Netgear Router DGND3700 User Guide
Netgear Router DGND3700 User Guide
March 2012
202-10642-03
v1.0
Technical Support
Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online, or
for more information about the topics covered in this manual, visit the Support website at
http://support.netgear.com.
Trademarks
NETGEAR, the NETGEAR logo, and Connect with Innovation are trademarks and/or registered trademarks of
NETGEAR, Inc. and/or its subsidiaries in the United States and/or other countries. Information is subject to change
without notice. Other brand and product names are registered trademarks or trademarks of their respective
holders. © 2011 NETGEAR, Inc. All rights reserved.
Statement of Conditions
To improve internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes
to the products described in this document without notice. NETGEAR does not assume any liability that may occur
due to the use, or application of, the product(s) or circuit layout(s) described herein.
Chapter 9 Troubleshooting
Router Not On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Power LED Is Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Power LED Is Red . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
LAN LED Is Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Wireless LEDs Are Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
DSL or Internet LED Is Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
No ISP Connection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
ADSL Link. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Internet LED Is Red . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Cannot Obtain an Internet IP Address . . . . . . . . . . . . . . . . . . . . . . . . . 149
Debug PPPoE or PPPoA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Cannot Load an Internet Web Page . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
TCP/IP Network Not Responding. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Test the LAN Path to Your Wireless Modem Router . . . . . . . . . . . . . . 151
Test the Path from Your Computer to a Remote Device . . . . . . . . . . . 152
Cannot Log In. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Changes Not Saved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Firmware Needs to Be Reloaded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Incorrect Date or Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Index
Warranty
• NETGEAR 1-year warranty
System Requirements
• Broadband Internet service
- ADSL broadband Internet service
- Cable or fiber: Connects to cable modem or fiber termination node through the
Gigabit Ethernet WAN port
• 802.11 a/b/g/n 2.4 or 5.0 GHz specification wireless adapter or an Ethernet adapter and
cable for each computer
• Microsoft Windows 7, Vista, XP, 2000, Me, Mac OS, UNIX, or Linux
• Microsoft Internet Explorer 5.0, Firefox 2.0, Safari 1.4, or later
• Use with an N600 Wireless Dual Band USB Adapter (WNDA3100 for maximum
performance)
Standards
• IEEE 802.11 b/g/n 2.4 GHz
• IEEE 802.11 a/n 5.0 GHz
• Five (5) 10/100/1000 (1 WAN and 4 LAN) Gigabit Ethernet ports
• Two (2) USB 2.0 ports
• One (1) ADSL2+ port
Performance
• All-in-one. High-speed ADSL2+ modem (built-in) and WAN Gigabit Ethernet port for
cable/fiber
• Powerful dual-core (400 MHz each) processor
• High-speed access to external USB storage using two USB 2.0 ports
• Memory: 128 MB flash and 128 MB RAM
• Five (5) (1 WAN, 4 LAN) Gigabit Ethernet ports
• Advanced Quality of Service (QoS)
Security
• Wi-Fi Protected Access® (WPA/WPA2—PSK) and WEP
• Double firewall protection (SPI and NAT firewall)
• Denial-of-service (DoS) attack prevention
Ease of Use
• Easy installation. Connect to PC and open your browser to install
• Push 'N' Connect using Wi-Fi Protected Setup® (WPS)
Physical Specifications
• Dimensions: 223 x 153 x 31 mm (8.8 x 6.0 x 1.2 in)
Hardware Setup
9
Hardware Setup
10
ADSL
Line
Phone
ADSL filter
Hardware Setup
11
Hardware Features
Before you cable your router, take a moment to become familiar with the label and the front
and back panels. Pay particular attention to the LEDs on the front panel.
Label
The label on the bottom of the wireless modem router shows the router’s Restore Factory
Settings button, WPS security PIN, MAC address, and serial number.
WPS Security PIN MAC address
See Factory Settings on page 156 for information about the Restore Factory Settings button
and the factory setting values.
Hardware Setup
12
Back Panel
The back panel has the Power On/Off button and port connections shown in the figure:
1. ADSL line
4. USB port
Viewed from left to right, the rear panel contains the following elements:
1. RJ-11 asynchronous DSL (ADSL) port for connecting the wireless modem router to an
ADSL line
Note: An ADSL port is capable of sending data over an ADSL line at one
speed and receiving it at another speed.
2. Ethernet WAN port for connecting the wireless modem router to a fiber/cable modem
Note: You can use either the ADSL or Gigabit Ethernet port for WAN
connectivity.
3. Four Ethernet RJ-45 LAN ports for cabling the wireless modem router to the local computers
Hardware Setup
13
4. USB port for connecting USB storage devices like flash drives or hard drives
5. Power On/Off button
6. AC power adapter input
Front Panel
The wireless modem router front panel has the 10 status LEDs, icons, and ports shown in the
figure. Note that the Wireless and WPS icons are buttons.
USB port
Internet
DSL
5 GHZ wireless
2.4 GHz wireless
USB
LAN ports
Power
The following tables describe the LEDs, icons, and buttons on the front panel from top to
bottom.
Off WPS is not enabled. For information about the use of this button, see Wi-Fi
Protected Setup (WPS) Method on page 40.
Hardware Setup
14
Icon Description
For information about the use of this button, see Turn Off Wireless Connectivity on page 38.
Icon Description
USB port for connecting USB storage devices like flash drives or hard drives.
Solid green You have an Internet connection. If this connection is dropped due to an
idle time-out but the connection is still present, the light stays green. If the
Internet connection is dropped for any other reason, the light turns off.
Solid red The Internet (IP) connection failed. See No ISP Connection on page 148
for troubleshooting information.
Solid green You have an ADSL connection. In technical terms, the ADSL port is
synchronized with an ISP’s network-access device.
Blinking green Indicates that the wireless modem router is negotiating the best possible
speed on the ADSL line.
Hardware Setup
15
Blinking blue Data is being transmitted or received over the 5 GHz wireless link.
Off There is no wireless connectivity. You can still plug an Ethernet cable into
one of the LAN ports to get wired connectivity.
Blinking green Data is being transmitted or received over the 2.4 GHz wireless link.
Off There is no wireless connectivity. You can still plug an Ethernet cable into
one of the LAN ports to get wired connectivity.
Solid green A LAN port has detected an Ethernet link with a device.
Hardware Setup
16
Solid red POST (power-on self-test) failure or a device malfunction has occurred.
Restore Factory Light blinks momentarily when the Restore Factory Settings button on the
Settings bottom of the unit is pressed for 6 seconds. The Power LED then blinks red
three times when the Restore Factory Settings button is released and then
turns green as the gateway resets to the factory defaults.
Also be aware that when you use multiple access points, it is better if adjacent access points
use different radio frequency channels to reduce interference. The recommended channel
spacing between adjacent access points is five channels (for example, use Channels 1 and
6, or 6 and 11).
Hardware Setup
17
ADSL Microfilters
If this is the first time you have cabled a wireless router between an ADSL phone line and
your computer or laptop, you might not be familiar with ADSL microfilters. If you are, you can
skip this section and proceed to Cable Your N600 Wireless Modem Router on page 20.
An ADSL microfilter is a small in-line device that filters ADSL interference out of standard
phone equipment that shares the same line with your ADSL service. Every telephone device
that connects to a telephone line that provides ADSL service needs an ADSL microfilter to
filter out the ADSL interference. Example devices are telephones, fax machines, answering
machines, and caller ID displays. Note that not every phone line in your home necessarily
carries ADSL service. That depends on the ADSL service setup in your home.
