Page 6 / 174 Scroll up to view Page 1 - 5
202-10072-01, March 2005
vi
Contents
How to Log On to the Wireless Router After
Configuration Settings Have Been Applied
..............................................................
3-6
How to Bypass the Configuration Assistant
.............................................................
3-8
How to Manually Configure Your Internet Connection
....................................................
3-9
Using the Smart Setup Wizard
.....................................................................................
3-11
NETGEAR Product Registration, Support, and Documentation
...................................
3-12
Chapter 4
Wireless Configuration
Observe Performance, Placement, and Range Guidelines
............................................
4-1
Implement Appropriate Wireless Security
......................................................................
4-2
Understanding Wireless Settings
...................................................................................
4-4
Information to Gather Before Changing Basic Wireless Settings
.............................
4-7
Default Factory Settings
...........................................................................................
4-8
How to Set Up and Test Basic Wireless Connectivity
..............................................
4-8
How to Configure WEP
..........................................................................................
4-10
How to Configure WPA-PSK Wireless Security
............................................................
4-12
How to Restrict Wireless Access by MAC Address
......................................................
4-13
Chapter 5
Content Filtering
Content Filtering Overview
.............................................................................................
5-1
Blocking Access to Internet Sites
...................................................................................
5-2
Blocking Access to Internet Services
.............................................................................
5-3
Configuring a User Defined Service
.........................................................................
5-4
Configuring Services Blocking by IP Address Range
..............................................
5-5
Scheduling When Blocking Will Be Enforced
.................................................................
5-5
Viewing Logs of Web Access or Attempted Web Access
...............................................
5-6
Configuring E-Mail Alert and Web Access Log Notifications
..........................................
5-7
Chapter 6
Maintenance
Viewing Wireless Router Status Information
...................................................................
6-1
Viewing a List of Attached Devices
.................................................................................
6-5
Configuration File Management
.....................................................................................
6-6
Restoring and Backing Up the Configuration
...........................................................
6-6
Erasing the Configuration
.........................................................................................
6-7
Upgrading the Router Software
......................................................................................
6-7
Changing the Administrator Password
...........................................................................
6-9
Page 7 / 174
Contents
vii
202-10072-01, March 2005
Chapter 7
Troubleshooting
Basic Functioning
...........................................................................................................
7-1
Power Light Not On
..................................................................................................
7-1
Lights Never Turn Off
...............................................................................................
7-2
LAN or WAN Port Lights Not On
..............................................................................
7-2
Troubleshooting the Web Configuration Interface
..........................................................
7-3
Troubleshooting the ISP Connection
..............................................................................
7-4
Troubleshooting a TCP/IP Network Using a Ping Utility
.................................................
7-5
Testing the LAN Path to Your Router
.......................................................................
7-5
Testing the Path from Your Computer to a Remote Device
.....................................
7-6
Restoring the Default Configuration and Password
........................................................
7-7
Problems with Date and Time
.........................................................................................
7-8
Chapter 8
Advanced Configuration of the Router
Configuring Advanced Wireless Settings
.......................................................................
8-1
Wireless Card Access List
.......................................................................................
8-3
Wireless Card Access Setup
....................................................................................
8-4
Configuring Port Triggering and Port Forwarding
...........................................................
8-5
Configuring Port Forwarding to Local Servers
................................................................
8-8
Adding a Custom Service
.........................................................................................
8-9
Editing or Deleting a Port Forwarding Entry
...........................................................
8-10
Local Web and FTP Server Example
.....................................................................
8-10
Multiple Computers for Half Life, KALI or Quake III Example
................................
8-10
Configuring the WAN Setup Options
............................................................................
8-11
Connect Automatically, as Required
......................................................................
8-11
Disabling the SPI Firewall
......................................................................................
8-12
Setting Up a Default DMZ Server
...........................................................................
8-12
Responding to Ping on Internet WAN Port
.............................................................
8-12
Setting the MTU Size
.............................................................................................
8-13
Using the LAN IP Setup Options
..................................................................................
8-13
Configuring LAN TCP/IP Setup Parameters
..........................................................
8-14
Using the Router as a DHCP server
......................................................................
8-15
Using Address Reservation
....................................................................................
8-16
Using a Dynamic DNS Service
.....................................................................................
8-16
Page 8 / 174
202-10072-01, March 2005
viii
Contents
Configuring Static Routes
.............................................................................................
