MR814v2 Reference Manual
Page 5
... of the Router 1-1 802.11b Standards-based Wireless Networking 1-2 A Powerful, True Firewall with Content Filtering 1-2 Security ...1-3 Autosensing Ethernet Connections with Auto Uplink 1-3 Extensive Protocol Support 1-3 Easy Installation and Management 1-4 Maintenance and Support 1-4 Package Contents ...1-5 The Router's Front Panel 1-6 The Router's Rear Panel 1-7 Chapter 2 Connecting the Router to the Internet What You Will Need Before You Begin 2-1 Cabling and Computer...
... of the Router 1-1 802.11b Standards-based Wireless Networking 1-2 A Powerful, True Firewall with Content Filtering 1-2 Security ...1-3 Autosensing Ethernet Connections with Auto Uplink 1-3 Extensive Protocol Support 1-3 Easy Installation and Management 1-4 Maintenance and Support 1-4 Package Contents ...1-5 The Router's Front Panel 1-6 The Router's Rear Panel 1-7 Chapter 2 Connecting the Router to the Internet What You Will Need Before You Begin 2-1 Cabling and Computer...
MR814v2 Reference Manual
Page 8
Appendix A Technical Specifications Appendix B Network, Routing, Firewall, and Basics Related Publications ...B-1 Basic Router Concepts B-1 What is a Router B-2 Routing Information Protocol B-2 IP Addresses and the Internet B-2 Netmask ...B-4 Subnet Addressing B-5 Private IP ... IP Configuration by DHCP B-10 Internet Security and Firewalls B-10 What is a Firewall B-11 Stateful Packet Inspection B-11 Denial of Service Attack B-11 Ethernet Cabling ...B-12 Uplink Switches, Crossover Cables, and MDI/MDIX Switching B-12 Cable Quality ...B-13 Appendix C Preparing Your Network Preparing Your...
Appendix A Technical Specifications Appendix B Network, Routing, Firewall, and Basics Related Publications ...B-1 Basic Router Concepts B-1 What is a Router B-2 Routing Information Protocol B-2 IP Addresses and the Internet B-2 Netmask ...B-4 Subnet Addressing B-5 Private IP ... IP Configuration by DHCP B-10 Internet Security and Firewalls B-10 What is a Firewall B-11 Stateful Packet Inspection B-11 Denial of Service Attack B-11 Ethernet Cabling ...B-12 Uplink Switches, Crossover Cables, and MDI/MDIX Switching B-12 Cable Quality ...B-13 Appendix C Preparing Your Network Preparing Your...
MR814v2 Reference Manual
Page 11
...router provides connection for multiple personal computers (PCs) to intermediate computer and Internet skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial information is provided in square brackets. Screen text. File and directory names. About This Manual xi Preface About This Manual Congratulations on the Netgear... that must be pressed simultaneously are shown enclosed in the Appendices and on your purchase of the NETGEAR® MR814v2 Cable/DSL Wireless Router. Named keys in text are shown in text linked with a plus (+) sign. User input....
...router provides connection for multiple personal computers (PCs) to intermediate computer and Internet skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial information is provided in square brackets. Screen text. File and directory names. About This Manual xi Preface About This Manual Congratulations on the Netgear... that must be pressed simultaneously are shown enclosed in the Appendices and on your purchase of the NETGEAR® MR814v2 Cable/DSL Wireless Router. Named keys in text are shown in text linked with a plus (+) sign. User input....
MR814v2 Reference Manual
Page 13
... external access device such as a cable modem or DSL modem • Extensive Protocol Support • Login capability • Front panel LEDs for easy monitoring of -day, Website addresses and address keywords, and share high-speed cable/DSL Internet access for firmware upgrade Introduction 1-1 With minimum setup, you from hackers. Key Features of the NETGEAR MR814v2 Cable/DSL Wireless Router.
... external access device such as a cable modem or DSL modem • Extensive Protocol Support • Login capability • Front panel LEDs for easy monitoring of -day, Website addresses and address keywords, and share high-speed cable/DSL Internet access for firmware upgrade Introduction 1-1 With minimum setup, you from hackers. Key Features of the NETGEAR MR814v2 Cable/DSL Wireless Router.
MR814v2 Reference Manual
Page 14
... • WEP keys can be generated manually or by passphrase • Wireless access can be restricted by screening for the MR814v2 Cable/DSL Wireless Router 802.11b Standards-based Wireless Networking The MR814v2 router includes an 802.11b-compliant wireless access point, providing continuous, high-speed 11 Mbps access between your wireless and Ethernet devices. Reference Manual for keywords within Web addresses. The...
