Netgear DGN2000 DGN2000 Reference Manual - Page 8

Protecting Your Network, Managing Your Network - port forwarding

Page 8 highlights

Wireless-N ADSL2+ Modem Router DGN2000 Reference Manual Hiding your wireless network name (SSID 2-11 Restricting access by MAC address 2-11 Configuring Mixed WPA-PSK+WPA2-PSK Security 2-13 Choosing Alternative Authentication and Encryption Methods 2-14 Configuring WEP 2-15 Configuring WPA-802.1x 2-16 Using Push 'N' Connect (WPS) to Configure Your Wireless Network and Security .....2-17 Connecting Additional Wireless Client Devices After WPS Setup 2-20 Chapter 3 Protecting Your Network Protecting Access to Your Wireless Modem Router 3-1 How to Change the Built-In Password 3-2 Changing the Administrator Login Time-out 3-3 Configuring Basic Firewall Services 3-3 Blocking Keywords, Sites, and Services 3-3 How to Block Keywords and Sites 3-3 Firewall Rules ...3-5 Inbound Rules (Port Forwarding 3-6 Inbound Rule Example: A Local Public Web Server 3-7 Inbound Rule Example: Allowing Video conferencing 3-8 Considerations for Inbound Rules 3-9 Outbound Rules (Service Blocking 3-9 Outbound Rule Example: Blocking Instant Messenger 3-9 Order of Precedence for Rules 3-11 Services ...3-12 How to Define Services 3-12 Setting Times and Scheduling Firewall Services 3-13 How to Set Your Time Zone 3-14 How to Schedule Firewall Services 3-15 Chapter 4 Managing Your Network Backing Up, Restoring, and Erasing Your Settings 4-1 How to Back Up the Configuration to a File 4-1 How to Restore the Configuration from a File 4-2 How to Erase the Configuration 4-2 viii v1.0, July 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126

Wireless-N ADSL2+ Modem Router DGN2000 Reference Manual
viii
v1.0, July 2008
Hiding your wireless network name (SSID)
.....................................................
2-11
Restricting access by MAC address
................................................................
2-11
Configuring Mixed WPA-PSK+WPA2-PSK Security
..............................................
2-13
Choosing Alternative Authentication and Encryption Methods
..............................
2-14
Configuring WEP
.............................................................................................
2-15
Configuring WPA-802.1x
.................................................................................
2-16
Using Push 'N' Connect (WPS) to Configure Your Wireless Network and Security
.....
2-17
Connecting Additional Wireless Client Devices After WPS Setup
.........................
2-20
Chapter 3
Protecting Your Network
Protecting Access to Your Wireless Modem Router
.......................................................
3-1
How to Change the Built-In Password
.....................................................................
3-2
Changing the Administrator Login Time-out
.............................................................
3-3
Configuring Basic Firewall Services
...............................................................................
3-3
Blocking Keywords, Sites, and Services
..................................................................
3-3
How to Block Keywords and Sites
...........................................................................
3-3
Firewall Rules
.................................................................................................................
3-5
Inbound Rules (Port Forwarding)
.............................................................................
3-6
Inbound Rule Example: A Local Public Web Server
..........................................
3-7
Inbound Rule Example: Allowing Video conferencing
.......................................
3-8
Considerations for Inbound Rules
.....................................................................
3-9
Outbound Rules (Service Blocking)
.........................................................................
3-9
Outbound Rule Example: Blocking Instant Messenger
.....................................
3-9
Order of Precedence for Rules
..............................................................................
3-11
Services
........................................................................................................................
3-12
How to Define Services
..........................................................................................
3-12
Setting Times and Scheduling Firewall Services
..........................................................
3-13
How to Set Your Time Zone
...................................................................................
3-14
How to Schedule Firewall Services
........................................................................
3-15
Chapter 4
Managing Your Network
Backing Up, Restoring, and Erasing Your Settings
........................................................
4-1
How to Back Up the Configuration to a File
.............................................................
4-1
How to Restore the Configuration from a File
..........................................................
4-2
How to Erase the Configuration
...............................................................................
4-2