Page 51 / 212 Scroll up to view Page 46 - 50
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Basic Installation and Configuration
2-21
v1.0, April 2007
Table 2-2.
Traffic Meter Parameters
Parameter
Description
Enable Traffic Meter
Check this if you wish to record the volume of Internet traffic passing
through the Router's WAN1 or WAN2 port.WAN1 or WAN2 can be selected
through the drop down menu, the entire configuration is specific to each
wan interface.
No Limit - If this is selected specified restriction will not be applied when
traffic limit is reached.
Download only - If this is selected the specified restriction will be applied
to the incoming traffic only
Both Directions - If this is selected the specified restriction will be applied
to both incoming and outgoing traffic only
Enable Monthly Limit
Use this if your ISP charges for additional traffic. If enabled, enter the
monthly volume limit and select the desired behavior when the limit is
reached.
Note
: Both incoming and outgoing traffic are included in the limit.
Increase this month's limit
Use this to temporarily increase the Traffic Limit if you have reached the
monthly limit, but need to continue accessing the Internet. Check the
checkbox and enter the desired increase. (The checkbox will automatically
be cleared when saved so the increase is only applied once.)
This month's limit
This displays the limit for the current month.
Restart traffic counter
This determines when the traffic counter restarts. Choose the desired time
and day of the month.
Restart Counter Now
Click this button to restart the Traffic Counter immediately.
Send E-mail Report before
restarting counter
If checked, an E-mail report will be sent immediately before restarting the
counter. You must configure the E-mail screen in order for this function to
work (see
“Event Logs and Alerts” on page 4-32
).
When limit is reached
Select the desired option:
Block all traffic - all access to and from the Internet will be blocked.
Block all traffic except E-mail - Only E-mail traffic will be allowed. All other
traffic will be blocked.
If using this option, you may also select the Send E-mail alert option. You
must configure the E-mail screen in order for this function to work.
Internet Traffic Statistics
This displays statistics on Internet Traffic via the WAN port. If you have not
enabled the Traffic Meter, these statistics are not available.
Traffic by Protocol
Click this button if you want to know more details of the Internet Traffic. The
volume of traffic for each protocol will be displayed in a sub-window.Traffic
counters are updated in MBytes scale, counter starts only when traffic
passed is at least 1MB.
Page 52 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
2-22
Basic Installation and Configuration
v1.0, April 2007
To Program the Traffic Meter (if desired):
1.
Select Monitoring from the main menu and Traffic Meter from the submenu. The default
ADSL screen shown in
Figure 2-12
will display.
2.
Fill in the fields from the descriptions in
Table 2-2
.
3.
Click
Apply
to save your settings.
4.
Click
Traffic by Protocol
to view the traffic details for each interface.
You can also choose to monitor both interfaces since the configuration is specific to each
connected WAN interface.
5.
Click
Apply
to save your settings
.
6.
Select the WAN Ethernet Traffic Meter tab and repeat the process to program the WAN
Ethernet Traffic Meter (if applicable).
7.
Click
Apply
to save your settings.
Page 53 / 212
Wireless Configuration
3-1
v1.0, April 2007
Chapter 3
Wireless Configuration
This chapter describes how to configure the wireless features of your ProSafe DGFV338.
In planning your wireless network, you should consider the level of security required. You should
also select the physical placement of your DGFV338 in order to maximize the network speed (see
Chapter 2, “Basic Installation and Configuration”
). For further information on wireless
networking, refer to
Appendix B, “Related Documents
for a link to resource material on the
NETGEAR website.
Implementing Wireless Security
Be aware that the time it takes to establish a wireless connection can vary depending on both your
security settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook computer.
Note:
Failure to follow these guidelines can result in significant performance degradation
or inability to wirelessly connect to the wireless firewall. For complete range and
performance specifications, please see
Appendix A, “Default Settings and
Technical Specifications
.”
Note:
Indoors, computers can connect to wireless networks at ranges of 300 feet or more.
Such distances allow others outside of your area to access your network.
Page 54 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
3-2
Wireless Configuration
v1.0, April 2007
Unlike wired network data, your wireless data transmissions can extend beyond your walls and
can be received by anyone with a compatible adapter. For this reason, use the security features of
your wireless equipment. The wireless firewall provides highly effective security features which
are covered in detail in this chapter.
There are several ways you can enhance the security of your wireless network:
Restrict Access Based on MAC Address.
You can allow only trusted PCs to connect so that
unknown PCs cannot wirelessly connect to the DGFV338. Restricting access by MAC address
adds an obstacle against unwanted access to your network, but the data broadcast over the
wireless link is fully exposed.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies wireless network
“discovery” feature of some products, such as Windows XP, but the data is still exposed.
WEP.
Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared
Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
WPA/WPA2 with RADIUS or WPA/WPA2-PSK.
Wi-Fi Protected Access (WPA and
WPA2) data encryption provides data security. The very strong authentication along with
dynamic per frame rekeying of WPA and WPA2 make it virtually impossible to compromise.
Because this is a new standard, wireless device driver and software availability may be
limited.
Figure 3-1
1) .O 3ECURITY:
%ASY BUT NO SECURITY
2) -!# !CCESS ,IST:
.O DATA SECURITY
4) 7%0:
3ECURITY BUT SOME PERFORMANCE
IMPACT
5) 70!/70!2 OR 70!/70!2603+:
8ERY
STRONG SECURITY
############:LUHOHVV#'DWD#
##########6HFXULW\#2SWLRQV
5DGLXV=#8S#WR#633#)HHW#
+Á¡.?wjËoåÔ±¤¤~Ë8¢Áj£j ÄË4¢ÁjÝ? £Ê+Á¢¥ÍË.jÁÜjÁ
)Á¡?aM?¥a
485 ¤|+
DGFV338
Page 55 / 212
DGFV338 ProSafe Wireless ADSL Modem VPN Firewall Router Reference Manual
Wireless Configuration
3-3
v1.0, April 2007
Understanding Wireless Settings
Before configuring your wireless settings, you may want to review the Wireless Settings choices to
determine what type of security is required for your wireless LAN network and to gather any
security information that may be required. A description of the various types of security available
on the wireless firewall, as well as a description of the other wireless settings you will be prompted
to make follows.
The Wireless Settings menu is divided into two basic sections: (1) Wireless Networks and Wireless
Access Point which deals with setting up the proper stations, channels, and regions for your
wireless device; as well as setting up the appropriate broadcast method, and (2) Wireless Security
Type which deals with setting up the security on each of your LANs.
Figure 3-2

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top