... • WEP keys can be generated manually or by passphrase • Wireless access can be restricted by screening for the MR814v2 Cable/DSL Wireless Router 802.11b Standards-based Wireless Networking The MR814v2 router includes an 802.11b-compliant wireless access point, providing continuous, high-speed 11 Mbps access between your wireless and Ethernet devices. Reference Manual for keywords within Web addresses. The...
MR814v2 Reference Manual
Page 15
... B, "Network, Routing, Firewall, and Basics." • IP Address Sharing by NAT The MR814v2 router allows several networked PCs to share an Internet account using only a single IP address, which may be statically or dynamically assigned by NAT NAT opens a temporary path to the Internet for the MR814v2 Cable/DSL Wireless Router Security The MR814v2 router is equipped...
... B, "Network, Routing, Firewall, and Basics." • IP Address Sharing by NAT The MR814v2 router allows several networked PCs to share an Internet account using only a single IP address, which may be statically or dynamically assigned by NAT NAT opens a temporary path to the Internet for the MR814v2 Cable/DSL Wireless Router Security The MR814v2 router is equipped...
MR814v2 Reference Manual
Page 37
... placement of your MR814v2 router. The time it takes to establish a wireless connection can result in order to maximize the network speed. The latency, data throughput performance, and notebook power consumption also vary depending on a notebook PC. Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your firewall in significant performance...
... placement of your MR814v2 router. The time it takes to establish a wireless connection can result in order to maximize the network speed. The latency, data throughput performance, and notebook power consumption also vary depending on a notebook PC. Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your firewall in significant performance...
MR814v2 Reference Manual
Page 38
...router provides highly effective security features which are covered in detail in the main menu of the browser interface. MR814 v2 Wireless Data Security Options Range: Up to 500 Feet 1) Open System: Easy but no security 2) MAC Access List: No data security 3) WEP: Security but the data broadcast over 802.11b wireless... MR814v2 wireless data security options Restricting access by anyone with a compatible adapter. The Wireless Settings menu will appear. 3-2 Wireless Configuration Reference Manual for the MR814v2 Cable/DSL Wireless Router Implement Appropriate Wireless Security Note...
...router provides highly effective security features which are covered in detail in the main menu of the browser interface. MR814 v2 Wireless Data Security Options Range: Up to 500 Feet 1) Open System: Easy but no security 2) MAC Access List: No data security 3) WEP: Security but the data broadcast over 802.11b wireless... MR814v2 wireless data security options Restricting access by anyone with a compatible adapter. The Wireless Settings menu will appear. 3-2 Wireless Configuration Reference Manual for the MR814v2 Cable/DSL Wireless Router Implement Appropriate Wireless Security Note...
MR814v2 Reference Manual
Page 40
... (SSID) you configure in the MR814v2 router. Restricting Wireless Access Based on the Wireless Access List This list determines which wireless hardware devices will still be able to use computers connected to the router via Ethernet cables will be allowed to connect to the firewall. 1. Reference Manual for the MR814v2 Cable/DSL Wireless Router Figure 3-3: Wireless Access Point settings Restricting Access to...
... (SSID) you configure in the MR814v2 router. Restricting Wireless Access Based on the Wireless Access List This list determines which wireless hardware devices will still be able to use computers connected to the router via Ethernet cables will be allowed to connect to the firewall. 1. Reference Manual for the MR814v2 Cable/DSL Wireless Router Figure 3-3: Wireless Access Point settings Restricting Access to...
MR814v2 Reference Manual
Page 44
... the MR814v2 Cable/DSL Wireless Router. This field determines which the wireless interface will be necessary to "Wireless Channels" on the wireless channel frequencies please refer to change the wireless channel unless you can enable security settings appropriate to save your changes. 3-8 Wireless Configuration For more information on page D-7. 6. Click the Wireless Settings link in to the MR814v2 firewall at its...
... the MR814v2 Cable/DSL Wireless Router. This field determines which the wireless interface will be necessary to "Wireless Channels" on the wireless channel frequencies please refer to change the wireless channel unless you can enable security settings appropriate to save your changes. 3-8 Wireless Configuration For more information on page D-7. 6. Click the Wireless Settings link in to the MR814v2 firewall at its...
MR814v2 Reference Manual
Page 45
... test your PCs for the MR814v2 Cable/DSL Wireless Router Note: If you change the wireless settings of the MR814v2 firewall. 3. How to match the firewall's new settings. 8. Wireless Access menu Wireless Configuration 3-9 You must then change the firewall's SSID, channel, or security settings, you will lose your PC to Restrict Wireless Access by DHCP from a wireless PC and you are able...
... test your PCs for the MR814v2 Cable/DSL Wireless Router Note: If you change the wireless settings of the MR814v2 firewall. 3. How to match the firewall's new settings. 8. Wireless Access menu Wireless Configuration 3-9 You must then change the firewall's SSID, channel, or security settings, you will lose your PC to Restrict Wireless Access by DHCP from a wireless PC and you are able...