Note: Often the ADSL microfilter is included in the box with the wireless
modem router. If you purchased the wireless modem router in a
country where a microfilter is not included, you have to acquire the
ADSL microfilter separately.
Second best when you do not have a separate ADSL line for the router is to get a separate
splitter. To use a one-line filter with a separate splitter, insert the splitter into the phone outlet,
connect the one-line filter to the splitter, and connect the phone to the filter.
Hardware Setup
18
Summary
• One-line ADSL microfilter (not included). Use with a phone or fax machine.
• Splitter (not included). Use with a one-line ADSL microfilter to share an outlet with a
phone and the wireless modem router.
• Two-line ADSL microfilter with built-in splitter (included). Use to share an outlet with a
phone and the wireless modem router.
Hardware Setup
19
WARNING:
DO not stack equipment, or place equipment in tight spaces, or in
drawers. Be sure your equipment is surrounded by at least
2 inches of air space. The unit should not be wall mounted.
The installation guide that came in the box has a cabling diagram on the first page.
Step 2:
Connect to ADSL Cable your computer.
if connecting directly
to a DSL line. Phone cable
Line
Phone
ADSL
Ethernet cable
Internet Ethernet cable
(not included)
Note: Add an ADSL filter for every
telephone on the same phone line Laptop or desktop
as your wireless modem router. computer
Connect to Internet with ADSL or Ethernet WAN. Note: Keep the DGND3700
N600 Wireless Modem Router
in a vertical position.
Step 3:
Internet
Power on your router.
Connect to Ethernet WAN Wait until the 2.4 GHz 2.4 GHz
Wireless LED turns solid Wireless LED
if connecting to a
fiber/cable modem. green.
N600 Wireless Modem Router
Fiber/Cable modem
CAUTION:
Incorrectly connecting a filter to your wireless modem router blocks your
ADSL connection.
Hardware Setup
20
Hardware Setup
21
22
Note: If you have a Macintosh or Linux system, you have to use the
manual setup method.
this information, ask your ISP to provide it. When your Internet connection is working, you no
longer need to launch the ISP’s login program on your computer to access the Internet. When
you start an Internet application, your wireless modem router automatically logs you in.
• Active Internet service provided by an ADSL account
• The ISP configuration information for your ADSL account
- ISP login name and password
- ISP Domain Name Server (DNS) addresses
- Fixed or static IP address
- Host and domain names
- Depending on how your ISP set up your Internet account, you could need to know
one or more of these settings for a manual setup:
- Virtual path identifier (VPI) and virtual channel identifier (VCI) parameters
- Multiplexing method
- Host and domain names
2. When prompted, enter admin for the router user name and password for the router
password, both in lowercase letters, and click OK.
Note: The router user name and password are probably different from the
user name and password for logging in to your Internet connection.
See Types of Logins on page 34 for more information.
The router screens display, where you can do things like changing settings or adding
other devices to your network. For a brief description of the available functionality, see
Router Interface on page 26. For information about adding devices to your network, see
Wi-Fi Protected Setup (WPS) Method on page 40.
If you do not see the login prompt:
1. Check the LEDs on the router front panel to make sure that the modem router is
plugged into an electrical outlet, its power is on, and the Ethernet cable between your
computer and the router is connected to a LAN port.
2. If you connected the Ethernet cable and quickly launched your browser and typed in the
router URL, your computer might need a minute or two to recognize the LAN connection.
Relaunch your browser and try again.
3. If you are having trouble accessing the router wirelessly, NETGEAR recommends that
during setup you use an Ethernet cable to connect your computer so that you can log in to
the wireless modem router.
Note: If you cannot connect to the wireless router, check the Internet
Protocol (TCP/IP) properties in the Network Connections section of
your PC Control Panel. They should be set to obtain both IP and
DNS server addresses automatically.
CAUTION:
Do not try to go online, turn off the router, shut down the computer, or do
anything else to the router until the router finishes restarting.
You cannot upgrade firmware until you have established your Internet connection as
described in Setup Wizard on page 27.
Router Interface
The router interface gives you access to the router’s current settings so you can view or
change them (if needed). The left column has the router menus, and the right column
provides online help. The middle column is the screen for the current menu option.
Setup Wizard
Specify the language and location, and automatically detect the Internet connection. See
Setup Wizard on page 27.
Setup Menu
Set, upgrade, and check the ISP and wireless network settings of your router. See Manual
Setup (Basic Settings) on page 28 and ADSL Settings on page 32. See also Chapter 3,
Wireless Settings, for information about preset and basic security settings.
Maintenance Menu
Administer and maintain your router and network. See Chapter 5, Network Maintenance.
Advanced Menu
Set the router up for unique situations such as when remote access by IP or by domain name
from the Internet is needed. See Chapter 8, Advanced Settings. Using this menu requires a
solid understanding of networking concepts.
Web Support
Go to the NETGEAR support site to get information, help, and product documentation. These
links work once you have an Internet connection.
Setup Wizard
You have to log in to the modem router to set the country, language, and Internet connection.
Note: Check that the country and language are set as described Setup
Wizard on page 27 before proceeding with the manual setup.
Figure 11. Basic Settings screen without (left) and with (right) login
The following table explains all of the possible fields in the Basic Settings screen. Note that
which fields appear in this screen depends on whether or not a login is required.
Table 11. Basic Settings Screen Description
Settings Description
These fields Account Name Enter the account name provided by your ISP. This might also be
display only if (If required) called the host name.
no login is
required. Domain Name Enter the domain name provided by your ISP.
(If required)
Settings Description
These fields Encapsulation Encapsulation is a method for enclosing multiple protocols. PPP
display only if stands for Point-to-Point Protocol. The choices are:
your ISP • PPPoE (PPP over Ethernet)
requires a • PPPoA (PPP over ATM)
login.
Login The login name provided by your ISP. This is often an email address.
Idle Timeout (In If you want to change the login time-out, enter a new value in
minutes) minutes. This determines how long the wireless modem router keeps
the Internet connection active after there is no Internet activity from
the LAN. Entering a value of 0 (zero) means never log out.
Internet IP • Get Dynamically from ISP. Your ISP uses DHCP to assign your IP
Address address. Your ISP automatically assigns these addresses.
• Use Static IP Address. Enter the IP address, IP subnet mask, and
the gateway IP address that your ISP assigned. The gateway is the
ISP’s wireless modem router to which your wireless modem router
will connect.
This field displays only Use IP Over ATM (IPoA). Your ISP uses classical IP addresses (RFC
if no login is required. 1577). Enter the IP address, IP subnet mask, and gateway IP
addresses that your ISP assigned.
Domain Name Server (DNS) Address The DNS server is used to look up site addresses based on their
names.
• Get Automatically from ISP. Your ISP uses DHCP to assign your
DNS servers. Your ISP automatically assigns this address.
• Use These DNS Servers. If you know that your ISP does not
automatically transmit DNS addresses to the wireless modem
router during login, select this option, and enter the IP address of
your ISP’s primary DNS server. If a secondary DNS server address
is available, enter it also.
Settings Description
NAT (Network Address Translation) NAT automatically assigns private IP addresses (10.1.1.x) to
LAN-connected devices.
• Enable. Usually NAT is enabled.
