Page 31 / 94
Scroll up to view Page 26 - 30
54Mbps Wireless Router Model KWGR614 Reference Manual
Wireless Configuration
2-13
v1.2, September 2006
•
Automatic—enter a word or group of printable characters in the Passphrase box and click
the
Generate
button. The passphrase is case sensitive; NETGEAR is not the same as
nETgear. The four key boxes are automatically populated with key values.
•
Manual—enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F). These entries
are not case sensitive; AA is the same as aa.
Select which of the four keys to activate.
Please see
“Wireless Communications” in Appendix B
for a full explanation of each of these
options, as defined by the IEEE 802.11 wireless communication standard.
6.
Click
Apply
to save your settings.
How to Configure WPA-PSK or WPA2-PSK Wireless Security
To configure WPA-PSK, follow these steps:
Note:
Not all wireless adapters support WPA. Furthermore, client software is also
required. Windows XP and Windows 2000 with Service Pack 3 do include WPA
support. Nevertheless, the wireless adapter hardware and driver must also support
WPA. For instructions on configuring wireless computers or PDAs (Personal
Digital Assistants) for WPA-PSK security, consult the documentation for the
product you are using.
Page 32 / 94
54Mbps Wireless Router Model KWGR614 Reference Manual
2-14
Wireless Configuration
v1.2, September 2006
1.
Click
Wireless Settings
in the Setup section of the main menu and select one of the WPA-
PSK or WPA2-PSK options for the Security Type. The third option (
WPA/WPA2-PSK
is the
most flexible, since it allows clients using either WPA-PSK or WPA2-PSK.
2.
In the Security Encryption section, select an encryption method. You have a choice between
TKIP
,
AES
, and
AUTO
. TKIP (Temporal Key Integrity Protocol) scrambles the encryption
keys using a hashing algorithm and uses integrity checking to ensure that the keys are not
tampered with. TKIP was introduced with WPA-PSK. AES (Advanced Encryption Standard)
was adopted by the National Institute of Standards and Technology on May 26, 2002, is part of
the IEEE 802.11i standard, and is the default encryption method for WPA2-PSK. The AUTO
setting allows the wireless router to connect to wireless clients using either the TKIP or AES
encryption method.
3.
Enter a word or group of 8-63 printable characters in the Passphrase box.
Figure 2-6
Page 33 / 94
54Mbps Wireless Router Model KWGR614 Reference Manual
Wireless Configuration
2-15
v1.2, September 2006
4.
Click
Apply
to save your settings.
How to Restrict Wireless Access by MAC Address
To restrict access based on MAC addresses, follow these steps:
1.
Log in to the KWGR614 wireless router at URL
Enter the default
user name of
admin
and default password of
password
, or whatever LAN address and
password you have set up.
2.
Click
Wireless Settings
in the
Advanced
section of the main menu of the KWGR614 wireless
router.
3.
From the Wireless Settings menu, click
Setup Access List
to display the Wireless Access
menu shown below.
Note:
If you use a wireless computer to configure WPA-PSK or WPA2-PSK settings, you
will be disconnected when you click
Apply
. You must then either configure your
wireless adapter to match the wireless router WPA settings or access the wireless
router from a wired computer to make any further changes.
Note:
When configuring the wireless router from a wireless computer whose MAC
address is not in the Trusted PC list, if you select
Turn Access Control On
,
you will lose your wireless connection when you click on
Apply
. You must
then access the wireless router from a wired computer or from a wireless
computer which is on the access control list to make any further changes.
Figure 2-7
Page 34 / 94
54Mbps Wireless Router Model KWGR614 Reference Manual
2-16
Wireless Configuration
v1.2, September 2006
4.
Select the
Turn Access Control On
check box.
5.
Click
Add
to add a wireless device to the wireless access control list. The Wireless Card
Access Setup dialog displays.
6.
In the Available Wireless Cards list, either select from the list of available wireless cards the
KWGR614 wireless router has found in your area, or enter the MAC address and device name
for a device you plan to use. You can usually find the MAC address printed on the wireless
adapter.
7.
Click
Add
to add this wireless device to the Wireless Card Access List. The screen changes
back to the list screen.
8.
Repeat
step 5
to
step 7
for each additional device you wish to add to the list.
9.
Be sure to click
Apply
to save your Wireless Card Access List settings.
Now, only devices on this list will be allowed to wirelessly connect to the wireless router.
Figure 2-8
Note:
You can copy and paste the MAC addresses from the router’s Attached Devices
menu into the MAC Address box of this menu. To do this, configure each
wireless computer to obtain a wireless link to the wireless router. The
computer should then appear in the Attached Devices menu.
Page 35 / 94
3-1
v1.2, September 2006
Chapter 3
Content Filtering
This chapter describes how to use the content filtering features of the 54Mbps Wireless Router
Model KWGR614 to protect your network. These features can be found by clicking on the Content
Filtering heading in the Main Menu of the browser interface.
Content Filtering Overview
The 54Mbps Wireless Router Model KWGR614 provides you with Web content filtering options,
plus browsing activity reporting and instant alerts via e-mail. Parents and network administrators
can establish restricted access policies based on time of day, Web addresses and Web address
keywords. You can also block Internet access by applications and services, such as chat or games.
To configure these features of your router, click on the subheadings under the Content Filtering
heading in the Main Menu of the browser interface at
. The subheadings
are described below: