Page 6 / 172 Scroll up to view Page 1 - 5
July 2004 202-10036-01
vi
Contents
How to Manually Configure Your Internet Connection
..................................................
3-13
Using the Smart Setup Wizard
.....................................................................................
3-15
NETGEAR Product Registration, Support, and Documentation
...................................
3-16
Chapter 4
Wireless Configuration
Observe Performance, Placement, and Range Guidelines
............................................
4-1
Implement Appropriate Wireless Security
......................................................................
4-2
Understanding Wireless Settings
...................................................................................
4-3
Information to Gather Before Changing Basic Wireless Settings
.............................
4-6
Default Factory Settings
...........................................................................................
4-7
How to Set Up and Test Basic Wireless Connectivity
..............................................
4-7
How to Configure WEP
............................................................................................
4-9
How to Configure WPA-PSK Wireless Security
............................................................
4-11
How to Restrict Wireless Access by MAC Address
......................................................
4-11
Chapter 5
Content Filtering
Content Filtering Overview
.............................................................................................
5-1
Blocking Access to Internet Sites
...................................................................................
5-2
Blocking Access to Internet Services
.............................................................................
5-3
Configuring a User Defined Service
.........................................................................
5-4
Configuring Services Blocking by IP Address Range
..............................................
5-5
Scheduling When Blocking Will Be Enforced
.................................................................
5-5
Viewing Logs of Web Access or Attempted Web Access
...............................................
5-6
Configuring E-Mail Alert and Web Access Log Notifications
..........................................
5-7
Chapter 6
Maintenance
Viewing Wireless Router Status Information
...................................................................
6-1
Viewing a List of Attached Devices
.................................................................................
6-5
Configuration File Management
.....................................................................................
6-5
Restoring and Backing Up the Configuration
...........................................................
6-6
Erasing the Configuration
.........................................................................................
6-7
Upgrading the Router Software
......................................................................................
6-7
Changing the Administrator Password
...........................................................................
6-8
Chapter 7
Advanced Configuration of the Router
Configuring Port Triggering
.............................................................................................
7-1
Page 7 / 172
Contents
vii
July 2004 202-10036-01
Configuring Port Forwarding to Local Servers
................................................................
7-3
Adding a Custom Service
.........................................................................................
7-5
Editing or Deleting a Port Forwarding Entry
.............................................................
7-5
Local Web and FTP Server Example
.......................................................................
7-6
Multiple Computers for Half Life, KALI or Quake III Example
..................................
7-6
Configuring the WAN Setup Options
..............................................................................
7-7
Connect Automatically, as Required
........................................................................
7-7
Disabling the SPI Firewall
........................................................................................
7-8
Setting Up a Default DMZ Server
.............................................................................
7-8
Responding to Ping on Internet WAN Port
...............................................................
7-8
Setting the MTU Size
...............................................................................................
7-9
Using the LAN IP Setup Options
..................................................................................
7-10
Configuring LAN TCP/IP Setup Parameters
..........................................................
7-10
Using the Router as a DHCP server
......................................................................
7-12
Using Address Reservation
....................................................................................
7-12
Using a Dynamic DNS Service
.....................................................................................
7-13
Configuring Static Routes
.............................................................................................
7-14
Enabling Remote Management Access
.......................................................................
7-16
Using Universal Plug and Play (UPnP)
........................................................................
7-17
Chapter 8
Troubleshooting
Basic Functioning
...........................................................................................................
8-1
Power Light Not On
..................................................................................................
8-1
Lights Never Turn Off
...............................................................................................
8-2
LAN or WAN Port Lights Not On
..............................................................................
8-2
Troubleshooting the Web Configuration Interface
..........................................................
8-3
Troubleshooting the ISP Connection
..............................................................................
8-4
Troubleshooting a TCP/IP Network Using a Ping Utility
.................................................
8-5
Testing the LAN Path to Your Router
.......................................................................
8-5
Testing the Path from Your Computer to a Remote Device
.....................................
8-6
Restoring the Default Configuration and Password
........................................................
8-7
Problems with Date and Time
.........................................................................................
8-8
Page 8 / 172
July 2004 202-10036-01
viii
Contents
Appendix A
Technical Specifications
Appendix B
Network, Routing, Firewall, and Basics
Related Publications
......................................................................................................