• Disable. This disables NAT, but leaves the firewall active. Disable
NAT only if you are sure you do not need it. When NAT is disabled,
only standard routing is performed by this router. Classical routing
lets you directly manage the IP addresses that the wireless modem
router uses. Classical routing should be selected only by
experienced users.1
• Disable firewall. This disables the firewall in addition to disabling
NAT. With the firewall disabled, the protections usually provided to
your network are disabled.
These fields Router MAC Address The Ethernet MAC address used by the wireless modem router on
display only if the Internet port. Some ISPs register the MAC address of the
no login is network interface card in your computer when your account is first
required. opened. They will then accept traffic only from the MAC address of
that computer. This feature allows your wireless modem router to use
your computer’s MAC address (this is also called cloning).
• Use Default Address. Use the default MAC address.
• Use Computer MAC Address. The wireless modem router will
capture and use the MAC address of the computer that you are
now using. You must be using the one computer that is allowed by
the ISP.
• Use This MAC Address. Enter the MAC address that you want to
use.
1. Disabling NAT reboots the wireless modem router and resets its configuration settings to the factory defaults.
Disable NAT only if you plan to set up the wireless modem router in a setting where you will be manually
administering the IP address space on the LAN side of the router.
ADSL Settings
ADSL settings of your wireless modem router work fine for most ISPs. However, some ISPs
use a specific multiplexing method and virtual circuit number for the virtual path identifier
(VPI) and virtual channel identifier (VCI).
Note: You must use the Setup Wizard to select the correct country for the
default ADSL settings to work.
If your ISP provided you with a multiplexing method or VPI/VCI number, enter the
setting:
1. Select Setup > ADSL Settings to display the following screen:
Note: If you cannot connect to the wireless router, check the Internet
Protocol (TCP/IP) properties in the Network Connections section of
your PC Control Panel. They should be set to obtain both IP and
DNS server addresses automatically.
Note: The router user name and password are not the same as the user
name and password for logging in to your Internet connection. See
Types of Logins on page 34 for more information about login types.
Types of Logins
There are three separate types of logins that have different purposes. It is important that you
understand the difference so that you know which login to use when.
• Router login logs you in to the router interface. See Log In to the N600 Modem Router
on page 24 for details about this login.
• ISP login logs you in to your Internet service. Your service provider has provided you with
this login information in a letter or some other way. If you cannot find this login
information, contact your service provider.
• Wi-Fi network name and passphrase logs you in to your wireless network. This login is
preconfigured and can be found on the label on the bottom of your unit. See Chapter 3,
Wireless Settings, for more information.
Note: If you use the Internet for activities like purchases or banking, those
Internet sites use a highly secure data encryption protocol called
Secure Sockets Layer (SSL). If a website uses SSL, the address
begins with https instead of http. If you do not see https, it is more
secure to do your business in person or over the phone.
36
Wireless Settings
37
Note: Turning off SSID broadcast nullifies the wireless network discovery
feature of some products such as Windows XP, but the data is still
fully exposed to a determined snoop using specialized test
equipment like wireless sniffers. If you allow the broadcast, be sure
to keep wireless security enabled.
Wireless Settings
38
WEP Encryption
WEP uses an old encryption method and can be easily decoded with today’s powerful
computers. Use this mode only when you have a very old legacy wireless client that does not
support WPA-PSK. The Wi-Fi alliance highly recommends against using WEP and plans to
make it obsolete. If you do decide to use WEP, see Set WEP Encryption and Passphrase: on
page 46 for the procedure.
WPA Encryption
WPA encryption is built into all hardware that has the Wi-Fi-certified seal. This seal means
the product is authorized by the Wi-Fi Alliance (http://www.wi-fi.org/) because it complies with
the worldwide single standard for high-speed wireless local area networking. For information
about how to use the WPA home options, see Change WPA Security Option and
Passphrase: on page 46.
WPA-PSK uses a much stronger encryption algorithm than WEP so it is harder to decode.
This option uses a passphrase to perform the authentication and generate the initial data
encryption keys. Then it dynamically varies the encryption key. WPA-PSK uses Temporal Key
Integrity Protocol (TKIP) data encryption, implements most of the IEEE 802.11i standard, and
is designed to work with all wireless network interface cards, but not all wireless access
points. It is superseded by WPA2-PSK.
WPA2-PSK is the strongest. It is advertised to be theoretically indecipherable due to the
greater degree of randomness in encryption keys that it generates. WPA2-PSK gets higher
speed because it is usually implemented through hardware, while WPA-PSK is usually
implemented through software. WPA2-PSK uses a passphrase to authenticate and generate
the initial data encryption keys. Then it dynamically varies the encryption key.
WPS-PSK + WPA2-PSK mixed mode is the preconfigured security mode on the wireless
modem router. NETGEAR recommends mixed mode because it provides broader support for
all wireless clients. WPA2-PSK clients get higher speed and security, and WPA-PSK clients
get decent speed and security. The product documentation for your wireless adapter and
WPA client software should have instructions about configuring their WPA settings.
WPA-802.1x is enterprise-level security and requires an authentication server to recognize
and authorize client access. The authentication server is called Remote Authentication Dial
In User Service (RADIUS). Every wireless client has a user login on the RADIUS server, and
the wireless modem router has a client login on the RADIUS server. Data transmissions are
encrypted with an automatically generated key. For information about how to use the WPA
enterprise option, see Set WPA-802.1x Server and Passphrase: on page 46.
Wireless Settings
39
Manual Method
To add clients (devices) to your network manually:
1. Open the software that manages your wireless connections on the wireless device
(laptop computer, gaming device, iPhone) that you want to connect to your router. This
software scans for all wireless networks in your area.
2. Look for your network and select it. If you did not change the name of your network during
the setup process, look for the default Wi-Fi network name (SSID) and select it. The default
Wi-Fi network name (SSID) is located on the product label on the bottom of the router.
3. Enter the wireless modem router passphrase and click Connect. The default wireless
modem router passphrase is located on the product label on the bottom of the router.
4. Repeat steps 1–3 to add other wireless devices.
Note: However, if you find that the router is generating new security
settings for each added device, it means that the default value for
Keep Existing Wireless Settings has changed. See WPS Settings on
page 131 for more information about this setting.
All Wi-Fi-certified and WPS-capable products are compatible with the NETGEAR products
that have Push 'N' Connect, which is based on WPS.1 For information about how to view a
list of all wireless and wired devices connected to your modem router, see View Attached
Devices on page 72.
Note: WEP security does not support WPS. If you try to use WPS to
connect a WEP device to your network, it will not connect.
Wireless Settings
40
You can use the WPS (Push 'N' Connect) or router interface method to add wireless devices
and other equipment to your wireless network.
3. Select either Push Button or PIN Number. With either method, the client wireless device
attempts to detect the WPS signal from the wireless modem router and establish a
wireless connection in the time allotted.
The PIN method displays this screen so you can enter the client security PIN number:
• While the wireless modem router attempts to connect to a WPS-capable device, the
WPS LED on the front of the wireless modem router blinks green. When the wireless
modem router establishes a WPS connection, the LED is solid green.
• If a connection is established, the wireless modem router WPS screen displays a
confirmation message.
4. Repeat to add another WPS client to your network.
Wireless Settings
41
Note: If you use a wireless computer to change the wireless network name
(SSID) or other wireless security settings, you are disconnected
when you click Apply. To avoid this problem, use a computer with a
wired connection to access the modem router.
