СправочникСодержаниеReference Manual for the 54 Mbps Wall-Plugged Wireless Range Extender WGX1021Contents5Chapter 1 About This Manual11Audience, Scope, Conventions, and Formats11How to Use This Manual12How to Print this Manual13Chapter 2 Introduction15Key Features15802.11g Wireless Networking16Easy Installation and Management17Content Filtering in Router Mode17Maintenance and Support17Package Contents18The WGX102 Front Panel19The Label on the Rear Panel of the WGX10220The WGX102 Bottom Panel20A Road Map for ‘How to Get There From Here’20Chapter 3 Installing the XE102 and the WGX10223Prepare to Install Your Range Extender23WGX102 Wall-Plugged Range Extender Operation Modes24Access Point Mode24Router Mode25Installing the WGX102 in Access Point Mode25Basic Installation Troubleshooting Tips29Logging On to Configure the WGX10230Configuring the WGX102 in Access Point Mode32Configuring the LAN IP Setup Options in Access Point Mode32Chapter 4 Configuring the WGX102 in Router Mode35Connecting the WGX102 to the Internet in Router Mode36Manually Configuring Your Internet Connection41Manual PPPoE Configuration43Manual PPTP Configuration44Configuring the WGX102 in Router Mode47Chapter 5 Wireless Configuration49Observing Performance, Placement, and Range Guidelines49Implementing Appropriate Wireless Security50Wireless Data Security Options50Basic Wireless Settings50Information to Gather Before Changing Basic Wireless Settings53Default Factory Settings54Setting Up and Testing Basic Wireless Connectivity54Configuring WEP Security56Configuring WPA-PSK Wireless Security58Restricting Wireless Access by MAC Address59Chapter 6 Maintenance61Configuring the HomePlug Password61Viewing Access Point Status Information63Viewing Router Status Information66Viewing a List of Attached Devices69Configuration File Management70Backing Up the Configuration70Erasing the Configuration71Upgrading the Range Extender Software71Changing the Administrator Password72Chapter 7 Content Filtering in Router Mode75Content Filtering Overview75Blocking Access to Internet Sites75Blocking Access to Internet Services77Configuring a User Defined Service78Configuring Services Blocking by IP Address Range79Scheduling When Blocking is Enforced79Viewing Logs of Web Access or Attempted Web Access80Configuring E-Mail Alert and Web Access Log Notifications81Chapter 8 Advanced Configuration of the WGX10283Configuring Port Triggering83Configuring Port Forwarding to Local Servers86Adding a Custom Service87Local Web and FTP Server Example88Multiple Computers for Half Life, KALI or Quake III Example88Configuring the WAN Setup Options89Configuring the LAN IP Setup Options in Router Mode91Using the WGX102 as a DHCP server93Using Address Reservation94Configuring Dynamic DNS94Configuring Static Routes95Enabling Remote Management Access98Configuring Universal Plug and Play (UPnP)99Chapter 9 Troubleshooting101NETGEAR Product Registration, Support, and Documentation101Basic Functioning101Power Light Not On102HomePlug/Internet or Wireless Port Lights Not On102Troubleshooting the Web Configuration Interface102Troubleshooting the ISP Connection103Troubleshooting a TCP/IP Network Using a Ping Utility105Testing the LAN Path to the WGX102105Testing the Path from Your Computer to a Remote Device106Restoring the Default Configuration and Password107Problems with Date and Time107Appendix A Technical Specifications109Appendix B Network, Routing, Firewall, and Basics111Related Publications111Basic Router Concepts111What is a Router?111Routing Information Protocol112IP Addresses and the Internet112Netmask114Subnet Addressing115Private IP Addresses117Single IP Address Operation Using NAT118MAC Addresses and Address Resolution Protocol119Related Documents119Domain Name Server120IP Configuration by DHCP120Internet Security and Firewalls120What is a Firewall?121Stateful Packet Inspection121Denial of Service Attack121Ethernet Cabling121Category 5 Cable Quality122Inside Twisted Pair Cables123Uplink Switches, Crossover Cables, and MDI/MDIX Switching124Appendix C Preparing Your Network127What You Need To Use a Router with a Broadband Modem127Cabling and Computer Hardware127Computer Network Configuration Requirements128Internet Configuration