Page 6 / 268 Scroll up to view Page 1 - 5
202-10006-05, June 2005
vi
Contents
Where Do I Get the Internet Configuration Parameters?
.........................................
3-3
Record Your Internet Connection Information
..........................................................
3-3
Connecting the DG834G to Your LAN
............................................................................
3-5
How to Connect the Router
......................................................................................
3-5
Auto-Detecting Your Internet Connection Type
..............................................................
3-9
Wizard-Detected PPPoE Login Account Setup
......................................................
3-10
Wizard-Detected PPPoA Login Account Setup
......................................................
3-11
Wizard-Detected Dynamic IP Account Setup
.........................................................
3-11
Wizard-Detected IP Over ATM Account Setup
......................................................
3-12
Wizard-Detected Fixed IP (Static) Account Setup
..................................................
3-13
Testing Your Internet Connection
..................................................................................
3-14
Manually Configuring Your Internet Connection
...........................................................
3-14
How to Perform Manual Configuration
...................................................................
3-15
Internet Connection Requires Login and Uses PPPoE
...................................
3-16
Internet Connection Requires Login and Uses PPPoA
...................................
3-17
Internet Connection Does Note Require A Login
............................................
3-18
ADSL Settings
........................................................................................................
3-19
Chapter 4
Wireless Configuration
Considerations for a Wireless Network
..........................................................................
4-1
Observe Performance, Placement, and Range Guidelines
.....................................
4-1
Implement Appropriate Wireless Security
................................................................
4-2
Understanding Wireless Settings
...................................................................................
4-3
How to Set Up and Test Basic Wireless Connectivity
..............................................
4-7
How to Restricting Wireless Access to Your Network
..............................................
4-8
Restricting Access to Your Network by Turning Off Wireless Connectivity
........
4-9
Restricting Wireless Access Based on the Wireless Network Name (SSID)
.....
4-9
Restricting Wireless Access Based on the Wireless Station Access List
..........
4-9
Choosing WEP Authentication and Security Encryption Methods
.........................
4-11
Authentication Type Selection
.........................................................................
4-11
Encryption Choices
..........................................................................................
4-12
How to Configure WEP
..........................................................................................
4-13
How to Configure WPA-PSK
..................................................................................
4-14
Page 7 / 268
Contents
vii
202-10006-05, June 2005
Chapter 5
Protecting Your Network
Protecting Access to Your DG834G Wireless ADSL Firewall Router
.............................
5-1
How to Change the Built-In Password
.....................................................................
5-1
Changing the Administrator Login Timeout
..............................................................
5-2
Configuring Basic Firewall Services
...............................................................................
5-2
Blocking Keywords, Sites, and Services
..................................................................
5-3
How to Block Keywords and Sites
...........................................................................
5-3
Firewall Rules
.................................................................................................................
5-5
Inbound Rules (Port Forwarding)
.............................................................................
5-6
Inbound Rule Example: A Local Public Web Server
..........................................
5-6
Inbound Rule Example: Allowing Videoconferencing
........................................
5-8
Considerations for Inbound Rules
.....................................................................
5-8
Outbound Rules (Service Blocking)
.........................................................................
5-9
Outbound Rule Example: Blocking Instant Messenger
.....................................
5-9
Order of Precedence for Rules
..............................................................................
5-11
Services
........................................................................................................................
5-12
How to Define Services
..........................................................................................
5-12
Setting Times and Scheduling Firewall Services
..........................................................
5-13
How to Set Your Time Zone
...................................................................................
5-13
How to Schedule Firewall Services
........................................................................
5-14
Chapter 6
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings
...........................................................
6-1
How to Back Up the Configuration to a File
.............................................................
6-1
How to Restore the Configuration from a File
..........................................................
6-2
How to Erase the Configuration
...............................................................................
6-2
Upgrading the Router’s Firmware
...................................................................................
6-2
How to Upgrade the Router Firmware
.....................................................................
6-3
Network Management Information
.................................................................................
6-4
Viewing Router Status and Usage Statistics
............................................................
6-4
Viewing Attached Devices
........................................................................................
6-9
Viewing, Selecting, and Saving Logged Information
................................................
6-9
Selecting What Information to Log
..................................................................
6-11
Saving Log Files on a Server
..........................................................................
6-12
Page 8 / 268
202-10006-05, June 2005
viii
Contents
Examples of Log Messages
...................................................................................
6-12
Activation and Administration
..........................................................................
6-12
Dropped Packets
.............................................................................................
6-12
Enabling Security Event E-mail Notification
.................................................................
6-13
Running Diagnostic Utilities and Rebooting the Router
................................................
6-14
Enabling Remote Management
....................................................................................
6-15
Configuring Remote Management
.........................................................................
6-15
Chapter 7
Advanced Configuration
Configuring Advanced Security
......................................................................................
7-1
Setting Up A Default DMZ Server
............................................................................
7-1
How to Configure a Default DMZ Server
...........................................................
7-2
Connect Automatically, as Required
........................................................................
7-3
Disable Port Scan and DOS Protection
...................................................................
7-3
Respond to Ping on Internet WAN Port
...................................................................
7-3
MTU Size
.................................................................................................................
7-3
Configuring LAN IP Settings
...........................................................................................
