Netgear orporated 10400149 Users Manual

Easy, Reliable & Secure
User Manual

N300 WiFi Router (N300R) User Manual

202-11001-01 May 2012
Brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to change without notice.
In the interest of improving internal design, operational function, and/or reliability, On Networks reserves the right to make changes to the products described in this document without notice. On Networks does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
This symbol is placed in accordance with the European Union Directive 2002/96 on the Waste Electrical and Electronic Equipment (the WEEE Directive). If disposed of within the European Union, this product should be treated and recycled in accordance with the laws of your jurisdiction implementing the WEEE Directive.
ii
May 2012

Contents

Chapter 1 Configuring Basic Connectivity
Powering On Your Wireless Router.................................................................................1-1
Logging In To Your Wireless Router ..............................................................................1-1
Configuring Your Internet Connection Using the Smart Setup Wizard ...........................1-5
Viewing and Configuring Basic ISP Settings ..................................................................1-5
Setting Up and Testing Basic Wireless Connectivity ....................................................1-10
Chapter 2 Safeguarding Your Network
Choosing Appropriate Wireless Security ........................................................................2-1
Recording Basic Wireless Settings Setup Information ...................................................2-5
Changing Wireless Security Settings .............................................................................2-6
Viewing Basic Wireless Settings ..............................................................................2-6
Configuring WEP Wireless Security .........................................................................2-9
Configuring WPA-PSK and WPA2-PSK Wireless Security ....................................2-10
Viewing Advanced Wireless Settings ...........................................................................2-12
Using Push 'N' Connect (Wi-Fi Protected Setup) .........................................................2-13
Push Button Configuration .....................................................................................2-14
Security PIN Entry ..................................................................................................2-15
Configuring the WPS Settings ................................................................................2-17
Connecting Additional Wireless Client Devices after WPS Setup ..........................2-18
Restricting Wireless Access by MAC Address .............................................................2-19
Changing the Administrator Password .........................................................................2-21
Backing Up Your Configuration ....................................................................................2-22
Live Parental Controls...................................................................................................2-23
Understanding Your Firewall ........................................................................................2-23
v1.0, May 2012
vii
N300 WiFi Router (N300R) User Manual
Chapter 3 Restricting Access From Your Network
Content Filtering Overview .............................................................................................3-1
Blocking Access to Internet Sites ...................................................................................3-1
Blocking Access to Internet Services .............................................................................3-3
Blocking Services by IP Address Range ..................................................................3-5
Scheduling Blocking .......................................................................................................3-5
Viewing Logs of Web Access or Attempted Web Access ...............................................3-6
Configuring E-mail Alert and Web Access Log Notifications ..........................................3-7
Chapter 4 Customizing Your Network Settings
Using the LAN IP Setup Options ....................................................................................4-1
Configuring a Device Name .....................................................................................4-2
Configuring LAN TCP/IP Setup Parameters ............................................................4-3
Using the Router as a DHCP Server ........................................................................4-4
Using Address Reservation ......................................................................................4-5
Using a Dynamic DNS Service .......................................................................................4-6
Configuring the WAN Setup Options ..............................................................................4-8
Disabling Prt Scan and DoS Protection ....................................................................4-8
Setting Up a Default DMZ Server .............................................................................4-8
Responding to a Ping on the Internet (WAN) Port ...................................................4-9
Ebling IBMP Proxying ...............................................................................................4-9
Setting the MTU Size .............................................................................................4-10
Configuring NAT Filtering .......................................................................................4-10
Configuring Static Routes .............................................................................................4-10
Wireless Repeating (Also Called WDS) .......................................................................4-12
Wireless Repeating Function .................................................................................4-13
Setting Up the Base Station ...................................................................................4-14
Setting Up a Repeater Unit ....................................................................................4-15
viii Contents
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Chapter 5 Fine-Tuning Your Network
Allowing Inbound Connections to Your Network ............................................................5-1
How Your Computer Accesses a Remote Computer through Your Router .............5-2
How Port Triggering Changes the Communication Process ....................................5-3
How Port Forwarding Changes the Communication Process ..................................5-5
How Port Forwarding Differs from Port Triggering ...................................................5-6
Configuring Port Forwarding to Local Servers ................................................................5-6
Adding a Custom Service .........................................................................................5-7
Editing or Deleting a Port Forwarding Entry .............................................................5-9
Configuring Port Triggering ..........................................................................................5-10
Using Universal Plug and Play .....................................................................................5-14
Optimizing Wireless Performance ................................................................................5-15
Changing the MTU Size ...............................................................................................5-16
Quality of Service .........................................................................................................5-18
Using WMM QoS for Wireless Multimedia Applications .........................................5-18
Configuring QoS for Internet Access ......................................................................5-18
Overview of Home and Small Office Networking Technologies ...................................5-24
Assessing Your Speed Requirements ...................................................................5-25
Chapter 6 Using Network Monitoring Tools
Viewing Wireless Router Status Information ..................................................................6-2
Viewing a List of Attached Devices ................................................................................6-7
Managing the Configuration File .....................................................................................6-7
Backing Up and Restoring the Configuration ...........................................................6-8
Erasing the Configuration .........................................................................................6-9
Updating the Router Firmware .......................................................................................6-9
Checking for New Firmware in the Router Upgrade Screen ..................................6-10
Updating Manually to New Router Firmware .........................................................6-11
Enabling Remote Management Access .......................................................................6-13
Traffic Meter ..................................................................................................................6-15
Contents ix
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Chapter 7 Troubleshooting
Quick Tips .......................................................................................................................7-1
Troubleshooting Basic Functions ...................................................................................7-2
Login Problems ...............................................................................................................7-4
Checking the Internet Service Connection .....................................................................7-5
Obtaining an Internet IP Address .............................................................................7-5
Troubleshooting PPPoE ...........................................................................................7-6
Troubleshooting Internet Browsing ..........................................................................7-7
Troubleshooting Your Network Using the Ping Utility .....................................................7-7
Testing the LAN Path to Your Router .......................................................................7-8
Testing the Path from Your Computer to a Remote Device .....................................7-9
Problems with Date and Time ........................................................................................7-9
Problems with Wireless Adapter Connections ..............................................................7-10
Restoring the Default Configuration and Password ......................................................7-11
Appendix A Technical Specifications
Default Configuration Settings ....................................................................................... A-1
General Specifications ................................................................................................... A-3
Appendix B Related Documents
Index
x Contents
v1.0, May 2012
Chapter 1
Configuring Basic Connectivity
This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. This chapter provides further details about connectivity settings, as well as instructions on how to log in to the router for further configuration.This chapter includes the following sections:
“Logging In To Your WiFi Router”
“Configuring Your Internet Connection Using the Smart Setup Wizard” on page 1-5
“Viewing and Configuring Basic ISP Settings” on page 1-5
“Setting Up and Testing Basic Wireless Connectivity” on page 1-11

