When you get to the wireless settings, you will have to select the country where you are located and decide whether you want to have security on your wireless links Netgear strongly recommends enabling security.
Configuring the Internet and Wireless Settings , April Logging Into Your Router To log into your router after you have configured your router, do the following: 1. Note: The router user name and password are not the same as any user name or password you may use to log in to your Internet connection. A login window like the one shown below opens:. Changing Your Configuration You can change your Internet and wireless settings after they have been configured by the Smart Wizard Configuration Assistant.
One of the following screens appears: Basic Settings, No Login. Click an item in the leftmost column. The current settings or information for that area appear in the center column. Helpful information related to the selected Settings page appears in this column. If you are using Internet Explorer, you may click an item in the center column to jump directly to the related help section; otherwise, scroll down until you reach it. Otherwise, select No. Select Yes. Login: This is usually the name that you use in your e-mail address.
If your ISP requires your full e-mail address, then type it in the Login box. Otherwise, this may be left blank. Idle Timeout: An idle Internet connection will be terminated after this time period. Select Get dynamically from ISP. Account Name also known as Host Name or System Name : For most users, type your account name or user name in this box. You may type the domain name of your ISP. If you have a Domain name given to you by your ISP, type it in this box.
If you have a cable modem, this is usually the Workgroup name. If you have a fixed or static IP address, your ISP will have provided you with the required information. For example: IP Address: If you connect successfully, your settings work and you may click Logout to exit these pages and One of the following screens appears: Wireless Settings: No security.
Placement of the Router to Optimize Wireless Connectivity: The operating distance or range of your wireless connection can vary significantly based on the physical placement of the router.
For best results, place your router: —. Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the router.
This value is also case-sensitive. Region: Select your region from the drop-down list. This field displays the region of operation for which the wireless interface is intended.
It may not be legal to operate the router in a region other than the region shown here. If your country or region is not listed, please check with your local government agency or check our web site for more information on which channels to use. Channel: This field determines which operating frequency will be used.
It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point. These values must be identical on all PCs and Access Points in your network.
If encryption strength is set to 64 bit, then each of the four key boxes will automatically be populated with key values. If encryption strength is set to bit, then only the selected WEP key box will automatically be populated with key values. Manual Entry Mode: Select which of the four keys will be used and enter the matching WEP key information for your network in the selected key box.
The Passphrase must be 8 to 63 characters in length. You can restore these defaults with the Factory Default Restore button on the rear panel. After you install the WGR v6 router, use the procedures below to customize any of the settings to better meet your networking needs. When the wireless router is in the factory default state, a user name and password are not required. The browser will then display the WGR v6 settings home page shown in Figure If you do not click Logout, the wireless router will wait 5 minutes after there is no activity before it automatically logs you out.
Registration is required before you can use our telephone support service. When the wireless router is connected to the Internet, click the Knowledge Base or the Documentation link under the Web Support menu to view support information or the documentation for the wireless router.
This chapter describes how to use the content filtering features of the 54 Mbps Wireless Router WGR v6 to protect your network. These features can be found by clicking on the Content Filtering heading in the Main Menu of the browser interface.
Parents and network administrators can establish restricted access policies based on time of day, Web addresses and Web address keywords. You can also block Internet access by applications and services, such as chat or games. To configure these features of your router, click on the subheadings under the Content Filtering heading in the Main Menu of the browser interface.
The subheadings are described below:. Up to entries are supported in the Keyword list. The Block Sites menu is shown in Figure below:. If you want to block by schedule, be sure that a time period is specified in the Schedule menu.
To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply. To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply. You may specify one Trusted User, which is a PC that will be exempt from blocking and logging.
This is called services blocking or port filtering. The Block Services menu is shown below:. Services are functions performed by server computers at the request of client computers.
When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. To enable service blocking, select either Per Schedule or Always, then click Apply. From the Service Type list, select the application or service to be allowed or blocked.
The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined.
Configuring a User Defined Service To define a service, first you must determine which port number or range of numbers is used by the application. Service numbers for other applications are typically chosen from the range to by the authors of the application. This information can usually be determined by contacting the publisher of the application or from user groups of newsgroups. Enter the Starting Port and Ending Port numbers. If the application uses a single port number, enter that number in both boxes.