Requirements128Where Do I Get the Internet Configuration Parameters?128Record Your Internet Connection Information129Preparing Your Computers for TCP/IP Networking130Configuring Windows 95, 98, and Me for TCP/IP Networking131Install or Verify Windows Networking Components131Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me132Selecting Windows’ Internet Access Method135Verifying TCP/IP Properties135Configuring Windows NT4, 2000 or XP for IP Networking136Install or Verify Windows Networking Components136DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4137DHCP Configuration of TCP/IP in Windows XP137DHCP Configuration of TCP/IP in Windows 2000139DHCP Configuration of TCP/IP in Windows NT4142Verifying TCP/IP Properties for Windows XP, 2000, and NT4144Configuring the Macintosh for TCP/IP Networking145MacOS 8.6 or 9.x145MacOS X146Verifying TCP/IP Properties for Macintosh Computers146Verifying the Readiness of Your Internet Account147Are Login Protocols Used?147What Is Your Configuration Information?147Obtaining ISP Configuration Information for Windows Computers148Obtaining ISP Configuration Information for Macintosh Computers149Restarting the Network150Appendix D Wireless Networking Basics151Wireless Networking Overview151Infrastructure Mode151Ad Hoc Mode (Peer-to-Peer Workgroup)152Network Name: Extended Service Set Identification (ESSID)152Authentication and WEP153802.11 Authentication153Open System Authentication154Shared Key Authentication154Overview of WEP Parameters155Key Size156WEP Configuration Options157Wireless Channels157WPA Wireless Security158How Does WPA Compare to WEP?159How Does WPA Compare to IEEE 802.11i?160What are the Key Features of WPA Security?160WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS162WPA Data Encryption Key Management164Is WPA Perfect?166Product Support for WPA166Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged166Changes to Wireless Access Points167Changes to Wireless Network Adapters167Changes to Wireless Client Programs168Glossary169List of Glossary Terms169Index179Размер: 3,3 МБСтраницы: 182Язык: EnglishПросмотреть
Справочник ПользователяСодержаниеReference Manual for the 54 Mbps Wall-Plugged Router WGX1021Contents6Chapter 1 About This Manual12Audience, Scope, Conventions, and Formats12How to Use This Manual13How to Print this Manual14Chapter 2 Introduction16Key Features16802.11g Wireless Networking17A Powerful, True Firewall with Content Filtering17Security18Extensive Protocol Support18Easy Installation and Management19Maintenance and Support19Package Contents20The Router’s Front Panel21The Router’s Label on the Rear Panel22The Router’s Bottom Panel23A Road Map for ‘How to Get There From Here’23Chapter 3 Connecting the Router to the Internet26Prepare to Install Your Wireless Router26First, Connect a Wall-Plugged Ethernet Bridge XE10226Connect the Wireless Router to the Internet28Now, Set Up a Computer for Wireless Connectivity32Troubleshooting Tips33Overview of How to Access the Wireless Router34How to Log On to the Wireless Router After Configuration Settings Have Been Applied35How to Bypass the Configuration Assistant37How to Manually Configure Your Internet Connection38Using the Smart Setup Wizard40NETGEAR Product Registration, Support, and Documentation41Chapter 4 Wireless Configuration42Observe Performance, Placement, and Range Guidelines42Implement Appropriate Wireless Security43Understanding Wireless Settings44Information to Gather Before Changing Basic Wireless Settings47Default Factory Settings48How to Set Up and Test Basic Wireless Connectivity48How to Configure WEP50How to Configure WPA-PSK Wireless Security52How to Restrict Wireless Access by MAC Address52Chapter 5 Content Filtering56Content Filtering Overview56Blocking Access to Internet Sites57Blocking Access to Internet Services58Configuring a User Defined Service59Configuring Services Blocking by IP Address Range60Scheduling When Blocking Will Be Enforced60Viewing Logs of Web Access or Attempted Web Access61Configuring E-Mail Alert and Web Access Log Notifications62Chapter 6 Maintenance64Viewing Wireless Router Status Information64Viewing a List of Attached Devices68Configuration File Management68Restoring and Backing Up the Configuration69Erasing