Netgear rp614v2 setup
The operation of some equipment for example, test transmitters in accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notes in the operating instructions.
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations. Voluntary Control Council for Interference VCCI Statement This equipment is in the second category information equipment to be used in a residential area or an adjacent area thereto and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.
When used near a radio or TV receiver, it may become the cause of radio interference. Read instructions for correct handling. A direct connection to the Internet and a Web browser such as Internet Explorer or Netscape are required. B-1 Basic Router Concepts B-1 What is a Router? B-2 Routing Information Protocol B-2 IP Addresses and the Internet B-2 Netmask B-4 Subnet Addressing B-5 Private IP Addresses B-9 Related Documents Domain Name Server B Internet Security and Firewalls B What is a Firewall?
B Stateful Packet Inspection B Denial of Service Attack B Ethernet Cabling B Uplink Switches and Crossover Cables B Cable Quality C Are Login Protocols Used? C Restarting the Network C Glossary Index. The RP v2 router provides connection for multiple personal computers PCs to the Internet through an external broadband access device such as a cable modem or DSL modem that is normally intended for use by a single PC.
Audience This reference manual assumes that the reader has basic to intermediate computer and Internet skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial information is provided in the Appendices and on the Netgear website. Named keys in text are shown enclosed in square brackets. The notation [Enter] is used for the Enter key and the Return key. The RP v2 router provides you with multiple Web content filtering options, plus browsing activity reporting and instant alerts -- both via e-mail.
With minimum setup, you can install and use the router within minutes. Denial of Service DoS protection. Logs security incidents. The Model RP v2 will log security events such as blocked incoming traffic, port scans, attacks, and administrator logins.
You can configure the router to email the log to you at specified intervals. You can also configure the router to send immediate alert messages to your email address or email pager whenever a significant event occurs. With its content filtering feature, the Model RP v2 prevents objectionable content from reaching your PCs. The router allows you to control access to Internet content by screening for keywords within Web addresses. You can configure the router to log and report attempts to access objectionable Internet sites.
Security The RP v2 router is equipped with several features designed to maintain security, as described in this section. You can specify forwarding of single ports or ranges of ports. The router incorporates Auto UplinkTM technology. That port will then configure itself to the correct configuration. This feature also eliminates the need to worry about crossover cables, as Auto Uplink will accommodate either type of cable to make the right connection.
This feature greatly simplifies configuration of PCs on your local network. Browser-based management. Browser-based configuration allows you to easily configure your router from almost any type of personal computer, such as Windows, Macintosh, or Linux. A user-friendly Setup Wizard is provided and online help documentation is built into the browser-based Web Management Interface. Smart Wizard. The RP v2 router automatically senses the type of Internet connection, asking you only for the information required for your type of ISP account.
Visual monitoring. Flash memory for firmware upgrade Free technical support seven days a week, twenty-four hours a day. AC power adapter. Category 5 CAT5 Ethernet cable. Keep the carton, including the original packing materials, in case you need to return the router for repair. You can use some of the LEDs to verify connections.
Viewed from left to right, Table 2 describes the LEDs on the front panel of the router. These LEDs are green when lit. Table 2. Data is being transmitted or received by the Internet port. The Internet WAN port in not connected or the electric power to the device to which it is connected is turned off. Data is being transmitted or received at Mbps. The Local port has detected link with a 10 Mbps device. Data is being transmitted or received at 10 Mbps. No link is detected on this port.
This chapter describes how to set up the router on your local area network LAN and connect to the Internet. If the computer will connect to your network at Mbps, you must use a Category 5 CAT5 cable such as the one provided with your router. Host and Domain Names.
There are several ways you can gather the required Internet connection information. Your ISP provides all the information needed to connect to the Internet. If you cannot locate this information, you can ask your ISP to provide it or you can try one of the options below. If you have a computer already connected using the active Internet access account, you can gather the configuration information from that computer. Record all the settings for each tab page.
Record all the settings for each section. Once you locate your Internet configuration parameters, you may want to record them on the page below. For AOL customers, the login name is their primary screen name. Some ISPs use your full e-mail address as the login name. For example, If your main e-mail account with your ISP is aaa yyy.
Your ISP might call this your account, user, host, computer, or system name. Follow the steps below to connect your router to your network. You can also refer to the Resource CD included with your router which contains an animated Installation Assistant to help you through this procedure. Connect the router to your network. Cable or DSL modem. Connect the Ethernet cable which came with the router from a Local port on the router B to your computer. Each Ethernet port will automatically sense if the cable should have a normal connection or an uplink connection.
