Netgear WGR614v9 UM 14may08 Reference Manual
Netgear WGR614v9 UM 14may08 Reference Manual
Netgear WGR614v9 UM 14may08 Reference Manual
WGR614v9 Reference
Manual
NETGEAR, Inc.
4500 Great America Parkway
Santa Clara, CA 95054 USA
202-10308-01
May 2008
Technical Support
Please refer to the support information card that shipped with your product. When you register your product at
http://www.netgear.com/register, we can provide you with faster expert technical support and timely notices of product
and software upgrades.
NETGEAR, INC. Support Information
Phone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card.
E-mail: [email protected]
North American NETGEAR website: http://www.netgear.com
Trademarks
NETGEAR, the NETGEAR logo, ProSafe, and Auto Uplink are trademarks or registered trademarks of NETGEAR, Inc.
Microsoft, Windows, Windows NT and Vista are registered trademarks of Microsoft Corporation.Other brand and
product names are registered trademarks or trademarks of their respective holders.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
make changes to the products described in this document without notice.
NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein.
Wireless Communications
Maximum Wireless signal rate derived from IEEE Standard 802.11 specifications. Actual throughput will vary. Network
conditions and environmental factors, including volume of network traffic, building materials and construction, and
network overhead, lower actual data throughput rate.
FCC Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of
the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to
radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try
to correct the interference by one of the following measures:
Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
1.
ii
v1.1, May 2008
2.
This device must accept any interference received, including interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could
void the users authority to operate this equipment.
The radio module has been evaluated under FCC Bulletin OET 65C (01-01) and found to be compliant to the
requirements as set forth in CFR 47 Sections, 2.1093, and 15.247 (b) (4) addressing RF Exposure from radio frequency
devices. This model meets the applicable government requirements for exposure to radio frequency waves.
Dansk
[Danish]
Deutsch
[German]
Hiermit erklrt NETGEAR Inc., dass sich das Gert Radiolan in bereinstimmung mit den
grundlegenden Anforderungen und den brigen einschlgigen Bestimmungen der Richtlinie
1999/5/EG befindet.
Eesti
[Estonian]
English
Hereby, NETGEAR Inc., declares that this Radiolan is in compliance with the essential
requirements and other relevant provisions of Directive 1999/5/EC.
Espaol
[Spanish]
Por medio de la presente NETGEAR Inc. declara que el Radiolan cumple con los requisitos
esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE.
[Greek]
Franais
[French]
Par la prsente NETGEAR Inc. dclare que l'appareil Radiolan est conforme aux exigences
essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Italiano
[Italian]
Con la presente NETGEAR Inc. dichiara che questo Radiolan conforme ai requisiti essenziali ed
alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Latviski
[Latvian]
iii
v1.1, May 2008
Lietuvi
[Lithuanian]
iuo NETGEAR Inc. deklaruoja, kad is Radiolan atitinka esminius reikalavimus ir kitas 1999/5/
EB Direktyvos nuostatas.
Nederlands
[Dutch]
Hierbij verklaart NETGEAR Inc. dat het toestel Radiolan in overeenstemming is met de essentile
eisen en de andere relevante bepalingen van richtlijn 1999/5/EG.
Malti
[Maltese]
Magyar
[Hungarian]
Polski
[Polish]
Portugus
[Portuguese]
NETGEAR Inc. declara que este Radiolan est conforme com os requisitos essenciais e outras
disposies da Directiva 1999/5/CE.
Slovensko
[Slovenian]
Slovensky
[Slovak]
NETGEAR Inc. tmto vyhlasuje, _e Radiolan spa zkladn po_iadavky a vetky prslun
ustanovenia Smernice 1999/5/ES.
Suomi
[Finnish]
NETGEAR Inc. vakuuttaa tten ett Radiolan tyyppinen laite on direktiivin 1999/5/EY oleellisten
vaatimusten ja sit koskevien direktiivin muiden ehtojen mukainen.
Svenska
[Swedish]
Hrmed intygar NETGEAR Inc. att denna Radiolan str I verensstmmelse med de vsentliga
egenskapskrav och vriga relevanta bestmmelser som framgr av direktiv 1999/5/EG.
slenska
[Icelandic]
Norsk
[Norwegian]
NETGEAR Inc. erklrer herved at utstyret Radiolan er i samsvar med de grunnleggende krav og
vrige relevante krav i direktiv 1999/5/EF.
iv
v1.1, May 2008
WGR614v9
Publication Date:
May 2008
Product Family:
Wireless Router
Product Name:
Home
Language:
English
202-10308-01
1.1
v
v1.1, May 2008
vi
v1.1, May 2008
Contents
Contents
v1.1, May 2008
ix
v1.1, May 2008
Contents
v1.1, May 2008
The user manual provides information for configuring the features of the NETGEAR Wireless-G
Router Model WGR614v9 beyond initial configuration settings. Initial configuration instructions
can be found in the . You should have basic to intermediate computer and Internet skills.
Bold
Fixed
Italic
URL links
Formats. This manual uses the following formats to highlight special messages:
Tip: This format is used to highlight a procedure that will save time or resources.
Warning: Ignoring this type of note might result in a malfunction or damage to the
equipment, a breach of security, or a loss of data.
Danger: This is a safety warning. Failure to take heed of this notice might result in
personal injury or death.
xi
v1.1, May 2008
Scope. This manual is written for the Wireless-G Router according to these specifications:
Product Version
May 2008
For more information about network, Internet, firewall, and VPN technologies, click the links to
the NETGEAR website in Appendix B, Related Documents.
Note: Product updates are available on the NETGEAR, Inc. website at
http://www.netgear.com/support.
Buttons,
at a time.
and
A
button that displays the table of contents and an
button that displays an
index. Double-click a link in the table of contents or index to navigate directly to where the
topic is described in the manual.
A
model.
button to access the full NETGEAR, Inc. online knowledge base for the product
Printing a page from HTML. Each page in the HTML version of the manual is dedicated to
a major topic. Select File > Print from the browser menu to print the page contents.
Printing from PDF. Your computer must have the free Adobe Acrobat Reader installed for
you to view and print PDF files. The Acrobat Reader is available on the Adobe website at
http://www.adobe.com.
Printing a PDF chapter. Use the PDF of This Chapter link at the top left of any page.
xii
Click the PDF of This Chapter link at the top left of any page in the chapter you want
to print. The PDF version of the chapter you were viewing opens in a browser
window.
Click the print icon in the upper left of your browser window.
Printing a PDF version of the complete manual. Use the Complete PDF Manual link
at the top left of any page.
Click the Complete PDF Manual link at the top left of any page in the manual. The
PDF version of the complete manual opens in a browser window.
Click the print icon in the upper left of your browser window.
Tip: If your printer supports printing two pages on a single sheet of paper, you can
save paper and printer ink by selecting this feature.
Revision History
NETGEAR, Inc. is constantly searching for ways to improve its products and documentation. The
following table indicates any changes that might have been made since the Wireless-G Router was
introduced.
Table 2-1. Publication Revision History
Part Number
Version
Number
Date
Description
202-10308-01
v1.0
February 2008
First publication.
v1.1
May 2008
xiii
v1.1, May 2008
xiv
Chapter 1
Configuring Basic Connectivity
This chapter describes the settings for your Internet connection and your wireless local area
network (LAN) connection. When you perform the initial configuration of your wireless router
using the Resource CD as described in the , these settings are specified automatically for you. This
chapter provides further details about these connectivity settings, as well as instructions on how to
log in to the router for further configuration.
Note: NETGEAR recommends using the Smart Wizard on the Resource CD for initial
configuration, as described in the .
