NETGEAR WGR614V10 User Manual

Wireless-G Router WGR614v10 Reference Manual
NETGEAR, Inc.
350 East Plumeria Drive San Jose, CA 95134 USA
202-10585-01 February 2010
© 2010 by NETGEAR, Inc. All rights reserved.
Technical Support
Please refer to the support information card that shipped with your product. When you register your product at
http://www.netgear.com/register, we can provide you with faster expert technical support and timely notices of product
and software upgrades. NETGEAR, INC. Support Information Phone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card. E-mail: support@netgear.com North American NETGEAR website: http://www.netgear.com
Trademarks
NETGEAR, the NETGEAR logo, ProSafe, and Auto Uplink are trademarks or registered trademarks of NETGEAR, Inc. Microsoft, Windows, Windows NT and Vista are registered trademarks of Micros oft Corporation.Other brand and product names are registered trademarks or trademarks of their respective holders.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice.
NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
Wireless Communications
Maximum Wireless signal rate derived from IEEE S tandard 802 .1 1 specificatio ns. Actual throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate.
FCC Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide rea sonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference, and
ii
2. This device must accept any interference received, including interference that may cause undesired oper ation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could
void the user’s authority to operate this equipment. The radio module has been evaluated under FCC Bulletin OET 65C (01-01) and found to be compliant to the
requirements as set forth in CFR 47 Sections, 2.1093, and 15.247 (b) (4) addressing RF Exposure from radio frequency devices. This model meets the applicable government requirements for exposure to radio frequency waves.
Europe – EU Declaration of Conformity
Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following conformance standards:
EN300 328, EN301 489-17, EN60950-1
Europe – Declaration of Conformity in Languages of the European Community
Èesky
[Czech]
Dansk
[Danish]
Deutsch
[German]
Eesti
[Estonian]
English Hereby, NETGEAR Inc., declares that this Radiolan is in compliance with the essential
Español
[Spanish]
ЕллзнйкЮ
[Greek]
Français
[French]
Italiano
[Italian]
Latviski
[Latvian]
NETGEAR Inc. tímto prohlašuje, _e tento Radiolan je ve shodì se základními po_adavky a dalšími pøíslušnými ustanoveními smìrnice 1999/5/ES.
Undertegnede NETGEAR Inc. erklærer herved, at følgende udstyr Radiolan overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Hiermit erklärt NETGEAR Inc., dass sich das Gerät Radiolan in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet.
Käesolevaga kinnitab NETGEAR Inc. seadme Radiolan vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
requirements and other relevant provisions of Directive 1999/5/EC.
Por medio de la presente NETGEAR Inc. declara que el Radiolan cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.
МЕ ФЗН РБСПХУБ NETGEAR Inc. ДЗЛЩНЕЙ ПФЙ Radiolan УХММПСЦЩНЕФБЙ РСПУ ФЙУ ПХУЙЩДЕЙУ БРБЙФЗУЕЙУ КБЙ ФЙУ ЛПЙРЕУ УЧЕФЙКЕУ ДЙБФБОЕЙУ ФЗУ ПДЗГЙБУ 1999/5/ЕК.