Wireless Settings
42
2. Make any changes that are needed, and click Apply when done to save your settings.
Note: The screen sections, settings, and procedures are explained in the
following sections.
3. After you finish adjusting settings and click Apply, configure and test your computers for
wireless connectivity:
Wireless Settings
43
a. Program the wireless adapter of your computers to have the same SSID and channel
that you specified in the router.
b. Check that the adapters have a wireless link and can obtain an IP address by DHCP
from the wireless modem router.
Wireless Settings
44
• Available Wireless Stations lists the currently untrusted computers that are connected
to your network.
2. Select the Turn Access Control On check box to enable access restriction by MAC
address.
3. In the Add New Station Manually section, click Add to add your computer’s MAC address so
you do not lose your wireless connection when you click Apply. If you lose your wireless
connection, you have to access the wireless modem router from a wired computer or from a
wireless computer that is on the access control list.
4. If a wireless station that you want to add to the Trusted Wireless Stations list is connected to
the network, select it from the Available Wireless Stations list and click Add.
5. If the wireless station is not currently connected, you can enter its address manually. The
MAC address is usually printed on the wireless card, or it might appear in the wireless
modem router’s DHCP table. The MAC address is 12 hexadecimal digits.
You can also copy and paste the MAC addresses from the wireless modem router’s
Attached Devices screen (see View Attached Devices on page 72) into the MAC Address
field. To do this, configure each wireless computer to obtain a wireless link to the wireless
modem router. The computer should then appear in the Attached Devices screen.
6. Click Apply to save your settings and return to the Wireless Settings screen.
Wireless Settings
45
2. In the Passphrase field that displays when you select a WPA security option, enter the
network keys (passphrases) that you want to use. They are text strings from 8 to 63
characters (in the preceding figure, HomeNetwork1 and HomeNetwork2 are used as
examples).
Set WPA-802.1x Server and Passphrase:
1. In the Security Options section, select WPA-802.1x to display the following fields:
2. In the Radius Server Name/IP Address field, enter the name or IP address of the RADIUS
server on your LAN. This is a required field.
3. In the Radius Port field, enter the port number used for connections to the RADIUS server.
The default port is 1812.
4. In the Shared Key field, enter the RADIUS server passphrase for client logins. The router
has to have this passphrase to log in to the RADIUS server as a client.
Set WEP Encryption and Passphrase:
When configuring WEP from a wireless computer, you lose your wireless connection when
you click Apply. You have to either configure your wireless adapter to match the wireless
modem router WEP settings or access the wireless modem router from a wired computer.
Wireless Settings
46
1. In the Security Options section, select WEP to display the following screen:
2. Select the authentication type. The default is Automatic. Other choices are Open System
(any client can authenticate itself to the network) and Shared Key (a passphrase and a
four-way challenge is needed for authentication).
3. Select the encryption strength setting, either 64 bit or 128 bit.
4. Enter the four data encryption keys either manually or automatically. These values have to
be identical on all computers and access points in your network.
• Automatic. Enter a word or group of printable characters in the Passphrase field, and
click Generate. The four key fields are automatically populated with key values.
• Manual. The number of hexadecimal digits that you enter depends on the encryption
strength setting:
- For 64-bit WEP, enter 10 hexadecimal digits (any combination of 0–9, a–f, or
A–F).
- For 128-bit WEP, enter 26 hexadecimal digits (any combination of 0–9, a–f, or
A–F).
5. Select the radio button for the key you want to make active.
Make sure that you understand how the WEP key settings are configured in your wireless
adapter. Wireless adapter configuration utilities such as the one in Windows XP allow one
key entry, which has to match the default key you set in the wireless modem router.
6. Click Save to save your settings or click Apply so your changes to take effect immediately.
Wireless Settings
47
48
Security Settings
49
Security Settings
50
3. Your router creates an entry in its internal session table describing this communication
session between your computer and the web server at www.example.com. Before sending
the web page request message to www.example.com, your router stores the original
information and then modifies the source information in the request message, performing
Network Address Translation (NAT):
• The source address is replaced with your router’s public IP address. This is
necessary because your computer uses a private IP address that is not globally
unique and cannot be used on the Internet.
• The source port number is changed to a number chosen by the router, such as 33333.
This is necessary because two computers could independently be using the same
session number.
Your router then sends this request message through the Internet to the web server at
www.example.com.
4. The web server at www.example.com composes a return message with the requested web
page data. The return message contains the following address and port information. The
web server then sends this reply message to your router.
Source address. The IP address of www.example.com.
Source port number. 80, which is the standard port number for a web server process.
Destination address. The public IP address of your router.
Destination port number. 33333.
5. Upon receiving the incoming message, your router checks its session table to determine
whether there is an active session for port number 33333. Finding an active session, the
router then modifies the message to restore the original address information replaced by
NAT. Your router sends this reply message to your computer, which displays the web
page from www.example.com. The message now contains the following address and port
information.
Source address. The IP address of www.example.com.
Source port number. 80, which is the standard port number for a web server process.
Destination address. Your computer’s IP address.
Destination port number. 5678, which is the browser session that made the initial
request.
6. When you finish your browser session, your router eventually detects a period of inactivity in
the communications. Your router then removes the session information from its session
table, and incoming traffic is no longer accepted on port number 33333.
Security Settings
51
triggering function of your router, you can tell the router to open additional incoming ports
when a particular outgoing port originates a session.
An example is Internet Relay Chat (IRC). Your computer connects to an IRC server at
destination port 6667. The IRC server not only responds to your originating source port, but
also sends an “identify” message to your computer on port 113. Using port triggering, you can
tell the router, “When you initiate a session with destination port 6667, you have to also allow
incoming traffic on port 113 to reach the originating computer.” Using steps similar to the
preceding example, the following sequence shows the effects of the port triggering rule you
have defined:
1. You open an IRC client program to start a chat session on your computer.
2. Your IRC client composes a request message to an IRC server using a destination port
number of 6667, the standard port number for an IRC server process. Your computer then
sends this request message to your router.
3. Your router creates an entry in its internal session table describing this communication
session between your computer and the IRC server. Your router stores the original
information, performs Network Address Translation (NAT) on the source address and port,
and sends this request message through the Internet to the IRC server.
4. Noting your port triggering rule and having observed the destination port number of 6667,
your router creates an additional session entry to send any incoming port 113 traffic to your
computer.
5. The IRC server sends a return message to your router using the NAT-assigned source port
(as in the previous example, let’s say port 33333) as the destination port. The IRC server
also sends an “identify” message to your router with destination port 113.
6. Upon receiving the incoming message to destination port 33333, your router checks its
session table to determine whether there is an active session for port number 33333.
Finding an active session, the router restores the original address information replaced by
NAT and sends this reply message to your computer.
7. Upon receiving the incoming message to destination port 113, your router checks its session
table and learns that there is an active session for port 113, associated with your computer.
The router replaces the message’s destination IP address with your computer’s IP address
and forwards the message to your computer.
8. When you finish your chat session, your router eventually senses a period of inactivity in the
communications. The router then removes the session information from its session table,
and incoming traffic is no longer accepted on port numbers 33333 or 113.
To configure port triggering, you need to know which inbound ports the application needs.
Also, you need to know the number of the outbound port that will trigger the opening of the
inbound ports. You can usually determine this information by contacting the publisher of the
application, or user groups or newsgroups.
Note: Only one computer at a time can use the triggered application.
