MR814v2 Reference Manual
Page 6
... Wireless Security 3-2 Understanding Wireless Settings 3-2 Restricting Wireless Access to Your Network 3-3 Restricting Access to Your Network by Turning Off Wireless Connectivity ........3-4 Restricting Wireless Access Based on the Wireless Network Name (SSID) .....3-4 Restricting Wireless Access Based on the Wireless ...E-Mail Alert and Web Access Log Notifications 4-7 Chapter 5 Maintenance Viewing Router Status Information 5-1 Viewing a List of Attached Devices 5-5 Upgrading the Router Software 5-5 Configuration File Management 5-6 Restoring and Backing Up the Configuration 5-7 Erasing...
... Wireless Security 3-2 Understanding Wireless Settings 3-2 Restricting Wireless Access to Your Network 3-3 Restricting Access to Your Network by Turning Off Wireless Connectivity ........3-4 Restricting Wireless Access Based on the Wireless Network Name (SSID) .....3-4 Restricting Wireless Access Based on the Wireless ...E-Mail Alert and Web Access Log Notifications 4-7 Chapter 5 Maintenance Viewing Router Status Information 5-1 Viewing a List of Attached Devices 5-5 Upgrading the Router Software 5-5 Configuration File Management 5-6 Restoring and Backing Up the Configuration 5-7 Erasing...
MR814v2 Reference Manual
Page 25
... for the MR814v2 Cable/DSL Wireless Router c. This feature eliminates the need to the router Note: The MR814v2 router incorporates Auto UplinkTM technology. Now, turn on your computer. Connecting the Router to the router d. Cable or B DSL modem Figure 2-3: Connect the computers on your network to worry about crossover cables because Auto Uplink will automatically sense if the cable should have a normal...
... for the MR814v2 Cable/DSL Wireless Router c. This feature eliminates the need to the router Note: The MR814v2 router incorporates Auto UplinkTM technology. Now, turn on your computer. Connecting the Router to the router d. Cable or B DSL modem Figure 2-3: Connect the computers on your network to worry about crossover cables because Auto Uplink will automatically sense if the cable should have a normal...
MR814v2 Reference Manual
Page 61
...Refresh button. Upgrade files can be upgraded as new software is stored in FLASH memory, and can be sent to view the table, shown below. Note: The Web browser used to look for the MR814v2 Cable/DSL Wireless Router Viewing a List of Attached Devices The Attached Devices... menu contains a table of the browser interface, under the Maintenance heading, select Attached Devices to the router using Microsoft Internet Explorer or Netscape Navigator 3.0 or above. The upgrade file can be downloaded from Netgear's...
...Refresh button. Upgrade files can be upgraded as new software is stored in FLASH memory, and can be sent to view the table, shown below. Note: The Web browser used to look for the MR814v2 Cable/DSL Wireless Router Viewing a List of Attached Devices The Attached Devices... menu contains a table of the browser interface, under the Maintenance heading, select Attached Devices to the router using Microsoft Internet Explorer or Netscape Navigator 3.0 or above. The upgrade file can be downloaded from Netgear's...
MR814v2 Reference Manual
Page 62
... may corrupt the software. Reference Manual for the MR814v2 Cable/DSL Wireless Router From the Main Menu of the browser interface, under the Maintenance heading, select the Router Upgrade heading to reconfigure the router after upgrading. Download and unzip the new software file from the user's PC, or cleared to a user's PC, retrieved (restored) from NETGEAR. 2. If the browser...
... may corrupt the software. Reference Manual for the MR814v2 Cable/DSL Wireless Router From the Main Menu of the browser interface, under the Maintenance heading, select the Router Upgrade heading to reconfigure the router after upgrading. Download and unzip the new software file from the user's PC, or cleared to a user's PC, retrieved (restored) from NETGEAR. 2. If the browser...
MR814v2 Reference Manual
Page 86
...If you do not receive replies: - Check to your workstation and router. • Wrong network configuration - Verify that your cable or DSL modem is connected and functioning. 7-6 Troubleshooting Check that the Ethernet card driver software and TCP/IP software are displayed. From the Windows run menu, type: PING -n ...off, follow the instructions in the previous section are both installed and configured on the same subnet. Reference Manual for the MR814v2 Cable/DSL Wireless Router If the path is working, you see this message: Reply from < IP address >: bytes=32 time=NN ms TTL=xxx...
...If you do not receive replies: - Check to your workstation and router. • Wrong network configuration - Verify that your cable or DSL modem is connected and functioning. 7-6 Troubleshooting Check that the Ethernet card driver software and TCP/IP software are displayed. From the Windows run menu, type: PING -n ...off, follow the instructions in the previous section are both installed and configured on the same subnet. Reference Manual for the MR814v2 Cable/DSL Wireless Router If the path is working, you see this message: Reply from < IP address >: bytes=32 time=NN ms TTL=xxx...