If you are not sure, select Both. The Schedule menu is shown below:. Use this schedule for blocking content. Check this box if you wish to enable a schedule for Content Filtering.
Click Apply. Days to Block. Select days to block by checking the appropriate boxes. Select Everyday to check the boxes for all days.
Time of Day to Block. Select a start and end time in format. Select All day for 24 hour blocking. Up to entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User. An example is shown below:. The index number of the content filter log entries. The log will keep the record of the latest entries.
This field displays whether the access was blocked or allowed. The name or IP address of the Web site or newsgroup visited or attempted to access. Turn e-mail notification on Check this box if you wish to receive e-mail logs and alerts from the router.
You may be able to find this information in the configuration menu of your e-mail program. If you leave this box blank, log and alert messages will not be sent via e-mail. Send to this e-mail address Enter the e-mail address to which logs and alerts are sent. This e-mail address will also be used as the From address. Send alert immediately Check this box if you would like immediate notification of attempted access to a blocked site. Day for sending log Specifies which day of the week to send the log.
Relevant when the log is sent weekly or daily. Time for sending log Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If the Weekly, Daily or Hourly option is selected and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address.
If the router cannot e-mail the log file, the log buffer may fill up. In this case, the router overwrites the log and discards its contents. Time Zone Select your local time zone. This setting will be used for the blocking schedule and for time-stamping log entries. These features can be found by clicking on the Maintenance heading in the Main Menu of the browser interface.
From the Main Menu of the browser interface, click on Maintenance, then select Router Status to view the System Status screen, shown below. If no address is shown, the router cannot connect to the Internet.
The default is This field displays the Media Access Control address being used by the Wireless port of the router. This field displays the wireless network name SSID being used by the wireless port of the router. This field displays the geographic region where the router being used. It may be illegal to use the wireless features of the router in some parts of the world. Identifies the channel of the wireless port being used.
Specifies the intervals at which the statistics are updated in this window. Click on Stop to freeze the display. From the Main Menu of the browser interface, under the Maintenance heading, select Attached Devices to view the table, shown below.
Note that if the router is rebooted, the table data is lost until the router rediscovers the devices. To force the router to look for attached devices, click the Refresh button.
Configuration File Management The configuration settings of the WGR v6 router are stored within the router in a configuration file.
From the Main Menu of the browser interface, under the Maintenance heading, select the Settings Backup heading to bring up the menu shown below. To save your settings, click the Backup button. Your browser will extract the configuration file from the router and will prompt you for a location on your PC to store the file. You can give the file a meaningful name at this time, such as pacbell.
To restore your settings from a saved configuration file, enter the full path to the file on your PC or click the Browse button to browse to the file. When you have located it, click the Restore button to send the file to the router. The router will then reboot automatically.
Warning: Do not interrupt the reboot process. Erasing the Configuration It is sometimes desirable to restore the router to original default settings. This can be done by using the Erase function, which will restore all factory settings. To erase the configuration, click the Erase button. To restore the factory default configuration settings without knowing the login password or IP address, you must use the Default Reset button on the rear panel of the router. Note: Before upgrading the router software, use the router backup utility to save your configuration settings.
Any router upgrade will revert the router settings back to the factory defaults. After completing the upgrade, you can restore your settings from the backup. If the upgrade file is compressed. ZIP file , you must first extract the file before sending it to the router. The upgrade file can be sent to the router using your browser. From the Main Menu of the browser interface, under the Maintenance heading, select the Router Upgrade link display the menu shown below.
In the Router Upgrade menu, click the Browse button and browse to the location of the upgrade file 3. Click Upload. Note: When uploading software to the WGR v6 router, it is important not to interrupt the Web browser by closing the window, clicking a link, or loading a new page.
If the browser is interrupted, it may corrupt the software. When the upload is complete, your router will automatically restart. The upgrade process will typically take about one minute. Note: Before changing the router password, use the router backup utility to save your configuration settings.
If after changing the password, you forget the new password you assigned, you will have to reset the router back to the factory defaults to be able to log in using the default password of password. This means you will have to restore all the router configuration settings. If you ever have to reset the router back to the factory defaults, you can restore your settings from the backup.
