vi Contents
Chapter 3
Wireless Configuration
Considerations For A Wireless Network .........................................................................3-1
Observe Performance, Placement, and Range Guidelines .....................................3-1
Implement Appropriate Wireless Security ................................................................3-2
Understanding Wireless Settings ...................................................................................3-2
Restricting Wireless Access to Your Network ..........................................................3-3
Restricting Access to Your Network by Turning Off Wireless Connectivity ........3-4
Restricting Wireless Access Based on the Wireless Network Name (SSID) .....3-4
Restricting Wireless Access Based on the Wireless Access List ......................3-4
Choosing Authentication and Security Encryption Methods ....................................3-6
Authentication Scheme Selection ......................................................................3-6
Encryption Strength Choices .............................................................................3-6
How to Set Up and Test Basic Wireless Connectivity ..............................................3-8
How to Restrict Wireless Access by MAC Address .................................................3-9
Configure WEP ......................................................................................................3-10
Chapter 4
Content Filtering
Content Filtering Overview .............................................................................................4-1
Blocking Access to Internet Sites ...................................................................................4-2
Blocking Access to Internet Services .............................................................................4-3
Configuring a User Defined Service .........................................................................4-4
Configuring Services Blocking by IP Address Range ..............................................4-5
Scheduling When Blocking Will Be Enforced .................................................................4-5
Viewing Logs of Web Access or Attempted Web Access ...............................................4-6
Configuring E-Mail Alert and Web Access Log Notifications ..........................................4-7
Chapter 5
Maintenance
Viewing Router Status Information .................................................................................5-1
Viewing a List of Attached Devices .................................................................................5-5
Upgrading the Router Software ......................................................................................5-5
Configuration File Management .....................................................................................5-6
Restoring and Backing Up the Configuration ...........................................................5-7
Erasing the Configuration .........................................................................................5-8
Changing the Administrator Password ...........................................................................5-8