Netgear WNR3500Lv2 User Manual - Page 39

Restricting Access by MAC Address, admin, password, Setup, Access List

Page 39 highlights

RangeMax™ Wireless-N Gigabit Router with USB WNR3500L User Manual Restricting Access by MAC Address For increased security, you can restrict access to the wireless network to allow only specific PCs based on their MAC addresses. You can restrict access to only trusted PCs so that unknown PCs cannot wirelessly connect to the WNR3500L router. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. To restrict access based on MAC addresses: 1. Log in to the wireless router at its default LAN address of http://www.routerlogin.net with its default user name of admin, and default password of password, or using whatever user name, password, and LAN address you have chosen for the wireless router. Note: If you configure the router from a wireless computer, add your computer's MAC address to the access list. Otherwise you will lose your wireless connection when you click Apply. You must then access the wireless router from a wired computer, or from a wireless computer that is on the access control list, to make any further changes. 2. From Advanced section of the main menu, select Wireless Settings, and then click Setup Access List to display the Wireless Station Access List screen. Figure 3-3 3. Click Add to add a wireless device to the wireless access control list. The Wireless Card Access Setup screen opens and displays a list of currently active wireless cards and their MAC addresses. Protecting Your Network 3-3 v1.0, November 2009

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133

RangeMax™ Wireless-N Gigabit Router with USB WNR3500L User Manual
Protecting Your Network
3-3
v1.0, November 2009
Restricting Access by MAC Address
For increased security, you can restrict access to the wireless network to allow only specific PCs
based on their MAC addresses. You can restrict access to only trusted PCs so that unknown PCs
cannot wirelessly connect to the WNR3500L router. MAC address filtering adds an obstacle
against unwanted access to your network, but the data broadcast over the wireless link is fully
exposed.
To restrict access based on MAC addresses:
1.
Log in to the wireless router at its default LAN address of
with
its default user name of
admin
, and default password of
password
, or using whatever user
name, password, and LAN address you have chosen for the wireless router.
2.
From Advanced section of the main menu, select Wireless Settings, and then click
Setup
Access List
to display the Wireless Station Access List screen.
3.
Click
Add
to add a wireless device to the wireless access control list. The Wireless Card
Access Setup screen opens and displays a list of currently active wireless cards and their MAC
addresses.
Note:
If you configure the router from a wireless computer, add your computer’s
MAC address to the access list. Otherwise you will lose your wireless
connection when you click Apply. You must then access the wireless router
from a wired computer, or from a wireless computer that is on the access
control list, to make any further changes.
Figure 3-3