This chapter includes the following sections:
Configuring Your Internet Connection Using the Smart Setup Wizard on page 1-1
Using the Setup Manual on page 1-2
Logging In to Your Wireless Router on page 1-2
Viewing and Configuring Basic ISP Settings on page 1-5
Figure 1-1
1-2
Tip: You can connect to the wireless router by typing either of these URLs in the
address field of your browser, and then pressing Enter:
http://www.routerlogin.net
http://www.routerlogin.com
If these URLs do not work, you must type the IP address of the router, for
example, http://www.192.168.1.1.
2. Enter admin for the router user name and your password (or the default, password). For
information about how to change the password, see Changing the Administrator Password
on page 2-14.
Note: The router user name and password are not the same as any other user name or
password you might use to log in to your Internet connection.
The Checking for Firmware Updates screen appears unless you previously cleared the Check
for Updated Firmware Upon Log-in check box.
Figure 1-2
If the router discovers a newer version of software, you are asked if you want to upgrade to the
new software (see Upgrading the Router Software on page 6-7 for details). If no new
firmware is available, the no new firmware available message displays.
3. In the main menu on the left, select Basic Settings under Setup. The Basic Settings screen
displays showing the wireless routers home page and suggested default settings.
1-3
v1.1, May 2008
Figure 1-3
Note: If the Check for New Version Upon Log-in check box is selected, the home
page is the Router Upgrade screen. Otherwise, it is the Basic Settings screen.
If the wireless router is connected to the Internet, you can select Knowledge Base or
Documentation under Web Support in the main menu to view support information or the
documentation for the wireless router.
If you do not click Logout, the wireless router will wait for 5 minutes after no activity before
it automatically logs you out.
1-4
Figure 1-4
No login required by ISP. If no login is required by your ISP, the following settings appear in
the Basic Settings screen.
1-5
v1.1, May 2008
Account Name (might also be called Host Name). The account name is provided to the
ISP during a DHCP request from your router. In most cases, this setting is not required,
but some ISPs require it for access to ISP services such as mail or news servers.
Domain Name. The domain name is provided by your router to computers on your LAN
when the computers request DHCP settings from your router. In most cases, this settings is
not required.
Internet IP Address. Determines how your router obtains an IP address for Internet
access.
If your ISP assigns an IP address dynamically (by DHCP), select Get Dynamically
From ISP.
If your ISP has assigned you a permanent, fixed (static) IP address for your computer,
select Use Static IP Address. Enter the IP address that your ISP assigned. Also, enter
the subnet mask and the gateway IP address. The gateway is the ISPs router to which
your router will connect.
Domain Name Server (DNS) Address. If you know that your ISP does not automatically
transmit DNS addresses to the router during login, select Use These DNS Servers, and
enter the IP address of your ISPs primary DNS server. If a secondary DNS server address
is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.
Router MAC Address. This section determines the Ethernet MAC address that the router
will use on the Internet port. Typically, you would leave Use Default Address selected.
However, some ISPs (especially cable modem providers) register the Ethernet MAC
address of the network interface card in your computer when your account is first opened.
They then accept only traffic from the MAC address of that computer. This feature allows
your router to masquerade as that computer by cloning or spoofing its MAC address.
To change the MAC address, select one of the following methods:
Select Use Computer MAC Address. The router will then capture and use the MAC
address of the computer that you are now using. You must be using the one computer
that is allowed by the ISP.
1-6
If a login is required by your ISP, the following settings appear in the Basic Settings screen:
ISP does require login
Figure 1-5
Does Your Internet Connection Require A Login? If you usually must use a login program
such as WinPOET to access the Internet, your Internet connection requires a login. After you
select Yes, the Basic Settings screen displays.
Note: After you finish setting up your router, you will no longer need to launch the
ISPs login program on your computer to access the Internet. When you start
an Internet application, your router will automatically log you in.
Internet Service Provider. This drop-down list contains a few ISPs that need special
protocols for connection. The list includes:
PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services
1-7
v1.1, May 2008
Other, which selects PPPoE (Point to Point Protocol over Ethernet), the protocol used
by most DSL services worldwide.
Figure 1-6
Note: Not all ISPs are listed here. The ones on this list have special
requirements.
Login and Password. This is the user name and password provided by your ISP. This
name and password are used to log in to the ISP server.
Connection Mode. This drop-down list (shown in Figure 1-5 on page 1-7) selects when
the router will connect to and disconnect from the Internet. The list includes:
Always On. The router logs in to the Internet immediately after booting and never
disconnects.
Dial on Demand. The router logs in only when outgoing traffic is present and logs out
after the idle time-out.
Manually Connect. The router logs in or logs out only when the user clicks Connect
or Disconnect in the Router Status screen.
Idle Timeout. Your Internet connection is logged out if there is no data transfer during the
specified time interval.
1-8
Domain Name Server (DNS) Address. If you know that your ISP does not automatically
transmit DNS addresses to the router during login, select Use These DNS Servers, and
enter the IP address of your ISPs primary DNS server. If a secondary DNS server address
is available, enter it also.
Note: If you enter or change a DNS address, restart the computers on your
network so that these settings take effect.
1-9
v1.1, May 2008
1-10
Chapter 2
Safeguarding Your Network
The Wireless-G Router Model WGR614v9 provides highly effective security features, which are
covered in detail in this chapter.
This chapter includes the following sections:
Choosing Appropriate Wireless Security
Recording Basic Wireless Settings Setup Information on page 2-4
Changing Wireless Security Settings on page 2-5
Viewing Advanced Wireless Settings on page 2-10
Restricting Wireless Access by MAC Address on page 2-11
Restricting Wireless Access by MAC Address on page 2-11
Changing the Administrator Password on page 2-14
Backing Up Your Configuration on page 2-15
Understanding Your Firewall on page 2-15
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK
encryption can consume more battery power on a notebook computer, and can cause significant
performance degradation with a slow computer.
Note: NETGEAR recommends that you change the administration password of your
router. Default passwords are well known, and an intruder can use your
administrator access to read or disable your security settings. For information
about how to change the administrator password, see Changing the Administrator
Password on page 2-14.
Wireless data
security options
Range: up to 300 foot radius
1) Open system: easy but no security
2) MAC access list: no data security
WGR614v9
Note: Use these with other features that enhance security (Table 2-2 on page 2-3).
Figure 2-1
The Wireless-G Router provides two screens for configuring the wireless settings: the basic
Wireless Settings screen, which you access under Setup in the main menu (see Changing Wireless
Security Settings on page 2-5), and the Advanced Wireless Settings screen, which you access
under Advanced (see Changing Wireless Security Settings on page 2-5).
Basic security options are listed in order of increasing effectiveness in Table 2-1 below. Other
features that affect security are listed in Table 2-2 on page 2-3. For more details on wireless
security methods, see the online document Wireless Networking Basics in Appendix B.
2-2
Description
None.
Wi-Fi Protected Access with Pre-Shared Key (WPAPSK and WPA2-PSK) data encryption provides
extremely strong data security, very effectively
WPA2-PSK (AES). Wi-Fi Protected Access version 2 blocking eavesdropping. Because WPA and WPA2
with Pre-Shared Key; WPA2-PSK standard
are relatively new standards, older wireless adapters
encryption with the AES encryption type.
and devices might not support them.
For more information, see Configuring WPA-PSK
WPA-PSK (TKIP) + WPA2-PSK (AES). Mixed mode. and WPA2-PSK Wireless Security on page 2-9.
Description
2-3
v1.1, May 2008
Description
If WEP Authentication is used, circle one: Open System, Shared Key, or Auto.
Note: If you select Shared Key, the other devices in the network will not connect
unless they are also set to Shared Key and are configured with the correct key.
WEP Encryption Key Size. Choose one: 64-bit or 128-bit. Again, the encryption key
size must be the same for the wireless adapters and the wireless router.
2-4
Data Encryption (WEP) Keys. There are two methods for creating WEP data encryption
keys. Whichever method you use, record the key values in the spaces provided.
