Table of Contents | 3
Table of Contents

Chapter 1 Configuring Basic Connectivity

Using the Setup Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Logging In To Your Wireless Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Selecting a Language for Your Screen Display . . . . . . . . . . . . . . . . . . . . . .9
Configuring Your Internet Settings Using the Setup Wizard. . . . . . . . . . . .11
Viewing and Configuring Basic Internet Settings . . . . . . . . . . . . . . . . . . . .11
Your Internet Connection Does Not Require a Login. . . . . . . . . . . . . . . 11
Your Internet Connection Does Require a Login . . . . . . . . . . . . . . . . . .13
Setting Up and Testing Basic Wireless Connectivity . . . . . . . . . . . . . . . . .16

Chapter 2 Safeguarding Your Network

Choosing Appropriate Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . .20
Recording Basic Wireless Settings Setup Information. . . . . . . . . . . . . . . . 23
Changing Wireless Security Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Viewing Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Configuring WEP Wireless Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Configuring WPA-PSK and WPA2-PSK Wireless Security . . . . . . . . . . 28
Viewing Advanced Wireless Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Using Push 'N' Connect (Wi-Fi Protected Setup). . . . . . . . . . . . . . . . . . . . 30
Push Button Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
Security PIN Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Configuring the WPS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Connecting Additional Wireless Client Devices after WPS Setup . . . . . 34
Restricting Wireless Access by MAC Address. . . . . . . . . . . . . . . . . . . . . . 35
Adding Guest Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Changing the Administrator Password. . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Backing Up Your Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Understanding Your Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Chapter 3 Restricting Access From Your Network

Content Filtering Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Blocking Access to Internet Sites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Blocking Access to Internet Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Blocking Services by IP Address Range . . . . . . . . . . . . . . . . . . . . . . . . 44
Scheduling Blocking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Viewing Logs of Web Access or Attempted Web Access. . . . . . . . . . . . . .45
Configuring E-mail Alert and Web Access Log Notifications . . . . . . . . . . .46
Setting the Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47