MR814v2 Reference Manual
Page 93
...Class B addresses can correctly identify the host section of the address are subdivided into your computer. After the address class has been determined, the software can have up to 16,777,214 hosts on a single network. In addition, the 32 bits of the address. The first part of...part identifies the host node or station on the address range and the application. Reference Manual for the MR814v2 Cable/DSL Wireless Router The latter version is used by the TCP/IP software to enter into two parts. The follow figure shows the three main address classes, including network and host...
...Class B addresses can correctly identify the host section of the address are subdivided into your computer. After the address class has been determined, the software can have up to 16,777,214 hosts on a single network. In addition, the 32 bits of the address. The first part of...part identifies the host node or station on the address range and the application. Reference Manual for the MR814v2 Cable/DSL Wireless Router The latter version is used by the TCP/IP software to enter into two parts. The follow figure shows the three main address classes, including network and host...
MR814v2 Reference Manual
Page 105
... as its networking protocol. If a Network Interface Card (NIC) is probably already installed as NetManage Chameleon. • Macintosh Operating System 7 or later includes the software components for use in your PC, then TCP/ IP is already installed in the configuration of broadband Internet service from an Internet service provider (ISP... well. Preparing Your Network C-1 Appendix C Preparing Your Network This appendix describes how to prepare your network to connect to the Internet through the MR814v2 Cable/DSL Wireless Router and how to verify the readiness of your firewall.
... as its networking protocol. If a Network Interface Card (NIC) is probably already installed as NetManage Chameleon. • Macintosh Operating System 7 or later includes the software components for use in your PC, then TCP/ IP is already installed in the configuration of broadband Internet service from an Internet service provider (ISP... well. Preparing Your Network C-1 Appendix C Preparing Your Network This appendix describes how to prepare your network to connect to the Internet through the MR814v2 Cable/DSL Wireless Router and how to verify the readiness of your firewall.
MR814v2 Reference Manual
Page 137
...about its local hosts. The cable used to the Internet. UPnP compliant routers provide broadband users at www.ietf.org. Unshielded twisted pair. The Internet is a data encryption protocol for 802.11b wireless networks. See Windows Internet ... Windows Internet Naming Service WINS PPP. A networking architecture that provides compatibility among networking equipment, software and peripherals of the Universal Plug and Play Forum. See Universal Plug and Play. Windows .... Reference Manual for the MR814v2 Cable/DSL Wireless Router Point-to -peer services. Request For Comment.
...about its local hosts. The cable used to the Internet. UPnP compliant routers provide broadband users at www.ietf.org. Unshielded twisted pair. The Internet is a data encryption protocol for 802.11b wireless networks. See Windows Internet ... Windows Internet Naming Service WINS PPP. A networking architecture that provides compatibility among networking equipment, software and peripherals of the Universal Plug and Play Forum. See Universal Plug and Play. Windows .... Reference Manual for the MR814v2 Cable/DSL Wireless Router Point-to -peer services. Request For Comment.
MR814v3 Reference Manual
Page 6
...NETGEAR product registration, support, and documentation 3-16 Chapter 4 Wireless Configuration Observe Performance, Placement, and Range Guidelines 4-1 Implement Appropriate Wireless Security 4-2 Understanding Wireless Settings 4-3 Default Factory Settings 4-3 Basic Wireless Settings 4-3 Advanced Wireless Settings 4-6 Information to Gather Before Changing Basic Wireless... E-Mail Alert and Web Access Log Notifications 5-7 Chapter 6 Maintenance Viewing Router Status Information 6-1 Viewing a List of Attached Devices 6-5 Configuration File Management 6-5 Restoring and Backing Up...
...NETGEAR product registration, support, and documentation 3-16 Chapter 4 Wireless Configuration Observe Performance, Placement, and Range Guidelines 4-1 Implement Appropriate Wireless Security 4-2 Understanding Wireless Settings 4-3 Default Factory Settings 4-3 Basic Wireless Settings 4-3 Advanced Wireless Settings 4-6 Information to Gather Before Changing Basic Wireless... E-Mail Alert and Web Access Log Notifications 5-7 Chapter 6 Maintenance Viewing Router Status Information 6-1 Viewing a List of Attached Devices 6-5 Configuration File Management 6-5 Restoring and Backing Up...
MR814v3 Reference Manual
Page 27
...modem and wait 2 minutes. Last, turn on your router (cable 2 in the diagram below) into the Ethernet port of installing the router. Connecting the Router to the "Observe Performance, Placement, and Range Guidelines" on the router such as LAN port 4 (point C in to ...router provides a convenient, space-saving way of your router and wait 1 minute. Note: For DSL customers, if software logs you can select "Never dial a connection." f. Securely insert the blue cable that software. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Note: Place the MR814 v3 router...