From the Main Menu of the browser interface, under the Maintenance heading, select Set Password to bring up the menu shown below. To change the password, first enter the old password, then enter the new password twice. These features can be found under the Advanced heading in the Main Menu of the browser interface.
Configuring Port Triggering Port Triggering is an advanced feature that can be used to easily enable gaming and other internet applications. Port Forwarding is typically used to enable similar functionality, but it is static and has some limitations.
Port Triggering opens an incoming port temporarily and does not require the server on the internet to track your IP address if it is changed by DHCP, for example. Port Triggering monitors outbound traffic. When the router detects traffic on the specified outbound port, it remembers the IP address of the computer that sent the data and triggers the incoming port. Incoming traffic on the triggered port is then forwarded to the triggering computer.
Once port forwarding is set up, request from Internet will be forwarded to the proper server. On the contrary,. Port triggering applies to chat and Internet games. Note: If Disable Port Triggering box is checked after configuring port triggering, port triggering will be disabled but any port triggering configuration information you added to the router will be retained even though it will not be used.
Port Triggering Timeout Enter a value up to minutes. The Port Triggering Timeout value controls the inactivity timer for the designated inbound port s. The inbound port s will be closed when the inactivity timer expires. Under Service User, selecting Any default will allow this service to be used by everyone in your network. Otherwise, select Single address and enter the IP address of one computer to restrict the service to a particular computer. This information can be obtained from the game or applications manual or support Web site.
Configuring Port Forwarding to Local Servers Although the router causes your entire local network to appear as a single machine to the Internet, you can make a local server for example, a Web server or game server visible and available to the Internet. This is done using the Port Forwarding menu. Use the Port Forwarding menu to configure the router to forward incoming protocols to computers on your local network.
In addition to servers for specific applications, you can also specify a Default DMZ Server to which all other incoming protocols are forwarded. To configure port forwarding to a local server:. For this information, you may need to contact the manufacturer of the program that you wish to use.
When you have the port number information, follow these steps: 1. If the application uses a range of ports; type the ending port number of the range in the Ending Port box. If this address is To avoid this, you can manually configure the computer to use a fixed address. Attempts by local computers to access the server using the external IP address Change the beginning port number in the Start Port box. Some online games and videoconferencing applications are incompatible with NAT.
The WGR v6 router is programmed to recognize some of these applications and to work properly with them, but there are other applications that may not function well. If one local computer acts as a game or videoconferencing host, enter its IP address as the default. These options are discussed below. Connect Automatically, as Required Normally, this option should be checked to enable it. An Internet connection will be made automatically after each timeout, whenever Internet-bound traffic is detected.
This provides connection on demand and is potentially cost-saving in places in Europe for example where Internet services charge by the minute. This manual connection will stay up all the time without time outs.
This should only be disabled in special circumstances. The router is programmed to recognize some of these applications and to work properly with them, but there are other applications that may not function well.
Note: DMZ servers pose a security risk. A computer designated as the default DMZ server loses much of the protection of the firewall, and is exposed to exploits from the Internet.
If compromised, the DMZ server can be used to attack your network. Incoming traffic from the Internet is normally discarded by the router unless the traffic is a response to one of your local computers or a service that you have configured in the Ports menu. Instead of discarding this traffic, you can have it forwarded to one computer on your network.
Type the IP address for that server. This should only be used as a diagnostic tool, since it allows your router to be discovered. But this is rarely required, and should not be done unless you are sure it is necessary for your ISP connection.
Any packets sent through the router that are larger than the configured MTU size will be repackaged into smaller packets to meet the MTU requirement. To change the MTU size: 1. These addresses are part of the IETF-designated private address range for use in private networks, and should be suitable in most applications. If your network has a requirement to use a different IP addressing scheme, you can make those changes in this menu.
Combined with the IP address, the IP Subnet Mask allows a device to know which other addresses are local to it, and which must be reached through a gateway or router. None is the default. It recognizes both formats when receiving. By default, this is set for RIP RIP-1 is probably adequate for most networks, unless you have an unusual network setup. RIP-2B uses subnet broadcasting. You must then open a new connection to the new IP address and log in again. The assigned default gateway address is the LAN address of the router.