Passphrase Method. ______________________________ These characters are
case-sensitive. Enter a word or group of printable characters and click Generate. Not
all wireless devices support the passphrase method.
Manual Method. These values are not case-sensitive. For 64-bit WEP, enter 10
hexadecimal digits (any combination of 09, af, or AF). For 128-bit WEP, enter
26 hexadecimal digits.
Key 1: ___________________________________
Key 2: ___________________________________
Key 3: ___________________________________
Key 4: ___________________________________
Use the procedures described in the following sections to specify the Wireless-G Router. Store this
information in a safe place.
2-5
v1.1, May 2008
Figure 2-2
Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to
32 alphanumeric characters. When more than one wireless network is active, different wireless
network names provide a way to separate the traffic. For a wireless device to participate in a
particular wireless network, it must be configured with the SSID for that network. The
WGR614v9 default SSID is NETGEAR. You can disable this broadcast as described in
Viewing Advanced Wireless Settings on page 2-10.
Region. This field identifies the region where the Wireless-G Router can be used. It might not
be legal to operate the wireless features of the wireless router in a region other than one of
those identified in this field.
Note: The region selection feature might not be available in all countries.
2-6
Channel. This field determines which operating frequency is used. It should not be necessary
to change the wireless channel unless you notice interference problems with another nearby
wireless network. The wireless router uses channel bonding technology to extend the
bandwidth for data transmission. For more information about the wireless channel
frequencies, see the online document that you can access from Wireless Networking Basics
in Appendix B.
Mode. This field determines which data communications protocol is used. You can choose
from: b and g; or g only.
Security Options. The selection of wireless security options can significantly affect your
network performance. The time it takes to establish a wireless connection can vary depending
on both your security settings and router placement.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2PSK encryption can consume more battery power on a notebook computer, and can cause
significant performance degradation with a slow computer. Instructions for configuring the
security options can be found in Choosing Appropriate Wireless Security on page 2-1. A full
explanation of wireless security standards is available in the online document that you can
access from Wireless Networking Basics in Appendix B.
Open System. With Open System authentication and 64 or 128 bit WEP data encryption, the
Wireless-G Router does perform data encryption but does not perform any authentication.
Anyone can join the network. This setting provides very little practical wireless security.
Shared Key. With Shared Key authentication, a wireless device must know the WEP key to
join the network. Select the encryption strength (64 or 128 bit data encryption). Manually
enter the key values, or enter a word or group of printable characters in the Passphrase field.
Manually entered keys are not case-sensitive, but passphrase characters are case-sensitive.
2-7
v1.1, May 2008
Figure 2-3
Automatic. In the Passphrase field, enter a word or group of printable characters, and
click Generate. The passphrase is case-sensitive. For example, NETGEAR is not the
same as nETgear. The four key fields are automatically populated with key values.
Manual. Enter 10 hexadecimal digits (any combination of 09, af, or AF). These
entries are not case-sensitive. For example, AA is the same as aa.
Select which of the four keys to activate.
2-8
2-9
v1.1, May 2008
Figure 2-4
Figure 2-5
2-10
Enable SSID Broadcast. Clear this check box to disable broadcast of the SSID, so that
only devices that know the correct SSID can connect. Disabling SSID broadcast nullifies
the wireless network discovery feature of some products such as Windows XP.
Enable Wireless Router Radio. If you disable the wireless router radio, wireless devices
cannot connect to the Wireless-G Router. If you will not be using your wireless network
for a period of time, you can clear this check box and disable all wireless connectivity.
Enable WMM. Clear this check box to disable WMM. Disabling WMM turns off the
wireless prioritization scheme. Note that wireless clients must also support WMM to take
advantage of this feature.
Wireless Card Access List. For information about this list, see Restricting Wireless
Access by MAC Address on page 2-11.
2-11
v1.1, May 2008
2. In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless
Card Access List.
Figure 2-6
3. Click Add to add a wireless device to the wireless access control list. The Wireless Card
Access Setup screen opens and displays a list of currently active wireless cards and their
Ethernet MAC addresses.
Figure 2-7
2-12
4. If the computer you want appears in the Available Wireless Cards list, you can select the radio
button of that computer to capture its MAC address; otherwise, you can manually enter a name
and the MAC address of the authorized computer. You can usually find the MAC address on
the bottom of the wireless device.
Tip: You can copy and paste the MAC addresses from the routers Attached Devices
screen into the MAC Address field of this screen. To do this, configure each
wireless computer to obtain a wireless link to the router. The computer should
then appear in the Attached Devices screen.
5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes
back to the list screen.
6. Repeat step 3 through step 5 for each additional device you want to add to the list.
7. Select the Turn Access Control On check box.
Note: When configuring the router from a wireless computer whose MAC address is
not in the Trusted PC list, if you select Turn Access Control On, you lose
your wireless connection when you click Apply. You must then access the
wireless router from a wired computer or from a wireless computer that is on
the access control list to make any further changes.
8. Click Apply to save your Wireless Card Access List settings.
Now, only devices on this list can wirelessly connect to the Wireless-G Router.
Warning: MAC address filtering adds an obstacle against unwanted access to your
network by the general public. However, because your trusted MAC
addresses appear in your wireless transmissions, an intruder can read them
and impersonate them. Do not rely on MAC address filtering alone to secure
your network.
2-13
v1.1, May 2008
Figure 2-8
2. To change the password, first enter the old password, then enter the new password twice.
3. Click Apply.
2-14
Blocking sites. Block access from your network to certain Web locations based on Web
addresses and Web address keywords. This feature is described in Blocking Access to
Internet Sites on page 3-1.
Blocking services. Block the use of certain Internet services by specific computers on your
network. This feature is described in Blocking Access to Internet Services on page 3-3.
Scheduled blocking. Block sites and services according to a daily schedule. This feature is
described in Scheduling Blocking on page 3-5.
2-15
v1.1, May 2008
Allow inbound access to your server. To allow inbound access to resources on your local
network (for example, a Web server or remote desktop program), you can open the needed
services by configuring port forwarding as described in Allowing Inbound Connections to
Your Network on page 5-1.
Allow certain games and applications to function correctly. Some games and applications
need to allow additional inbound traffic in order to function. Port triggering can dynamically
allow additional service connections, as described in Allowing Inbound Connections to Your
Network on page 5-1. Another feature to solve application conflicts with the firewall is
Universal Plug and Play (UPnP), described in Using Universal Plug and Play on page 5-12.
2-16
Chapter 3
Restricting Access From Your Network
This chapter describes how to use the content filtering and reporting features of the Wireless-G
Router Model WGR614v9 to protect your network. You can find these features by selecting the
items under Content Filtering in the main menu of the browser interface.
This chapter includes the following sections:
Content Filtering Overview
Blocking Access to Internet Sites
Blocking Access to Internet Services on page 3-3
Scheduling Blocking on page 3-5
Viewing Logs of Web Access or Attempted Web Access on page 3-7
3-1
v1.1, May 2008
If the keyword .com is specified, only websites with other domain suffixes (such as .edu, .org,
or .gov) can be viewed.
Figure 3-1
3-2
4. You can specify one trusted user, which is a computer that is exempt from blocking and
logging. Specify a trusted user by entering that computers IP address in the Trusted IP
Address fields.
Since the trusted user is identified by IP address, you should configure that computer with a
fixed IP address.
5. Click Apply to save all your settings in the Block Sites screen.
Figure 3-2
2. Enable service blocking by selecting either Per Schedule or Always, and then click Apply.
Restricting Access From Your Network
3-3
v1.1, May 2008
To block by schedule, be sure to specify a time period in the Schedule screen. For information
about scheduling, see Scheduling Blocking on page 3-5.
3. Specify a service for blocking by clicking Add. The Block Services Setup screen displays.
Figure 3-3
4. From the Service Type list, select the application or service to be allowed or blocked. The list
already displays several common services, but you are not limited to these choices. To add any
additional services or applications that do not already appear, select User Defined.
