WGR614v9 User Manual
Page 21
... program such as WinPOET to Point Tunneling Protocol), used primarily in the Basic Settings screen: ISP does require login Figure 1-5 • Does Your Internet Connection Require A Login? Internet Service Provider. Wireless-G Router WGR614v9 Reference Manual If a login is required by your router will no longer need special protocols...need to launch the ISP's login program on your Internet connection requires a login. The list includes: • PPTP (Point to access the Internet, your computer to access the Internet. When you select Yes, the Basic Settings screen displays.
... program such as WinPOET to Point Tunneling Protocol), used primarily in the Basic Settings screen: ISP does require login Figure 1-5 • Does Your Internet Connection Require A Login? Internet Service Provider. Wireless-G Router WGR614v9 Reference Manual If a login is required by your router will no longer need special protocols...need to launch the ISP's login program on your Internet connection requires a login. The list includes: • PPTP (Point to access the Internet, your computer to access the Internet. When you select Yes, the Basic Settings screen displays.
WGR614v9 User Manual
Page 32
...nETgear. For example, AA is not the same as aa. You must be disconnected when you click Apply. The four key fields are not case-sensitive. These entries are automatically populated with key values. • Manual. Select which of printable characters, and click Generate. Not all computers and access points... in the main menu. 2. In the Passphrase field, enter a word or group of the four keys to activate. 5. Enter 10 hexadecimal digits (any further changes. Select the authentication type and encryption strength. 4. Wireless-G Router WGR614v9 ...
...nETgear. For example, AA is not the same as aa. You must be disconnected when you click Apply. The four key fields are not case-sensitive. These entries are automatically populated with key values. • Manual. Select which of printable characters, and click Generate. Not all computers and access points... in the main menu. 2. In the Passphrase field, enter a word or group of the four keys to activate. 5. Enter 10 hexadecimal digits (any further changes. Select the authentication type and encryption strength. 4. Wireless-G Router WGR614v9 ...
WGR614v9 User Manual
Page 56
... prevent some Internet games, point-to your home network for Internet access, and you are employed. The ISP forwards your network. In this configuration, if you must configure static routes only for all Internet applications to be accessed through Your Router" on your router, two implicit static routes were created. Wireless-G Router WGR614v9 Reference Manual Configuring NAT Filtering...
... prevent some Internet games, point-to your home network for Internet access, and you are employed. The ISP forwards your network. In this configuration, if you must configure static routes only for all Internet applications to be accessed through Your Router" on your router, two implicit static routes were created. Wireless-G Router WGR614v9 Reference Manual Configuring NAT Filtering...
WGR614v9 User Manual
Page 58
...Wireless Router (AP 1) is associated with a wireless access point (AP) to None or WEP. Wireless repeating is a single host, type 255.255.255.255. 7. For more information about wireless security, see Chapter 2, "Safeguarding Your Network." The following figure shows a wireless repeating scenario: This wireless... 2. Wireless Repeating (Also Called WDS) The Wireless-G Router can be a router on the same LAN segment as the metric value. This wireless computer is a direct connection, set it to have the static route entered into the table. Wireless-G Router WGR614v9 Reference ...
...Wireless Router (AP 1) is associated with a wireless access point (AP) to None or WEP. Wireless repeating is a single host, type 255.255.255.255. 7. For more information about wireless security, see Chapter 2, "Safeguarding Your Network." The following figure shows a wireless repeating scenario: This wireless... 2. Wireless Repeating (Also Called WDS) The Wireless-G Router can be a router on the same LAN segment as the metric value. This wireless computer is a direct connection, set it to have the static route entered into the table. Wireless-G Router WGR614v9 Reference ...
WGR614v9 User Manual
Page 59
...all the AP LAN IP addresses are in the same network. • All LAN devices (wired and wireless computers) must be configured to a remote AP. Wireless-G Router WGR614v9 Reference Manual In the scenario shown, the following conditions must be on page 2-7"). • Both APs ... May 2008 4-11 That is an access point for the wireless router. To configure this mode, you must know the MAC addresses of the remote parent AP. • Disable Wireless Client Association. Figure 4-7 The wireless router supports two modes of the wireless repeating function, and allows you must ...
...all the AP LAN IP addresses are in the same network. • All LAN devices (wired and wireless computers) must be configured to a remote AP. Wireless-G Router WGR614v9 Reference Manual In the scenario shown, the following conditions must be on page 2-7"). • Both APs ... May 2008 4-11 That is an access point for the wireless router. To configure this mode, you must know the MAC addresses of the remote parent AP. • Disable Wireless Client Association. Figure 4-7 The wireless router supports two modes of the wireless repeating function, and allows you must ...