Par la présente NETGEAR Inc. déclare que l'appareil Radiolan est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Con la presente NETGEAR Inc. dichiara che questo Radiolan è conforme ai requ isiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Ar šo NETGEAR Inc. deklarç, ka Radiolan atbilst Direktîvas 1999/5/EK bûtiskajâm prasîbâm un citiem ar to saistîtajiem noteikumiem.
iii
Lietuviø
[Lithuanian]
Šiuo NETGEAR Inc. deklaruoja, kad šis Radiolan atitinka esminius reikalavimus ir kitas 1999/5/ EB Direktyvos nuostatas.
Nederlands
[Dutch]
Malti
[Maltese]
Magyar
[Hungarian]
Polski
[Polish]
Português
[Portuguese]
Slovensko
[Slovenian]
Slovensky
[Slovak]
Suomi
[Finnish]
Svenska
[Swedish]
Íslenska [Icelandic]
Hierbij verklaart NETGEAR Inc. dat het toestel Radiolan in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG.
Hawnhekk, NETGEAR Inc., jiddikjara li dan Radiolan jikkonforma mal-htigijiet essenzjali u ma provvedimenti ohrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Alulírott, NETGEAR Inc. nyilatkozom, hogy a Radiolan megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Niniejszym NETGEAR Inc. oœwiadcza, ¿e Radiolan jest zgodny z zasadniczymi wymogami oraz pozosta³ymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
NETGEAR Inc. declara que este Radiolan está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE.
NETGEAR Inc. izjavlja, da je ta Radiolan v skladu z bistvenimi zahtevami in ost alimi relevantnimi doloèili direktive 1999/5/ES.
NETGEAR Inc. týmto vyhlasuje, _e Radiolan spåòa základné po_iadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.
NETGEAR Inc. vakuuttaa täten että Radiolan tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Härmed intygar NETGEAR Inc. att denna Radiolan står I överensstämme lse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG.
Hér með lýsir NETGEAR Inc. yfir því að Radiolan er í samræmi við grun nkröfur og aðrar krö fur, sem gerðar eru í tilskipun 1999/5/EC.
Norsk
[Norwegian]
NETGEAR Inc. erklærer herved at utstyret Radiolan er i samsvar med de grunnleggende krav og øvrige relevante krav i direktiv 1999/5/EF.
Bestätigung des Herstellers/Importeurs
Es wird hiermit bestätigt, daß das Wireless-G Router Model WGR614v10 gemäß der im BMPT-AmtsblVfg 243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte (z.B. Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung.
Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.
iv
Certificate of the Manufacturer/Importer
It is hereby certified that the Wireless-G Router Model WGR614v10 has been suppressed in accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations m ay, however, be subject to certain restrictions. Please se e the not es in the operating instructions.
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations.
Voluntary Control Council for Interference (VCCI) Statement
This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.
When used near a radio or TV receiver , it may become the cause of radio interference. Read instructions for correct handling.
MIC Compliance, “Class B” Equipment (Household purpose info/tele­communications equipment)
As this equipment has undergone EMC registration for household purposes, this product can be used in any area including residential areas
Product and Publication Details
.
Model Number: WGR614v10 Publication Date: February 2010 Product Family: Wireless Router Product Name: Wireless-G Router Model WGR614v10 Home or Business Product: Home Language: English Publication Part Number: 202-10585-01 Publication Version Number: 1.0
v