Logging In To Your WiFi Router

When the WiFi router is connected to your network, you can access and configure the router using your browser.
To access the router:
1. Connect to the WiFi router by typing http://www.routerlogin.com in the address field of your browser, and then press Enter. A login window displays.
Figure 1-1
1-1
May 2012
N300 WiFi Router (N300R) User Manual
Tip: You can connect to the WiFi router by typing either of these URLs in the
address field of your browser, and then pressing Enter:
http://www.routerlogin.net
http://www.routerlogin.com If these URLs do not work, you must type the IP address of the router, for
example, http://www.192.168.1.1.
2. Enter admin for the router user name and your password (or the default, password). For information about how to change the password, see “Changing the Administrator Password”
on page 2-21.
Note: The router user name and password are not the same as any other user name or
password you might use to log in to your Internet connection.
The Checking for Firmware Updates screen appears unless you previously cleared the Check for Updated Firmware Upon Log-in check box.
Figure 1-2
1-2 Configuring Basic Connectivity
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
If the router discovers a newer version of firmware, the message on the left displays when you log in. If no new firmware is available, the message on the right displays.
Figure 1-3
To automatically update to the new firmware, click Yes to allow the router to download and install the new firmware file from On Networks.
Warning: When uploading firmware to the N300R router, do not interrupt the Web
browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it could corrupt the firmware.
When the upload is complete, your router automatically restarts. The update process typically takes about 1 minute.
3. In the main menu on the left, select Basic Settings under Setup. The Basic Settings screen displays showing the WiFi router’s home page and suggested default settings.
Configuring Basic Connectivity 1-3
May 2012
N300 WiFi Router (N300R) User Manual
Figure 1-4
Note: If the Check for New Version Upon Log-in check box is selected, the home
page is the Router Upgrade screen. Otherwise, it is the Basic Settings screen.
If the WiFi router is connected to the Internet, you can select Knowledge Base under Web Support in the main menu to view support information for the WiFi router.
If you do not click Logout, the WiFi router will wait for 5 minutes after no activity before it automatically logs you out.
1-4 Configuring Basic Connectivity
v1.0, May 2012
N300 WiFi Router (N300R) User Manual

Configuring Your Internet Connection Using the Smart Setup Wizard

You can manually configure your Internet connection using the Basic Settings screen, or you can allow the Smart Setup Wizard to determine your Internet Service Provider (ISP) configuration.
The Smart Setup Wizard searches your Internet connection for servers and protocols to determine your ISP configuration.
To use the Smart Setup Wizard to assist with configuration or to verify the Internet connection settings:
1. Select Setup Wizard from the top of the main menu.
2. Click Next to proceed. Enter your ISP settings, as needed.
3. At the end of the Setup Wizard, click Test to verify your Internet connection. If you have
trouble connecting to the Internet, see Chapter 7, “Troubleshooting.”

Viewing and Configuring Basic ISP Settings

Settings related to your Internet service are specified in the Basic Settings screen. Select Basic Settings under Setup in the main menu.
The content you see in the Basic Settings screen depends on whether your ISP requires that you log in with a user name and password for Internet access.
No login required by ISP. If no login is required by your ISP, the following settings appear in the Basic Settings screen.
Configuring Basic Connectivity 1-5
May 2012
N300 WiFi Router (N300R) User Manual
ISP does not require login
Figure 1-5
Account Name (might also be called Host Name). The account name is provided to the
ISP during a DHCP request from your router. In most cases, this setting is not required, but some ISPs require it for access to ISP services such as mail or news servers.
Domain Name. The domain name is provided by your router to computers on your LAN