5. Select the radio button for the IP address configuration you want to block, and then enter the
IP addresses in the appropriate fields.
6. Click Add to enable your Block Services Setup selections.
Enter the starting port and ending port numbers. If the application uses a single port number,
enter that number in both fields.
3-4
If you know that the application uses either TCP or UDP, select the appropriate protocol. If
you are not sure, select Both.
Scheduling Blocking
The Wireless-G Router allows you to specify when blocking is enforced.
To schedule blocking:
1. Select Schedule under Content Filtering in the main menu. The Schedule screen displays.
Figure 3-4
3-5
v1.1, May 2008
b. Time of Day to Block. Select a start and end time in 24-hour format. Select All Day for
24-hour blocking.
c. Time Zone.
Select the time zone where you are located, and if you prefer to automatically adjust for
daylight savings time.
Note: Accurate time zone and daylight savings settings will assure that the
scheduling and logging functions operate correctly.
The Wireless-G Router uses the Network Time Protocol (NTP) to obtain the current time
and date from one of several network time servers on the Internet. To localize the time for
your log entries, you must specify your time zone:
Time Zone. Select your local time zone. This setting is used for the blocking schedule
and for time-stamping log entries.
Automatically Adjust for Daylight Savings Time. Select this check box if your
region supports daylight savings time. The router will automatically adjust the time at
the start and end of the daylight savings time period.
3. Click Apply to save your settings.
3-6
Figure 3-5
Description
Source IP
Target address
Action
3-7
v1.1, May 2008
3-8
Chapter 4
Customizing Your Network Settings
Figure 4-1
4-1
v1.1, May 2008
These addresses are part of the designated private address range for use in private networks and
should be suitable for most applications. If your network has a requirement to use a different IP
addressing scheme, you can make those changes in this screen.
The LAN IP settings are:
IP Subnet Mask. The LAN subnet mask of the router. Combined with the IP address, the IP
subnet mask allows a device to know which other addresses are local to it, and which must be
reached through a gateway or router.
Specify the pool of IP addresses to be assigned by setting the starting IP address and ending IP
address. These addresses should be part of the same IP address subnet as the routers LAN IP
address. Using the default addressing scheme, you should define a range between 192.168.1.2 and
192.168.1.254, although you might wish to save part of the range for devices with fixed addresses.
The router delivers the following parameters to any LAN device that requests DHCP:
Subnet mask
Primary DNS server (if you entered a primary DNS address in the Basic Settings screen;
otherwise, the routers LAN IP address)
Secondary DNS server (if you entered a secondary DNS address in the Basic Settings screen)
To use another device on your network as the DHCP server, or to manually specify the network
settings of all of your computers, clear the Use Router as DHCP Server check box. Otherwise,
leave it selected. If this service is not selected and no other DHCP server is available on your
network, you need to set your computers IP addresses manually or they will not be able to access
the router.
4-3
v1.1, May 2008
4-4
From the main menu of the browser interface, under Advanced, select Dynamic DNS to display
the Dynamic DNS screen.
Figure 4-2
4-5
v1.1, May 2008
Figure 4-3
4-6
them, but there are other applications that might not function well. In some cases, one local
computer can run the application correctly if that computers IP address is entered as the default
DMZ server.
Warning: DMZ servers pose a security risk. A computer designated as the default DMZ
server loses much of the protection of the firewall, and is exposed to exploits
from the Internet. If compromised, the DMZ server computer can be used to
attack other computers on your network.
Incoming traffic from the Internet is usually discarded by the router unless the traffic is a response
to one of your local computers or a service that you have configured in the Port Forwarding/Port
Triggering screen. Instead of discarding this traffic, you can have it forwarded to one computer on
your network. This computer is called the default DMZ server.
The WAN Setup screen lets you configure a default DMZ server.
To assign a computer or server to be a default DMZ server:
1. In the last Default DMZ Server field, type the last digit of the IP address for that computer.
To remove the default DMZ server, enter 0 (zero).
2. Select the Default DMZ Server check box, and click Apply.
4-7
v1.1, May 2008
You have an ISDN router on your home network for connecting to the company where you are
employed. This routers address on your LAN is 192.168.1.100.
When you first configured your router, two implicit static routes were created. A default route was
created with your ISP as the gateway, and a second static route was created to your local network
for all 192.168.1.x addresses. With this configuration, if you attempt to access a device on the
134.177.0.0 network, your router forwards your request to the ISP. The ISP forwards your request
to the company where you are employed, and the request is likely to be denied by the companys
firewall.
In this case you must define a static route, telling your router that 134.177.0.0 should be accessed
through the ISDN router at 192.168.1.100.
In this example:
The Destination IP Address and IP Subnet Mask fields specify that this static route applies
to all 134.177.x.x addresses.
4-8
The Gateway IP Address field specifies that all traffic for these addresses should be
forwarded to the ISDN router at 192.168.1.100.
A Metric value of 1 will work since the ISDN router is on the LAN.
Select Static Routes under Advanced in the main menu. The Static Routes screen displays.
Figure 4-4
Figure 4-5
2. In the Route Name field, type a name for this static route. (This is for identification purposes
only.)
3. Select the Private check box if you want to limit access to the LAN only. If Private is selected,
the static route is not reported in RIP.
4. Select the Active check box to make this route effective.
Customizing Your Network Settings
4-9
v1.1, May 2008
Internet
PCs
AP 2 is in Repeater mode.
Modem
Figure 4-6
4-10
In the scenario shown, the following conditions must be met for both APs:
Both APs must use the same SSID, wireless channel, and encryption mode (see information
about WEP in Configuring WEP Wireless Security on page 2-7).
Both APs must be on the same LAN IP subnet. That is, all the AP LAN IP addresses are in the
same network.
All LAN devices (wired and wireless computers) must be configured to operate in the same
LAN network address range as the APs.
Figure 4-7
The wireless router supports two modes of the wireless repeating function, and allows you to
control wireless client association:
Wireless Base Station mode. The wireless router acts as the parent AP, bridging traffic to and
from the child repeater AP, as well as handling wireless and wired local computers. To
configure this mode, you must know the MAC addresses of the child repeater AP.
Wireless Repeater mode. The wireless router sends all traffic from its local wireless or wired
computers to a remote AP. To configure this mode, you must know the MAC address of the
remote parent AP.
Disable Wireless Client Association. Usually this check box is cleared so that the router is an
access point for wireless computers.
4-11
v1.1, May 2008
If this check box is selected, the router communicates wirelessly only with other APs whose
MAC addresses are listed in this screen. The router still communicates with wire-connected
LAN devices.
Figure 4-8
3. Select the Enable Wireless Repeating Function check box and the Wireless Base Station
radio button.
4. Enter the MAC address for the repeater units.
5. Click Apply to save your changes.
4-12
4-13
v1.1, May 2008
4-14
Chapter 5
Fine-Tuning Your Network
This chapter describes how to modify the configuration of the Wireless-G Router Model
WGR614v9 to allow specific applications to access the Internet or to be accessed from the
Internet, and how to make adjustments to enhance your networks performance.
This chapter includes the following sections:
Allowing Inbound Connections to Your Network
Configuring Port Forwarding to Local Servers on page 5-6
Configuring Port Triggering on page 5-9
Using Universal Plug and Play on page 5-12
Optimizing Wireless Performance on page 5-13
Using WMM for Wireless Multimedia Applications on page 5-14
Changing the MTU Size on page 5-15
Overview of Home and Small Office Networking Technologies on page 5-16
5-1
v1.1, May 2008
The destination port number is 80, the standard port number for a Web server process.
The source port number is changed to a number chosen by the router, such as 33333. This
is necessary because two computers could independently be using the same session
number.
Your router then sends this request message through the Internet to the Web server at
www.example.com.