...modem and wait 2 minutes. Last, turn on your router (cable 2 in the diagram below) into the Ethernet port of installing the router. Connecting the Router to the "Observe Performance, Placement, and Range Guidelines" on the router such as LAN port 4 (point C in to ...router provides a convenient, space-saving way of your router and wait 1 minute. Note: For DSL customers, if software logs you can select "Never dial a connection." f. Securely insert the blue cable that software. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Note: Place the MR814 v3 router...
MR814v3 Reference Manual
Page 42
...802.11 wireless networks at ranges of up to 300 feet. Reference Manual for others outside of your immediate area to access your needs. Wi-Fi Protected Access (WPA) data encryption provides strong data security. For this chapter. You can allow for the MR814 v3 Cable/DSL Wireless Router Implement Appropriate Wireless... Security Note: Indoors, computers can connect over the wireless link is a new standard, wireless device driver and software availability may be received well beyond your wireless equipment....
...802.11 wireless networks at ranges of up to 300 feet. Reference Manual for others outside of your immediate area to access your needs. Wi-Fi Protected Access (WPA) data encryption provides strong data security. For this chapter. You can allow for the MR814 v3 Cable/DSL Wireless Router Implement Appropriate Wireless... Security Note: Indoors, computers can connect over the wireless link is a new standard, wireless device driver and software availability may be received well beyond your wireless equipment....
MR814v3 Reference Manual
Page 45
... XP and Windows 2000 with Service Pack 3 do include the client software that the MR814 v3 router and wireless stations match. • Open System With Open Network Authentication and 64- or 128-bit...wireless station is using. These characters are case sensitive but does not perform any authentication. • Shared Key Shared Key authentication encrypts the SSID and data. Nevertheless, the wireless adapter hardware and driver must also support WPA. Security Options Field Disable WEP Description No wireless security. Reference Manual for the MR814 v3 Cable/DSL Wireless Router...
... XP and Windows 2000 with Service Pack 3 do include the client software that the MR814 v3 router and wireless stations match. • Open System With Open Network Authentication and 64- or 128-bit...wireless station is using. These characters are case sensitive but does not perform any authentication. • Shared Key Shared Key authentication encrypts the SSID and data. Nevertheless, the wireless adapter hardware and driver must also support WPA. Security Options Field Disable WEP Description No wireless security. Reference Manual for the MR814 v3 Cable/DSL Wireless Router...
MR814v3 Reference Manual
Page 51
... with key values. • Manual - For instructions on page D-6 for the MR814 v3 Cable/DSL Wireless Router 4. Click Wireless Settings the main menu and select WPA-PSK for the product you are not case sensitive; NETGEAR is also required. AA is case sensitive; How to save your network. •...these options, as nETgear. You can manually or automatically program the four data encryption keys. These entries are using. Select which of the four keys will be active. Furthermore, client software is not the same as defined by the IEEE 802.11 wireless communication standard. ...
... with key values. • Manual - For instructions on page D-6 for the MR814 v3 Cable/DSL Wireless Router 4. Click Wireless Settings the main menu and select WPA-PSK for the product you are not case sensitive; NETGEAR is also required. AA is case sensitive; How to save your network. •...these options, as nETgear. You can manually or automatically program the four data encryption keys. These entries are using. Select which of the four keys will be active. Furthermore, client software is not the same as defined by the IEEE 802.11 wireless communication standard. ...
MR814v3 Reference Manual
Page 69
... blank condition. NETGEAR recommends using the Erase function, which will be sent to the factory defaults. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Erasing the Configuration It is sometimes desirable to restore the router to upload new firmware into the MR814 v3 router must support HTTP uploads. Upgrading the Router Software Note: Before upgrading the router software, use the Default...
... blank condition. NETGEAR recommends using the Erase function, which will be sent to the factory defaults. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Erasing the Configuration It is sometimes desirable to restore the router to upload new firmware into the MR814 v3 router must support HTTP uploads. Upgrading the Router Software Note: Before upgrading the router software, use the Default...
MR814v3 Reference Manual
Page 70
...MR814 v3 Cable/DSL Wireless Router From the Main Menu of password. Click Upload. If the browser is interrupted, it is complete, your configuration settings. When the upload is important not to restore all the router configuration settings. In some cases, you can restore your settings from NETGEAR.... the new password you assigned, you will automatically restart. In the Router Upgrade menu, click the Browse button and browse to the factory defaults, you may corrupt the software. Figure 6-6: Router Upgrade menu To upload new firmware: 1. This means you will typically...
