Page 51 / 172 Scroll up to view Page 46 - 50
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Configuration
4-11
June 2004 202-10036-01
How to Configure WPA-PSK Wireless Security
Note
: Not all wireless adapters support WPA. Furthermore, client software is also required.
Windows XP and Windows 2000 with service pack 3 do include WPA support. Nevertheless, the
wireless adapter hardware and driver must also support WPA. For instructions on configuring
wireless computers or PDAs for WPA-PSK security, consult the documentation for the product
you are using.
To configure WPA-PSK, follow these steps:
1.
Click
Security Settings
in the Setup section of the main menu and select WPA-PSK for the
Security Type.
Figure 4-6: WPA Settings menu
2.
Enter a word or group of 8-63 printable characters in the Password Phrase box.
3.
Click
Apply
to save your settings.
How to Restrict Wireless Access by MAC Address
To restrict access based on MAC addresses, follow these steps:
Page 52 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
4-12
Wireless Configuration
June 2004 202-10036-01
1.
Log in to the WGR614 v5 firewall at its default LAN address of
with its default user name of
admin
and default password of
password
, or using whatever
LAN address and password you have set up.
2.
Click
Advanced Wireless Setup
in the main menu of the WGR614 v5 firewall.
3.
From the Wireless Settings menu, click
Setup Access List
to display the Wireless Access
menu shown below.
Figure 4-7:
Wireless Card Access List Setup
4.
Click
Add
to add a wireless device to the wireless access control list. The Available Wireless
Cards list displays.
Note:
When configuring the firewall from a wireless computer whose MAC address is
not in the Trusted PC list, if you select Turn Access Control On, you will lose your
wireless connection when you click on Apply. You must then access the wireless router
from a wired computer or from a wireless computer which is on the access control list to
make any further changes.
Page 53 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Configuration
4-13
June 2004 202-10036-01
5.
Click the
Turn Access Control On
check box.
6.
Then, either select from the list of available wireless cards the WGR614 v5 has found in your
area, or enter the MAC address and device name for a device you plan to use. You can usually
find the MAC address printed on the wireless adapter.
Note:
You can copy and paste the MAC addresses from the firewall’s Attached Devices menu
into the MAC Address box of this menu. To do this, configure each wireless computer to
obtain a wireless link to the firewall. The computer should then appear in the Attached
Devices menu.
7.
Click
Add
to add this wireless device to the Wireless Card Access List. The screen changes
back to the list screen. Repeat these steps for each additional device you wish to add to the list.
8.
Be sure to click
Apply
to save your wireless access control list settings.
Now, only devices on this list will be allowed to wirelessly connect to the WGR614 v5.
Page 54 / 172
Reference Manual for the 54 Mbps Wireless Router WGR614 v5
4-14
Wireless Configuration
June 2004 202-10036-01
Page 55 / 172
Content Filtering
5-1
July 2004 202-10036-01
Chapter 5
Content Filtering
This chapter describes how to use the content filtering features of the 54 Mbps Wireless Router
WGR614 v5 to protect your network. These features can be found by clicking on the Content
Filtering heading in the Main Menu of the browser interface.
Content Filtering Overview
The 54 Mbps Wireless Router WGR614 v5 provides you with Web content filtering options, plus
browsing activity reporting and instant alerts via e-mail. Parents and network administrators can
establish restricted access policies based on time of day, Web addresses and Web address
keywords. You can also block Internet access by applications and services, such as chat or games.
To configure these features of your router, click on the subheadings under the Content Filtering
heading in the Main Menu of the browser interface. The subheadings are described below:

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top