Contents

About This Manual
Conventions, Formats, and Scope ................................................................................... xi
How to Print This Manual .................................................................................................xii
Revision History ..................... ... ... .... ... ... ... ....................................... ... .... ... ... ... ... .... ... ... ...xiii
Chapter 1 Configuring Basic Connectivity
Using the Setup Manual .................................................................................................1-1
Logging In to Your Wireless Router .................... ............................................................ 1-2
Selecting a Language for Your Screen Display ..............................................................1-5
Configuring Your Internet Connection Using the Setup Wizard .................... ... ... .... ... ... ..1-6
Viewing and Configuring Basic ISP Settings ..................................................................1-6
Your Internet Connection Does Not Require a Login ...............................................1-7
Your Internet Connection Does Require a Login ................................................. ..... 1-9
Setting Up and Testing Basic Wireless Connectivity .................................................... 1-11
Chapter 2 Safeguarding Your Network
Choosing Appropriate Wireless Security ........................................................................ 2-1
Recording Basic Wireless Settings Setup Information ...................................................2-4
Changing Wireless Security Settings .............................................................................2-6
Viewing Basic Wireless Settings ..............................................................................2-6
Configuring WEP Wireless Security .........................................................................2-7
Configuring WPA-PSK and WPA2-PSK Wireless Security ......................................2-9
Viewing Advanced Wireless Settings ...........................................................................2-10
Restricting Wireless Access by MAC Address .............................................................2-11
Adding Guest Networks ......................... ... .... ... ... ... ... ....................................... ... .... ... ...2-14
Changing the Administrator Password .........................................................................2-15
Backing Up Your Configuration .....................................................................................2-16
Understanding Your Firewall .........................................................................................2-17
v1.0, February 2010
vii
Wireless-G Router WGR614v10 Reference Manual
Chapter 3 Restricting Access From Your Network
Content Filtering Overview .............................................................................................3-1
Blocking Access to Internet Sites ...................................................................................3-1
Blocking Access to Internet Services .............................................................................3-3
Configuring a User-Defined Service .........................................................................3-4
Blocking Services by IP Address Range ...... ... ... .... ... ... ... .... ... ... ... ............................3-5
Scheduling Blocking .......................................................................................................3-5
Viewing Logs of Web Access or Attempted Web Access ...............................................3-7
Chapter 4 Customizing Your Network Settings
Using the LAN IP Setup Options ....................................................................................4-1
Configuring a Device Name .....................................................................................4-2
Configuring LAN TCP/IP Setup Parameters ............................................................4-2
Using the Router as a DHCP Server ........................................................................4-2
Using Address Reservation ......................................................................................4-3
Using a Dynamic DNS Service .......................................................................................4-4
Configuring the WAN Setup Options ..............................................................................4-6
Disabling the SPI Firewall ........................................................................................4-6
Setting Up a Default DMZ Server .............................. ... ... .... ... ... ... .... ... ... ... ...............4-6
Responding to a Ping on the Internet (WAN) Port ...................................................4-7
Setting the MTU Size ......................................... .... ... ... .......................................... ..4-7
Configuring NAT Filtering .........................................................................................4-8
Configuring Static Routes ...............................................................................................4-8
Wireless Repeating (Also Called WDS) .......................................................................4-10
Wireless Repeating Function .................................................................................4-11
Setting Up the Base Station ......... ... ... .... ... ... ... ... .... .......................................... ......4-12
Setting Up a Repeater Unit ....................................................................................4-13
Chapter 5 Fine-Tuning Your Network
Allowing Inbound Connections to Your Network .................... .................................... ..... 5-1
How Your Computer Accesses a Remote Computer through Your Router ..............5-2
How Port Triggering Changes the Communication Process ....................................5-3
How Port Forwarding Changes the Communication Process ..................................5-5
How Port Forwarding Differs from Port Triggering ................................................... 5-6
Contents viii
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Configuring Port Forwarding to Local Servers .............. ... ... ... .... ... ... ...............................5-6
Adding a Custom Service ................................ ... .... ... ... ... .... ... ..................................5-7
Editing or Deleting a Port Forwarding Entry ........................ ................................... .. 5-8
Configuring Port Triggering .............................................................................................5-9
Using Universal Plug and Play .....................................................................................5-12
Optimizing Wireless Performance ................................................................................5-13
Using WMM for Wireless Multimedia Applications .................................................5-14
Quality of Service ............................... ... ... .... ... ....................................... ... ... ... ... .... ... ...5-15
Using WMM QoS for Wireless Multimedia Applications ......................... .......... ......5-15
Configuring QoS for Internet Access ......................................................................5-15
Changing the MTU Size ...............................................................................................5-21
Overview of Home and Small Office Networking Technologies ....................................5-22
Assessing Your Speed Requirements ....................................................................5-23
Chapter 6 Using Network Monitoring Tools
Viewing Wireless Router Status Information ...................................................................6-1
Viewing a List of Attached Devices .................................................................................6-6
Managing the Configuration File .....................................................................................6-6
Backing Up and Restoring the Configuration ................................... ........................6-7
Erasing the Configuration .........................................................................................6-7
Upgrading the Router Software ......................................................................................6-8
Upgrading Automatically to New Router Software ...................................................6-9
Upgrading Manually to New Router Software ........................................................ 6-10
Enabling Remote Management Access .......................................................................6-11
Traffic Meter ..................................................... ... ... ....................................... ... ... .... ... ...6-13
Chapter 7 Troubleshooting
Troubleshooting Quick Tips ............................................................................................7-1
Troubleshooting Basic Functions ....................................................................................7-3
Troubleshooting the Web Configuration Interface ..........................................................7-4
Troubleshooting the Internet Connection ........................................................................7-5
Troubleshooting a Network Using the Ping Utility ...........................................................7-7
Testing the LAN Path to Your Router .......................................................................7-7
Testing the Path from Your Computer to a Remote Device .....................................7-8
Problems with Date and Time .........................................................................................7-9
Contents ix
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Solving Wireless Connection Problems ..........................................................................7-9
Using Your Wireless Card Setup Program ...............................................................7-9
Setting Up and Testing Basic Wireless Connectivity ........................ ...................... 7-10
Restoring the Default Configuration and Password ............ ... .... ... ... ... .... ... ... ... ... .... ... ...7-13
Appendix A Technical Specifications
Appendix B Related Documents
Index
Contents x
v1.0, February 2010