Security Settings
52
Security Settings
53
• Port triggering can be used by any computer on your network, although only one
computer can use it at a time.
• Port forwarding is configured for a single computer on your network.
• Port triggering does not need to know the computer’s IP address in advance. The IP
address is captured automatically.
• Port forwarding requires that you specify the computer’s IP address during configuration,
and the IP address can never change.
• Port triggering requires specific outbound traffic to open the inbound ports, and the
triggered ports are closed after a period of no activity.
• Port forwarding is always active and does not need to be triggered.
Tip: To ensure that your server computer always has the same IP address,
use the reserved IP address feature of your product.
Security Settings
54
4. In the corresponding Server IP Address field, enter the last digit of the IP address of your
local computer that will provide this service.
5. Click Add. The service appears in the list in the screen.
Security Settings
55
To configure port triggering, you need to know which inbound ports the application needs.
Also, you need to know the number of the outbound port that will trigger the opening of the
inbound ports. You can usually determine this information by contacting the publisher of the
application or user groups or newsgroups.
To set up port triggering:
1. Select Content Filtering > Port Forwarding/Port Triggering to display the following
screen:
Security Settings
56
2. Select the Port Triggering radio button to display the port triggering information.
Note: If the Disable Port Triggering check box is selected after you
configure port triggering, port triggering is disabled. However, any
port triggering configuration information you added to the router is
retained even though it is not used.
4. In the Port Triggering Timeout field, enter a value up to 9999 minutes. This value controls
the inactivity timer for the designated inbound ports. The inbound ports close when the
inactivity time expires. This is required because the router cannot be sure when the
application has terminated.
5. Click Add Service.
Security Settings
57
10. Enter the inbound connection port information in the Connection Type, Starting Port, and
Ending Port fields.
11. Click Apply. The service appears in the Port Triggering Portmap table.
Configure Services
Services are functions performed by server computers at the request of client computers. For
example, web servers serve web pages, time servers serve time and date information, and
game hosts serve data about other players’ moves. When a computer on the Internet sends a
request for service to a server computer, the requested service is identified by a service or
port number. This number appears as the destination port number in the transmitted IP
packets. For example, a packet that is sent with destination port number 80 is an HTTP (web
server) request.
The service numbers for many common protocols are defined by the Internet Engineering
Task Force (IETF at http://www.ietf.org/) and published in RFC1700, “Assigned Numbers.”
Service numbers for other applications are typically chosen from the range 1024 to 65535 by
the authors of the application. Although the wireless modem router already holds a list of
many service port numbers, you are not limited to these choices.
To create your own service definitions:
1. Select Content Filtering > Services to display the following screen:
• To create a new service, click the Add Custom Service button to display the Add
Services screen.
• To edit a service, select its button on the left side of the table, and click Edit Service.
• To delete a service, select its button on the left side of the table, and click Delete
Service.
2. Use the following screen to define or edit a service.
Security Settings
58
• Type. Select the correct type for this service. If in doubt, select TCP/UDP. The options
are TCP, UDP, TCP/UDP.
• Start Port and End Port. If a port range is required, enter the range here. If a single
port is required, enter the same value in both fields.
3. Click Apply to save your changes.
2. Select your time zone. This setting determines the blocking schedule and time-stamping of
log entries.
3. If your time zone is in daylight savings time, select the Adjust for Daylight Savings Time
check box to add one hour to standard time.
Note: If your region uses daylight savings time, select Adjust for Daylight
Savings Time on the first day and clear it after the last day.
4. The wireless modem router has a list of NETGEAR NTP servers. If you would prefer to use
a particular NTP server as the primary server, select the Use this NTP Server check box,
and enter its IP address.
5. Click Apply to save your settings.
Security Settings
59
2. To block Internet services based on a schedule, select Every Day, or select one or more
days. If you want to limit access completely for the selected days, select All Day. Otherwise,
to limit access during certain times for the selected days, enter times in the Start Time and
End Time fields.
Note: Enter the values in 24-hour time format. For example, 10:30 a.m.
would be 10 hours and 30 minutes, and 10:30 p.m. would be 22
hours and 30 minutes. If you set the start time after the end time, the
schedule is effective through midnight the next day.
Security Settings
60
• Turn E-mail Notification On. Select this check box if you want to receive email logs and
alerts from the wireless modem router.
• Send To This E-mail Address. Enter the email address where you want logs and alerts
sent. This email address is also used as the From address. If you leave this field blank,
log and alert messages are not sent by email.
• Outgoing Mail Server. Enter the name or IP address of your ISP’s outgoing (SMTP) mail
server (such as mail.myISP.com). You might be able to find this information in the
configuration settings of your email program. Enter the email address to which logs and
alerts are sent. This email address is also used as the From address. If you leave this
field blank, log and alert messages are not sent by email.
• My Mail Server requires authentication. If you use an outgoing mail server provided by
your current ISP, you do not need to select this check box. If you use an email account
that is not provided by your ISP, select this check box, and enter the required user name
and password information.
• Send E-Mail alerts immediately. Select the corresponding check box if you would like
immediate notification of a significant security event, such as a known attack, port scan,
or attempted access to a blocked site.
• Send Logs According to this Schedule. Specifies how often to send the logs: Hourly,
Daily, Weekly, or When Full.
- Day for sending logs specifies which day of the week to send the log. This is relevant
when the log is sent weekly.
- Time for sending log specifies the time of day to send the log. This is relevant when
the log is sent daily or weekly.
Note: If the Weekly, Daily, or Hourly option is selected and the log fills up
before the specified period, the log is automatically emailed to the
specified email address. After the log is sent, it is cleared from the
wireless modem router’s memory. If the wireless modem router
Security Settings
61
cannot email the log file, the log buffer might fill up. In this case, the
wireless modem router overwrites the log and discards its contents.
Security Settings
62
Security Settings
63
Note: For security reasons, the wireless modem router has its own user
name and password that default to admin and password. You can
and should update your password regularly. See Change Password
and Login Time-Out on page 33.
64
WARNING:
When uploading firmware to the wireless modem router, do not
interrupt the web browser by closing the window, clicking a link,
or loading a new page. If the browser is interrupted, it could
corrupt the firmware.
Network Maintenance
65
WARNING:
When uploading firmware to the wireless modem router, do not
interrupt the web browser by closing the window, clicking a link,
or loading a new page. If the browser is interrupted, it could
corrupt the firmware.
Network Maintenance
66
5. Click Browse, and locate the firmware you downloaded (the file ends in .img).
6. Click Upload to send the firmware to the wireless modem router.
When the upload is done, your wireless modem router restarts. The upgrade process
typically takes about 1 minute. Read the new firmware release notes to determine
whether or not you need to reconfigure the wireless modem router after upgrading.
Back Up
To back up the configuration file:
1. Select Maintenance > Backup Settings to display the following screen:
Network Maintenance
67
Restore
To restore a configuration file:
1. Enter the full path to the file on your network, or click the Browse button to find the file.
2. When you have located the .cfg file, click the Restore button to upload the file to the
wireless modem router.
Upon completion, the wireless modem router reboots.
Erase
Click the Erase button to reset the wireless modem router to its factory default settings.
Alternately, press the Wireless On/Off and WPS buttons on the side panel of the wireless
modem router simultaneously for 6 seconds.
Erase sets the password to password and the LAN IP address to 192.168.0.1, and enables
the wireless modem router’s DHCP.