when the computers request DHCP settings from your router. In most cases, this settings is not required.
1-6 Configuring Basic Connectivity
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Internet IP Address. Determines how your router obtains an IP address for Internet
access.
If your ISP assigns an IP address dynamically (by DHCP), select Get Dynamically From ISP.
If your ISP has assigned you a permanent, fixed (static) IP address for your computer, select Use Static IP Address. Enter the IP address that your ISP assigned. Also, enter the subnet mask and the gateway IP address. The gateway is the ISP’s router to which your router will connect.
Domain Name Server (DNS) Address. If you know that your ISP does not automatically
transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.
Router MAC Address. This section determines the Ethernet MAC address that the router
will use on the Internet port. Typically, you would leave Use Default Address selected. However, some ISPs (especially cable modem providers) register the Ethernet MAC address of the network interface card in your computer when your account is first opened. They then accept only traffic from the MAC address of that computer. This feature allows your router to masquerade as that computer by “cloning” or “spoofing” its MAC address.
To change the MAC address, select one of the following methods:
Select Use Computer MAC Address. The router will then capture and use the MAC address of the computer that you are now using. You must be using the one computer that is allowed by the ISP.
Select Use This MAC Address, and enter it here.
Configuring Basic Connectivity 1-7
May 2012
N300 WiFi Router (N300R) User Manual
If a login is required by your ISP, the following settings appear in the Basic Settings screen:
ISP does require login
Figure 1-6
1-8 Configuring Basic Connectivity
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Does Your Internet Connection Require A Login? If you usually must use a login program
such as WinPOET to access the Internet, your Internet connection requires a login. After you select Yes, the Basic Settings screen displays.
Note: After you finish setting up your router, you will no longer need to launch the
ISP’s login program on your computer to access the Internet. When you start an Internet application, your router will automatically log you in.
Internet Service Provider. This drop-down list contains a few ISPs that need special
protocols for connection. The list includes:
PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services.
PPPoE (Point to Point Protocol over Ethernet), the protocol used by most DSL services worldwide.
L2TP (Layer 2 Tunneling Protocol), used to support virtual private networks (VPNs).
Figure 1-7
Note: Not all ISPs are listed here. The ones on this list have special
requirements.
Login and Password. This is the user name and password provided by your ISP. This
name and password are used to log in to the ISP server.
Service Name. If your connection is capable of connecting to multiple Internet services,
this setting specifies which service to use.
Configuring Basic Connectivity 1-9
May 2012
N300 WiFi Router (N300R) User Manual
Connection Mode. This drop-down list selects when the router will connect to and disconnect from the Internet.
Figure 1-8
The list includes:
Always On. The router logs in to the Internet immediately after booting and never disconnects.
Dial on Demand. The router logs in only when outgoing traffic is present and logs out after the idle time-out.
Manually Connect. The router logs in or logs out only when the user clicks Connect or Disconnect in the Router Status screen.
Idle Timeout. Your Internet connection is logged out if there is no data transfer during the
specified time interval.
Domain Name Server (DNS) Address. If you know that your ISP does not automatically
transmit DNS addresses to the router during login, select Use These DNS Servers, and enter the IP address of your ISP’s primary DNS server. If a secondary DNS server address is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.
Router MAC Address. Select the default router MAC address, the computer MAC
address, or a MAC address that you specify.
1-10 Configuring Basic Connectivity
v1.0, May 2012
N300 WiFi Router (N300R) User Manual