IP addresses will be assigned to the attached computers from a pool of addresses specified in this menu. Each pool address is tested before it is assigned to avoid duplicate addresses on the LAN. Otherwise, leave it checked. Using the default addressing scheme, you should define a range between Reserved IP addresses should be assigned to servers that require permanent IP settings. To reserve an IP address: 1. Type the MAC Address of the computer or server.
Tip: If the computer is already present on your network, you can copy its MAC address from the Attached Devices menu and paste it here. To edit or delete a reserved address entry: 1. However, if your Internet account uses a dynamically assigned IP address, you will not know in advance what your IP address will be, and the address can change frequently.
In this case, you can use a commercial dynamic DNS service, who will allow you to register your domain to their IP address, and will forward traffic directed at your domain to your frequently-changing IP address. The router contains a client that can connect to many popular dynamic DNS services.
You can select one of these services and obtain an account with them. For example, for dyndns. If your dynamic DNS provider allows the use of wildcards in resolving your URL, you may select the Use wildcards check box to activate this feature. Configuring Static Routes Static Routes provide additional routing information to your router.
Under normal circumstances, the router has adequate routing information after it has been configured for Internet access, and you do not need to configure additional static routes. You must configure static routes only for unusual cases such as multiple routers or multiple IP subnets located on your network. Type a route name for this static route in the Route Name box under the table. This is for identification purposes only. Select Private if you want to limit access to the LAN only.
The static route will not be reported in RIP. Type the IP Subnet Mask for this destination. If the destination is a single host, type Type a number between 1 and 15 as the Metric value. This represents the number of routers between your network and the destination. Usually, a setting of 2 or 3 works, but if this is a direct connection, set it to 1.
You have an ISDN router on your home network for connecting to the company where you are employed. When you first configured your router, two implicit static routes were created. A default route was created with your ISP as the gateway, and a second static route was created to your local network for all With this configuration, if you attempt to access a device on the In this case you must define a static route, telling your router that The static route would look like Figure The ideal password should contain no dictionary words from any language, and should be a mixture of letters both upper and lower case , numbers, and symbols.
Your password can be up to 30 characters. Note: For enhanced security, restrict access to as few external IP addresses as practical. Enter a beginning and ending IP address to define the allowed range. To allow access from a single IP address on the Internet, select Only this computer. Enter the IP address that will be allowed access. Specify the Port Number that will be used for accessing the management interface.
Web browser access normally uses the standard HTTP service port For greater security, change the remote management Web interface to a custom port by entering that number in the box provided.
Choose a number between and , but do not use the number of any common service port. The default is , which is a common alternate for HTTP. For example, if your external address is Universal Plug and Play UPnP helps devices, such as Internet appliances and computers, access the network and connect to other devices as needed.
UPnP devices can automatically discover the services from other registered UPnP devices on the network. Set up UPnP according to the guidelines below. The default setting for UPnP is disabled. If disabled, the router will not allow any device to automatically control the resources, such as port forwarding mapping , of the router. Note: If you use applications such as multi-player gaming, peer-to-peer connections, real time communications such as instant messaging, or remote assistance a feature in Windows XP , you should enable UPnP.
This value can range from 1 to minutes. The default period is 30 minutes. Shorter durations will ensure that control points have current device status at the expense of additional network traffic. Longer durations may compromise the freshness of the device status but can significantly reduce network traffic. The time to live hop count is the number of steps a broadcast packet is allowed to propagate for each UPnP advertisement before it disappears.
The number of hops can range from 1 to The default value for the advertisement time to live is 4 hops, which should be fine for most home networks. If you notice that some devices are not being updated or reached correctly, then it may be necessary to increase this value a little. After each problem description, instructions are provided to help you diagnose and solve the problem. Basic Functioning After you turn on power to the router, the following sequence of events should occur: 1.
If the port is 10 Mbps, the light will be amber. If any of these conditions does not occur, refer to the appropriate following section. Make sure that the power cord is properly connected to your router and that the power supply adapter is properly connected to a functioning power outlet. Lights Never Turn Off When the router is turned on, the lights turns on for about 10 seconds and then turn off.
If all the lights stay on, there is a fault within the router. Make sure that the Ethernet cable connections are secure at the router and at the hub or workstation. This cable could be a standard straight-through Ethernet cable or an Ethernet crossover cable.