MR814v2 Reference Manual
Page 46
... Add to add this , configure each wireless PC to obtain a wireless link to the list. To do this device to the firewall. Note: When configuring the firewall from a wireless PC which is not in the Attached Devices menu. 6. The Available Wireless Cards list displays. Click the radio button... from the table, click on Apply. Configure WEP To configure WEP data encryption, follow these steps: 3-10 Wireless Configuration Reference Manual for the MR814v2 Cable/DSL Wireless Router 4. The PC should then appear in the Trusted PC list, if you select Turn Access Control On, you...
... Add to add this , configure each wireless PC to obtain a wireless link to the list. To do this device to the firewall. Note: When configuring the firewall from a wireless PC which is not in the Attached Devices menu. 6. The Available Wireless Cards list displays. Click the radio button... from the table, click on Apply. Configure WEP To configure WEP data encryption, follow these steps: 3-10 Wireless Configuration Reference Manual for the MR814v2 Cable/DSL Wireless Router 4. The PC should then appear in the Trusted PC list, if you select Turn Access Control On, you...
MR814v2 Reference Manual
Page 47
...MR814v2 firewall ...Wireless Settings encryption menu 4. Wireless adapter configuration utilities such as defined by the IEEE 802.11b wireless communication standard. Click the Wireless Settings link in the MR814v2. 5. The four key boxes will lose your network. • Automatic - Click Apply to match the router WEP settings or access the router from a wireless...wireless connection when you set up. 2. You can manually or automatically program the four data encryption keys. Be sure you have set in the main menu of WEP Parameters" on page D-5 for the MR814v2 Cable/DSL Wireless Router...
...MR814v2 firewall ...Wireless Settings encryption menu 4. Wireless adapter configuration utilities such as defined by the IEEE 802.11b wireless communication standard. Click the Wireless Settings link in the MR814v2. 5. The four key boxes will lose your network. • Automatic - Click Apply to match the router WEP settings or access the router from a wireless...wireless connection when you set up. 2. You can manually or automatically program the four data encryption keys. Be sure you have set in the main menu of WEP Parameters" on page D-5 for the MR814v2 Cable/DSL Wireless Router...
MR814v2 Reference Manual
Page 65
...the browser interface. These features can make a local server (for Port Forwarding to Local Servers Although the router causes your MR814v2 Cable/DSL Wireless Router. Advanced Configuration of the Router 6-1 This is done using the Port Forwarding menu. Figure 6-1: Port Forwarding Menu . Configuring for example... of the Router This chapter describes how to configure the advanced features of your entire local network to appear as a single machine to the Internet, you are unfamiliar with networking and routing, refer to Appendix B, "Network, Routing, Firewall, and Basics...
...the browser interface. These features can make a local server (for Port Forwarding to Local Servers Although the router causes your MR814v2 Cable/DSL Wireless Router. Advanced Configuration of the Router 6-1 This is done using the Port Forwarding menu. Figure 6-1: Port Forwarding Menu . Configuring for example... of the Router This chapter describes how to configure the advanced features of your entire local network to appear as a single machine to the Internet, you are unfamiliar with networking and routing, refer to Appendix B, "Network, Routing, Firewall, and Basics...
MR814v2 Reference Manual
Page 68
...to one local PC acts as a game or videoconferencing host, enter its IP address as the default. Reference Manual for the MR814v2 Cable/DSL Wireless Router Some online games and videoconferencing applications are incompatible with them , but there are other applications that PC's IP address is entered as... DMZ server loses much of the protection of the Router This computer is called the Default DMZ Server. 6-4 Advanced Configuration of the firewall, and is exposed to exploits from the Internet is normally discarded by the router unless the traffic is helpful when using some of your...
...to one local PC acts as a game or videoconferencing host, enter its IP address as the default. Reference Manual for the MR814v2 Cable/DSL Wireless Router Some online games and videoconferencing applications are incompatible with them , but there are other applications that PC's IP address is entered as... DMZ server loses much of the protection of the Router This computer is called the Default DMZ Server. 6-4 Advanced Configuration of the firewall, and is exposed to exploits from the Internet is normally discarded by the router unless the traffic is helpful when using some of your...
MR814v2 Reference Manual
Page 76
...practical. Specify what external addresses will work since the ISDN router is on the Internet to configure, upgrade and check the status of your MR814v2 router. Reference Manual for the MR814v2 Cable/DSL Wireless Router When you can be accessed through the ISDN router at 192.168.0.100. • A Metric value of...users on the LAN. • Private is selected only as the gateway, and a second static route was created to your router for these addresses should be denied by the company's firewall. Your password can allow access from any IP address on the 134.177.0.0 network, your...
