NETGEAR DG824M Network Card User Manual


 
vi Contents
Chapter 3
Wireless Configuration
Considerations For A Wireless Network .........................................................................3-1
Implement Appropriate Security ...............................................................................3-1
Observe Placement and Range Guidelines .............................................................3-1
Wireless Settings ............................................................................................................3-2
Using the Wireless Access by MAC Address Feature .............................................3-4
Configuring Wired Equivalent Privacy (WEP) ..........................................................3-6
Configuring WEP (Wired Equivalent Privacy) .................................................................3-7
Chapter 4
Protecting Your Network
Protecting Access to Your DG824M Wireless ADSL Modem Gateway ..........................4-1
Configuring Basic Firewall Services ...............................................................................4-3
Blocking Keywords, Sites, and Services ..................................................................4-3
Rules ..............................................................................................................................4-5
Inbound Rules (Port Forwarding) .............................................................................4-7
Inbound Rule Example: A Local Public Web Server ..........................................4-7
Inbound Rule Example: Allowing Videoconference from Restricted Addresses 4-9
Considerations for Inbound Rules .....................................................................4-9
Outbound Rules (Service Blocking) .......................................................................4-10
Outbound Rule Example: Blocking Instant Messenger ...................................4-10
Order of Precedence for Rules ..............................................................................4-12
Services ........................................................................................................................4-13
Setting Times and Scheduling Firewall Services ..........................................................4-14
Chapter 5
Managing Your Network
Backing Up, Restoring, or Erasing Your Settings ...........................................................5-1
Upgrading the Gateway’s Firmware ...............................................................................5-3
Network Management Information .................................................................................5-5
Viewing Gateway Status and Usage Statistics .........................................................5-5
Viewing Attached Devices ........................................................................................5-9
Viewing, Selecting, and Saving Logged Information ..............................................5-10
Selecting What Information to Log ..................................................................5-11
Saving Log Files on a Server ..........................................................................5-12
Examples of log messages ....................................................................................5-12