WGR614v9 User Manual
Page 21
Note: After you finish setting up your router, you select Yes, the Basic Settings screen displays. Internet Service Provider. The list includes: • PPTP (Point to Point Tunneling Protocol), used primarily in the Basic Settings screen: ISP does require login Figure 1-5 • Does Your ...log you usually must use a login program such as WinPOET to access the Internet. If you in. - When you start an Internet application, your router will no longer need special protocols for connection. Wireless-G Router WGR614v9 Reference Manual If a login is required by your ISP, the ...
Note: After you finish setting up your router, you select Yes, the Basic Settings screen displays. Internet Service Provider. The list includes: • PPTP (Point to Point Tunneling Protocol), used primarily in the Basic Settings screen: ISP does require login Figure 1-5 • Does Your ...log you usually must use a login program such as WinPOET to access the Internet. If you in. - When you start an Internet application, your router will no longer need special protocols for connection. Wireless-G Router WGR614v9 Reference Manual If a login is required by your ISP, the ...
WGR614v9 User Manual
Page 32
...nETgear. These entries are automatically populated with key values. • Manual. These values must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired computer to make any combination of the four keys to activate. 5. The four key fields are not case-sensitive. Not all computers and access points... characters, and click Generate. Select the authentication type and encryption strength. 4. Wireless-G Router WGR614v9 Reference Manual To configure WEP data encryption: Note: If you use...
...nETgear. These entries are automatically populated with key values. • Manual. These values must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired computer to make any combination of the four keys to activate. 5. The four key fields are not case-sensitive. Not all computers and access points... characters, and click Generate. Select the authentication type and encryption strength. 4. Wireless-G Router WGR614v9 Reference Manual To configure WEP data encryption: Note: If you use...
WGR614v9 User Manual
Page 56
Wireless-G Router WGR614v9 Reference Manual Configuring NAT Filtering Network Address Translation (NAT) determines how the router processes inbound traffic. Secured NAT provides a secured firewall to be accessed through the ISDN router at 192.168.1.100. For more information about NAT, see "How Your Computer Accesses a ...the NAT Filtering area, select either the Secured or the Open radio button. 2. When you attempt to access a device on your request to -point applications, or multimedia applications from functioning. You must define a static route, telling your request to all...
Wireless-G Router WGR614v9 Reference Manual Configuring NAT Filtering Network Address Translation (NAT) determines how the router processes inbound traffic. Secured NAT provides a secured firewall to be accessed through the ISDN router at 192.168.1.100. For more information about NAT, see "How Your Computer Accesses a ...the NAT Filtering area, select either the Secured or the Open radio button. 2. When you attempt to access a device on your request to -point applications, or multimedia applications from functioning. You must define a static route, telling your request to all...
WGR614v9 User Manual
Page 58
...) The Wireless-G Router can be a router on the same LAN segment as the metric value. The following figure shows a wireless repeating scenario: This wireless computer is associated with a wireless access point (AP) to None or WEP. AP 2 is associated with AP 2. For more information about wireless security, see Chapter 2, "Safeguarding Your Network." Type the IP subnet mask for wireless security...
...) The Wireless-G Router can be a router on the same LAN segment as the metric value. The following figure shows a wireless repeating scenario: This wireless computer is associated with a wireless access point (AP) to None or WEP. AP 2 is associated with AP 2. For more information about wireless security, see Chapter 2, "Safeguarding Your Network." Type the IP subnet mask for wireless security...
WGR614v9 User Manual
Page 59
... Station mode. Wireless-G Router WGR614v9 Reference Manual In the scenario shown, the following conditions must be met for both APs: • Both APs must use the same SSID, wireless channel, and encryption mode (see information about WEP in "Configuring WEP Wireless Security" on the same LAN IP subnet. That is an access point for the wireless router. From the...
... Station mode. Wireless-G Router WGR614v9 Reference Manual In the scenario shown, the following conditions must be met for both APs: • Both APs must use the same SSID, wireless channel, and encryption mode (see information about WEP in "Configuring WEP Wireless Security" on the same LAN IP subnet. That is an access point for the wireless router. From the...
WGR614v9 User Manual
Page 75
... are farther away might be necessary to 255. Wireless-G Router WGR614v9 Reference Manual • Advertisement Period. The number of...wireless router. For complete range and performance specifications, click the link to the online document "Wireless Networking Basics" in hops (steps) for most critical links in significant performance degradation or inability to wirelessly connect to live for the advertisement is currently accessing the router...that control points have automatic data-rate fallback, which wireless devices need the highest data rate, and locate the router near ...