B-1
Basic Router Concepts
..................................................................................................
B-1
What is a Router?
...................................................................................................
B-1
Routing Information Protocol
...................................................................................
B-2
IP Addresses and the Internet
.......................................................................................
B-2
Netmask
..................................................................................................................
B-4
Subnet Addressing
..................................................................................................
B-4
Private IP Addresses
...............................................................................................
B-7
Single IP Address Operation Using NAT
.......................................................................
B-7
MAC Addresses and Address Resolution Protocol
.................................................
B-8
Related Documents
.................................................................................................
B-9
Domain Name Server
..............................................................................................
B-9
IP Configuration by DHCP
...........................................................................................
B-10
Internet Security and Firewalls
....................................................................................
B-10
What is a Firewall?
................................................................................................
B-10
Stateful Packet Inspection
...............................................................................
B-11
Denial of Service Attack
..................................................................................
B-11
Ethernet Cabling
...........................................................................................................
B-11
Category 5 Cable Quality
......................................................................................
B-12
Inside Twisted Pair Cables
....................................................................................
B-13
Uplink Switches, Crossover Cables, and MDI/MDIX Switching
............................
B-14
Appendix C
Preparing Your Network
What You Need To Use a Router with a Broadband Modem
.........................................
C-1
Cabling and Computer Hardware
............................................................................
C-1
Computer Network Configuration Requirements
....................................................
C-1
Internet Configuration Requirements
......................................................................
C-2
Where Do I Get the Internet Configuration Parameters?
........................................
C-2
Record Your Internet Connection Information
.........................................................
C-3
Preparing Your Computers for TCP/IP Networking
.......................................................
C-3
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
C-4
Page 9 / 172
Contents
ix
July 2004 202-10036-01
Install or Verify Windows Networking Components
.................................................
C-4
Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me
C-6
Selecting Windows’ Internet Access Method
..........................................................
C-8
Verifying TCP/IP Properties
....................................................................................
C-8
Configuring Windows NT4, 2000 or XP for IP Networking
............................................
C-9
Install or Verify Windows Networking Components
.................................................
C-9
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
.............................
C-10
DHCP Configuration of TCP/IP in Windows XP
...................................................
C-10
DHCP Configuration of TCP/IP in Windows 2000
................................................
C-12
DHCP Configuration of TCP/IP in Windows NT4
..................................................
C-15
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
C-17
Configuring the Macintosh for TCP/IP Networking
......................................................
C-18
MacOS 8.6 or 9.x
..................................................................................................
C-18
MacOS X
...............................................................................................................
C-18
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-19
Verifying the Readiness of Your Internet Account
.......................................................
C-20
Are Login Protocols Used?
...................................................................................
C-20
What Is Your Configuration Information?
..............................................................
C-20
Obtaining ISP Configuration Information for Windows Computers
.......................
C-21
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-22
Restarting the Network
................................................................................................
C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Wireless Channels
..................................................................................................
D-2
WEP Wireless Security
..................................................................................................
D-4
WEP Authentication
................................................................................................
D-4
WEP Open System Authentication
.........................................................................
D-5
WEP Shared Key Authentication
............................................................................
D-6
Key Size and Configuration
..............................................................................
D-7
How to Use WEP Parameters
.................................................................................
D-8
WPA Wireless Security
..................................................................................................
D-8
Page 10 / 172
July 2004 202-10036-01
x
Contents
How Does WPA Compare to WEP?
........................................................................
D-9
How Does WPA Compare to IEEE 802.11i?
........................................................
D-10
What are the Key Features of WPA Security?
......................................................
D-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
D-12
WPA Data Encryption Key Management
........................................................
D-14
Is WPA Perfect?
....................................................................................................
D-16
Product Support for WPA
......................................................................................
D-16
Supporting a Mixture of WPA and WEP Wireless Clients
...............................
D-16
Changes to Wireless Access Points
...............................................................
D-16
Changes to Wireless Network Adapters
.........................................................
D-17
Changes to Wireless Client Programs
............................................................
D-18
Glossary
List of Glossary Terms
...................................................................................................
G-1
Index

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top