NETGEAR MR814v2 User Manual

Page 6

Advertising
background image

vi

Contents

Chapter 3

Wireless Configuration

Considerations For A Wireless Network .........................................................................3-1

Observe Performance, Placement, and Range Guidelines .....................................3-1
Implement Appropriate Wireless Security ................................................................3-2

Understanding Wireless Settings ...................................................................................3-2

Restricting Wireless Access to Your Network ..........................................................3-3

Restricting Access to Your Network by Turning Off Wireless Connectivity ........3-4
Restricting Wireless Access Based on the Wireless Network Name (SSID) .....3-4
Restricting Wireless Access Based on the Wireless Access List ......................3-4

Choosing Authentication and Security Encryption Methods ....................................3-6

Authentication Scheme Selection ......................................................................3-6
Encryption Strength Choices .............................................................................3-6

How to Set Up and Test Basic Wireless Connectivity ..............................................3-8
How to Restrict Wireless Access by MAC Address .................................................3-9
Configure WEP ......................................................................................................3-10

Chapter 4

Content Filtering

Content Filtering Overview .............................................................................................4-1
Blocking Access to Internet Sites ...................................................................................4-2
Blocking Access to Internet Services .............................................................................4-3

Configuring a User Defined Service .........................................................................4-4
Configuring Services Blocking by IP Address Range ..............................................4-5

Scheduling When Blocking Will Be Enforced .................................................................4-5
Viewing Logs of Web Access or Attempted Web Access ...............................................4-6
Configuring E-Mail Alert and Web Access Log Notifications ..........................................4-7

Chapter 5

Maintenance

Viewing Router Status Information .................................................................................5-1
Viewing a List of Attached Devices .................................................................................5-5
Upgrading the Router Software ......................................................................................5-5
Configuration File Management .....................................................................................5-6

Restoring and Backing Up the Configuration ...........................................................5-7
Erasing the Configuration .........................................................................................5-8

Changing the Administrator Password ...........................................................................5-8

Advertising