Check the Ethernet connection between the computer and the router as described in the previous section. Follow the instructions in Appendix C to configure your computer. These auto-generated addresses are in the range of If your IP address is in this range, check the connection from the computer to the router and reboot your computer. If you are using Internet Explorer, click Refresh to be sure the Java applet is loaded. Make sure you are using the correct login information.
The factory default login name is admin and the password is password. When entering configuration settings, be sure to click the APPLY button before moving to another menu or tab, or your changes are lost. Click the Refresh or Reload button in the Web browser. The changes may have occurred, but the Web browser may be caching the old configuration.
You can determine whether the request was successful using the Web Configuration Manager. If your router is unable to obtain an IP address from the ISP, you may need to force your cable or DSL modem to recognize your new router by performing the following procedure: 1.
Your ISP may require a login program. In this case:. This can be done in the Basic Settings menu. Your computer may not recognize any DNS server addresses. Alternatively, you may configure your computer manually with DNS addresses, as explained in your operating system documentation. The device then responds with an echo reply. To ping the router from a running Windows 95 or later: 1.
In the field provided, type Ping followed by the IP address of the router, as in this example: ping Click on OK. If the path is functioning correctly, replies as in the previous section are displayed. If you do not receive replies: — Check that your computer has the IP address of your router listed as the default gateway. Use the Default Reset button on the rear panel of the router. Use this method for cases when the administration password or IP address is not known.
To restore the factory default configuration settings without knowing the administration password or IP address, you must use the Default Reset button on the rear panel of the router. Release the Default Reset button and wait for the router to reboot.
If the wireless router fails to restart or the power light continues to blink or turns solid amber, the unit may be defective. If the error persists, you might have a hardware problem and should contact technical support. Each entry in the log is stamped with the date and time of day. Problems with the date and time function can include: Troubleshooting.
Date shown is January 1, Cause: The router has not yet successfully reached a Network Time Server. Check that your Internet access settings are configured correctly. If you have just completed configuring the router, wait at least five minutes and check the date and time again. Time is off by one hour. Cause: The router does not automatically sense Daylight Savings Time. Related Publications As you read this document, you may be directed to various RFC documents for further information.
The RFC documents outline and define the standard protocols and procedures for the Internet. The documents are listed on the World Wide Web at www. Basic Router Concepts Large amounts of bandwidth can be provided easily and relatively inexpensively in a local area network LAN. However, providing high bandwidth between a local network and the Internet can be very expensive.
Because of this expense, Internet access is usually provided by a slower-speed wide-area network WAN link such as a cable or DSL modem. In order to make the best use of the slower WAN link, a mechanism must be in place for selecting and transmitting only the data traffic meant for the Internet. The function of selecting and forwarding this data is performed by a router.
What is a Router? A router is a device that forwards traffic between networks based on network layer information in the data and on routing tables maintained by the router. In these routing tables, a router builds up a logical picture of the overall network by gathering and exchanging information with other routers in the network.
Using this information, the router chooses the best path for forwarding network traffic. Routers vary in performance and scale, number of routing protocols supported, and types of physical WAN connection they support. Network, Routing, Firewall, and Basics , April Using RIP, routers periodically update one another and check for changes to add to the routing table. Among other improvements, RIP-2 supports subnet and multicast protocols. Note : If you are setting up the router for the first time, the default settings may work for you with no changes.
Otherwise, select No. Select Yes. If your ISP requires your full e-mail address, then type it in the Login box. Otherwise, this may be left blank. If this value is zero 0 , then the connection will be "kept alive" by re-connecting immediately whenever the connection is lost. Select Get dynamically from ISP. You may type the domain name of your ISP. For example, if your ISP's mail server is mail. If you have a Domain name given to you by your ISP, type it in this box.
For example, Earthlink Cable may require a Host name of 'home' and Comcast sometimes supplies a Domain name. If you have a fixed or static IP address, your ISP will have provided you with the required information. Note : If you get 'Address not found' errors when you go to a Web site, it is likely that your DNS servers aren't set up properly.
If you connect successfully, your settings work and you may click Logout to exit these pages and Go through the settings and make sure you've selected the correct options and typed everything correctly.
Contact your ISP to verify the configuration information. Read the Troubleshooting section in the Router Installation Guide. To change the Internet settings, click Wireless Settings on the left menu bar. For best results, place your router:. Note : Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the router.