Setting Up and Testing Basic Wireless Connectivity

Note: If you use a wireless computer to change wireless settings, you might be
disconnected when you click Apply. Reconfigure your wireless adapter to match the new settings, or access the router from a wired computer to make any further changes.
Follow these instructions to set up and test basic wireless connectivity. Once you have established basic wireless connectivity, you can enable security settings appropriate to your needs.
1. Select Wireless Settings under Setup in the main menu of the N300R router.
Figure 1-9
2. For the wireless network name (SSID), use the default name, or choose a suitable descriptive name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. The default SSID is On Networks.
Note: The SSID is case-sensitive. Also, the SSID of any wireless access adapters
must match the SSID you specify in the N300R router. If they do not match, you will not get a wireless connection to the N300R router.
Configuring Basic Connectivity 1-11
May 2012
N300 WiFi Router (N300R) User Manual
3. Select the region in which the wireless interface will operate.
Note: In North America, the region cannot be changed, and is set by default to US.
4. Set the channel. The default channel is Auto.
This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless router or access point. Select a channel that is not being used by any other wireless networks within several hundred feet of your router.
5. Make sure that the mode is set to Up to 145Mbps.
6. For Security Options, select None.
7. Click Apply to save your changes.
Note: If you are configuring the router from a wireless computer and you change the
router’s SSID, channel, or security settings, you will lose your wireless connection when you click Apply. You must then change the wireless settings of your computer to match the router’s new settings.
1-12 Configuring Basic Connectivity
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
8. Select Advanced Wireless Settings under Advanced in the main menu of the N300R router.
Figure 1-10
9. Make sure that the Enable Wireless Router Radio check box is selected.
10. Click Setup Access List.
11. Make sure that the Turn Access Control On check box is not selected.
Configuring Basic Connectivity 1-13
May 2012
N300 WiFi Router (N300R) User Manual
12. Configure and test your wireless computer for wireless connectivity. Program the wireless adapter of your computer to have the same SSID and channel that you
specified in the router, and disable encryption. Check that your computer has a wireless link and can obtain an IP address by DHCP from the router.
Once your computer has basic wireless connectivity to the router, you can configure the advanced wireless security functions of the computer and router (for more information about security and these settings, see Chapter 2, “Safeguarding Your Network ”).
1-14 Configuring Basic Connectivity
v1.0, May 2012
Chapter 2
Safeguarding Your Network
The N300 WiFi Router (N300R) provides highly effective security features, which are covered in detail in this chapter.
This chapter includes the following sections:
“Choosing Appropriate Wireless Security”
“Recording Basic Wireless Settings Setup Information” on page 2-5
“Changing Wireless Security Settings” on page 2-6
“Viewing Advanced Wireless Settings” on page 2-12
“Using WPS Push Button Connect (Wi-Fi Protected Setup)” on page 2-13
“Restricting Wireless Access by MAC Address” on page 2-19
“Changing the Administrator Password” on page 2-21
“Backing Up Your Configuration” on page 2-22
“Live Parental Controls” on page 2-23
“Understanding Your Firewall” on page 2-23