About This Manual

The user manual provides information for configuring the features of the NETGEAR® Wireless-G Router Model WGR614v10 beyond initial configuration settings. Initial configuration instructions can be found in the NETGEAR Wireless-G Router WGR614v10 Setup Manual. You should have basic to intermediate computer and Internet skills.

Conventions, Formats, and Scope

The conventions, formats, and scope of this manual are described in the following paragraphs:
Typographical conventions. This manual uses the following typographical conventions:
Italic Emphasis, books, CDs
Bold User input, GUI screen text
Fixed Command prompt, CLI text, code
Italic URL links
Formats. This manual uses the following formats to highlight special messages:
Note: This format is used to highlight information of importance or special interest.
Tip: This format is used to highlight a procedure that will save time or resources.
Warning: Ignoring this type of note might result in a malfunction or damage to the
equipment, a breach of security, or a loss of data.
v1.0, February 2010
xi
Wireless-G Router WGR614v10 Reference Manual
Danger: This is a safety warning. Failure to take heed of this notice might result in
personal injury or death.
Scope. This manual is written for the Wireless-G Router according to these specifications:
Product Version Wireless-G Router Model WGR614v10 Manual Publication Date February 2010
For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR website in Appendix B, “Related Documents.”
Note: Product updates are available on the NETGEAR, Inc. website at
http://www.netgear.com/support.

How to Print This Manual

T o print this manual, your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe Web site at
http://www.adobe.com.
Tip: If your printer supports printing two pages on a single sheet of paper, you can
save paper and printer ink by selecting this feature.
About This Manual xii
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual

Revision History

NETGEAR, Inc. is constantly searching for ways to improve its products and documentation. The following table indicates any changes that might have been made since the Wireless-G Router was introduced.
Table 2-1. Publication Revision History
Part Number
202-10585-01 v1.0 February 2010 First publication.
Version Number
Date Description
About This Manual xiii
v1.0, February 2010
Chapter 1
Configuring Basic Connectivity
This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration of your wireless router using the Resource CD as described in the Setup Ma nual, these settings are specified automatically for you. This chapter provides further details about these connectivity settings, as well as instructions on how to log in to the router for further configuration.
Note: NETGEAR recommends using the Smart Wizard™ on the Resource CD for initial
configuration, as described in the .
This chapter includes the following sections:
“Using the Setup Manual
“Logging In to Your Wireless Router” on page 1-2
“Selecting a Language for Your Screen Display” on page 1-5
“Configuring Your Internet Connection Using the Setup Wizard” on page 1-6
“Viewing and Configuring Basic ISP Settings” on page 1-6
“Setting Up and Testing Basic Wireless Connectivity” on page 1-11

