NETGEAR DGN2000 Network Router User Manual


 
Wireless-N ADSL2+ Modem Router DGN2000 Reference Manual
viii
v1.0, July 2008
Hiding your wireless network name (SSID) ..................................................... 2-11
Restricting access by MAC address ................................................................ 2-11
Configuring Mixed WPA-PSK+WPA2-PSK Security ..............................................2-13
Choosing Alternative Authentication and Encryption Methods ..............................2-14
Configuring WEP .............................................................................................2-15
Configuring WPA-802.1x .................................................................................2-16
Using Push 'N' Connect (WPS) to Configure Your Wireless Network and Security .....2-17
Connecting Additional Wireless Client Devices After WPS Setup .........................2-20
Chapter 3
Protecting Your Network
Protecting Access to Your Wireless Modem Router .......................................................3-1
How to Change the Built-In Password .....................................................................3-2
Changing the Administrator Login Time-out .............................................................3-3
Configuring Basic Firewall Services ...............................................................................3-3
Blocking Keywords, Sites, and Services ..................................................................3-3
How to Block Keywords and Sites ...........................................................................3-3
Firewall Rules .................................................................................................................3-5
Inbound Rules (Port Forwarding) .............................................................................3-6
Inbound Rule Example: A Local Public Web Server ..........................................3-7
Inbound Rule Example: Allowing Video conferencing .......................................3-8
Considerations for Inbound Rules .....................................................................3-9
Outbound Rules (Service Blocking) .........................................................................3-9
Outbound Rule Example: Blocking Instant Messenger .....................................3-9
Order of Precedence for Rules .............................................................................. 3-11
Services ........................................................................................................................3-12
How to Define Services ..........................................................................................3-12
Setting Times and Scheduling Firewall Services ..........................................................3-13
How to Set Your Time Zone ...................................................................................3-14
How to Schedule Firewall Services ........................................................................3-15
Chapter 4
Managing Your Network
Backing Up, Restoring, and Erasing Your Settings ........................................................4-1
How to Back Up the Configuration to a File .............................................................4-1
How to Restore the Configuration from a File ..........................................................4-2
How to Erase the Configuration ...............................................................................4-2