5-2
4. The Web server at www.example.com composes a return message with the requested Web
page data. The return message contains the following address and port information:
The source port number is 80, the standard port number for a Web server process.
The Web server then sends this reply message to your router.
5. Upon receiving the incoming message, your router checks its session table to determine
whether there is an active session for port number 33333. Finding an active session, the router
then modifies the message, restoring the original address information replaced by NAT. The
message now contains the following address and port information:
The source port number is 80, the standard port number for a Web server process.
The destination port number is 5678, the browser session that made the initial request.
Your router then sends this reply message to your computer, which displays the Web page
from www.example.com.
6. When you finish your browser session, your router eventually senses a period of inactivity in
the communications. Your router then removes the session information from its session table,
and incoming traffic is no longer accepted on port number 33333.
5-3
v1.1, May 2008
When you initiate a session with destination port 6667, you must also allow incoming traffic on
port 113 to reach the originating computer. Using steps similar to the preceding example, the
following sequence shows the effects of the port triggering rule you have defined:
1. You open an IRC client program, beginning a chat session on your computer.
2. Your IRC client composes a request message to an IRC server using a destination port number
of 6667, the standard port number for an IRC server process. Your computer then sends this
request message to your router.
3. Your router creates an entry in its internal session table describing this communication session
between your computer and the IRC server. Your router stores the original information,
performs Network Address Translation (NAT) on the source address and port, and sends this
request message through the Internet to the IRC server.
4. Noting your port triggering rule, and having observed the destination port number of 6667,
your router creates an additional session entry to send any incoming port 113 traffic to your
computer.
5. The IRC server sends a return message to your router using the NAT-assigned source port (as
in the previous example, lets say port 33333) as the destination port. The IRC server also
sends an identify message to your router with destination port 113.
6. Upon receiving the incoming message to destination port 33333, your router checks its session
table to determine whether there is an active session for port number 33333. Finding an active
session, the router restores the original address information replaced by NAT and sends this
reply message to your computer.
7. Upon receiving the incoming message to destination port 113, your router checks its session
table and learns that there is an active session for port 113, associated with your computer. The
router replaces the messages destination IP address with your computers IP address and
forwards the message to your computer.
8. When you finish your chat session, your router eventually senses a period of inactivity in the
communications. The router then removes the session information from its session table, and
incoming traffic is no longer accepted on port numbers 33333 or 113.
To configure port triggering, you need to know which inbound ports the application needs. Also,
you need to know the number of the outbound port that will trigger the opening of the inbound
ports. You can usually determine this information by contacting the publisher of the application, or
user groups or newsgroups.
Note: Only one computer at a time can use the triggered application.
5-4
The destination port number is 80, the standard port number for a Web server process.
The remote computer then sends this request message through the Internet to your router.
2. Your router receives the request message and looks in its rules table for any rules covering the
disposition of incoming port 80 traffic. Your port forwarding rule specifies that incoming port
80 traffic should be forwarded to local IP address 192.168.1.123. Therefore, your router
modifies the destination information in the request message:
The destination address is replaced with 192.168.1.123.
Your router then sends this request message to your local network.
3. Your Web server at 192.168.1.123 receives the request and composes a return message with
the requested Web page data. Your Web server then sends this reply message to your router.
4. Your router performs Network Address Translation (NAT) on the source IP address, and sends
this request message through the Internet to the remote computer, which displays the Web
page from www.example.com.
To configure port forwarding, you need to know which inbound ports the application needs. You
usually can determine this information by contacting the publisher of the application or user
groups or newsgroups.
5-5
v1.1, May 2008
5-6
Figure 5-1
2. From the Service Name list, select the service or game that you will host on your network.
If the service does not appear in the list, see the following section, Adding a Custom
Service.
3. In the corresponding Server IP Address box, enter the last digit of the IP address of your local
computer that will provide this service.
4. Click Add. The service appears in the list in the screen.
5-7
v1.1, May 2008
Figure 5-2
If the application uses only a single port, enter the same port number in the Ending Port
field.
If the application uses a range of ports, enter the ending port number of the range in the
Ending Port field.
6. In the Server IP Address field, enter the IP address of your local computer that will provide
this service.
7. Click Apply. The service appears in the list in the Port Forwarding/Port Triggering screen.
5-8
5-9
v1.1, May 2008
To configure port triggering, you need to know which inbound ports the application needs. Also,
you need to know the number of the outbound port that will trigger the opening of the inbound
ports. You can usually determine this information by contacting the publisher of the application or
user groups or newsgroups.
To set up port triggering:
1. Select Port Forwarding/Port Triggering under Advanced in the main menu. The
Forwarding/Port Triggering screen displays.
2. Select the Port Triggering radio button. The port triggering information displays.
Figure 5-3
5-10
4. In the Port Triggering Timeout field, enter a value up to 9999 minutes. This value controls
the inactivity timer for the designated inbound ports. The inbound ports close when the
inactivity time expires. This is required because the router cannot be sure when the application
has terminated.
5. Click Add Service.
Figure 5-4
5-11
v1.1, May 2008
Figure 5-5
Turn UPnP On. UPnP can be enabled or disabled for automatic device configuration. The
default setting for UPnP is disabled. If this check box is not selected, the router does not
allow any device to automatically control the resources, such as port forwarding
(mapping) of the router.
5-12
Advertisement Period. The advertisement period is how often the router broadcasts its
UPnP information. This value can range from 1 to 1440 minutes. The default period is 30
minutes. Shorter durations ensure that control points have current device status at the
expense of additional network traffic. Longer durations might compromise the freshness
of the device status but can significantly reduce network traffic.
Advertisement Time To Live. The time to live for the advertisement is measured in hops
(steps) for each UPnP packet sent. The time to live hop count is the number of steps a
broadcast packet is allowed to propagate for each UPnP advertisement before it
disappears. The number of hops can range from 1 to 255. The default value for the
advertisement time to live is 4 hops, which should be fine for most home networks. If you
notice that some devices are not being updated or reached correctly, then it might be
necessary to increase this value.
UPnP Portmap Table. The UPnP Portmap Table displays the IP address of each UPnP
device that is currently accessing the router and which ports (Internal and External) that
device has opened. The UPnP Portmap Table also displays what type of port is open and
whether that port is still active for each IP address.
5-13
v1.1, May 2008
Near the center of the area in which your computers will operate.
In an elevated location such as a high shelf where the wirelessly connected computers
have line-of-sight access (even if through walls).
Keep wireless devices at least 2 feet from large metal fixtures such as file cabinets,
refrigerators, pipes, metal ceilings, reinforced concrete, and metal partitions.
Keep away from large amounts of water such as fish tanks and water coolers.
Reduce interference.
Place wireless devices away from various electromagnetic noise sources, especially those
in the 24002500 MHz frequency band. Common noise-creating sources are:
Copying machines, elevators, and cell phones (no closer than 6 feet)
Use a scanning utility to determine what other wireless networks are operating nearby, and
choose an unused channel.
Turn off SSID broadcast, and change the default SSID. Other nearby devices might
automatically try to connect to your network several times a second, which can cause
significant performance reduction.
Use WMM to improve the performance of voice and video traffic over the wireless link.
You have problems connecting to your ISP, or other Internet service, and either the technical
support of the ISP or of NETGEAR recommends changing the MTU size. These might require
an MTU change:
A secure Web site that will not open, or displays only part of a Web page
Yahoo e-mail
MSN
You used a program to optimize MTU for performance reasons, and now you have
connectivity or performance problems.
Note: An incorrect MTU setting can cause Internet communication problems such as the
inability to access certain Web sites, frames within Web sites, secure login pages,
or FTP or POP servers.
5-15
v1.1, May 2008
If you suspect an MTU problem, a common solution is to change the MTU size to 1400. If you are
willing to experiment, you can gradually reduce the MTU size from the maximum value of 1500
until the problem goes away. Table 5-1 describes common MTU sizes and applications.