Choosing Appropriate Wireless Security

Unlike wired networks, wireless networks allow anyone with a compatible adapter to receive your wireless data transmissions well beyond your walls. Operating an unsecured wireless network creates an opportunity for outsiders to eavesdrop on your network traffic or to enter your network to access your computers and files. Indoors, computers can connect over 802.11g/n wireless networks at ranges of up to 300 feet. Such distances can allow for others outside your immediate area to access your network. Use the security features of your wireless equipment that are appropriate to your needs.
The time it takes to establish a wireless connection can vary depending on both your security settings and router placement.
2-1
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Stronger security methods can entail a cost in terms of throughput, latency, battery consumption, and equipment compatibility. In choosing an appropriate security level, you can also consider the effort compared to the reward for a hacker to break into your network. As a minimum, however, On Networks recommends using WEP with Shared Key authentication. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer.
Note: On Networks recommends that you change the administration password of your
router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings. For information about how to change the administrator password, see “Changing the Administrator
Password” on page 2-21.
Wireless data
security options
Range: up to 300 foot radius
1) Open system: easy but no security
2) MAC access list: no data security
JWNR2000
Note: Use these with other features that enhance security (Table 2-2 on page 2-4).
Figure 2-1
v2
3) WEP: security but some performance impact
4) WPA-PSK: strong security
5) WPA2-PSK: very strong security
To configure the wireless network, you can:
Manually specify your SSID and your wireless security settings. The N300R router provides two screens for configuring the wireless settings:
2-2 Safeguarding Your Network
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Wireless Settings. You access these under Setup in the main menu (see “Viewing Basic
Wireless Settings” on page 2-6).
Advanced Wireless Settings. You access these under Advanced in the main menu (see
“Viewing Advanced Wireless Settings” on page 2-12).
Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/ WPA2 security on both the router and the client device. If the clients in your network are WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/WPA2 security on both the router and the client device (see “Using WPS
Push Button Connect (Wi-Fi Protected Setup)” on page 2-13).
Basic security options are listed in order of increasing effectiveness in Table 2-1. Other features that affect security are listed in Table 2-2 on page 2-4.
Table 2-1. Wireless Security Options
Security Type Description None. No wireless security. Recommended only for
troubleshooting wireless connectivity. Do not run an unsecured wireless network unless it is your intention to provide free Internet access for the public.
WEP. Wired Equivalent Privacy. Wired Equivalent Privacy (WEP) data encryption
provides moderate data security. WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools. For more information, see “Configuring WEP
Wireless Security” on page 2-9.
WPA-PSK (TKIP). WPA-PSK standard encryption with TKIP encryption type.
WPA2-PSK (AES). Wi-Fi Protected Access version 2 with Pre-Shared Key; WPA2-PSK standard encryption with the AES encryption type.
WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode.
Wi-Fi Protected Access with Pre-Shared Key (WPA­PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. For more information, see “Configuring WPA-PSK
and WPA2-PSK Wireless Security” on page 2-10.
Safeguarding Your Network 2-3
May 2012
N300 WiFi Router (N300R) User Manual
Table 2-2. Other Features That Enhance Security
Security Type Description Disable the wireless router radio. If you disable the wireless router radio, wireless
devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see “Viewing Advanced
Wireless Settings” on page 2-12.
Turn off the broadcast of the wireless network name SSID.
Restrict access based on MAC address. You can restrict access to only trusted computers so
Modify your firewall’s rules. By default, the firewall allows any outbound traffic
Use the WPS push button Connect feature (Wi-Fi Protected Setup).
If you disable the broadcast of the SSID, only devices that know the correct SSID can connect. This nullifies the wireless network discovery feature of some products such as Windows XP, but your data is still fully exposed to an intruder using available wireless eavesdropping tools. For more information, see “Viewing Advanced
Wireless Settings” on page 2-12.
that unknown computers cannot wirelessly connect to the N300R router. MAC address filtering adds an obstacle against unwanted access to your network by the general public, but the data broadcast over the wireless link is fully exposed. This data includes your trusted MAC addresses, which can be read and impersonated by a hacker. For more information, see “Restricting Wireless
Access by MAC Address” on page 2-19.
and prohibits any inbound traffic except for responses to your outbound traffic. However, you can modify the firewall’s rules. For more information, see “Understanding Your
Firewall” on page 2-23.
Wi-Fi Protected Setup provides easy setup by means of a push button. Older wireless adapters and devices might not support this. Check whether devices are WPS enabled. For more information, see “Using WPS Push Button
Connect (Wi-Fi Protected Setup)” on page 2-13.
2-4 Safeguarding Your Network
v1.0, May 2012
N300 WiFi Router (N300R) User Manual