...MR814 v3 Cable/DSL Wireless Router From the Main Menu of password. Click Upload. If the browser is interrupted, it is complete, your configuration settings. When the upload is important not to restore all the router configuration settings. In some cases, you can restore your settings from NETGEAR.... the new password you assigned, you will automatically restart. In the Router Upgrade menu, click the Browse button and browse to the factory defaults, you may corrupt the software. Figure 6-6: Router Upgrade menu To upload new firmware: 1. This means you will typically...
MR814v3 Reference Manual
Page 92
Check that the Ethernet card driver software and TCP/IP software are displayed. If the LED is functioning...you could have one of the following problems: • Wrong physical connections - Reference Manual for your router and your workstation are correct and that the IP address of your computer is on page C-9. 8-6 Troubleshooting... gateway. Verify that the IP address for the MR814 v3 Cable/DSL Wireless Router 3. Verify that the addresses are connected to a remote device. If the IP configuration of the router is not functioning correctly, you do not receive ...
Check that the Ethernet card driver software and TCP/IP software are displayed. If the LED is functioning...you could have one of the following problems: • Wrong physical connections - Reference Manual for your router and your workstation are correct and that the IP address of your computer is on page C-9. 8-6 Troubleshooting... gateway. Verify that the IP address for the MR814 v3 Cable/DSL Wireless Router 3. Verify that the addresses are connected to a remote device. If the IP configuration of the router is not functioning correctly, you do not receive ...
MR814v3 Reference Manual
Page 98
... different ways of determining the network and host sections of the address, allowing for different numbers of hosts on a network. The MR814 v3 router supports both the older RIP-1 and the newer RIP-2 protocols. Individual users and small organizations may vary depending on the network. ...for each group of eight bits is the Routing Information Protocol (RIP). Reference Manual for the MR814 v3 Cable/DSL Wireless Router Routing Information Protocol One of the protocols used by the TCP/IP software to identify the address class. The address is not required for changes to add to the ...
... different ways of determining the network and host sections of the address, allowing for different numbers of hosts on a network. The MR814 v3 router supports both the older RIP-1 and the newer RIP-2 protocols. Individual users and small organizations may vary depending on the network. ...for each group of eight bits is the Routing Information Protocol (RIP). Reference Manual for the MR814 v3 Cable/DSL Wireless Router Routing Information Protocol One of the protocols used by the TCP/IP software to identify the address class. The address is not required for changes to add to the ...
MR814v3 Reference Manual
Page 116
...so that the PC obtains its specific network configuration information automatically from a DHCP server during the TCP/IP installation process. The MR814 v3 router is shipped preconfigured as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address....Before starting, locate your IP network, each networked PC. Double-click the Network icon. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Most operating systems include the software components you need for networking with your computer. You need to "Appendix B, "Network, Routing, Firewall, and...
...so that the PC obtains its specific network configuration information automatically from a DHCP server during the TCP/IP installation process. The MR814 v3 router is shipped preconfigured as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address....Before starting, locate your IP network, each networked PC. Double-click the Network icon. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Most operating systems include the software components you need for networking with your computer. You need to "Appendix B, "Network, Routing, Firewall, and...
MR814v3 Reference Manual
Page 150
... the identity to the client immediately after sending the success message. This could be through " for 802.1x messages, which means that the software supporting the specific EAP type resides on the authentication server and within the operating system or application "supplicant...security change is required. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for the MR814 v3 Cable/DSL Wireless Router 3. With WPA, rekeying of digital certificates or some other traffic, such as a "pass through the use . The important part to ...
... the identity to the client immediately after sending the success message. This could be through " for 802.1x messages, which means that the software supporting the specific EAP type resides on the authentication server and within the operating system or application "supplicant...security change is required. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for the MR814 v3 Cable/DSL Wireless Router 3. With WPA, rekeying of digital certificates or some other traffic, such as a "pass through the use . The important part to ...
MR814v3 Reference Manual
Page 152
Product Support for the MR814 v3 Cable/DSL Wireless Router Is WPA Perfect? WPA requires software changes to Wireless Access Points Wireless access points must have one year to lose network connectivity for 60 seconds. Changes to the following : D-16 202-10039-01 Wireless Networking Basics Reference Manual for WPA ...that obtained with a non-WPA network, and thus this mode of operation is a definite step forward in August, 2003, NETGEAR, Inc. wireless products that fail the Message Integrity Code (MIC) check within 60 seconds of each station using the access point. If ...
Product Support for the MR814 v3 Cable/DSL Wireless Router Is WPA Perfect? WPA requires software changes to Wireless Access Points Wireless access points must have one year to lose network connectivity for 60 seconds. Changes to the following : D-16 202-10039-01 Wireless Networking Basics Reference Manual for WPA ...that obtained with a non-WPA network, and thus this mode of operation is a definite step forward in August, 2003, NETGEAR, Inc. wireless products that fail the Message Integrity Code (MIC) check within 60 seconds of each station using the access point. If ...