the Configuration70Upgrading the Router Software70Changing the Administrator Password71Chapter 7 Advanced Configuration of the Router74Configuring Port Triggering74Configuring Port Forwarding to Local Servers76Adding a Custom Service78Editing or Deleting a Port Forwarding Entry78Local Web and FTP Server Example79Multiple Computers for Half Life, KALI or Quake III Example79Configuring the WAN Setup Options80Connect Automatically, as Required80Disabling the SPI Firewall81Setting Up a Default DMZ Server81Responding to Ping on Internet WAN Port81Setting the MTU Size82Using the LAN IP Setup Options83Configuring LAN TCP/IP Setup Parameters83Using the Router as a DHCP server85Using Address Reservation85Using a Dynamic DNS Service86Configuring Static Routes87Enabling Remote Management Access89Using Universal Plug and Play (UPnP)90Chapter 8 Troubleshooting92Basic Functioning92Power Light Not On92Lights Never Turn Off93LAN or WAN Port Lights Not On93Troubleshooting the Web Configuration Interface94Troubleshooting the ISP Connection95Troubleshooting a TCP/IP Network Using a Ping Utility96Testing the LAN Path to Your Router96Testing the Path from Your Computer to a Remote Device97Restoring the Default Configuration and Password98Problems with Date and Time99Appendix A Technical Specifications100Appendix B Network, Routing, Firewall, and Basics102Related Publications102Basic Router Concepts102What is a Router?102Routing Information Protocol103IP Addresses and the Internet103Netmask105Subnet Addressing105Private IP Addresses108Single IP Address Operation Using NAT108MAC Addresses and Address Resolution Protocol109Related Documents110Domain Name Server110IP Configuration by DHCP111Internet Security and Firewalls111What is a Firewall?111Stateful Packet Inspection112Denial of Service Attack112Ethernet Cabling112Category 5 Cable Quality113Inside Twisted Pair Cables114Uplink Switches, Crossover Cables, and MDI/MDIX Switching115Appendix C Preparing Your Network118What You Need To Use a Router with a Broadband Modem118Cabling and Computer Hardware118Computer Network Configuration Requirements118Internet Configuration Requirements119Where Do I Get the Internet Configuration Parameters?119Record Your Internet Connection Information120Preparing Your Computers for TCP/IP Networking120Configuring Windows 95, 98, and Me for TCP/IP Networking121Install or Verify Windows Networking Components121Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me123Selecting Windows’ Internet Access Method125Verifying TCP/IP Properties125Configuring Windows NT4, 2000 or XP for IP Networking126Install or Verify Windows Networking Components126DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4127DHCP Configuration of TCP/IP in Windows XP127DHCP Configuration of TCP/IP in Windows 2000129DHCP Configuration of TCP/IP in Windows NT4132Verifying TCP/IP Properties for Windows XP, 2000, and NT4134Configuring the Macintosh for TCP/IP Networking135MacOS 8.6 or 9.x135MacOS X135Verifying TCP/IP Properties for Macintosh Computers136Verifying the Readiness of Your Internet Account137Are Login Protocols Used?137What Is Your Configuration Information?137Obtaining ISP Configuration Information for Windows Computers138Obtaining ISP Configuration Information for Macintosh Computers139Restarting the Network140Appendix D Wireless Networking Basics142Wireless Networking Overview142Infrastructure Mode142Ad Hoc Mode (Peer-to-Peer Workgroup)143Network Name: Extended Service Set Identification (ESSID)143Wireless Channels143WEP Wireless Security145WEP Authentication145WEP Open System Authentication146WEP Shared Key Authentication147Key Size and Configuration148How to Use WEP Parameters149WPA Wireless Security149How Does WPA Compare to WEP?150How Does WPA Compare to IEEE 802.11i?151What are the Key Features of WPA Security?151WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS153WPA Data Encryption Key Management155Is WPA Perfect?157Product Support for WPA157Supporting a Mixture of WPA and WEP Wireless Clients157Changes to Wireless Access Points157Changes to Wireless Network Adapters158Changes to Wireless Client Programs159Glossary160List of Glossary Terms160Index170Размер: 3,3 МБСтраницы: 173Язык: EnglishПросмотреть