RadioLAN WNR834B user manual V1.2, January

Page 68

NETGEAR RangeMax™ NEXT Wireless Router WNR834B User Manual

a.You open an IRC client program, beginning a chat session on your computer.

b.Your IRC client composes a request message to an IRC server using a destination port number of 6667, the standard port number for an IRC server process. Your computer then sends this request message to your router.

c.Your router creates an entry in its internal session table describing this communication session between your computer and the IRC server. Your router stores the original information, performs Network Address Translation (NAT) on the source address and port, and sends this request message through the Internet to the IRC server.

d.Noting your Port Triggering rule, and having observed the destination port number of 6667, your router creates an additional session entry to send any incoming port 113 traffic to your computer.

e.The IRC server sends a return message to your router using the NAT-assigned source port (as in the previous example, let’s say port 33333) as the destination port. The IRC server also sends an “identify” message to your router with destination port 113.

f.Upon receiving the incoming message to destination port 33333, your router checks its session table to determine whether there is an active session for port number 33333. Finding an active session, the router restores the original address information replaced by NAT and sends this reply message to your computer.

g.Upon receiving the incoming message to destination port 113, your router checks its session table and learns that there is an active session for port 113, associated with your computer. The router replaces the message’s destination IP address with your computer’s IP address and forwards the message to your computer.

h.When you finish your chat session, your router eventually senses a period of inactivity in the communications. The router then removes the session information from its session table, and incoming traffic is no longer accepted on port numbers 33333 or 113.

To configure Port Triggering, you need to know which inbound ports the application needs. Also, you need to know the outbound port number that will trigger the opening of the inbound ports. This information can usually be determined by contacting the publisher of the application or from user groups or newsgroups..

Note: Only one computer at a time can use the triggered application.

6-4

Fine-Tuning Your Network

v1.2, January 2007

Image 68
Contents Netgear RangeMax Next Wireless Router Product Registration, Support, and Documentation TrademarksStatement of Conditions Certificate of the Manufacturer/ImporterRegulatory Compliance Information Europe EU Declaration of ConformityFCC Requirements for Operation in the United States FCC Information to UserFCC Radio Frequency Interference Warnings & Instructions FCC Guidelines for Human ExposureFCC Declaration Of Conformity Product and Publication Details WNR834BContents Chapter Customizing Your Network Settings Appendix a Technical Specifications V1.2, January Chapter About This Manual Conventions, Formats and ScopeHow to Use This Manual How to Print this ManualRevision History Publication Revision HistoryV1.2, January Chapter Configuring Basic Connectivity Using the Setup ManualAccessing the Wireless Router For Configuration RangeMax Next Wireless Router WNR834B Online Setup ManualsHttp//192.168.1.1 V1.2, January Viewing and Configuring Basic ISP Settings No Login Required by ISP ISP Does Not Require LoginV1.2, January Login Required by ISP ISP Does Require LoginV1.2, January Configuring Wireless Settings Viewing the Basic Wireless SettingsV1.2, January V1.2, January Viewing the Advanced Wireless Settings V1.2, January Chapter Safeguarding Your Network Choosing Appropriate Wireless SecuritySafeguarding Your Network Recommended Security Settings Changing Wireless Security SettingsV1.2, January Basic Wireless Security Options WEPConfiguring Security in the Advanced Wireless Settings Menu V1.2, January Configuring WEP Wireless Security If WPA-PSK or WPA2-PSK Authentication is usedV1.2, January Configuring WPA-PSK or WPA2-PSK Wireless Security V1.2, January Restricting Wireless Access by MAC Address V1.2, January Changing the Administrator Password Backing Up Your Configuration Understanding Your Firewall Blocking Access to Internet Sites Restricting Access From Your NetworkContent Filtering Overview Restricting Access From Your Network Blocking Access to Internet Services Configuring a User Defined Service Blocking Services by IP Address RangeScheduling Blocking Viewing Logs of Web Access or Attempted Web Access Log entry descriptionsConfiguring Email Alert and Web Access Log Notifications Log action buttonsSetting the Time V1.2, January V1.2, January Chapter Customizing Your Network Settings Using the LAN IP Setup OptionsConfiguring LAN TCP/IP Setup Parameters Using the Router as a Dhcp server Using Address Reservation Using a Dynamic DNS Service Configuring the WAN Setup Options Disabling the SPI Firewall Connecting Automatically, as RequiredSetting Up a Default DMZ Server Responding to a Ping on the Internet WAN Port Configuring Static RoutesSetting the MTU Size V1.2, January V1.2, January Chapter Fine-Tuning Your Network Allowing Inbound Connections To Your NetworkFine-Tuning Your Network How Port Triggering Changes the Communication Process V1.2, January How Port Forwarding Changes the Communication Process Configuring Port Forwarding to Local Servers How Port Forwarding Differs From Port TriggeringAdding a Custom Service Editing or Deleting a Port Forwarding Entry Application Example Making a Local Web Server PublicConfiguring Port Triggering To the instructions in Using Universal Plug and Play onV1.2, January V1.2, January Using Universal Plug and Play Optimizing Wireless Performance Changing the MTU MSN Common MTU SizesOptimizing Your Network Bandwidth Overview of Home and Small Office Networking Technologies Broadband InternetPowerline Assessing Your Speed RequirementsTheoretical Transfer Time for 1 Gigabyte Network Connection Theoretical Raw Transfer TimeV1.2, January Chapter Using Network Monitoring Tools Viewing Wireless Router Status InformationWireless Router Status Fields Default is Connection Status Items Router Statistics Items Managing the Configuration File Viewing a List of Attached DevicesBacking Up and Restoring the Configuration Erasing the Configuration Upgrading the Router SoftwareV1.2, January Enabling Remote Management Access V1.2, January V1.2, January Be sure to restart your network in this sequence Chapter TroubleshootingTroubleshooting Quick Tips Troubleshooting Basic Functions Make sure the network settings of the computer are correctMake sure the Ethernet cables are securely plugged Check the test light to verify correct router operationLAN or WAN port lights are not lit Power light is not on or is blinkingLights never turn off Wireless light is not lit Troubleshooting the Web Configuration Interface Troubleshooting the Internet Connection Troubleshooting a Network Using a Ping Utility Testing the LAN Path to Your RouterTesting the Path from Your Computer to a Remote Device Request timed outProblems with Date and Time Solving Wireless Connection ProblemsUsing Your Wireless Card Setup Program Setting Up and Testing Basic Wireless ConnectivityV1.2, January V1.2, January Restoring the Default Configuration and Password V1.2, January Appendix a Technical Specifications Factory Default SettingsGeneral Specifications WirelessElectromagnetic Emissions V1.2, January Appendix B Related Documents Document LinkV1.2, January Index Index-2