Using the Setup Manual

For first-time installation of your wireless router, refer to the NETGEAR Wireless Router Setup Manual. The Setup Manual explains how to launch the NETGEAR Smart Wizard on the Resource CD to step you through the procedure to connect your router, modem, and computers. The Smart
Wizard will assist you in configuring your wireless settings and enabling wireless security for your network. After initial configuration using the Setup Manual, you can use the information in this User Manual to configure additional features of your wireless router.
For installation instructions in a language other than English, refer to the language options on the Resource CD.
1-1
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual

Logging In to Your Wireless Router

When the wireless router is connected to your network, you can access and configure the router using your browser.
To access the Web Configuration Manager:
1. Connect to the wireless router by typing http://www.routerlogin.net or the router’s LAN IP
address (the default is 192.168.1.1) in the address field of your browser, and then press Enter. A login window opens:
Figure 1-1
Tip: Yo u can connect to the wireless router by typing either of these URLs in the
address field of your browser, and then pressing Enter:
http://www.routerlogin.net
http://www.routerlogin.com If these URLs do not work, you must type the IP address of the router, for
example, http://www.192.168.1.1.
2. Enter admin for the router user name and your password (or the default, password). For
information about how to change the password, see “Changing the Administrator Password”
on page 2-15.
Note: The router user name and password are not the same as any other user name or
password you might use to log in to your Internet connection.
Configuring Basic Connectivity 1-2
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
The Checking for Firmware Updates screen appears unless you previously cleared the Check for Updated Firmware Upon Log-in check box.
Figure 1-2
This message displays if the router discovers that new firmware is available. (If no new
firmware is available, the router will proceed to the router status screen.)
Figure 1-3
To automatically update to the new firmware, click Yes to allow the router to download
and install the new firmware file from NETGEAR.
Warning: When uploading firmware to the Wireless-G Router, do not interrupt
the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware.
The update process typically takes about 1 minute. When the upload is complete, your router automatically restarts.
3. If there is no new firmware, the login will take you to the Basic Settings screen displayed here.
Configuring Basic Connectivity 1-3
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Figure 1-4
Note: If the Check for New Version Upon Log-in check box is selected, the home
page is the Router Upgrade screen. Otherwise, it is the Basic Settings screen.
If the wireless router is connected to the Internet, you can select Knowledge Base or Documentation under Web Support in the main menu to view support information or the documentation for the wireless router.
If you do not click Logout, the wireless router will wait for 5 minutes after no activity before it automatically logs you out.
Configuring Basic Connectivity 1-4
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual

Selecting a Language for Your Screen Display

Using the Select Language drop-down menu, located in the upper right corner of the Router Manager screen, you can display the router manager screens in any of lan guages shown in Figure 1-5:
Figure 1-5
The language is set to English by default. The default language is always stored in memory. When you select a language other than the default, that language as well as English is stored in memory. The additional language stored is the most recently selected. For example, if you select Deutsch, German and English will be stored. If you next select Chinese, Chinese and English will be stored.
To specify a language to be used on your router manager screens, do the following:
1. Expand the list and select the language you want.
2. Click Apply.
Configuring Basic Connectivity 1-5
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
The language you select is then downloaded and displayed in the language selection box, and your screen display will be in the selected language.
Note: You can select from the entire list of supported languages only when the router is
connected to the Internet. When th e rout er is not c onnected to the Internet, you can select one of the stored languages only.

Configuring Your Internet Connection Using the Setup Wizard

You can manually configure your Internet connection using the Basic Settings screen, or you can allow the Smart Setup Wizard to determine your Internet Service Provider (ISP) configuration.
The Smart Setup Wizard searches your Internet connection for servers and protocols to determine your ISP configuration. This feature is not the same as the Smart Wizard configuration assistant that appears only when the router is in its factory default state. To use the Smart Setup Wizard to assist with configuration or to verify the Internet connection settings:
1. From the top of the main menu of the browser interface, click Setup Wizard.
2. Click Next to proceed. Enter your ISP settings, as needed.
3. At the end of the Setup Wizard, click Test to verify your Internet connection. If you have
trouble connecting to the Internet, see Chapter 7, “Troubleshooting.”

