WNDR3400 User Manual
Page 45
...password and the amount of time for the wireless router password. You can find these features by MAC Address" on page 3-2 • "Blocking Access to Internet Sites" on page 3-4 • "...of inactivity for a set length of both upper and lower case letters, numbers, and symbols. NETGEAR recommends that you might use procedures in the following sections: • "Protecting Access to Your... Wireless Router" • "Restricting Access by selecting the items under Content Filtering in to protect your Internet connection. The ideal password should contain no dictionary words from...
...password and the amount of time for the wireless router password. You can find these features by MAC Address" on page 3-2 • "Blocking Access to Internet Sites" on page 3-4 • "...of inactivity for a set length of both upper and lower case letters, numbers, and symbols. NETGEAR recommends that you might use procedures in the following sections: • "Protecting Access to Your... Wireless Router" • "Restricting Access by selecting the items under Content Filtering in to protect your Internet connection. The ideal password should contain no dictionary words from...
WNDR3400 User Manual
Page 46
... on the access control list, to the access list. Note: After changing the password, you click Apply. Otherwise you will lose your computer's MAC address to make any further changes. Log in to display the Set Password screen: 3. MAC address filtering adds an obstacle against unwanted access to the wireless router at its default LAN...
... on the access control list, to the access list. Note: After changing the password, you click Apply. Otherwise you will lose your computer's MAC address to make any further changes. Log in to display the Set Password screen: 3. MAC address filtering adds an obstacle against unwanted access to the wireless router at its default LAN...
WNDR3400 User Manual
Page 48
... Dual Band Router WNDR3400 User Manual • Use the Add button to enter the MAC address of the wireless device. Select Block Sites under Content Filtering in the Keyword list. The MAC address can usually be allowed to wirelessly connect to restrict access based on the bottom of ...the device to Internet sites: 1. Now, only devices on this list will be found on Web addresses and Web address keywords. Keyword application...
... Dual Band Router WNDR3400 User Manual • Use the Add button to enter the MAC address of the wireless device. Select Block Sites under Content Filtering in the Keyword list. The MAC address can usually be allowed to wirelessly connect to restrict access based on the bottom of ...the device to Internet sites: 1. Now, only devices on this list will be found on Web addresses and Web address keywords. Keyword application...
WNDR3400 User Manual
Page 133
... screen. • Your ISP could be rejecting the Ethernet MAC addresses of all but some ISPs additionally restrict access to the MAC address of day. Verify that your router to "clone" or "spoof" the MAC address from the authorized computer. Problems with Date and Time Under Content Filtering in the online document you must configure your cable...
... screen. • Your ISP could be rejecting the Ethernet MAC addresses of all but some ISPs additionally restrict access to the MAC address of day. Verify that your router to "clone" or "spoof" the MAC address from the authorized computer. Problems with Date and Time Under Content Filtering in the online document you must configure your cable...
WNDR3400 User Manual
Page 147
... 6-6 password restoring 8-14 path, testing 8-8 performance, optimizing 6-5 physical specifications A-3 ping 8-6 placement, router 6-5 poll interval 4-10 port filtering 3-5 port forwarding 5-14, 5-15, 5-16 configuring 5-16 example 5-14 port numbers 3-5 port status 4-10 port triggering 5-13, 5-...in 1-2 logging out 1-4 login settings A-1 logs sending 3-9 time-stamping entries 3-11 viewing 3-8 M MAC address location of 3-4 restricting access by 3-2 spoofing 1-9 MAC addresses attached devices 4-11 current 4-6 QoS for 6-11 troubleshooting 8-8 mail server, outgoing 3-10 managing router remotely...
... 6-6 password restoring 8-14 path, testing 8-8 performance, optimizing 6-5 physical specifications A-3 ping 8-6 placement, router 6-5 poll interval 4-10 port filtering 3-5 port forwarding 5-14, 5-15, 5-16 configuring 5-16 example 5-14 port numbers 3-5 port status 4-10 port triggering 5-13, 5-...in 1-2 logging out 1-4 login settings A-1 logs sending 3-9 time-stamping entries 3-11 viewing 3-8 M MAC address location of 3-4 restricting access by 3-2 spoofing 1-9 MAC addresses attached devices 4-11 current 4-6 QoS for 6-11 troubleshooting 8-8 mail server, outgoing 3-10 managing router remotely...