This value is also case-sensitive. This field displays the region of operation for which the wireless interface is intended. It may not be legal to operate the router in a region other than the region shown here. If your country or region is not listed, please check with your local government agency or check our web site for more information on which channels to use. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point.
The options are:. These values must be identical on all PCs and Access Points in your network. If encryption strength is set to 64 bit, then each of the four key boxes will automatically be populated with key values. If encryption strength is set to bit, then only the selected WEP key box will automatically be populated with key values. The Passphrase must be 8 to 63 characters in length. When you first receive your WGR v6, the default factory settings are shown below.
You can restore these defaults with the Factory Default Restore button on the rear panel. After you install the WGR v6 router, use the procedures below to customize any of the settings to better meet your networking needs. When the wireless router is in the factory default state, a user name and password are not required.
The browser will then display the WGR v6 settings home page shown in Figure If you do not click Logout, the wireless router will wait 5 minutes after there is no activity before it automatically logs you out.
Registration is required before you can use our telephone support service. Product updates and Web support are always available by going to:. When the wireless router is connected to the Internet, click the Knowledge Base or the Documentation link under the Web Support menu to view support information or the documentation for the wireless router.
This chapter describes how to use the content filtering features of the 54 Mbps Wireless Router WGR v6 to protect your network. These features can be found by clicking on the Content Filtering heading in the Main Menu of the browser interface. The 54 Mbps Wireless Router WGR v6 provides you with Web content filtering options, plus browsing activity reporting and instant alerts via e-mail. Parents and network administrators can establish restricted access policies based on time of day, Web addresses and Web address keywords.
You can also block Internet access by applications and services, such as chat or games. To configure these features of your router, click on the subheadings under the Content Filtering heading in the Main Menu of the browser interface.
The subheadings are described below:. Up to entries are supported in the Keyword list. The Block Sites menu is shown in Figure below:. If you want to block by schedule, be sure that a time period is specified in the Schedule menu. To add a keyword or domain, type it in the Keyword box, click Add Keyword, then click Apply. To delete a keyword or domain, select it from the list, click Delete Keyword, then click Apply.
You may specify one Trusted User, which is a PC that will be exempt from blocking and logging. This is called services blocking or port filtering. The Block Services menu is shown below:. Services are functions performed by server computers at the request of client computers. When a computer on your network sends a request for service to a server computer on the Internet, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets.
To enable service blocking, select either Per Schedule or Always, then click Apply. To specify a service for blocking, click Add. The Add Services menu will appear, as shown below:. From the Service Type list, select the application or service to be allowed or blocked.
The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined.
To define a service, first you must determine which port number or range of numbers is used by the application. This information can usually be determined by contacting the publisher of the application or from user groups of newsgroups. Enter the Starting Port and Ending Port numbers.
If the application uses a single port number, enter that number in both boxes. If you are not sure, select Both. The WGR v6 router allows you to specify when blocking will be enforced. The Schedule menu is shown below:. Check this box if you wish to enable a schedule for Content Filtering. Click Apply.
Select days to block by checking the appropriate boxes. Select Everyday to check the boxes for all days.
Select a start and end time in format. Select All day for 24 hour blocking. The log is a detailed record of what Web sites you have accessed or attempted to access. Up to entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User. An example is shown below:. Log entries are described in Table Log action buttons are described in Table In order to receive logs and alerts by E-mail, you must provide your E-mail information in the E-Mail menu, shown below:.
You may be able to find this information in the configuration menu of your e-mail program. If you leave this box blank, log and alert messages will not be sent via e-mail. Enter the e-mail address to which logs and alerts are sent. This e-mail address will also be used as the From address. You can specify that logs are automatically sent to the specified e-mail address with these options:. Check this box if you would like immediate notification of attempted access to a blocked site. Specifies which day of the week to send the log.
Relevant when the log is sent weekly or daily. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. What Is Your Configuration Information? Ask a question. About the Netgear WGR Netgear WGR specifications.
Related product manuals. What is the difference between a router and a modem? A modem provides the internet connection via the internet provider. A router then distributes the Internet signal to the devices connected to the router. What does the download speed on the internet depend on? The download speed on the internet depends on the type of connection you have.
0コメント