Viewing and Configuring Basic ISP Settings

Settings related to your Internet service are specified in the Basic Settings screen. To access the Basic Settings screen, from the main menu of the router’s Web Configuration Interface, under Setup, select Basic Settings.
The content you see in the Basic Settings screen depends on whether your ISP requires that you log in with a user name and password for Internet access.
Configuring Basic Connectivity 1-6
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
ISP does not require login

Your Internet Connection Does Not Require a Login

If no login is required by your ISP, the following settings appear in the Basic Settings screen.
Figure 1-6
Account Name (might also be called Host Name). The account name is provided to the ISP
during a DHCP request from your router. In most cases, this setting is not required, but some ISPs require it for access to ISP services such as mail or news servers.
Domain Name. The domain name is provided by your router to computers on your LAN when
the computers request DHCP settings from your router. In most cases, this settings is not required.
Configuring Basic Connectivity 1-7
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Internet IP Address. Determines how your router obtains an IP address for Internet access. – If your ISP assigns an IP address dynamically (by DHCP), select Get Dynamically From
ISP.
If your ISP has assigned you a permanent, fixed (static) IP address for your computer,
select Use Static IP Address. Enter the IP address that your ISP assigned. Also, enter the subnet mask and the gateway IP address. The gateway is the ISP’s router to which your router will connect.
Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.
Router MAC Address. This section determines the Ethernet MAC address that the router will use on the Internet port. Typically, yo u would leave Use Default Address selected. However, some ISPs (especially cable modem providers) register the Ethernet MAC address of the network interface card in your computer when your account is first opened. They then accept only traffic from the MAC address of that computer. This feature allows your router to masquerade as that computer by “cloning” or “spoofing” its MAC address.
To change the MAC address, select one of the following methods: – Select Use Computer MAC Address. The router will then capture and use the MAC
address of the computer that you are now using. You must be using the one computer that is allowed by the ISP.
Select Use This MAC Address, and type it in here.
Configuring Basic Connectivity 1-8
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Login required

Your Internet Connection Does Require a Login

If a login is required by your ISP, the following settings appear in the Basic Settings screen:
Figure 1-7
Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Yes, the Basic Settings screen displays.
Note: After you finish setting up your router, you will no longer need to launch the
ISP’s login program on your computer to access the Internet. When you start an Internet application, your router will automatically log you in.
Internet Service Provider. This drop-down list contains a few ISPs that need special protocols for connection. The list includes:
Configuring Basic Connectivity 1-9
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services – Telstra Bigpond, an Australian residential cable modem service
Note: The Telstra Bigpond setting is only for older cable modem service
accounts still requiring a Bigpond login utility. Telstra has discontinued this type of account. Those with Tels tra DSL accounts and newer cable modem accounts should select No for Does Your Internet Connection Require a Login.
PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services
worldwide.
Figure 1-8
Note: Not all ISPs are listed here. The ones on this list have special
requirements.
Login and Password. This is the user name and password provided by your ISP. This name and password are used to log in to the ISP server.
Service Name. If your connection is capable of connecting to multiple Internet services, this setting specifies which service to use.
Connection Mode. This drop-down list (shown in Figure 1-7 on page 1-9) selects when the router will connect to and disconnect from the Internet. The list includes:
Always On. The router logs in to the Internet immediately after booting and never
disconnects.
Dial on Demand. The router logs in only when outgoing traffic is present and logs out
after the idle time-out.
Manually Connect. The router logs in or logs out only when the user clicks Connect or
Disconnect in the Router Status screen.
Configuring Basic Connectivity 1-10
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Idle Timeout. Your Internet connection is logged out if there is no data transfer du ring the specified time interval.
Domain Name Server (DNS) Address. If you know that your ISP does not automatically transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.