Table 5-1. Common MTU Sizes
MTU
Application
1500
The largest Ethernet packet size and the default value. This is the typical setting for nonPPPoE, non-VPN connections, and is the default value for NETGEAR routers, adapters,
and switches.
1492
1472
1468
1460
Usable by AOL if you do not have large e-mail attachments, for example.
1436
1400
576
Broadband Internet. Your Internet connection speed is determined by your modem type,
such as ADSL or cable modem, as well as the connection speed of the sites to which you
connect, and general Internet traffic. ADSL and cable modem connections are asymmetrical,
meaning they have a lower data rate to the Internet (upstream) than from the Internet
(downstream). Keep in mind that when you connect to another site that also has an
asymmetrical connection, the data rate between your sites is limited by each sides upstream
data rate. A typical residential ADSL or cable modem connection provides a downstream
throughput of about 1 to 3 megabits per second (Mbps). Newer technologies such as ADSL2+
and Fiber to the Home (FTTH) will increase the connection speed to tens of Mbps.
5-16
Wireless. Your Wireless-G Router Model WGR614v9 provides a wireless data throughput of
up to 300 Mbps using technology called multiple input, multiple output (MIMO), in which
multiple antennas transmit multiple streams of data. The use of multiple antennas also
provides excellent range and coverage. With the introduction of the newer WPA and WPA2
encryption and authentication protocols, wireless security is extremely strong.
To get the best performance, use RangeMax NEXT adapters such as the WN511B for your
computers. Although the RangeMax NEXT router is compatible with older 802.11b and
802.11g adapters, the use of these older wireless technologies in your network can result in
lower throughput overall (typically less than 10 Mbps for 802.11b and less than 40 Mbps for
802.11g). In addition, many older wireless products do not support the latest security
protocols, WPA and WPA2.
Powerline. For connecting rooms or floors that are blocked by obstructions or are distant
vertically, consider networking over your buildings AC wiring. NETGEARs Powerline HD
family of products delivers up to 200 Mbps to any outlet, while the older-generation XE
family of products delivers 14 Mbps or 85 Mbps. Data transmissions are encrypted for
security, and you can configure an individual network password to prevent neighbors from
connecting.
The Powerline HD family of products can coexist on the same network with older-generation
XE family products or HomePlug 1.0 products, but they are not interoperable with these older
products.
Streaming HD video requires 10 to 30 Mbps per stream. Because latency and packet loss can
disrupt your video, plan to provide at least twice the capacity you need.
5-17
v1.1, May 2008
Streaming MP3 audio requires less than 1 Mbps per stream and does not strain most modern
networks. Like video, however, streaming audio is also sensitive to latency and packet loss, so
a congested network or a noisy link can cause problems.
Backing up computers over the network has become popular due to the availability of
inexpensive mass storage. Table 5-2 shows the time to transfer 1 gigabyte (1 GB) of data using
various networking technologies.
8 seconds
26 seconds
Powerline HD
40 seconds
80 seconds
802.11n wireless
45 seconds
802.11g wireless
150 seconds
802.11b wireless
700 seconds
800 seconds
2700 seconds
5-18
Chapter 6
Using Network Monitoring Tools
This chapter describes how to use the maintenance features of your Wireless-G Router Model
WGR614v9. You can access these features by selecting the items under Maintenance in the main
menu of the browser interface.
This chapter includes the following sections:
Viewing Wireless Router Status Information
Viewing a List of Attached Devices on page 6-5
Managing the Configuration File in Chapter 6
Upgrading the Router Software on page 6-7
Enabling Remote Management Access on page 6-11
Figure 6-1
6-1
v1.1, May 2008
Description
Account Name
Hardware Version
Firmware Version
The version of the current software installed in the router. This will
change if you upgrade your router.
Internet Port
MAC Address
IP Address
The IP address being used by the Internet (WAN) port of the router. If
no address is shown, or is 0.0.0.0, the router cannot connect to the
Internet.
DHCP
IP Subnet Mask
The IP subnet mask being used by the Internet (WAN) port of the
router. For an explanation of subnet masks and subnet addressing,
click the link to the online document TCP/IP Networking Basics in
Appendix B.
LAN Port
MAC Address
IP Address
The IP address being used by the Ethernet (LAN) port of the router.
The default is 192.168.1.1.
DHCP
Identifies whether the routers built-in DHCP server is active for the
LAN-attached devices.
IP Subnet Mask
The IP subnet mask being used by the Ethernet (LAN) port of the
router. The default is 255.255.255.0.
6-2
Description
Wireless Port
Name (SSID)
The wireless network name (SSID) being used by the wireless port of
the router. The default is NETGEAR.
Region
Channel
Identifies the channel of the wireless port being used. Click the link to
the online document Wireless Networking Basics in Appendix B for
the frequencies used on each channel.
Mode
Wireless AP
Broadcast Name
Figure 6-2
6-3
v1.1, May 2008
Description
IP Address
Subnet Mask
Default Gateway
The IP address for the default gateway that the router communicates with.
DHCP Server
The IP address for the Dynamic Host Configuration Protocol server that provides
the TCP/IP configuration for all the computers that are connected to the router.
DNS Server
The IP address of the Domain Name Service server that provides translation of
network names to IP addresses.
Lease Obtained
Lease Expires
Click the Release button to release the connection status items (that is, all items return to 0).
Click the Renew button to renew to the connection status items (that is, all items are
refreshed).
Click the Close Window button to close the Connection Status screen.
3. Click Show Statistics to display router usage statistics.
Figure 6-3
6-4
Description
System Up Time
Port
The statistics for the WAN (Internet) and LAN (Ethernet) ports. For each port, the
screen displays the following:
Status
TxPkts
The number of packets transmitted on this port since reset or manual clear.
RxPkts
The number of packets received on this port since reset or manual clear.
Collisions
Tx B/s
The current transmission (outbound) bandwidth used on the WAN and LAN ports.
Rx B/s
The current reception (inbound) bandwidth used on the WAN and LAN ports.
Up Time
Poll Interval
To change the polling frequency, enter a time in seconds in the Poll Interval field, and click
Set Interval.
To stop the polling entirely, click Stop.
Figure 6-4
6-5
v1.1, May 2008
For each device, the table shows the IP address, NetBIOS host name or device name (if available),
and the Ethernet MAC address. To force the router to look for attached devices, click Refresh.
Note: If the router is rebooted, the table data is lost until the router rediscovers the
devices.
Figure 6-5
To restore your settings from a saved configuration file, enter the full path to the file on your
computer, or click Browse to browse to the file. When you have located it, click Restore to send
the file to the router. The router then reboots automatically.
6-7
v1.1, May 2008
The Checking for Firmware Updates screen appears at login unless you clear the Check for
Updated Firmware Upon Log-in check box.
Figure 6-6
A screen is also provided for upgrading the router. From the main menu of the browser interface,
under Maintenance, select Router Upgrade to display the Router Upgrade screen.
Figure 6-7
From this screen, you can check for new software versions by clicking the Check button. If a new
version is found, you can download and install it in one step. To enable the Smart Wizard to
automatically check for a new software version upon login, select the Check for New Version
Upon Log-in check box.
Alternatively, you can manually install an upgrade file stored on your computer.
6-8
Tip: Before upgrading the router software, use the router Settings Backup screen to save
your configuration settings. A router upgrade might cause the router settings to
revert to the factory defaults. If this happens, after completing the upgrade, you can
restore your settings from the backup.
Figure 6-8
To automatically upgrade to the new software, click Yes to allow the router to download and install
the new software file from NETGEAR.
Warning: When uploading software to the Wireless-G Router, do not interrupt the Web
browser by closing the window, clicking a link, or loading a new page. If the
browser is interrupted, it could corrupt the software.
