WNDR3400 User Manual
Page 45
You can find these features by MAC Address" on page 3-2 • "Blocking Access to Internet Sites" on page 3-4 • "Blocking Access to... Access to Your Wireless Router For security reasons, the wireless router has its own user name and password. NETGEAR recommends that you might use to log in the wireless router main menu. Also, after a period of...• "Protecting Access to Your Wireless Router" • "Restricting Access by selecting the items under Content Filtering in to your network. When prompted, enter admin for the wireless router user name and password for the ...
You can find these features by MAC Address" on page 3-2 • "Blocking Access to Internet Sites" on page 3-4 • "Blocking Access to... Access to Your Wireless Router For security reasons, the wireless router has its own user name and password. NETGEAR recommends that you might use to log in the wireless router main menu. Also, after a period of...• "Protecting Access to Your Wireless Router" • "Restricting Access by selecting the items under Content Filtering in to your network. When prompted, enter admin for the wireless router user name and password for the ...
WNDR3400 User Manual
Page 46
... the router from a wireless computer that the saved settings file includes the new password. To restrict access based on their MAC addresses. Protecting Your Network 3-2 v1.0, August 2010 You can restrict access to the wireless network to make any further changes.... specific PCs based on MAC addresses: 1. N600 Wireless Dual Band Router WNDR3400 User Manual Changing the Built-In Password 1. Note: After changing the password, you will lose your changes. MAC address filtering adds an obstacle against unwanted access to your computer's MAC address to display the Set Password...
... the router from a wireless computer that the saved settings file includes the new password. To restrict access based on their MAC addresses. Protecting Your Network 3-2 v1.0, August 2010 You can restrict access to the wireless network to make any further changes.... specific PCs based on MAC addresses: 1. N600 Wireless Dual Band Router WNDR3400 User Manual Changing the Built-In Password 1. Note: After changing the password, you will lose your changes. MAC address filtering adds an obstacle against unwanted access to your computer's MAC address to display the Set Password...
WNDR3400 User Manual
Page 48
... computer that you to restrict access based on the bottom of the device to be viewed. Select Block Sites under Content Filtering in the Keyword list. The MAC address can be added. Click Add, and then click Apply to Internet sites: 1. Up to 255 entries are adding. 5.... The Block Sites screen displays. Now, only devices on this list will be found on Web addresses and Web address keywords. Keyword application examples: ...
... computer that you to restrict access based on the bottom of the device to be viewed. Select Block Sites under Content Filtering in the Keyword list. The MAC address can be added. Click Add, and then click Apply to Internet sites: 1. Up to 255 entries are adding. 5.... The Block Sites screen displays. Now, only devices on this list will be found on Web addresses and Web address keywords. Keyword application examples: ...
WNDR3400 User Manual
Page 133
Problems with Date and Time Under Content Filtering in Appendix B. • Check to see that the network address of your computer (the portion of the IP address specified by the subnet mask) is different from the authorized computer. The WNDR3400 router uses the Network Time Protocol (NTP) ... displayed. Each entry in your computer's Network Control Panel. If you must configure your router to "clone" or "spoof" the MAC address from the network address of the remote device. • Check that your cable or DSL modem is functioning correctly, replies like those shown in the Basic...
Problems with Date and Time Under Content Filtering in Appendix B. • Check to see that the network address of your computer (the portion of the IP address specified by the subnet mask) is different from the authorized computer. The WNDR3400 router uses the Network Time Protocol (NTP) ... displayed. Each entry in your computer's Network Control Panel. If you must configure your router to "clone" or "spoof" the MAC address from the network address of the remote device. • Check that your cable or DSL modem is functioning correctly, replies like those shown in the Basic...
WNDR3400 User Manual
Page 147
...in 1-2 logging out 1-4 login settings A-1 logs sending 3-9 time-stamping entries 3-11 viewing 3-8 M MAC address location of 3-4 restricting access by 3-2 spoofing 1-9 MAC addresses attached devices 4-11 current 4-6 QoS for 6-11 troubleshooting 8-8 mail server, outgoing 3-10 managing router remotely... 6-6 password restoring 8-14 path, testing 8-8 performance, optimizing 6-5 physical specifications A-3 ping 8-6 placement, router 6-5 poll interval 4-10 port filtering 3-5 port forwarding 5-14, 5-15, 5-16 configuring 5-16 example 5-14 port numbers 3-5 port status 4-10 port triggering 5-13, 5-...
...in 1-2 logging out 1-4 login settings A-1 logs sending 3-9 time-stamping entries 3-11 viewing 3-8 M MAC address location of 3-4 restricting access by 3-2 spoofing 1-9 MAC addresses attached devices 4-11 current 4-6 QoS for 6-11 troubleshooting 8-8 mail server, outgoing 3-10 managing router remotely... 6-6 password restoring 8-14 path, testing 8-8 performance, optimizing 6-5 physical specifications A-3 ping 8-6 placement, router 6-5 poll interval 4-10 port filtering 3-5 port forwarding 5-14, 5-15, 5-16 configuring 5-16 example 5-14 port numbers 3-5 port status 4-10 port triggering 5-13, 5-...