Contents
|
3
Contents
Chapter 1
Configuring Basic Connectivity
Using the Setup Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Logging In To Your Wireless Router . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Selecting a Language for Your Screen Display . . . . . . . . . . . . . . . . . . . . . 10
Configuring Your Internet Settings Using the Setup Wizard. . . . . . . . . . . . 11
Viewing and Configuring Basic Internet Settings . . . . . . . . . . . . . . . . . . . . 12
Your Internet Connection Does Not Require a Login . . . . . . . . . . . . . . . 12
Your Internet Connection Does Require a Login . . . . . . . . . . . . . . . . . . 14
Setting Up and Testing Basic Wireless Connectivity . . . . . . . . . . . . . . . . . 17
Chapter 2
Safeguarding Your Network
Choosing Appropriate Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Recording Basic Wireless Settings Setup Information . . . . . . . . . . . . . . . . 24
Changing Wireless Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Viewing Basic Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Configuring WEP Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configuring WPA-PSK and WPA2-PSK Wireless Security . . . . . . . . . . 28
Viewing Advanced Wireless Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Using Push 'N' Connect (Wi-Fi Protected Setup) . . . . . . . . . . . . . . . . . . . . 31
Push Button Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Security PIN Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Configuring the WPS Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Connecting Additional Wireless Client Devices after WPS Setup . . . . . 35
Restricting Wireless Access by MAC Address . . . . . . . . . . . . . . . . . . . . . . 36
Changing the Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Backing Up Your Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Understanding Your Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Chapter 3
Restricting Access From Your Network
Content Filtering Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Blocking Access to Internet Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Blocking Access to Internet Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Blocking Services by IP Address Range . . . . . . . . . . . . . . . . . . . . . . . . 43
Scheduling Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Viewing Logs of Web Access or Attempted Web Access. . . . . . . . . . . . . . 44
Configuring E-mail Alert and Web Access Log Notifications . . . . . . . . . . . 45
Setting the Time Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47