NETGEAR WNR1000v3h2 manual Recording Basic Wireless Settings Setup Information

Page 23

N150 Wireless Router User Manual

Table 2. Other Features That Enhance Security

Security Type

Description

 

 

Restrict access based on MAC address.

You can restrict access to only trusted computers so

 

that unknown computers cannot wirelessly connect

 

to the WNR1000v3h2 router. MAC address filtering

 

adds an obstacle against unwanted access to your

 

network by the general public, but the data broadcast

 

over the wireless link is fully exposed. This data

 

includes your trusted MAC addresses, which can be

 

read and impersonated by a hacker.

 

For more information, see Restricting Wireless

 

Access by MAC Address on page 35.

 

 

Modify your firewall’s rules.

By default, the firewall allows any outbound traffic

 

and prohibits any inbound traffic except for

 

responses to your outbound traffic. However, you

 

can modify the firewall’s rules.

 

For more information, see Understanding Your

 

Firewall on page 40.

Use the Push 'N' Connect feature (Wi-Fi Protected

Wi-Fi Protected Setup provides easy setup by

Setup).

means of a push button. Older wireless adapters and

 

devices might not support this. Check whether

 

devices are WPS enabled.

 

For more information, see Using Push 'N' Connect

 

(Wi-Fi Protected Setup) on page 30.

 

 

Recording Basic Wireless Settings Setup Information

Before and after customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided.

Wireless Network Name (SSID). ______________________________ The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is case-sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In some configuration utilities (such as in Windows XP), the term “wireless network name” is used instead of SSID.

If WEP Authentication is used, circle one: Shared Key or Auto.

Note: If you select Shared Key, the other devices in the network will not connect unless they are also set to Shared Key and are configured with the correct key.