Network Maintenance
68
Use the Router Status screen to check the current settings and statistics for your router. This
screen shows you the current settings. If something needs to be changed, you have to
change it on the relevant screen.
Account Name. This is the account name that you entered in the Setup Wizard or Basic
Settings screen.
Network Maintenance
69
Firmware Version. This is the current software the router is using. This will change if you
upgrade your router.
Internet Port. These are the current settings that you set in the Setup Wizard or Basic
Settings screen.
• MAC Address. The physical address of the router, as seen from the Internet.
• IP Address. Current Internet IP address. If assigned dynamically, and no Internet
connection exists, this is blank or 0.0.0.0.
• Network Type. Indicates either Client (IP address is obtained dynamically) or None.
• IP Subnet Mask. The subnet mask associated with the Internet IP address.
• Domain Name Server. Displays the address of the current DNS.
LAN Port. These are the current settings, as set in the LAN IP Setup screen.
• MAC Address. The physical address of the router, as seen from the LAN.
• IP Address. LAN IP address of the router.
• DHCP. Indicates if the router is acting as a DHCP server for devices on your LAN.
• IP Subnet Mask. Subnet mask associated with the LAN IP address.
Modem. The current modem status and settings are shown in this section.
• ADSL Firmware Version. This is the version number of the low-level ADSL firmware.
This is contained within the router firmware.
• Modem Status. The current state of the ADSL connection to your phone company.
• DownStream Connection Speed. The connection speed of the ADSL connection from
the phone company to your router.
• UpStream Connection Speed. The connection speed of the ADSL connection from your
router to the phone company.
• VPI. The VPI setting entered on the ADSL Settings screen.
• VCI. The VCI setting entered on the ADSL Settings screen.
Wireless Port. These are the current settings, as set in the Wireless Settings screen.
• Name (SSID). SSID of the router.
• Region. The location (country).
• Channel. The current channel in use.
• Wireless AP. Indicates if the access point feature of the router is enabled or not. If not
enabled, the Wireless LED on the front panel is off.
• Broadcast Name. Indicates if the router is broadcasting its SSID.
To see router performance statistics such as the number of packets sent and number of
packets received for each port, click Show Statistics.
To see information about your current connection, click Connection Status.
Network Maintenance
70
• Port. The statistics for the WAN (Internet), LAN (local), and wireless LAN (WLAN) ports.
For each port, the screen displays the following:
- Status. The link status of the port.
- TxPkts. The number of packets transmitted since reset or manual clear.
- RxPkts. The number of packets received since reset or manual clear.
- Collisions. The number of collisions since reset or manual clear.
- Tx B/s. The current line utilization—percentage of current bandwidth used.
- Rx B/s. The average line utilization.
- Up Time. The time elapsed since the last power cycle or reset.
• ADSL Link Downstream or Upstream. The statistics for the upstream and downstream
ADSL link. These statistics are of interest to your technical support representative if you
have problems obtaining or maintaining a connection.
• Connection Speed. Typically, the downstream speed is faster than the upstream speed.
• Line Attenuation. The line attenuation increases the farther you are physically located
from your ISP’s facilities.
• Noise Margin. The signal-to-noise ratio, which is a measure of the quality of the signal on
the line.
• Poll Interval. The interval at which the statistics are updated in this window. Click the
Stop button to freeze the display.
Network Maintenance
71
Connection Time. The time elapsed since the last connection to the Internet through the
ADSL port.
Connecting to sender. The connection status.
Negotiation. Success or Failed.
Authentication. Success or Failed.
Obtaining IP Address. The IP address assigned to the WAN port by the ISP.
Obtaining Network Mask. The network mask assigned to the WAN port by the ISP.
For each device, the table shows the IP address, device name if available, and the Ethernet
MAC address. Note that if the wireless modem router is rebooted, the table data is lost until
the wireless modem router rediscovers the devices. To force the wireless modem router to
look for attached devices, click the Refresh button.
Network Maintenance
72
Network Maintenance
73
Note: The USB ports on the wireless modem router can be used only to
connect USB storage devices like flash drives or hard drives. Do not
connect computers, USB modems, printers, CD drives, or DVD
drives to the these USB ports.
74
• File-Sharing Scenarios
• USB Storage Basic Settings
• Edit a Network Folder
• Configure USB Storage Advanced Settings
• Unmount a USB Drive
• Specify Approved USB Devices
• Connect to the USB Drive from a Remote Computer
• Connect to the USB Drive with Microsoft Network Settings
• Set Up a Media Server
Bus Speed/Second
Actual bus speeds can vary, depending on the CPU speed, memory, speed of the network,
and other variables. The wireless modem router should work with USB 2.0-compliant or
1.1-compliant external flash and hard drives. For the most up-to-date list of USB drives
supported by the wireless modem router, go to
http://support.netgear.com/app/answers/detail/a_id/18620.
When selecting a USB device, bear in mind the following:
• The USB port on the wireless modem router can be used with one USB hard drive at a
time. Do not attempt to use a USB hub attached to the USB port.
• According to the USB 2.0 specification, the maximum available power is 5V @ 0.5A.
Some USB devices might exceed this requirement, in which case the device might not
function or might function erratically. Check the documentation for your USB device to be
sure.
• The wireless modem router supports FAT, FAT32, and NTFS (read only) file systems.
File-Sharing Scenarios
You can share files on the USB drive for a wide variety of business and recreational
purposes. The files can be any PC, Mac, or Linux file type including text, Word, PowerPoint,
Excel, MP3, pictures, and multimedia files. USB drive applications include:
USB Storage
75
• Sharing multimedia with friends and family. You can share MP3 files, pictures, and other
multimedia with local and remote users.
• Sharing resources on your network. Store files in a central location so that you do not
have to power up a computer to perform local sharing. In addition, you can share files
between Macintosh, Linux, and PC computers by using the USB drive as a go-between.
• Sharing files with offsite coworkers. Share files such as Word documents, PowerPoint
presentations, and text files with remote users.
A few common uses are described in the following sections.
USB Storage
76
colleagues at another site. Rather than tying up their mail systems will large files, your
colleagues can use FTP to easily download shared files from the wireless modem router.
To share files with a remote colleague:
1. To protect your network, set up security. Create a user name and password for the
colleague with appropriate access.
2. If you want to limit USB drive access to only read access, from the wireless modem router
USB Storage (Basic Settings) screen, click Edit a Network folder. In the Write Access
field, select admin, and then click Apply.
Note: The password for admin is the same one that you use to access the
wireless modem router. By default it is password.
3. In the USB Storage (Advanced Settings) screen, select the check box next to FTP via
Internet. See Configure USB Storage Advanced Settings on page 80.
By default, the USB storage device is available to all computers on your local area network
(LAN). To access your USB device from this screen, you can click the network/device name
or the share name.
USB Storage
77
Network/device name:
\\readyshare
Share name:
\\readyshare\USB_Storage
You can also type \\readyshare in the address field of your web browser. If you logged in to
the wireless modem router before you connected your USB device, you might not see your
USB device in the wireless modem router screens until you log out and then log in again.
Table 13. USB Storage (Basic Settings)
Available Shared Name • You can click the name shown, or you can type it in the address
Network folders field of your web browser.
• If Not Shared is shown, then the default share has been deleted
and no other share for the root folder exists. Click the link to
change this setting.
Volume name Volume name from the storage device (either USB drive or HDD).
Edit button You can click the Edit button to edit the Available Network Folders
settings. See Edit a Network Folder on page 79.