This feature eliminates the need to worry about crossover cables because Auto Uplink will make the right connection either type of cable. Now, turn on your computer. If software usually logs you in to your Internet connection, do not run that software or cancel it if it starts automatically. Log in to the router. For security reasons, the router has its own user name and password.
When prompted, enter admin for the router user name and password for the router password, both in lower case letters. Note: The router user name and password are not the same as any user name or password you may use to log in to your Internet connection. You are now connected to the router. If you do not see the menu above, click the Setup Wizard link on the upper left of the main menu.
Click Next and follow the steps in the Setup Wizard for inputting the configuration parameters from your ISP to connect to the Internet.
The Setup Wizard reports which connection type it discovered, and displays the appropriate configuration menu.
If the Setup Wizard finds no connection, you will be prompted to check the physical connection between your router and the cable or DSL line. Connections which use dynamic IP address assignment. Connections which use fixed IP address assignment.
These fields are case sensitive. The router will try to discover the domain automatically if you leave the Domain Name blank. Otherwise, you may need to enter it manually. Connecting the Router to the Internet. To change the login timeout, enter a new value in minutes. This determines how long the router keeps the Internet connection active after there is no Internet activity from the LAN.
Entering a timeout value of zero means never log out. When you start an Internet application, your router will automatically log you in. Note: If you enter DNS addresses, restart your computers so that these settings take effect. Click Apply to save your settings. Click Test to verify that your Internet connection works. AOL v8. Click OK to continue. You will notice that the navigation menu now looks like the illustration below. After the router finishes testing the connection, the window updates with the AOL Connection Established message below.
To connect to the Internet, run the AOL software on a computer, select Home Network as the location, sign on, and the router will share the connection with others who are connected from different computers on the network.
Enter your Login, Password and Authentication Server. This feature allows your router to masquerade as that PC. Click Test to test your Internet connection. If you leave the Domain Name field blank, the router try to discover the domain. This information should have been provided to you by your ISP. Note: Restart the computers on your network so that these settings take effect. Click Apply to save the settings. Manually Configuring Your Internet Connection You can manually configure your router using the menu below, or you can allow the Setup Wizard to determine your configuration as described in the previous section.
Procedure: Configuring the Internet Connection Manually You can manually configure the router using the Basic Settings menu shown in Figure using these steps: 1. If your Internet connection does not require a login, click No at the top of the Basic Settings menu and fill in the settings according to the instructions below.
If your Internet connection does require a login, click Yes, and skip to step 3. Also enter the netmask and the Gateway IP address. Note: If you enter an address here, restart the computers on your network so that these settings take effect. If your Internet connection does require a login, fill in the settings according to the instructions below. Fill in the parameters for your ISP according to the Wizard-detected procedures starting on page This chapter describes how to use the content filtering features of the Model RP v2 Web Safe Router to protect your network.
These features can be found by clicking on the Content Filtering heading in the Main Menu of the browser interface. Parents and network administrators can establish restricted access policies based on time-of-day, web addresses and web address keywords. You can also block Internet access by applications and services, such as chat or games. To configure these features of your router, click on the subheadings under the Content Filtering heading in the Main Menu of the browser interface.
The subheadings are described below:. Blocking Access to Internet Sites The RP v2 router allows you to restrict access based on web addresses and web address keywords. Up to entries are supported in the Keyword list. The Block Sites menu is shown in Figure below:.
If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply. To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply.
Content Filtering. You may specify one Trusted User, which is a PC that will be exempt from blocking and logging. This is called services blocking or port filtering. The Block Services menu is shown below:. Services are functions performed by server computers at the request of client computers.
When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. To enable service blocking, select either Per Schedule or Always, then click Apply. From the Service Type list, select the application or service to be allowed or blocked.
The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. Configuring a User Defined Service To define a service, first you must determine which port number or range of numbers is used by the application. Service numbers for other applications are typically chosen from the range to by the authors of the application.
This information can usually be determined by contacting the publisher of the application or from user groups of newsgroups. Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter that number in both boxes. If you are not sure, select Both. The Schedule menu is shown below:. Use this schedule for blocking content. Check this box if you wish to enable a schedule for Content Filtering. Click Apply. Days to Block. Select days to block by checking the appropriate boxes.