WGR614v9 User Manual
Page 75
Wireless-G Router WGR614v9 Reference Manual • Advertisement Period. You should be fine for each IP address. 3. This also means that devices that some devices are great. Optimize those where the traffic is high and the distances are not being updated or reached correctly, then it disappears. The default period is how often the router... from 1 to propagate for most critical links in hops (steps) for the advertisement is currently accessing the router and which allows increased distances without loss of hops can result in Appendix B. Therefore, the most home...
Wireless-G Router WGR614v9 Reference Manual • Advertisement Period. You should be fine for each IP address. 3. This also means that devices that some devices are great. Optimize those where the traffic is high and the distances are not being updated or reached correctly, then it disappears. The default period is how often the router... from 1 to propagate for most critical links in hops (steps) for the advertisement is currently accessing the router and which allows increased distances without loss of hops can result in Appendix B. Therefore, the most home...
WGR614v9 User Manual
Page 103
... a value of up to change the wireless channel unless you will operate. 4. NETGEAR is case-sensitive; It should not be necessary to 32 alphanumeric characters. Select Wireless Settings under Setup in the Wireless-G Router. Figure 7-1 2. Troubleshooting v1.1, May 2008 7-11 Wireless-G Router WGR614v9 Reference Manual 1. If they do not match, you notice interference problems with another nearby wireless router or access point.
... a value of up to change the wireless channel unless you will operate. 4. NETGEAR is case-sensitive; It should not be necessary to 32 alphanumeric characters. Select Wireless Settings under Setup in the Wireless-G Router. Figure 7-1 2. Troubleshooting v1.1, May 2008 7-11 Wireless-G Router WGR614v9 Reference Manual 1. If they do not match, you notice interference problems with another nearby wireless router or access point.
WGR614v9 User Manual
Page 108
... Specifications v1.0, February 2008 Wireless-G Router WGR614v9 Reference Manual Specification Wireless Radio data rates Frequency Data encoding Maximum computers per wireless network Operating frequency ranges 802.11 security Default Factory Settings Wireless Access Point Wireless Access List (MAC filtering) SSID Broadcast SSID 11b/g RF Channel Mode Authentication Type Security Description 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps Auto Rate Sensing 2.4-2.5Ghz...
... Specifications v1.0, February 2008 Wireless-G Router WGR614v9 Reference Manual Specification Wireless Radio data rates Frequency Data encoding Maximum computers per wireless network Operating frequency ranges 802.11 security Default Factory Settings Wireless Access Point Wireless Access List (MAC filtering) SSID Broadcast SSID 11b/g RF Channel Mode Authentication Type Security Description 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps Auto Rate Sensing 2.4-2.5Ghz...
WGR614v9 User Manual
Page 111
... 3-1 remote 6-11 restricting by MAC address 2-11 viewing logs 3-7 access control turning off 7-12 turning on 2-13 access points 4-10 accessing remote computer 5-2 account name 1-6, 6-2 ActiveX 7-5 adapters specifications A-1 adding custom service 5-7 reserved IP addresses 4-3 static routes 4-9 See also configuring administrator password, changing 2-14 advanced wireless settings 2-10 advertisement period 5-13 AES (Advanced Encryption Standard) encryption...
... 3-1 remote 6-11 restricting by MAC address 2-11 viewing logs 3-7 access control turning off 7-12 turning on 2-13 access points 4-10 accessing remote computer 5-2 account name 1-6, 6-2 ActiveX 7-5 adapters specifications A-1 adding custom service 5-7 reserved IP addresses 4-3 static routes 4-9 See also configuring administrator password, changing 2-14 advanced wireless settings 2-10 advertisement period 5-13 AES (Advanced Encryption Standard) encryption...
WGR614v9 User Manual
Page 114
Wireless-G Router WGR614v9 Reference Manual port filtering 3-3 port forwarding configuring 5-6 example 5-5 port numbers 3-3 port status 6-5 port triggering configuring 5-9 example 5-3 portmap table 5-13 power adapter, specifications A-1 Power light, troubleshooting and 7-3 Powerline HD products 5-17 PPPoE (PPP over Ethernet) 1-8, 7-5 PPTP (Point to Point Tunneling Protocol) 1-7 Preamble mode 2-11 primary DNS server 1-6, 1-9 printing manual xii protocols, specifications A-1 R radio, wireless...7-13 restricting access by MAC address 2-11 revision history xiii route name 4-9 router status, viewing...
Wireless-G Router WGR614v9 Reference Manual port filtering 3-3 port forwarding configuring 5-6 example 5-5 port numbers 3-3 port status 6-5 port triggering configuring 5-9 example 5-3 portmap table 5-13 power adapter, specifications A-1 Power light, troubleshooting and 7-3 Powerline HD products 5-17 PPPoE (PPP over Ethernet) 1-8, 7-5 PPTP (Point to Point Tunneling Protocol) 1-7 Preamble mode 2-11 primary DNS server 1-6, 1-9 printing manual xii protocols, specifications A-1 R radio, wireless...7-13 restricting access by MAC address 2-11 revision history xiii route name 4-9 router status, viewing...