Netgear WGR614v9 WGR614v9 User Manual - Page 37

Turn Access Control On, Apply, Warning, not in the Trusted PC list, if you select - repeater

Page 37 highlights

Wireless-G Router WGR614v9 Reference Manual 4. If the computer you want appears in the Available Wireless Cards list, you can select the radio button of that computer to capture its MAC address; otherwise, you can manually enter a name and the MAC address of the authorized computer. You can usually find the MAC address on the bottom of the wireless device. Tip: You can copy and paste the MAC addresses from the router's Attached Devices screen into the MAC Address field of this screen. To do this, configure each wireless computer to obtain a wireless link to the router. The computer should then appear in the Attached Devices screen. 5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes back to the list screen. 6. Repeat step 3 through step 5 for each additional device you want to add to the list. 7. Select the Turn Access Control On check box. Note: When configuring the router from a wireless computer whose MAC address is not in the Trusted PC list, if you select Turn Access Control On, you lose your wireless connection when you click Apply. You must then access the wireless router from a wired computer or from a wireless computer that is on the access control list to make any further changes. 8. Click Apply to save your Wireless Card Access List settings. Now, only devices on this list can wirelessly connect to the Wireless-G Router. Warning: MAC address filtering adds an obstacle against unwanted access to your network by the general public. However, because your trusted MAC addresses appear in your wireless transmissions, an intruder can read them and impersonate them. Do not rely on MAC address filtering alone to secure your network. Safeguarding Your Network v1.1, May 2008 2-13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116

Wireless-G Router WGR614v9 Reference Manual
Safeguarding Your Network
2-13
v1.1, May 2008
4.
If the computer you want appears in the Available Wireless Cards list, you can select the radio
button of that computer to capture its MAC address; otherwise, you can manually enter a name
and the MAC address of the authorized computer. You can usually find the MAC address on
the bottom of the wireless device.
5.
Click
Add
to add this wireless device to the Wireless Card Access List. The screen changes
back to the list screen.
6.
Repeat
step 3
through
step 5
for each additional device you want to add to the list.
7.
Select the
Turn Access Control On
check box.
8.
Click
Apply
to save your Wireless Card Access List settings.
Now, only devices on this list can wirelessly connect to the Wireless-G Router.
Tip:
You can copy and paste the MAC addresses from the router’s Attached Devices
screen into the MAC Address field of this screen. To do this, configure each
wireless computer to obtain a wireless link to the router. The computer should
then appear in the Attached Devices screen.
Note:
When configuring the router from a wireless computer whose MAC address is
not in the Trusted PC list, if you select
Turn Access Control On
, you lose
your wireless connection when you click
Apply
. You must then access the
wireless router from a wired computer or from a wireless computer that is on
the access control list to make any further changes.
Warning:
MAC address filtering adds an obstacle against unwanted access to your
network by the general public. However, because your trusted MAC
addresses appear in your wireless transmissions, an intruder can read them
and impersonate them. Do not rely on MAC address filtering alone to secure
your network.