Recording Basic Wireless Settings Setup Information

Before and after customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided.
Wireless Network Name (SSID). ______________________________ The SSID identifies the wireless network. You can use up to 32 alphanumeric characters. The SSID is case- sensitive. The SSID in the wireless adapter card must match the SSID of the WiFi router. In some configuration utilities (such as in Windows XP), the term “wireless network name” is used instead of SSID.
•If WEP Authentication is used, circle one: Open System, Shared Key, or Auto.
Note: If you select Shared Key, the other devices in the network will not connect
unless they are also set to Shared Key and are configured with the correct key.
WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key
size must be the same for the wireless adapters and the WiFi router.
Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption
keys. Whichever method you use, record the key values in the spaces provided.
Passphrase Method. ______________________________ These characters are
case-sensitive. Enter a word or group of printable characters and click Generate. Not all wireless devices support the passphrase method.
Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10
hexadecimal digits (any combination of 0–9, a–f, or A–F). For 128-bit WEP, enter
26 hexadecimal digits. Key 1: ___________________________________ Key 2: ___________________________________ Key 3: ___________________________________ Key 4: ___________________________________
If WPA-PSK or WPA2-PSK authentication is used:
Safeguarding Your Network 2-5
May 2012
N300 WiFi Router (N300R) User Manual
Passphrase. ______________________________ These characters are case-sensitive.
Enter a word or group of printable characters. When you use WPA-PSK, the other devices in the network will not connect unless they are also set to WPA-PSK and are configured with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the network will not connect unless they are also set to WPA2-PSK and are configured with the correct passphrase.
Use the procedures described in the following sections to specify the N300R router. Store this information in a safe place.

Changing Wireless Security Settings

This section describes the wireless settings that you can view and configure in the Wireless Settings screen, which you access under Setup in the main menu.