... are farther away might be necessary to 255. Wireless-G Router WGR614v9 Reference Manual • Advertisement Period. The number of...wireless router. For complete range and performance specifications, click the link to the online document "Wireless Networking Basics" in hops (steps) for most critical links in significant performance degradation or inability to wirelessly connect to live for the advertisement is currently accessing the router...that control points have automatic data-rate fallback, which wireless devices need the highest data rate, and locate the router near ...
WGR614v9 User Manual
Page 103
... the wireless channel unless you will operate. 4. NETGEAR is used by any wireless access adapters must match the SSID you can enter a value of the WGR614v9 router. Troubleshooting v1.1, May 2008 7-11 Figure 7-1 2. The default channel is not being used . It should not be necessary to 32 alphanumeric characters. Select Wireless Settings under Setup in Appendix B. 5. Wireless-G Router WGR614v9 Reference...
... the wireless channel unless you will operate. 4. NETGEAR is used by any wireless access adapters must match the SSID you can enter a value of the WGR614v9 router. Troubleshooting v1.1, May 2008 7-11 Figure 7-1 2. The default channel is not being used . It should not be necessary to 32 alphanumeric characters. Select Wireless Settings under Setup in Appendix B. 5. Wireless-G Router WGR614v9 Reference...
WGR614v9 User Manual
Page 108
Wireless-G Router WGR614v9 Reference Manual Specification Wireless Radio data rates Frequency Data encoding Maximum computers per wireless network Operating frequency ranges 802.11 security Default Factory Settings Wireless Access Point Wireless Access List (MAC filtering) SSID Broadcast SSID 11b/g RF Channel Mode Authentication Type Security Description 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps... WEP; and WPA-PSK, WPA2-PSK and WPA-PSK+WPA2-PSK Enabled All wireless stations allowed Enabled NETGEAR 11 g and b Open System Disabled A-2 Technical Specifications v1.0, February 2008
Wireless-G Router WGR614v9 Reference Manual Specification Wireless Radio data rates Frequency Data encoding Maximum computers per wireless network Operating frequency ranges 802.11 security Default Factory Settings Wireless Access Point Wireless Access List (MAC filtering) SSID Broadcast SSID 11b/g RF Channel Mode Authentication Type Security Description 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps... WEP; and WPA-PSK, WPA2-PSK and WPA-PSK+WPA2-PSK Enabled All wireless stations allowed Enabled NETGEAR 11 g and b Open System Disabled A-2 Technical Specifications v1.0, February 2008
WGR614v9 User Manual
Page 111
... 3-1 remote 6-11 restricting by MAC address 2-11 viewing logs 3-7 access control turning off 7-12 turning on 2-13 access points 4-10 accessing remote computer 5-2 account name 1-6, 6-2 ActiveX 7-5 adapters specifications A-1 adding custom service 5-7 reserved IP addresses 4-3 static routes 4-9 See also configuring administrator password, changing 2-14 advanced wireless settings 2-10 advertisement period 5-13 AES (Advanced Encryption Standard) encryption...
... 3-1 remote 6-11 restricting by MAC address 2-11 viewing logs 3-7 access control turning off 7-12 turning on 2-13 access points 4-10 accessing remote computer 5-2 account name 1-6, 6-2 ActiveX 7-5 adapters specifications A-1 adding custom service 5-7 reserved IP addresses 4-3 static routes 4-9 See also configuring administrator password, changing 2-14 advanced wireless settings 2-10 advertisement period 5-13 AES (Advanced Encryption Standard) encryption...
WGR614v9 User Manual
Page 114
Wireless-G Router WGR614v9 Reference Manual port filtering 3-3 port forwarding configuring 5-6 example 5-5 port numbers 3-3 port status 6-5 port triggering configuring 5-9 example 5-3 portmap table 5-13 power adapter, specifications A-1 Power light, troubleshooting and 7-3 Powerline HD products 5-17 PPPoE (PPP over Ethernet) 1-8, 7-5 PPTP (Point to Point Tunneling Protocol) 1-7 Preamble mode 2-11 primary DNS server 1-6, 1-9 printing manual xii protocols, specifications A-1 R radio, wireless...7-13 restricting access by MAC address 2-11 revision history xiii route name 4-9 router status, viewing...
Wireless-G Router WGR614v9 Reference Manual port filtering 3-3 port forwarding configuring 5-6 example 5-5 port numbers 3-3 port status 6-5 port triggering configuring 5-9 example 5-3 portmap table 5-13 power adapter, specifications A-1 Power light, troubleshooting and 7-3 Powerline HD products 5-17 PPPoE (PPP over Ethernet) 1-8, 7-5 PPTP (Point to Point Tunneling Protocol) 1-7 Preamble mode 2-11 primary DNS server 1-6, 1-9 printing manual xii protocols, specifications A-1 R radio, wireless...7-13 restricting access by MAC address 2-11 revision history xiii route name 4-9 router status, viewing...