Page 21 / 116 Scroll up to view Page 16 - 20
Wireless-G Router WGR614v9 Reference Manual
Configuring Basic Connectivity
1-7
v1.1, May 2008
If a login is required by your ISP, the following settings appear in the Basic Settings screen:
Does Your Internet Connection Require A Login?
If you usually must use a login program
such as WinPOET to access the Internet, your Internet connection requires a login. After you
select
Yes
, the Basic Settings screen displays.
Internet Service Provider
. This drop-down list contains a few ISPs that need special
protocols for connection. The list includes:
PPTP
(Point to Point Tunneling Protocol), used primarily in Austrian DSL services
Figure 1-5
Note:
After you finish setting up your router, you will no longer need to launch the
ISP’s login program on your computer to access the Internet. When you start
an Internet application, your router will automatically log you in.
ISP
does
require login
Page 22 / 116
Wireless-G Router WGR614v9 Reference Manual
1-8
Configuring Basic Connectivity
v1.1, May 2008
Telstra Bigpond
, an Australian residential cable modem service
Other
, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used
by most DSL services worldwide.
Login and Password
. This is the user name and password provided by your ISP. This
name and password are used to log in to the ISP server.
Service Name
. If your connection is capable of connecting to multiple Internet services,
this setting specifies which service to use.
Connection Mode
. This drop-down list (shown in
Figure 1-5 on page 1-7
) selects when
the router will connect to and disconnect from the Internet. The list includes:
Always On
. The router logs in to the Internet immediately after booting and never
disconnects.
Dial on Demand
. The router logs in only when outgoing traffic is present and logs out
after the idle time-out.
Manually Connect
. The router logs in or logs out only when the user clicks
Connect
or
Disconnect
in the Router Status screen.
Idle Timeout
. Your Internet connection is logged out if there is no data transfer during the
specified time interval.
Note:
The Telstra Bigpond setting is only for older cable modem service
accounts still requiring a Bigpond login utility. Telstra has
discontinued this type of account. Those with Telstra DSL accounts
and newer cable modem accounts should select
No
for Does Your
Internet Connection Require a Login.
Figure 1-6
Note:
Not all ISPs are listed here. The ones on this list have special
requirements.
Page 23 / 116
Wireless-G Router WGR614v9 Reference Manual
Configuring Basic Connectivity
1-9
v1.1, May 2008
Domain Name Server (DNS) Address
. If you know that your ISP does not automatically
transmit DNS addresses to the router during login, select
Use These DNS Servers
, and
enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address
is available, enter it also.
Note:
If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.
Page 24 / 116
Wireless-G Router WGR614v9 Reference Manual
1-10
Configuring Basic Connectivity
v1.1, May 2008
Page 25 / 116
2-1
v1.1, May 2008
Chapter 2
Safeguarding Your Network
The Wireless-G Router Model WGR614v9 provides highly effective security features, which are
covered in detail in this chapter.
This chapter includes the following sections:
“Choosing Appropriate Wireless Security
“Recording Basic Wireless Settings Setup Information” on page 2-4
“Changing Wireless Security Settings” on page 2-5
“Viewing Advanced Wireless Settings” on page 2-10
“Restricting Wireless Access by MAC Address” on page 2-11
“Restricting Wireless Access by MAC Address” on page 2-11
“Changing the Administrator Password” on page 2-14
“Backing Up Your Configuration” on page 2-15
“Understanding Your Firewall” on page 2-15
Choosing Appropriate Wireless Security
Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your
wireless data transmissions well beyond your walls. Operating an unsecured wireless network
creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network
to access your computers and files. Indoors, computers can connect over 802.11g/n wireless
networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate
area to access your network. Use the security features of your wireless equipment that are
appropriate to your needs.
The time it takes to establish a wireless connection can vary depending on both your security
settings and router placement.
Stronger security methods can entail a cost in terms of throughput, latency, battery consumption,
and equipment compatibility. In choosing an appropriate security level, you can also consider the
effort compared to the reward for a hacker to break into your network. As a minimum, however,
NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured
wireless network unless it is your intention to provide free Internet access for the public.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top