vi
v2.0 BETA, January 2006
Next, log in to the router. ..........................................................................................3-5
Then, connect to the Internet. ..................................................................................3-6
Testing Your Internet Connection ....................................................................................3-7
Manually Configuring Your Internet Connection .......................................... ... ... .... ... ... ..3-8
Chapter 4
Wireless Configuration
Considerations for a Wireless Network ..........................................................................4-1
Observe Performance, Placement, and Range Guidelines ............. ... ... ... ... .... ........4-1
Implement Appropriate Wireless Security ................................................................4-2
Understanding Wireless Settings ...................................................................................4-3
How to Set Up and Test Basic Wireless Connectivity ..............................................4-6
How to Restricting Wireless Access to Your Network ..............................................4-7
Choosing WEP Authentication and Security Encryption Methods ...........................4-9
How to Configure WEP ..........................................................................................4-11
How to Configure WPA-PSK ..................................................................................4-12
Chapter 5
Protecting Your Network
Protecting Access to Your Mobile Broadband Router MBR814X....................................5-1
How to Change the Built-In Password .....................................................................5-1
Changing the Administrator Login Timeout ..............................................................5-2
Configuring Basic Firewall Services ...............................................................................5-2
Blocking Keywords, Sites, and Services ... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ... ....... ... ... ..5-3
How to Block Keywords and Sites ...........................................................................5-3
Firewall Rules .................................................................................................................5-5
Inbound Rules (Port Forwarding) ........................................................... ..................5-6
Outbound Rules (Service Blocking) .........................................................................5-9
Order of Precedence for Rules ..............................................................................5-11
Services .......................... ................................................. .............................................5-12
How to Define Services ..........................................................................................5-12
Setting Times and Scheduling Firewall Services ............................................. ............. 5-13
How to Set Your Time Zone ...................................................................................5-13
How to Schedule Firewall Services ........................................................................5-14
Chapter 6
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings ...........................................................6-1