Safely Remove USB Device Click to safely remove the USB device attached to your wireless
button modem router. See Unmount a USB Drive on page 82.
USB Storage
78
You can use this screen to select a folder, to change the Shared Name, or to change Read
Access or Write Access from All-no password to admin. The password for admin is the
same one that is used to log in to the router main menu. By default it is password.
Note: You have to click Apply for your changes to take effect.
USB Storage
79
You can use this screen to specify access to the USB storage device. The following table
explains the fields and buttons in the USB Storage (Advanced Settings) screen.
Table 14. USB Storage (Advanced Settings)
Fields Description
Network Device Name The default is readyshare. This is the name used to access the USB
device connected to the wireless modem router from your computer.
Workgroup If you are using a Windows workgroup rather than a domain, the
workgroup name is displayed here.
Access Method Network Enabled by default, this allows all users on the LAN to have access
Connection to the USB drive.
HTTP Disabled by default. If you enable this setting, you can type
http://readyshare to access the USB drive.
HTTP (via Disabled by default. If you enable this setting, remote users can type
Internet) http://readyshare to access the USB drive over the Internet.
FTP (via Disabled by default. If you enable this setting, remote users can
Internet) access the USB drive through FTP over the Internet.
USB Storage
80
Fields Description
Available Shared Name • You can click the name shown or you can type it into the address
Network Folders field of your web browser.
• If Not Shared is shown, then the default share has been deleted
and no other share for the root folder exists. Click the link to
change this setting.
Read/Write • Shows the permissions and access controls on the network folder.
Access • All-no password allows all users to access the network folder.
• admin prompts you to enter the same password that you use to log
in to the wireless modem router main menu.
Volume Name Volume name from the storage device (either USB drive or HDD).
2. Create a folder.
• You can specify the folder’s shared name, and change Read Access and Write
Access from All-no password to admin.
• The password for admin is the same one that is used to log in to the wireless modem
router main menu. By default it is password.
3. Click Apply so that your changes take effect.
USB Storage
81
WARNING:
Unmount the USB drive first before physically unplugging it from
the wireless modem router. If the USB disk is removed or a cable
is pulled while data is being written to the disk, it could result in
file or disk corruption.
To unmount a USB disk drive so that no users can access it, from the USB Settings screen,
click the Safely Remove USB button. This takes the drive offline.
3. On the USB Drive Approved Devices screen, select the USB device from the Available
USB Devices list.
4. Click Add.
USB Storage
82
USB Storage
83
Note: In Windows 2000 and Windows XP, File and Printer Sharing is
enabled by default.
Note: If you have any questions about File and Printer Sharing, contact
Microsoft for assistance.
USB Storage
84
• Enable Media Server enables the N600 Wireless Modem Router to act as a media
server.
• Media Server Name is the name that shows up on media players.
• Under Content Scan, Automatic scans for media files whenever new files are added
to the ReadyShare USB storage.
• You can also schedule scan periodically or click Scan Now to scan for new media
immediately.
2. Click Apply to save your settings.
USB Storage
85
86
Internet
PC running NETGEAR
ProSafe VPN client
A VPN client access allows a remote PC to connect to your network from any location on the
Internet. The remote PC is one tunnel endpoint, running the VPN client software. The
wireless modem router on your network is the other tunnel endpoint. See Set Up a
Client-to-Gateway VPN Configuration on page 90 for information about how to set up this
configuration.
Internet
A VPN between two or more NETGEAR VPN-enabled routers is a good way to connect
branch or home offices and business partners over the Internet. VPN tunnels also enable
access to network resources across the Internet. In this case, use gateways on each end of
the tunnel to form the VPN tunnel endpoints. See Set Up a Gateway-to-Gateway VPN
Configuration on page 101 for information about how to set up this configuration.
Plan a VPN
When you set up a VPN, it is helpful to plan the network configuration and record the
configuration parameters on a worksheet:
Table 15. VPN tunnel configuration worksheet
VPN Endpoint Local IPSecID LAN IP Address Subnet Mask FQDN or Gateway
IP (WAN IP Address
To set up a VPN connection, you have to configure each endpoint with specific identification
and connection information describing the other endpoint. You have to configure the
outbound VPN settings on one end to match the inbound VPN settings on other end, and vice
versa.
This set of configuration information defines a security association (SA) between the two
VPN endpoints. When planning your VPN, you should make a few choices first:
• Will the local end be any device on the LAN, a portion of the local network (as defined by
a subnet or by a range of IP addresses), or a single PC?
• Will the remote end be any device on the remote LAN, a portion of the remote network (as
defined by a subnet or by a range of IP addresses), or a single PC?
• Will either endpoint use fully qualified domain names (FQDNs)? FQDNs supplied by
Dynamic DNS providers (see Use a Fully Qualified Domain Name (FQDN) on page 163)
can allow a VPN endpoint with a dynamic IP address to initiate or respond to a tunnel
request. Otherwise, the side using a dynamic IP address has to always be the initiator.
• Which method will you use to configure your VPN tunnels?
- The VPN Wizard using VPNC defaults (see the following table)
- The typical automated Internet Key Exchange (IKE) setup (see Use Auto Policy to
Configure VPN Tunnels on page 112)
- A manual keying setup in which you have to specify each phase of the connection
(see Use Manual Policy to Configure VPN Tunnels on page 119)
Table 16. Parameters recommended by the VPNC and used in the VPN Wizard
• When the VPN Wizard and its VPNC defaults (see Table 16 on page 89) are not
appropriate for your special circumstances and you have to specify each phase of the
connection, see Use Manual Policy to Configure VPN Tunnels on page 119. You
manually enter all the authentication and key parameters. You have more control over the
process; however, the process is more complex, and there are more opportunities for
errors or configuration mismatches between your N600 Wireless Dual Band Gigabit
ADSL2+ Modem Router DGND3700 and the corresponding VPN endpoint gateway or
client workstation.
Internet
PC running NETGEAR
ProSafe VPN client
The following worksheet identifies the parameters used in this procedure. For a blank
worksheet, see Plan a VPN on page 88.
Table 17. VPN tunnel configuration worksheet
VPN Endpoint Local IPSecID LAN IP Address Subnet Mask FQDN or Gateway
IP (WAN IP
Address)
6. Click Done on the Summary screen. The VPN Policies screen displays, showing that the
new tunnel is enabled:
To view or modify the tunnel settings, select its radio button and click Edit.
Note: See Use Auto Policy to Configure VPN Tunnels on page 112 for
information about how to enable the IKE keep-alive capability on an existing
VPN tunnel.
The PC has to have the NETGEAR ProSafe VPN Client program installed, which supports
IPSec. Go to the NETGEAR website (http://www.netgear.com) for information about how to
purchase the NETGEAR ProSafe VPN client.
c. Rename the new connection so that it matches the Connection Name field in the
VPN Settings screen of the wireless modem router on LAN A. Choose connection
names that make sense to the people using and administering the VPN.
Note: In this example, the connection name used on the client side of the
VPN tunnel is togw_a, and it does not have to match the
RoadWarrior connection name used on the gateway side of the VPN
tunnel because connection names are irrelevant to how the VPN
tunnel functions.
b. Click the Security Policy subheading to view the Security Policy settings.
c. In the Select Phase 1 Negotiation Mode section of the screen, select the Main Mode
radio button.