Setting Up and Testing Basic Wireless Connectivity

Follow these instructions to set up and test basic wireless connectivity. Once you have established basic wireless connectivity, you can enable security settings appropriate to your needs.
1. Select Wireless Settings under Setup in the main menu of the WGR614v10 router.
Figure 1-9
Configuring Basic Connectivity 1-11
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
2. As appropriate, select the region in which the wireless interface will operate.
Note: In North America, you will not be able to change the region setting.
3. For the wireless network name (SSID), use the default name, or choose a suitable descriptive
name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. The default SSID is NETGEAR.
Note: The SSID is case-sensitive; NETGEAR is not the same as nETgear. Also, the
SSID of any wireless access adapters must match the SSID you specify in the Wireless-G Router. If they do not match, you will not get a wireless connection to the Wireless-G Router.
4. For the remaining settings, accept the defaults.
The default channel is Auto.
It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless router or access point. Selec t a channel that is not being used by any other wireless networks within several hundred feet of your router. For more information about the wireless channel frequencies, click the link to the online document “Wireless Networking Basics” in Appendix B.
The default mode is b and g.
The default for Security Options is None.
5. Click Apply to save your changes.
Note: If you are configuring the router from a wireless computer and you change the
router’s SSID, channel, or security settings, you will lose your wireless connection when you click Apply. You must then change the wireless settings of your computer to match the router’s new settings.
Configuring Basic Connectivity 1-12
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
6. Select Wireless Settings under Advanced in the main menu of the WGR614v10 router.
Figure 1-10
7. Make sure that the Enable Wireless Router Radio, Enable SSID Broadcast, and Enable WMM check boxes are selected.
8. Click Setup Access List.
9. Make sure that the Turn Access Control On check box is not selected.
10. Configure and test your wireless computer for wireless connectivity.
Program the wireless adapter of your computer to have the same SSID and channel that you specified in the router, and disable encryption. Check that your computer has a wireless link and can obtain an IP address by DHCP from the router.
Once your computer has basic wireless connectivity to the router, you can configure the advanced wireless security functions of the computer and router (for more information about security and these settings, see Chapter 2, “Safeguarding Your Network ”).
Configuring Basic Connectivity 1-13
v1.0, February 2010
Chapter 2
Safeguarding Your Network
The Wireless-G Router Model WGR614v10 provides highly effective security features, which are covered in detail in this chapter.
This chapter includes the following sections:
“Choosing Appropriate Wireless Security
“Recording Basic Wireless Settings Setup Information ” on page 2-4
“Changing Wireless Security Settings” on page 2-6
“Viewing Advanced Wireless Settings” on page 2-10
“Restricting Wireless Access by MAC Address” on page 2-11
“Restricting Wireless Access by MAC Address” on page 2-11
“Adding Guest Networks” on page 2-14
“Changing the Administrator Password” on page 2-15
“Backing Up Your Configuration” on page 2-16
“Understanding Your Firewall” on page 2-17