Select Everyday to check the boxes for all days. Time of Day to Block. Select a start and end time in format. Select All day for 24 hour blocking. These options are discussed below. Using SPI Stateful inspection technology tracks each packet traversing the router and makes sure that they are legitimate. A stateful inspection router also monitors the state of the connection and compiles the information in a state table ensuring that the source and destination of each packet is valid.
By default, SPI is enabled. Using Java, ActiveX, and cookies Filtering. What are these items and what can I do about them? ActiveX and Java programs can be embedded in websites, and will be executed by your computer. These programs may sometimes include malicious content.
Cookies are small files that a website can store on your computer to track your activity. Some cookies can be helpful, but some may compromise your privacy. Type the IP address for that server. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of what websites you have accessed or attempted to access. Up to entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User.
An example is shown below:. The index number of the content filter log entries. The log will keep the record of the latest entries.
This field displays whether the access was blocked or allowed. The name or IP address of the website or newsgroup visited or attempted to access. Turn e-mail notification on Check this box if you wish to receive e-mail logs and alerts from the router.
You may be able to find this information in the configuration menu of your e-mail program. If you leave this box blank, log and alert messages will not be sent via e-mail. Send to this e-mail address Enter the e-mail address to which logs and alerts are sent.
This e-mail address will also be used as the From address. Send alert immediately Check this box if you would like immediate notification of attempted access to a blocked site. Day for sending log Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. Time for sending log Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If the Weekly, Daily or Hourly option is selected and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address.
If the router cannot e-mail the log file, the log buffer may fill up. In this case, the router overwrites the log and discards its contents. Time Zone Select your local time zone.
This setting will be used for the blocking schedule and for time-stamping log entries. These features can be found by clicking on the Maintenance heading in the Main Menu of the browser interface. From the Main Menu of the browser interface, click on Maintenance, then select System Status to view the System Status screen, shown below. If no address is shown, the router cannot connect to the Internet. The default is Click this button to close the window. Description The time elapsed since this port acquired the link.
Specifies the intervals at which the statistics are updated in this window. Click on Stop to freeze the display. From the Main Menu of the browser interface, under the Maintenance heading, select Attached Devices to view the table, shown below. Note that if the router is rebooted, the table data is lost until the router rediscovers the devices. To force the router to look for attached devices, click the Refresh button. If the upgrade file is compressed.
ZIP file , you must first extract the binary. BIN file before sending it to the router. The upgrade file can be sent to the router using your browser.
From the Main Menu of the browser interface, under the Maintenance heading, select the Router Upgrade heading to display the menu shown below. In the Router Upgrade menu, click the Browse button and browse to the location of the binary.
BIN upgrade file. Click Upload. Note: When uploading software to the RP v2 router, it is important not to interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, it may corrupt the software.
When the upload is complete, your router will automatically restart. The upgrade process will typically take about one minute. Configuration File Management The configuration settings of the RP v2 router are stored within the router in a configuration file.
From the Main Menu of the browser interface, under the Maintenance heading, select the Settings Backup heading to bring up the menu shown below. To save your settings, select the Backup tab. Click the Backup button. Your browser will extract the configuration file from the router and will prompt you for a location on your PC to store the file. You can give the file a meaningful name at this time, such as pacbell. To restore your settings from a saved configuration file, enter the full path to the file on your PC or click the Browse button to browse to the file.
When you have located it, click the Restore button to send the file to the router. The router will then reboot automatically. Erasing the Configuration It is sometimes desirable to restore the router to a known blank condition. This can be done by using the Erase function, which will restore all factory settings.
To erase the configuration, click the Erase button. To restore the factory default configuration settings without knowing the login password or IP address, you must use the Default Reset button on the rear panel of the router. Netgear recommends that you change this password to a more secure password. From the Main Menu of the browser interface, under the Maintenance heading, select Set Password to bring up the menu shown below.
To change the password, first enter the old password, and then enter the new password twice. These features can be found under the Advanced heading in the Main Menu of the browser interface. Configuring for Port Forwarding to Local Servers Although the router causes your entire local network to appear as a single machine to the Internet, you can make a local server for example, a web server or game server visible and available to the Internet.
This is done using the Port Forwarding menu. From the Main Menu of the browser interface, under Advanced, click on Port Forwarding to view the port forwarding menu, shown below. Use the Port Forwarding menu to configure the router to forward incoming protocols to computers on your local network. In addition to servers for specific applications, you can also specify a Default DMZ Server to which all other incoming protocols are forwarded.