7-3
DHCP
.......................................................................................................................
7-5
Use Router as DHCP server
.............................................................................
7-5
Reserved IP addresses
.....................................................................................
7-6
How to Configure LAN TCP/IP Settings
...................................................................
7-7
Configuring Dynamic DNS
.......................................................................................
7-7
How to Configure Dynamic DNS
..............................................................................
7-8
Using Static Routes
........................................................................................................
7-9
Static Route Example
...............................................................................................
7-9
How to Configure Static Routes
.............................................................................
7-10
Universal Plug and Play (UPnP)
...................................................................................
7-12
Chapter 8
Virtual Private Networking (Advanced Feature)
Overview of VPN Configuration
......................................................................................
8-2
Client-to-Gateway VPN Tunnels
..............................................................................
8-2
Gateway-to-Gateway VPN Tunnels
.........................................................................
8-2
Planning a VPN
..............................................................................................................
8-3
VPN Tunnel Configuration
..............................................................................................
8-6
How to Set Up a Client-to-Gateway VPN Configuration
.................................................
8-6
Page 9 / 268
Contents
ix
202-10006-05, June 2005
Step 1: Configuring the Client-to-Gateway VPN Tunnel on the DG834G
................
8-7
Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC
.........
8-12
How to Set Up a Gateway-to-Gateway VPN Configuration
..........................................
8-20
VPN Tunnel Control
......................................................................................................
8-27
Activating a VPN Tunnel
........................................................................................
8-27
Using the VPN Status Page to Activate a VPN Tunnel
....................................
8-27
Activate the VPN Tunnel by Pinging the Remote Endpoint
.............................
8-28
Start Using a VPN Tunnel to Active It
..............................................................
8-30
Verifying the Status of a VPN Tunnel
.....................................................................
8-30
Deactivating a VPN Tunnel
....................................................................................
8-32
Using the Policy Table on the VPN Policies Page to Deactivate a VPN Tunnel 8-32
Using the VPN Status Page to Deactivate a VPN Tunnel
...............................
8-33
Deleting a VPN Tunnel
...........................................................................................
8-35
How to Set Up VPN Tunnels in Special Circumstances
...............................................
8-35
Using Auto Policy to Configure VPN Tunnels
........................................................
8-36
Configuring VPN Network Connection Parameters
.........................................
8-36
Example of Using Auto Policy
.........................................................................
8-41
Using Manual Policy to Configure VPN Tunnels
....................................................
8-48
Chapter 9
Troubleshooting
Basic Functioning
...........................................................................................................
9-1
Power LED Not On
...................................................................................................
9-2
Test LED Never Turns On or Test LED Stays On
.....................................................
9-2
LAN or WAN Port LEDs Not On
...............................................................................
9-2
Troubleshooting the Web Configuration Interface
..........................................................
9-3
Troubleshooting the ISP Connection
..............................................................................
9-4
ADSL link
.................................................................................................................
9-4
WAN LED Blinking Yellow
..................................................................................
9-4
WAN LED Off
.....................................................................................................
9-4
Obtaining a WAN IP Address
...................................................................................
9-5
Troubleshooting PPPoE or PPPoA
..........................................................................
9-6
Troubleshooting Internet Browsing
..........................................................................
9-6
Troubleshooting a TCP/IP Network Using the Ping Utility
..............................................
9-7
Testing the LAN Path to Your Router
.......................................................................
9-7
Testing the Path from Your Computer to a Remote Device
.....................................
9-8
Page 10 / 268
202-10006-05, June 2005
x
Contents
Restoring the Default Configuration and Password
........................................................
9-9
Using the Reset button
.............................................................................................
9-9
Problems with Date and Time
.........................................................................................
9-9
Appendix A
Technical Specifications
Appendix B
Network and Routing Basics
Related Publications
......................................................................................................
B-1
Basic Router Concepts
..................................................................................................
B-1
What is a Router?
...................................................................................................
B-1
Routing Information Protocol
...................................................................................
B-2
IP Addresses and the Internet
.................................................................................
B-2
Netmask
..................................................................................................................
B-4
Subnet Addressing
..................................................................................................
B-4
Private IP Addresses
...............................................................................................
B-7
Single IP Address Operation Using NAT
.................................................................
B-7
MAC Addresses and Address Resolution Protocol
.................................................
B-8
Related Documents
.................................................................................................
B-9
Domain Name Server
..............................................................................................
B-9
IP Configuration by DHCP
......................................................................................
B-9
Internet Security and Firewalls
....................................................................................
B-10
What is a Firewall?
................................................................................................
B-10
Stateful Packet Inspection
.....................................................................................
B-10
Denial of Service Attack
.........................................................................................
B-11
Ethernet Cabling
...........................................................................................................
B-11
Category 5 Cable Quality
.......................................................................................
B-11
Inside Twisted Pair Cables
....................................................................................
B-12
Uplink Switches, Crossover Cables, and MDI/MDIX Switching
............................
B-13
Appendix C
Preparing Your Network
Preparing Your Computers for TCP/IP Networking
.......................................................
C-1
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
C-2
Installing or Verifying Windows Networking Components
.......................................
C-2
Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me
C-4
Selecting the Windows’ Internet Access Method
....................................................
C-6

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top