When the upload is complete, your router automatically restarts. The upgrade process typically
takes about 1 minute. Read the new software release notes to determine whether you must
reconfigure the router after upgrading.
6-9
v1.1, May 2008
6-10
Figure 6-9
Note: Be sure to change the routers default configuration password to a very secure
password. The ideal password should contain no dictionary words from any
language, and should be a mixture of letters (both uppercase and lowercase),
numbers, and symbols. Your password can be up to 30 characters.
To configure your router for remote management:
1. Select the Turn Remote Management On check box.
6-11
v1.1, May 2008
2. Under Allow Remote Access By, specify what external IP addresses will be allowed to access
the routers remote management.
Note: For enhanced security, restrict access to as few external IP addresses
as practical.
To allow access from a range of IP addresses on the Internet, select IP Address Range.
Enter a beginning and ending IP address to define the allowed range.
To allow access from a single IP address on the Internet, select Only This Computer.
Enter the IP address that will be allowed access.
6-12
Chapter 7
Troubleshooting
This chapter provides information about troubleshooting your Wireless-G Router Model
WGR614v9. After each problem description, instructions are provided to help you diagnose and
solve the problem. As a first step, please review the Quick Tips.
Tip: NETGEAR provides helpful articles, documentation, and the latest software
updates at http://www.netgear.com/support.
This chapter includes the following sections:
Troubleshooting Quick Tips
Troubleshooting Basic Functions on page 7-3
Troubleshooting the Web Configuration Interface on page 7-4
Troubleshooting the Internet Connection on page 7-5
Troubleshooting a Network Using the Ping Utility on page 7-7
Problems with Date and Time on page 7-9
Solving Wireless Connection Problems on page 7-9
Restoring the Default Configuration and Password on page 7-13
7-1
v1.1, May 2008
The Internet status light on the wireless router is on if the Ethernet cable connecting the
wireless router and the modem is plugged in securely and the modem and wireless router are
turned on.
For each powered-on computer connected to the wireless router by an Ethernet cable, the
corresponding numbered router LAN port light is on.
Make sure that the wireless settings in the computer and router match exactly.
For a wirelessly connected computer, the wireless network name (SSID) and WEP or WPA
security settings of the router and wireless computer must match exactly.
If you have enabled the wireless router to restrict wireless access by MAC address, you must
add the wireless computers MAC address to the routers wireless card access list.
Make sure that the network settings of the computer are correct.
Wired and wirelessly connected computers must have network (IP) addresses on the same
network as the router. The simplest way to do this is to configure each computer to obtain an
IP address automatically using DHCP. Click the link to the online document Preparing Your
Network in Appendix B, or see the documentation that came with your computer.
Some cable modem service providers require you to use the MAC address of the computer
initially registered on the account. Your wireless router can capture and use that MAC address,
as described in Configuring Your Internet Connection Using the Smart Setup Wizard on
page 1-1.
7-2
Troubleshooting
v1.1, May 2008
is on.
Make sure that the power cord is properly connected to your router and that the power adapter
is properly connected to a functioning power outlet.
Check that you are using the 12V DC 1A power adapter that NETGEAR supplied for this
product.
If the Power light blinks alternately green and amber every second, the router software is
corrupted. This can happen if a firmware upgrade is interrupted, or if the router detects a
problem with the firmware. For recovery instructions, contact Technical Support at
www.netgear.com/support.
If the error persists, you have a hardware problem and should contact Technical Support at
www.netgear.com/support.
The lights never turn off.
When the router is turned on, the lights turn on for about 10 seconds and then turn off. If all the
lights stay on, there is a fault within the router.
If all lights are still on 1 minute after power-up:
Clear the routers configuration to factory defaults as explained in Restoring the Default
Configuration and Password on page 7-13.
Troubleshooting
7-3
v1.1, May 2008
If the error persists, you might have a hardware problem and should contact Technical Support at
www.netgear.com/support.
The Internet or Ethernet port lights are not on.
If either the Ethernet port lights or the Internet light does not come on when the Ethernet
connection is made, check the following:
Make sure that the Ethernet cable connections are secure at the router and at the modem or
computer.
If you are connecting from a wireless computer, try connecting from a wired computer.
Check the Ethernet connection between the wired computer and the router as described in
Troubleshooting Basic Functions on page 7-3.
Make sure that your computers IP address is on the same subnet as the router. For
instructions, click the link to the online document Preparing Your Network in Appendix B to
configure your computer.
Note: If your computers IP address is shown as 169.254.x.x: Windows and Mac OS
generate and assign an IP address if the computer cannot reach a DHCP server.
These autogenerated addresses are in subnet 169.254.x.x. If your IP address is
in this range, check the connection from the computer to the router, and reboot
your computer.
7-4
Troubleshooting
v1.1, May 2008
Make sure that your browser has Java, JavaScript, or ActiveX enabled. If you are using
Internet Explorer, click Refresh to be sure that the Java applet is loaded.
Try closing the browser and opening it again, or try a different browser.
Make sure that you are using the correct login information. The factory default login name is
admin, and the password is password. Make sure that Caps Lock is off when entering this
information.
If the router does not save changes you have made in the Web Configuration Interface, check the
following:
When entering configuration settings, be sure to click Apply before moving to another screen
or tab, or your changes could be lost.
Click Refresh or Reload in the Web browser. The changes might have occurred, but the Web
browser might be caching the old configuration.
Troubleshooting
7-5
v1.1, May 2008
If your ISP requires a login, the login name or password might be set incorrectly.
Your ISP allows only one Ethernet MAC address to connect to Internet and might check for
your computers MAC address. In this case, do one of the following:
Inform your ISP that you have bought a new network device, and ask them to use the
routers MAC address.
Configure your router to spoof your computers MAC address. This procedure is
explained in Configuring Your Internet Connection Using the Smart Setup Wizard on
page 1-1.
If your router can obtain an IP address, but your computer is unable to load any Web pages from
the Internet:
Your computer might not have the router configured as its TCP/IP gateway.
If your computer obtains its information from the router by DHCP, reboot the computer, and
verify the gateway address as described in the online document you can access from
Preparing Your Network in Appendix B.
7-6
Troubleshooting
v1.1, May 2008
For a wired connection, make sure that the numbered LAN port light is on for the port
to which you are connected. If the light is off, follow the instructions in The Internet
or Ethernet port lights are not on. on page 7-4.
Check that the corresponding Link lights are on for your network interface card. If
your router and computer are connected to a separate Ethernet switch, make sure that
the Link lights are on for the switch ports that are connected to your computer and
router.
Verify that the Ethernet card driver software and TCP/IP software are both installed
and configured on your computer.
Troubleshooting
7-7
v1.1, May 2008
Verify that the IP address for your router and your computer are correct and that the
addresses are on the same subnet.
Check that your computer has the IP address of your router listed as the default gateway. If the
IP configuration of your computer is assigned by DHCP, this information is not be visible in
your computers Network Control Panel. Verify that the IP address of the router is listed as the
default gateway as described in the online document you can access from Preparing Your
Network in Appendix B.
Check to see that the network address of your computer (the portion of the IP address specified
by the subnet mask) is different from the network address of the remote device.
If your ISP assigned a host name to your computer, enter that host name as the account name
in the Basic Settings screen.
Your ISP could be rejecting the Ethernet MAC addresses of all but one of your computers.
Many broadband ISPs restrict access by allowing traffic only from the MAC address of your
broadband modem, but some ISPs additionally restrict access to the MAC address of a single
computer connected to that modem. If this is the case, you must configure your router to
clone or spoof the MAC address from the authorized computer. For more information, see
Configuring Your Internet Connection Using the Smart Setup Wizard on page 1-1.
7-8
Troubleshooting
v1.1, May 2008
Troubleshooting
7-9
v1.1, May 2008
Use the setup program to scan for available wireless networks. Look for a network name (SSID) of
NETGEAR or your custom SSID if you have changed it. If your wireless network does not appear,
check these conditions:
Is your routers wireless radio enabled? See Viewing Advanced Wireless Settings on
page 2-10.