To configure port forwarding to a local server: 1. For this information, you may need to contact the manufacturer of the program that you wish to use. When you have the port number information, follow these steps: 1. To forward only one port, enter it again in the End Port box.
To specify a range of ports, enter the last port to be forwarded in the End Port box. If this address is To avoid this, you can manually configure the PC to use a fixed address.
Attempts by local PCs to access the server using the external IP address Change the beginning port number in the Start Port box. Some online games and videoconferencing applications are incompatible with NAT. The RP v2 router is programmed to recognize some of these applications and to work properly with them, but there are other applications that may not function well. If one local PC acts as a game or videoconferencing host, enter its IP address as the default.
The router is programmed to recognize some of these applications and to work properly with them, but there are other applications that may not function well. Note: DMZ servers pose a security risk. A computer designated as the default DMZ server loses much of the protection of the firewall, and is exposed to exploits from the Internet.
If compromised, the DMZ server can be used to attack your network. Incoming traffic from the Internet is normally discarded by the router unless the traffic is a response to one of your local computers or a service that you have configured in the Ports menu. Instead of discarding this traffic, you can have it forwarded to one computer on your network.
This should only be used as a diagnostic tool, since it allows your router to be discovered. This should not be done unless you are sure it is necessary by your ISP. Any packets sent through the router that are larger than the configured MTU size will be repackaged into smaller packets to meet the MTU requirement. To change the MTU size: 1. These addresses are part of the IETF-designated private address range for use in private networks, and should be suitable in most applications.
If your network has a requirement to use a different IP addressing scheme, you can make those changes in this menu. Combined with the IP address, the IP Subnet Mask allows a device to know which other addresses are local to it, and which must be reached through a gateway or router.
Both is the default. It recognizes both formats when receiving. By default, this is set for RIP RIP-1 is probably adequate for most networks, unless you have an unusual network setup.
RIP-2B uses subnet broadcasting. You must then open a new connection to the new IP address and log in again. The assigned default gateway address is the LAN address of the router. IP addresses will be assigned to the attached PCs from a pool of addresses specified in this menu.
Each pool address is tested before it is assigned to avoid duplicate addresses on the LAN. Otherwise, leave it checked. Using the default addressing scheme, you should define a range between Reserved IP addresses should be assigned to servers that require permanent IP settings. To reserve an IP address: 1. To edit or delete a reserved address entry: 1.
However, if your Internet account uses a dynamically assigned IP address, you will not know in advance what your IP address will be, and the address can change frequently. In this case, you can use a commercial dynamic DNS service, who will allow you to register your domain to their IP address, and will forward traffic directed at your domain to your frequently-changing IP address.
The router contains a client that can connect to many popular dynamic DNS services. You can select one of these services and obtain an account with them. To configure Dynamic DNS: 1. For example, for dyndns. If your dynamic DNS provider allows the use of wildcards in resolving your URL, you may select the Use wildcards check box to activate this feature.
Configuring Static Routes Static Routes provide additional routing information to your router. Under normal circumstances, the router has adequate routing information after it has been configured for Internet access, and you do not need to configure additional static routes. You must configure static routes only for unusual cases such as multiple routers or multiple IP subnets located on your network.
Type a route name for this static route in the Route Name box under the table. This is for identification purpose only. Select Private if you want to limit access to the LAN only. The static route will not be reported in RIP.
Type the IP Subnet Mask for this destination. If the destination is a single host, type Type a number between 1 and 15 as the Metric value. This represents the number of routers between your network and the destination. Usually, a setting of 2 or 3 works, but if this is a direct connection, set it to 1.
You have an ISDN router on your home network for connecting to the company where you are employed. When you first configured your router, two implicit static routes were created.
A default route was created with your ISP as the gateway, and a second static route was created to your local network for all With this configuration, if you attempt to access a device on the You can also use the Nighthawk app to view the devices on your network, run speed tests, and manage your WiFi settings.
Note : If your product is not supported or if you prefer to install your router using a computer, see the following knowledge base topic: How do I set up my NETGEAR router using the router web interface?
Advanced remote support tools are used to fix issues on any of your devices. The service includes support for the following:. Thank You Thank you for taking the time to respond. Rating Submitted Do you have a suggestion for improving this article? Characters Left : Submit Cancel. Guided Assistance. Get information, documentation, videos and more for your specific product. Ask the Community.
Need to Contact Support?
0コメント