settings screen,
select the
Turn Access Control On
check box (see
Figure 2-11 on page 2-20
).
3.
When you enable access control, the access point only accepts connections from clients on the
selected access control list. This provides an additional layer of security.
4.
Click the
Setup Access List
button to display the Wireless Card Access List screen.
Note:
If you are configuring the gateway from a wireless computer, make sure to add
your computer’s MAC address to the Access List. Otherwise you will lose your
wireless connection when you click Apply. You must then access the gateway
from a wired computer, or from a wireless computer that is on the access
control list, to make any further changes.
Page 44 / 90
Wireless Cable Modem Gateway CGD24G User Manual
2-20
Wireless Configuration
v1.1, May 2009
By default, the Access List table is empty. You must add wireless clients so that they will have
access to the wireless network when the list is enabled.
5.
Adjust the access list as needed for your network. You can add devices to the access list using
either one of the following methods:
If the computer is in the Connected Wireless Devices table, click the radio button of that
computer to capture its MAC address. Then click
Add
.
Enter the MAC address of the device to be added in the
Add Access Filter
fields. The
MAC address can usually be found on the bottom of the wireless device. Then click
Add
.
6.
Click
Apply
to save these settings. Now, only devices in the Access List table will be allowed
to wirelessly connect to the gateway.
Figure 2-11
Note:
If no Device Name appears when you enter the MAC address, you can type a
descriptive name for the computer that you are adding.
Page 45 / 90
3-1
v1.1, May 2009
Chapter 3
Content Filtering and Firewall Rules
This chapter describes how to use content filtering and firewall rules for the gateway.
This chapter includes:
“Configuring Logs
” on this page
“Blocking Keywords, Sites, and Services” on page 3-2
“Firewall Rules—Port Forwarding and Port Blocking” on page 3-5
Configuring Logs
A log is a detailed record of the Denial of Service (DoS) attacks directed at your network. You can
use e-mail notification to receive these logs in an e-mail message. If you do not have e-mail
notification set up you can connect to the gateway to view the logs.
To receive logs by e-mail:
1.
In the main menu, under Content Filtering, select
Logs
. The Logs screen displays.
Note:
Log in to the gateway using its default address of
or at whatever
IP address the unit is currently configured. To access the content filtering features
you must log in to the gateway with the
mso
user name and its default password
changeme
, or whatever new password you have set up.
Figure 3-1

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top