Is your routers SSID broadcast enabled? See Viewing Advanced Wireless Settings on
page 2-10.
Is your router set to a wireless standard that is not supported by your wireless card? Check the
Mode setting as described in Viewing and Configuring Basic ISP Settings on page 1-5.
If your wireless network appears, but the signal strength is weak, check these conditions:
Is your router too far from your computer, or too close? Place your computer near the router,
but at least 6 feet away, and see whether the signal strength improves.
Is your wireless signal obstructed by objects between the router and your computer? See
Optimizing Wireless Performance on page 5-13.
If your wireless network appears and has good signal strength, configure your wireless card and
router for the simplest possible connection as described in the next section.
7-10
Troubleshooting
v1.1, May 2008
1. Select Wireless Settings under Setup in the main menu of the WGR614v9 router.
Figure 7-1
2. For the wireless network name (SSID), use the default name, or choose a suitable descriptive
name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters.
The default SSID is NETGEAR.
Note: The SSID is case-sensitive; NETGEAR is not the same as nETgear. Also, the
SSID of any wireless access adapters must match the SSID you specify in the
Wireless-G Router. If they do not match, you will not get a wireless connection
to the Wireless-G Router.
3. Select the region in which the wireless interface will operate.
4. Set the channel. The default channel is Auto.
This field determines which operating frequency is used. It should not be necessary to change
the wireless channel unless you notice interference problems with another nearby wireless
router or access point. Select a channel that is not being used by any other wireless networks
within several hundred feet of your router. For more information about the wireless channel
frequencies, click the link to the online document Wireless Networking Basics in
Appendix B.
5. Set the mode to b and g.
Troubleshooting
7-11
v1.1, May 2008
Figure 7-2
9. Make sure that the Enable Wireless Router Radio and Enable SSID Broadcast check boxes
are selected.
10. Click Setup Access List.
11. Make sure that the Turn Access Control On check box is not selected.
12. Configure and test your wireless computer for wireless connectivity.
Program the wireless adapter of your computer to have the same SSID and channel that you
specified in the router, and disable encryption. Check that your computer has a wireless link
and can obtain an IP address by DHCP from the router.
Once your computer has basic wireless connectivity to the router, you can configure the advanced
wireless security functions of the computer and router (for more information about security, see
Chapter 2, Safeguarding Your Network).
7-12
Troubleshooting
v1.1, May 2008
Use the Erase function of the router (see Erasing the Configuration on page 6-7).
Use the restore factory settings button on the rear panel of the router. Use this method for cases
when the administration password or IP address is not known.
To restore the factory default configuration settings when you do not know the administration
password or IP address, you must use the restore settings button on the rear panel of the router.
1. Press and hold the restore settings button for 10 seconds.
2. Release the restore settings button, and wait for the router to reboot.
If the wireless router fails to restart, or the Power light continues to blink or turns solid amber, the
unit might be defective. If the error persists, you might have a hardware problem and should
contact Technical Support at http://www.netgear.com/support.
Troubleshooting
7-13
v1.1, May 2008
7-14
Troubleshooting
v1.1, May 2008
Appendix A
Technical Specifications
This appendix provides technical specifications for the Wireless-G Router Model WGR614v9.
Specification
Description
TCP/IP, DHCP
PPP over Ethernet (PPPoE)
Power Adapter
North America
Europe
Japan
Physical Specifications
Dimensions
Weight
Environmental Specifications
Operating temperature
0 to 40 C
(32 to 104 F)
Operating humidity
Electromagnetic Emissions
Meets requirements of
Interface Specifications
LAN
WAN
Technical Specifications
A-1
v1.0, February 2008
Specification
Description
Wireless
Radio data rates
Frequency
2.4-2.5Ghz
Data encoding
802.11 security
Enabled
SSID Broadcast
Enabled
SSID
NETGEAR
11b/g RF Channel
11
Mode
g and b
Authentication Type
Open System
Security
Disabled
A-2
Technical Specifications
v1.0, February 2008
Appendix B
Related Documents
This appendix provides links to reference documents you can use to gain a more complete
understanding of the technologies used in your NETGEAR product.
Document
Link
http://documentation.netgear.com/reference/enu/tcpip/index.htm
http://documentation.netgear.com/reference/enu/wireless/index.htm
http://documentation.netgear.com/reference/enu/wsdhcp/index.htm
http://documentation.netgear.com/reference/enu/vpn/index.htm
Glossary
http://documentation.netgear.com/reference/enu/glossary/index.htm
In addition, you can find initial setup instructions for your wireless router in the .
Related Documents
B-1
v1.1, May 2008
B-2
Related Documents
v1.1, May 2008
Index
access
blocking 3-1
remote 6-11
restricting by MAC address 2-11
viewing logs 3-7
access control
turning off 7-12
turning on 2-13
bold text xi
broadband Internet 5-16
broadcast status 6-3
ActiveX 7-5
adapters
specifications A-1
adding
custom service 5-7
reserved IP addresses 4-3
static routes 4-9
See also configuring
B
backing up configuration file 6-6
backing up, transfer time 5-18
base station, setting up 4-12
configuring
advanced security 2-10
basic security 2-5
DMZ server 4-7
Dynamic DNS 4-5
LAN IP settings 4-1
NAT 4-8
port forwarding 5-6
port triggering 5-9
repeater unit 4-13
user-defined services 3-4
WPA security 2-9
See also adding
connection mode 1-8
connection status settings 6-4
Index-1
v1.1, May 2008
encryption 2-1
firewalls
disabling 4-6
overview 2-15
disabling
firewall 4-6
wireless client association 4-11
H
hardware version 6-2
host name 1-6, 6-2, 6-6
HTML version, printing xii
I
idle time-out 1-8
inbound traffic, allowing or blocking 5-1
interface specifications A-1
interference, reducing 5-14
Internet connection
Index-2
v1.1, May 2008
troubleshooting 7-5
Internet light, troubleshooting and 7-3
Internet port, status 6-2
MAC addresses
attached devices 6-6
current 6-2
entering 1-6
restricting access by 2-11
N
NAT (Network Address Translation) 4-6, 4-8, 5-2
K
keys, encryption 2-8
L
LAN IP setup 4-1
LAN port
settings 6-2
password
changing 2-14
restoring 7-13
Index-3
v1.1, May 2008
port forwarding
configuring 5-6
example 5-5
S
scheduling blocking 3-5
secondary DNS server 1-6, 1-9
security
options, compared 2-2
setting up 2-1
service name 1-8
service numbers 3-4
services, blocking 3-3
setting time 3-6
setup information, gathering 2-4
Setup Manual 1-2
Shared Key authentication 2-4, 2-7
Smart Setup Wizard 1-1
R
radio, wireless 2-11, 6-3, 7-12
range, router 5-13
reducing interference 5-14
reference documents B-1
region of operation 2-6
registering 1-ii
releasing connection status 6-4
remote devices, testing path 7-8
remote management 6-11
renewing connection status 6-4
repeater units 4-13
requirements, speed 5-17
reserved IP adresses 4-3
Resource CD 1-2
restarting network 7-1
restoring
configuration 6-6
default factory settings 7-13
Index-4
v1.1, May 2008
time-out
idle 1-8
port triggering 5-11
troubleshooting 7-1
wireless settings
advanced 2-10
basic 2-5
gathering information 2-4
testing 7-10
typographical conventions xi
URLs
typography for xi
Web Configuration Manager 1-3
V
viewing
advanced wireless settings 2-10
attached devices 6-5
basic security settings 2-5
logs 3-7
status 6-1
W
WAN IP address, troubleshooting 7-5
WAN setup 4-6
Index-5
v1.1, May 2008
Index-6
v1.1, May 2008