...practical. Specify what external addresses will work since the ISDN router is on the Internet to configure, upgrade and check the status of your MR814v2 router. Reference Manual for the MR814v2 Cable/DSL Wireless Router When you can be accessed through the ISDN router at 192.168.0.100. • A Metric value of...users on the LAN. • Private is selected only as the gateway, and a second static route was created to your router for these addresses should be denied by the company's firewall. Your password can allow access from any IP address on the 134.177.0.0 network, your...
MR814v2 Reference Manual
Page 91
...are mirrored and indexed at many other sites worldwide. Basic Router Concepts Large amounts of selecting and forwarding this data is performed by a router. The function of bandwidth can be very expensive. Network, Routing, Firewall, and Basics B-1 Because of the Internet. An RFC is..., Internet access is a Request For Comment (RFC) published by a slower-speed wide-area network (WAN) link such as a cable or DSL modem. The RFC documents outline and define the standard protocols and procedures for further information. However, providing high bandwidth between a local network...
...are mirrored and indexed at many other sites worldwide. Basic Router Concepts Large amounts of selecting and forwarding this data is performed by a router. The function of bandwidth can be very expensive. Network, Routing, Firewall, and Basics B-1 Because of the Internet. An RFC is..., Internet access is a Request For Comment (RFC) published by a slower-speed wide-area network (WAN) link such as a cable or DSL modem. The RFC documents outline and define the standard protocols and procedures for further information. However, providing high bandwidth between a local network...
MR814v2 Reference Manual
Page 92
... home applications. In these routing tables, a router builds up a logical picture of physical WAN connection they support. The MR814v2 Cable/DSL Wireless Router is a device that routes the IP protocol over a single-user broadband connection. Among other routers in the data and on the Internet must have... in the network. RIP is not required for the MR814v2 Cable/DSL Wireless Router What is written in which each group of the network is normally written as: 195.34.12.7 B-2 Network, Routing, Firewall, and Basics Individual users and small organizations may obtain their ...
... home applications. In these routing tables, a router builds up a logical picture of physical WAN connection they support. The MR814v2 Cable/DSL Wireless Router is a device that routes the IP protocol over a single-user broadband connection. Among other routers in the data and on the Internet must have... in the network. RIP is not required for the MR814v2 Cable/DSL Wireless Router What is written in which each group of the network is normally written as: 195.34.12.7 B-2 Network, Routing, Firewall, and Basics Individual users and small organizations may obtain their ...
MR814v2 Reference Manual
Page 93
...,777,214 hosts on the address range and the application. They use an eight-bit network number and a 24-bit node number. Network, Routing, Firewall, and Basics B-3 In addition, the 32 bits of IP addresses. There are five standard classes of the address are in this range: 1.x.x.x to...,354 hosts on a network. A Class B address uses a 16-bit network number and a 16-bit node number. Reference Manual for the MR814v2 Cable/DSL Wireless Router The latter version is used by the TCP/IP software to identify the address class. Each address type begins with a unique bit pattern, which is...
...,777,214 hosts on the address range and the application. They use an eight-bit network number and a 24-bit node number. Network, Routing, Firewall, and Basics B-3 In addition, the 32 bits of IP addresses. There are five standard classes of the address are in this range: 1.x.x.x to...,354 hosts on a network. A Class B address uses a 16-bit network number and a 16-bit node number. Reference Manual for the MR814v2 Cable/DSL Wireless Router The latter version is used by the TCP/IP software to identify the address class. Each address type begins with a unique bit pattern, which is...
MR814v2 Reference Manual
Page 94
....168.170.237) combined with: 11111111 11111111 11111111 00000000 (255.255.255.0) Equals: 11000000 10101000 10101010 00000000 (192.168.170.0) B-4 Network, Routing, Firewall, and Basics For instance, the netmasks for Class A, B, and C addresses are used for multicasts (messages sent to all ones) is not assigned, ...a 32-bit quantity that, when logically combined (using an AND operator) with the IP address. Reference Manual for the MR814v2 Cable/DSL Wireless Router • Class C Class C addresses can also be expressed by the class. Class C addresses use . A netmask is the upper 24 bits.
....168.170.237) combined with: 11111111 11111111 11111111 00000000 (255.255.255.0) Equals: 11000000 10101000 10101010 00000000 (192.168.170.0) B-4 Network, Routing, Firewall, and Basics For instance, the netmasks for Class A, B, and C addresses are used for multicasts (messages sent to all ones) is not assigned, ...a 32-bit quantity that, when logically combined (using an AND operator) with the IP address. Reference Manual for the MR814v2 Cable/DSL Wireless Router • Class C Class C addresses can also be expressed by the class. Class C addresses use . A netmask is the upper 24 bits.