Choosing Appropriate Wireless Security

Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11b/g wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs.
The time it takes to establish a wireless connection can vary depending on both your security settings and router placement.
2-1
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
WGR614v10
1) Open system: easy but no security
2) MAC access list: no data security
3) WEP: security but some performance impact
4) WPA-PSK: strong security
5) WPA2-PSK: very strong security
Wireless data
security options
Range: up to 300 foot radius
Note: Use these with other features that enhance security (Table 2-2 on page 2-4).
Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, NETGEAR recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, an d can cause significan t performance degradation with a slow computer.
Note: NETGEAR recommends that you change the administration password of your
router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see “Changing the Administrator
Password” on page 2-15.
Figure 2-1
The Wireless-G Router provides two screens for configuring the wireless settings: the basic Wireless Settings screen, which you access under Setup in the main menu (see “Changing W ireless
Security Settings” on page 2-6), and the Advanced Wireless Settings screen, which you access
under Advanced (see “Changing Wireless Security Settings” on page 2-6). Basic security options are listed in order of increasing effectiveness in Table 2-1 below. Other
Safeguarding Your Network 2-2
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
features that affect security are listed in Table 2-2 on page 2-4. For more details on wireless security methods, see the online document “Wireless Networking Basics” in Appendix B.
Table 2 -1 . Wireless Security Options
Security Type Description None. No wireless security. Recommended only for
troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.
WEP. Wired Equiva lent Privacy. Wired Equivalent Privacy (WEP) data encryption
provides moderate data security. WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropp e r usi n g publicly available tools. For more information, see “Configuring WEP
Wireless Security” on page 2-7.
WPA-PSK (TKIP). WPA-PSK standard encryption with TKIP encryption type.
WPA2-PSK (AES). Wi-Fi Protected Access version 2 with Pre-Shared Key; WPA2-PSK standard encryption with the AES encryption type.
WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.
Wi-Fi Protected Access with Pre-Shared Key (WPA­PSK and WPA2-PSK) dat a encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. For more information, see “Configuring WPA-PSK
and WPA2-PSK Wireless Security” on page 2-9.
Safeguarding Your Network 2-3
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Table 2-2. Other Features That Enhance Security
Security Type Description Disable the wireless router radio. If you disable the wireless router radio, wireless
devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see “Viewing Advanced
Wireless Settings” on page 2-10.
T urn off the broadcast of the wireless network name SSID.
Restrict access based on MAC address. You can restrict access to only trusted computers so
Modify your firewall’s rules. By default, the firewall allows any outbound traffic
If you disable the broadcast of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless network discovery feature of some products such as Windows XP , but your data is still fully exposed to an intruder using available wireless eavesdropping tools. For more information, see “Viewing Advanced
Wireless Settings” on page 2-10.
that unknown computers cannot wirelessly connect to the Wireless-G Router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see “Restricting Wireless
Access by MAC Address” on page 2-11.
and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewall’s rules. For more information, see “Understanding Your
Firewall” on page 2-17.

Recording Basic Wireless Settings Setup Information

Before customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided.
Safeguarding Your Network 2-4
v1.0, February 2010
Wireless-G Router WGR614v10 Reference Manual
Wireless Network Name (SSID). ______________________________ The SSID identifies
the wireless network. You can use up to 32 alphanumeric characters. The SSID is case­sensitive. The SSID in the wireless adapter card must match the SSID of the wireless router. In some configuration utilities (such as in Windows XP), the term “wireless network name” is used instead of SSID.
•If WEP Authentication is used, circle one: Open System, Shared Key, or Auto.
Note: If you select Shared Key, the other devices in the network will not connect
unless they are also set to Shared Key and are configured with the correct key.
WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key
size must be the same for the wireless adapters and the wireless router.
Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption
keys. Whichever method you use, record the key values in the spaces provided.
Passphrase Method. ______________________________ These characters are
case-sensitive. Enter a word or group of printable characters and click Generate. Not all wireless devices support the passphrase method.
Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10
hexadecimal digits (any combination of 0–9, a–f, or A–F). For 128-bit WEP, enter 26 hexadecimal digits.
Key 1: ___________________________________ Key 2: ___________________________________ Key 3: ___________________________________ Key 4: ___________________________________
If WPA-PSK or WPA2-PSK authentication is used:
Passphrase. ______________________________ These characters are case-sensitive.
Enter a word or group of printable characters. When you use WPA-PSK, the other devices in the network will not connect unless they are also set to WPA-PSK and are configured with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the network will not connect unless they are also set to WPA2-PSK and are configured with the correct passphrase.
Use the procedures described in the following sections to specify the Wireless-G Router. Store this information in a safe place.
Safeguarding Your Network 2-5
v1.0, February 2010
Loading...
+ 92 hidden pages