Netgear HR314 HR314 Reference Manual - Page 20
Content Filtering, Security, Encryption of the Wireless Link - user manual
UPC - 606449024241
View all Netgear HR314 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 20 highlights
Reference Manual for the Model HR314 802.11a Hi-Speed Wireless Router • Duplicate detection and Recovery • Beacon generation • Fragmentation and reassembly • Roaming among access points on the same subnet Content Filtering With its content filtering features, the HR314 prevents objectionable content from reaching your PCs. Its content filtering features include: • Content filtering by domain or keyword The HR314 uses content filtering to enforce your network's Internet access policies. The router allows you to control access to Internet content by screening for keywords within Website names. • Logging of inappropriate use You can configure the HR314 to log access to Web sites and to e-mail the log to you. You can also configure the router to send an immediate alert e-mail message to you whenever a local user attempts to access a blocked Web site. Security The HR314 is equipped with several features designed to maintain security, as described in this section. • PCs Hidden by NAT Network address translation (NAT) opens a temporary path to the Internet for requests originating from the local network. Requests originating from outside the LAN are discarded, preventing users outside the LAN from finding and directly accessing the PCs on the LAN. • Port Forwarding with NAT Although NAT prevents Internet locations from directly accessing the PCs on the LAN, the router allows you to direct incoming traffic to specific PCs based on the service port number of the incoming request, or to one designated "DMZ" host computer. You can specify forwarding of single ports or ranges of ports. • Encryption of the Wireless Link For security against eavesdropping of the wireless signal, the router supports Wired Equivalent Privacy (WEP) data encryption with Shared Key authentication. You can also restrict access to the wireless network by MAC address. 1-4 Introduction