Page 36 / 178 Scroll up to view Page 31 - 35
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
3-14
Connecting the Router to the Internet
M-10153-01
To configure your Internet service connection for PPTP, fill in the following fields:
Enter your Login and Password. These fields are case sensitive.
To change the login timeout, enter a new value in minutes. This determines how long the
router keeps the Internet connection active after there is no Internet activity from the LAN.
Entering a timeout value of zero means never log out.
Enter your IP address if your ISP provided a fixed IP address, such as 10.0.1.20. Otherwise,
leave the IP address set to 0.0.0.0 and you will be automatically assigned an IP address when
you connect.
Enter a Server IP Address if your ISP provided one, such as 10.0.0.138. Otherwise, leave the
IP address set to 0.0.0.0 and the Server IP Address will be automatically supplied when you
connect.
Normally the Connection ID/Name should be left blank. If your ISP provided one, then enter it
here.
If you know that your ISP does not automatically transmit DNS addresses to the router during
login, select “Use these DNS servers” and enter the IP address of your ISP’s Primary DNS
Server. If a Secondary DNS Server address is available, enter it also.
Note:
If you enter DNS addresses, restart your computers so that these settings take effect.
The Router MAC Address section determines the Ethernet Mac address that will be used by
the router on the Internet port. Some ISPs will register the Ethernet MAC address of the
network interface card in your PC when your account is first opened. They will then only
accept traffic from the MAC address of that PC. This feature allows your router to masquerade
as that PC.
To change the MAC address, select “Use this Computer’s MAC address.” The router will then
capture and use the MAC address of the PC that you are now using. You must be using the one
PC that is allowed by the ISP. Or, select “Use this MAC address” and enter it.
Click Apply to save your settings.
Click Test to test your Internet connection. If the NETGEAR Web site does not appear within
one minute, refer to
Chapter 8, “Troubleshooting”
.
Page 37 / 178
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
Connecting the Router to the Internet
3-15
M-10153-01
Manual Telstra Bigpond Configuration
If your ISP uses Telstra Bigpond, select Telstra Bigpond for the Internet Service Provider in the
Basic Settings menu and you will see the following menu:
Figure 3-10:
Telstra Bigpond Cable menu
To configure your Internet service connection for Telstra Bigpond, fill in the following fields:
Enter your Login, Password and Authentication Server. These fields are case sensitive.
If you know that your ISP does not automatically transmit DNS addresses to the router during
login, select “Use these DNS servers” and enter the IP address of your ISP’s Primary DNS
Server. If a Secondary DNS Server address is available, enter it also.
Note:
If you enter DNS addresses, restart your computers so that these settings take effect.
Page 38 / 178
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
3-16
Connecting the Router to the Internet
M-10153-01
The Router Mac Address section determines the Ethernet MAC address that will be used by
the router on the Internet port. Some ISPs register the Ethernet MAC address of the network
interface card in your PC when your account is first opened. They will then only accept traffic
from the MAC address of that PC. This feature allows your router to masquerade as that PC.
To change the MAC address, select “Use this Computer’s MAC address.” The router will then
capture and use the MAC address of the PC that you are now using. You must be using the one
PC that is allowed by the ISP. Or, select “Use this MAC address” and enter it.
Click Apply to save your settings.
Click Test to test your Internet connection. If the NETGEAR Web site does not appear within
one minute, refer to
Chapter 8, “Troubleshooting”
.
Page 39 / 178
Wireless Configuration
4-1
M-10153-01
Chapter 4
Wireless Configuration
This chapter describes how to configure the wireless features of your WGU624 wireless router. In
planning your wireless network, you should consider the level of security required. You should
also select the physical placement of your router in order to maximize the network speed. For
further information on wireless networking, refer to in
Appendix D, “Wireless Networking
Basics”
.
Observing Performance, Placement, and Range Guidelines
The operating distance or range of your wireless connection can vary significantly based on the
physical placement of the wireless router. The latency, data throughput performance, and
notebook power consumption of wireless adapters also vary depending on your configuration
choices.
For best results, place your router:
Near the center of the area in which your PCs will operate.
In an elevated location such as a high shelf where the wirelessly connected PCs have
line-of-sight access (even if through walls).
Away from sources of interference, such as PCs, microwaves, and 2.4 GHz cordless phones.
Away from large metal surfaces.
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook PC.
Note:
Failure to follow these guidelines can result in significant performance
degradation or inability to wirelessly connect to the router. For complete range/
performance specifications, please see
Appendix A, “Technical Specifications”
.
Page 40 / 178
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
4-2
Wireless Configuration
M-10153-01
Implementing Appropriate Wireless Security
Unlike wired network data, your wireless data transmissions can be received well beyond your
walls by anyone with a compatible adapter. For this reason, use the security features of your
wireless equipment. The WGU624 wireless router provides highly effective security features
which are covered in detail in this chapter. Deploy the security features appropriate to your needs.
Figure 4-1:
WGU624 wireless data security options
There are several ways you can enhance the security of you wireless network.
Restrict Access Based on MAC Address.
You can restrict access to only trusted PCs so that
unknown PCs cannot wirelessly connect to the WGU624. MAC address filtering adds an
obstacle against unwanted access to your network, but the data broadcast over the wireless link
is fully exposed.
Turn Off the Broadcast of the Wireless Network Name SSID.
If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network “discovery” feature of some products such as Windows XP, but the data is still fully
exposed to a determined snoop using specialized test equipment like wireless sniffers.
Note:
Indoors, computers can connect over 802.11b/g wireless networks at
ranges of up to 300 feet.
Such distances can allow for others outside of your
immediate area to access your network.
###<LUHOHVV#'DWD
:HFXULW\#2SWLRQV
9DQJH=#XS#WR#633#IRRW#UDGLXV
4-#2SHQ#V\VWHP=#HDV\#EXW#QR#VHFXULW\
5-#1$&#DFFHVV#OLVW=#QR#GDWD#VHFXULW\
6-#:(3=#VHFXULW\#EXW#VRPH#SHUIRUPDQFH#LPSDFW
7-#:3$038.=#YHU\#VWURQJ#VHFXULW\#
WGU624

Rate

4.3 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top