Chapter 2: Safeguarding Your Network 23

Image 23
Contents N150 Wireless Router WNR1000v3h2 Revision History Technical SupportTrademarks Statement of ConditionsTable of Contents Customizing Your Network Settings Troubleshooting Configuring Basic Connectivity Using the Setup ManualLogging In To Your Wireless Router Configuring Basic Connectivity Selecting a Language for Your Screen Display Configuring Basic Connectivity Your Internet Connection Does Not Require a Login Configuring Your Internet Settings Using the Setup WizardViewing and Configuring Basic Internet Settings No login required Your Internet Connection Does Require a Login Login required Configuring Basic Connectivity Setting Up and Testing Basic Wireless Connectivity Configuring Basic Connectivity Click Setup Access List Safeguarding Your Network Safeguarding Your NetworkChoosing Appropriate Wireless Security To configure the wireless network, you can Other Features That Enhance Security Wireless Security OptionsIf WEP Authentication is used, circle one Shared Key or Auto Recording Basic Wireless Settings Setup InformationViewing Basic Wireless Settings Changing Wireless Security SettingsSafeguarding Your Network Configuring WEP Wireless Security Safeguarding Your Network Configuring WPA-PSK and WPA2-PSK Wireless Security Viewing Advanced Wireless Settings Using Push N Connect Wi-Fi Protected Setup Using the Physical Push Button Push Button ConfigurationSecurity PIN Entry Using the Router’s Security PINUsing the Wireless Client’s Security PIN Configuring the WPS SettingsAdding Additional WPS-Enabled Clients Adding Additional Non-WPS-Enabled Clients Restricting Wireless Access by MAC AddressSelect the Turn Access Control On check box To add a guest network, do the following Adding Guest NetworksChanging the Administrator Password Backing Up Your Configuration Understanding Your Firewall Restricting Access From Your Network Content Filtering OverviewBlocking Access to Internet Sites Blocking Access to Internet Services To block access to Internet services Scheduling Blocking Blocking Services by IP Address RangeLog Entry Descriptions Viewing Logs of Web Access or Attempted Web AccessConfiguring E-mail Alert and Web Access Log Notifications Setting the Time Zone Customizing Your Network Settings Using the LAN IP Setup OptionsConfiguring LAN TCP/IP Setup Parameters Configuring a Device NameUsing Address Reservation Using the Router as a Dhcp ServerClick Edit or Delete Using a Dynamic DNS ServiceTo reserve an IP address To edit or delete a reserved address entrySelect the Use a Dynamic DNS Service check box Configuring the WAN Setup OptionsTo configure for a Dynamic DNS service Disabling Port Scan and DoS Protection Setting Up a Default DMZ ServerResponding to a Ping on the Internet WAN Port Configuring Static RoutesSetting the MTU Size Configuring NAT FilteringTo add or edit a static route Customizing Your Network Settings Allowing Inbound Connections to Your Network Fine-Tuning Your NetworkFine-Tuning Your Network Web server then sends this reply message to your router How Port Triggering Changes the Communication ProcessHow Port Forwarding Changes the Communication Process How Port Forwarding Differs from Port Triggering Configuring Port Forwarding to Local ServersTo configure port forwarding to a local server Adding a Custom ServiceTo edit or delete a port forwarding entry Click Edit Service or Delete Service to make changesEditing or Deleting a Port Forwarding Entry Application Example Making a Local Web Server PublicConfiguring Port Triggering Clear the Disable Port Triggering check box To turn on Universal Plug and Play Using Universal Plug and PlayOptimizing Wireless Performance Reduce interference Identify critical wireless linksChoose your settings Using WMM QoS for Wireless Multimedia Applications Using WMM for Wireless Multimedia ApplicationsQuality of Service To create a QoS policy for applications and online games Configuring QoS for Internet AccessQoS for Applications and Online Gaming QoS for a Router LAN Port Click Setup QoS Rule and then click Add Priority RuleQoS for a MAC Address Editing or Deleting an Existing QoS Policy Click Setup QoS RuleChanging the MTU Size Common MTU Sizes Overview of Home and Small Office Networking TechnologiesAssessing Your Speed Requirements Network Connection Theoretical Raw Transfer Time Theoretical Transfer Time for 1 GigabyteUsing Network Monitoring Tools Using Network Monitoring ToolsWireless Router Status Fields Viewing Wireless Router Status InformationDhcp Click Connection Status to display the connection status Router Statistics Connection Status SettingsRx B/s Viewing a List of Attached DevicesDo not interrupt the reboot process Managing the Configuration FileBacking Up and Restoring the Configuration Updating the Router Firmware Erasing the ConfigurationChecking for New Firmware in the Router Upgrade Screen Using Network Monitoring Tools Updating Manually to New Router Firmware Select the Turn Remote Management On check box Enabling Remote Management AccessTo configure your router for remote management Using Network Monitoring Tools To monitor traffic on your router, do the following Traffic MeterUsing Network Monitoring Tools Be sure to restart your network in this sequence TroubleshootingQuick Tips Check the Test light to verify correct router operation Troubleshooting Basic FunctionsMake sure that the Ethernet cables are securely plugged Internet light stays amber Power light is not onPower light blinks green slowly and continuously Power light stays amberInternet or LAN port lights are not on Login ProblemsObtaining an Internet IP Address Checking the Internet Service ConnectionTroubleshooting Internet Browsing Troubleshooting PPPoETesting the LAN Path to Your Router Troubleshooting Your Network Using the Ping UtilityRequest timed out Testing the Path from Your Computer to a Remote DeviceProblems with Wireless Adapter Connections Problems with Date and TimeThese procedures erase all current configuration settings Restoring the Default Configuration and PasswordAppendix a Technical Specifications Default Configuration SettingsWNR1000v3h2 Router Default Configuration Settings Wireless Communication WNR1000v3h2 Router General Specifications General SpecificationsAppendix B Related Documents Reference DocumentsFCC Requirements for Operation in the United States Regulatory Compliance InformationEdoc in Languages of the European Community Europe EU Declaration of ConformityFCC Caution Pertinentes de la directive 1999/5/CE Interference Reduction Table Interference Reduction TableIndex IndexIndex PIN 32, 34 ping 54 Setup Manual