Viewing Basic Wireless Settings

To specify the wireless security settings of your router:
1. Log in to the router as described in “Logging In To Your WiFi Router” on page 1-1.
2-6 Safeguarding Your Network
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
2. Select Wireless Settings under Setup in the main menu. The Wireless Settings screen displays.
Figure 2-2
The available settings in this screen are:
Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The N300R default SSID is On Networks. You can disable this broadcast as described in “Viewing
Advanced Wireless Settings” on page 2-12.
Safeguarding Your Network 2-7
May 2012
N300 WiFi Router (N300R) User Manual
Region. This field identifies the region where the N300R router can be used. It might not be legal to operate the wireless features of the WiFi router in a region other than one of those identified in this field.
Note: In North America, the region cannot be changed, and is set by default to US.
Channel. This field determines which operating frequency is used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless network. The WiFi router uses channel bonding technology to extend the bandwidth for data transmission.
Mode. This field determines which data communications protocol is used. You can choose from:
Up To 54 Mbps. Legacy mode, for compatibility with the slower 802.11b and 802.11g
wireless devices.
Note: WEP and WPA security options are supported at 54 Mbps only.
Up To 145 Mbps. Neighbor Friendly mode, for reduced interference with neighboring
wireless networks. Provides two transmission streams with different data on the same channel at the same time, but also allows 802.11b and 802.11g wireless devices. This is the default mode.
Up To 300 Mbps. Performance mode, using channel expansion to achieve the 300 Mbps
data rate. The N300R router will use the channel you selected as the primary channel and expand to the secondary channel (primary channel +4 or –4) to achieve a 40 MHz frame­by-frame bandwidth. The N300R router will detect channel usage and will disable frame­by-frame expansion if the expansion would result in interference with the data transmission of other access points or clients.
Note: The maximum wireless signal rate is derived from the IEEE Standard 802.11
specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate.
2-8 Safeguarding Your Network
v1.0, May 2012
N300 WiFi Router (N300R) User Manual
Security Options. The selection of wireless security options can significantly affect your network performance. The time it takes to establish a wireless connection can vary depending on both your security settings and router placement.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2­PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Instructions for configuring the security options can be found in “Choosing Appropriate Wireless Security” on page 2-1.
3. Click Apply to save your settings.

Configuring WEP Wireless Security

WEP Shared Key authentication and WEP data encryption can be defeated by a determined eavesdropper using publicly available tools.
WEP offers the following options:
Automatic. With the Automatic option, the router will try both Open System and Shared Key authentication. Normally this setting is suitable. If it fails, select Open System or Shared Key. You can also refer to your wireless adapter’s documentation to see what method to use.
Open System. With Open System authentication and 64 or 128 bit WEP data encryption, the N300R router does perform data encryption but does not perform any authentication. Anyone can join the network. This setting provides very little practical wireless security.
Shared Key. With Shared Key authentication, a wireless device must know the WEP key to join the network. Select the encryption strength (64 or 128 bit data encryption). Manually enter the key values, or enter a word or group of printable characters in the Passphrase field. Manually entered keys are not case-sensitive, but passphrase characters are case-sensitive.
To configure WEP data encryption:
Note: If you use a wireless computer to configure WEP settings, you will be disconnected
when you click Apply. You must then either configure your wireless adapter to match the WiFi router WEP settings or access the WiFi router from a wired computer to make any further changes. Not all wireless adapter configuration utilities support passphrase key generation.
1. Select Wireless Settings under Setup in the main menu.
2. In the Security Options section, select WEP. The WEP options display.
Safeguarding Your Network 2-9
May 2012
N300 WiFi Router (N300R) User Manual
.
Figure 2-3
3. Select the authentication type and encryption strength.
4. You can manually or automatically program the four data encryption keys. These values must
be identical on all computers and access points in your network.
Automatic. In the Passphrase field, enter a word or group of printable characters, and
click Generate. The passphrase is case-sensitive. The four key fields are automatically populated with key values.
Manual. Enter 10 hexadecimal digits (any combination of 0–9, a–f, or A–F). These
entries are not case-sensitive. For example, AA is the same as aa. Select which of the four keys to activate.
5. Click Apply to save your settings.

Configuring WPA-PSK and WPA2-PSK Wireless Security

Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. Check whether newer drivers are available from the manufacturer. Also, you might be able to use the Push 'N' Connect feature to configure this type of security if it is supported by your wireless clients. See “Using WPS Push Button Connect (Wi-Fi Protected Setup)” on page 2-13.
2-10 Safeguarding Your Network
v1.0, May 2012
Loading...
+ 108 hidden pages