8-17
Enabling Remote Management Access
.......................................................................
8-19
Using Universal Plug and Play (UPnP)
........................................................................
8-20
Appendix A
Technical Specifications
Appendix B
Network, Routing, Firewall, and Basics
Related Publications
......................................................................................................
B-1
Basic Router Concepts
..................................................................................................
B-1
What is a Router?
...................................................................................................
B-1
Routing Information Protocol
...................................................................................
B-2
IP Addresses and the Internet
.......................................................................................
B-2
Netmask
..................................................................................................................
B-4
Subnet Addressing
..................................................................................................
B-4
Private IP Addresses
...............................................................................................
B-7
Single IP Address Operation Using NAT
.......................................................................
B-7
MAC Addresses and Address Resolution Protocol
.................................................
B-8
Related Documents
.................................................................................................
B-9
Domain Name Server
..............................................................................................
B-9
IP Configuration by DHCP
...........................................................................................
B-10
Internet Security and Firewalls
....................................................................................
B-10
What is a Firewall?
................................................................................................
B-10
Stateful Packet Inspection
...............................................................................
B-11
Denial of Service Attack
..................................................................................
B-11
Ethernet Cabling
...........................................................................................................
B-11
Category 5 Cable Quality
......................................................................................
B-12
Inside Twisted Pair Cables
....................................................................................
B-13
Uplink Switches, Crossover Cables, and MDI/MDIX Switching
............................
B-14
Appendix C
Preparing Your Network
What You Need To Use a Router with a Broadband Modem
.........................................
C-1
Cabling and Computer Hardware
............................................................................
C-1
Computer Network Configuration Requirements
....................................................
C-1
Internet Configuration Requirements
......................................................................
C-2
Where Do I Get the Internet Configuration Parameters?
........................................
C-2
Page 9 / 174
Contents
ix
202-10072-01, March 2005
Record Your Internet Connection Information
.........................................................
C-3
Preparing Your Computers for TCP/IP Networking
.......................................................
C-3
Configuring Windows 95, 98, and Me for TCP/IP Networking
.......................................
C-4
Install or Verify Windows Networking Components
.................................................
C-4
Enabling DHCP to Automatically Configure TCP/IP Settings
in Windows 95B, 98, and Me
..................................................................................
C-6
Selecting Windows’ Internet Access Method
..........................................................
C-8
Verifying TCP/IP Properties
....................................................................................
C-8
Configuring Windows NT4, 2000 or XP for IP Networking
............................................
C-9
Install or Verify Windows Networking Components
.................................................
C-9
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
.............................
C-10
DHCP Configuration of TCP/IP in Windows XP
...................................................
C-10
DHCP Configuration of TCP/IP in Windows 2000
................................................
C-12
DHCP Configuration of TCP/IP in Windows NT4
..................................................
C-15
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
C-17
Configuring the Macintosh for TCP/IP Networking
......................................................
C-18
MacOS 8.6 or 9.x
..................................................................................................
C-18
MacOS X
...............................................................................................................
C-18
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-19
Verifying the Readiness of Your Internet Account
.......................................................
C-20
Are Login Protocols Used?
...................................................................................
C-20
What Is Your Configuration Information?
..............................................................
C-20
Obtaining ISP Configuration Information for Windows Computers
.......................
C-21
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-22
Restarting the Network
................................................................................................
C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Authentication and WEP Data Encryption
.....................................................................
D-2
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-3
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Page 10 / 174
202-10072-01, March 2005
x
Contents
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
WPA and WPA2 Wireless Security
................................................................................
D-8
How Does WPA Compare to WEP?
........................................................................
D-9
How Does WPA Compare to WPA2 (IEEE 802.11i)?
............................................
D-10
What are the Key Features of WPA and WPA2 Security?
....................................
D-10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
D-12
WPA/WPA2 Data Encryption Key Management
.............................................
D-14
Is WPA/WPA2 Perfect?
.........................................................................................
D-16
Product Support for WPA/WPA2
...........................................................................
D-16
Supporting a Mixture of WPA, WPA2, and WEP
Wireless Clients is Discouraged
.....................................................................
D-16
Changes to Wireless Access Points
...............................................................
D-17
Changes to Wireless Network Adapters
.........................................................
D-17
Changes to Wireless Client Programs
............................................................
D-18
Glossary

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top