4. Configure the VPN client identity.
In this step, you provide information about the remote VPN client PC. You have to provide
the pre-shared key that you configured in the wireless modem router and either a fixed IP
address or a fixed virtual IP address of the VPN client PC.
a. In the Network Security Policy list on the left side of the Security Policy Editor window,
click My Identity.
c. In the ID Type drop-down list, select IP Address. If you are using a virtual fixed IP
address, enter this address in the Internal Network IP Address field. Otherwise,
leave this field empty.
d. In the Internet Interface section of the screen, select the adapter that you use to
access the Internet. If you have a dial-up Internet account, in the Name list, select
PPP Adapter. If you have a dedicated cable or ADSL line, select your Ethernet
adapter. If you will be switching between adapters or if you have only one adapter,
select Any.
e. In the My Identity section of the screen, click the Pre-Shared Key button. The
Pre-Shared Key screen displays:
f. Click Enter Key. Enter the wireless modem router pre-shared key, and then click
OK. In this example, 12345678 is entered, though asterisks are displayed in the
field. This field is case-sensitive.
5. Configure the VPN client authentication proposal.
In this step, you provide the type of encryption (DES or 3DES) to be used for this
connection. This selection has to match your selection in the wireless modem router
configuration.
a. In the Network Security Policy list on the left side of the Security Policy Editor window,
expand the Security Policy heading by double-clicking its name or clicking the +
symbol.
b. Expand the Authentication subheading by double-clicking its name or clicking the +
symbol. Then select Proposal 1 below Authentication.
d. In the Encrypt Alg drop-down list, select the type of encryption that is configured for
the encryption protocol in the wireless modem router, as listed in Table 15 on
page 88. This example uses Triple DES.
e. In the Hash Alg drop-down list, select SHA-1.
f. In the SA Life drop-down list, select Unspecified.
g. In the Key Group drop-down list, select Diffie-Hellman Group 2.
6. Configure the VPN client key exchange proposal.
In this step, you provide the type of encryption (DES or 3DES) to be used for this
connection. This selection has to match your selection in the wireless modem router
configuration.
a. Expand the Key Exchange subheading by double-clicking its name or clicking the +
symbol. Then select Proposal 1 below Key Exchange.
To check the VPN connection, you can initiate a request from the remote PC to the
wireless modem router’s network by using the Connect option in the NETGEAR ProSafe
menu bar. The NETGEAR ProSafe client reports the results of the attempt to connect.
Since the remote PC has a dynamically assigned WAN IP address, it has to initiate the
request.
To perform a ping test using our example, start from the remote PC:
a. Establish an Internet connection from the PC.
b. On the Windows taskbar, click the Start button, and then select Run.
c. Type ping -t 192.168.3.1, and then click OK.
This causes a continuous ping to be sent to the first wireless modem router. After
between several seconds and 2 minutes, the ping response should change from
timed out to reply.
Once the connection is established, you can open a browser on the PC and enter the
LAN IP address of the remote gateway. After a short wait, you should see the login
screen of the wireless modem router (unless another PC is already logged in to the
wireless modem router).
You can view information about the progress and status of the VPN client connection by
opening the NETGEAR ProSafe Log Viewer.
To launch this function, click the Windows Start button, then select Programs >
NETGEAR ProSafe VPN Client > Log Viewer. The VPN Status/Log screen for a
successful connection is shown in the following figure:
Note: Use the active VPN tunnel information and pings to determine
whether a failed connection is due to the VPN tunnel or some reason
outside the VPN tunnel.
The Connection Monitor screen for this connection is shown in the following figure:
Note: This section describes how to use the VPN Wizard to set up the
VPN tunnel using the VPNC default parameters listed in Table 16 on
page 89. If you have special requirements not covered by these
VPNC-recommended parameters, see Set Up VPN Tunnels in
Special Circumstances on page 111 for information about how to set
up the VPN tunnel.
Follow this procedure to configure a gateway-to-gateway VPN tunnel using the VPN Wizard.
IP: 192.168.0.1 IP:192.168.3.1
VPN tunnel
14.15.16.17 22.23.24.25
Gateway A Gateway B
Internet
Set the LAN IPs on each wireless modem router to different subnets and configure each
correctly for the Internet. The subsequent examples assume the settings shown in the
following table.
Table 18. Gateway-to-gateway VPN tunnel configuration worksheet
VPN Endpoint Local IPSecID LAN IP Address Subnet Mask FQDN or Gateway
IP (WAN IP
Address)
2. Fill in the Connection Name and pre-shared key fields. Select the radio button for the type of
target endpoint, and click Next, and the Step 2 of 3 screen displays.
3. Fill in the IP address or FQDN for the target VPN endpoint WAN connection, and click Next.
and the Step 3 of 3 screen displays.
4. Fill in the IP Address and Subnet Mask fields for the target endpoint that can use this
tunnel, and click Next.
The VPN Wizard Summary screen displays:
Note: See Use Auto Policy to Configure VPN Tunnels on page 112 for
information about how to enable the IKE keep-alive capability on an
existing VPN tunnel.
6. Repeat these steps for the gateway on LAN B, and pay special attention to the following
network settings:
• WAN IP of the remote VPN gateway (for example, 14.15.16.17)
• LAN IP settings of the remote VPN gateway:
- IP address (for example, 192.168.0.1)
- Subnet mask (for example, 255.255.255.0)
- Pre-shared key (for example, 12345678)
7. Use the VPN Status screen to activate the VPN tunnel by performing the following steps:
Note: The VPN Status screen is only one of three ways to active a VPN
tunnel. See Activate a VPN Tunnel on page 105 for information
about the other ways.
a. On the wireless modem router menu, select VPN Status. The VPN Status/Log screen
displays:
b. Click the VPN Status button to display the Current VPN Tunnels (SAs) screen:
c. Click Connect for the VPN tunnel you want to activate. View the VPN Status/Log
screen to verify that the tunnel is connected.
Note: See Use Auto Policy to Configure VPN Tunnels on page 112 for
information about how to enable the IKE keep-alive capability on an
existing VPN tunnel.
2. On the main menu, select VPN Status. The VPN Status/Log screen displays:
3. Click VPN Status to display the Current VPN Tunnels (SAs) screen:
4. Click Connect for the VPN tunnel that you want to activate.
Note: This section uses 192.168.3.1 for a sample remote endpoint LAN IP
address.
To activate the VPN tunnel by pinging the remote endpoint (for example, 192.168.3.1),
perform the following steps depending on whether your configuration is client-to-gateway or
gateway-to-gateway:
• Client-to-gateway configuration. To check the VPN connection, you can initiate a
request from the remote PC to the N600 Wireless Dual Band Gigabit ADSL2+ Modem
Router DGND3700’s network by using the Connect option in the NETGEAR ProSafe
menu bar. The NETGEAR ProSafe client reports the results of the attempt to connect.
Since the remote PC has a dynamically assigned WAN IP address, it has to initiate the
request.
To perform a ping test using our example, start from the remote PC:
a. Establish an Internet connection from the PC.
b. On the Windows taskbar, click the Start button, and then select Run.
c. Type ping -t 192.168.3.1, and then click OK.
This causes a continuous ping to be sent to the first N600 Wireless Dual Band Gigabit
ADSL2+ Modem Router DGND3700. Within 2 minutes, the ping response should
change from timed out to reply.
Once the connection is established, you can open a browser on the PC and enter the
LAN IP address of the remote N600 Wireless Dual Band Gigabit ADSL2+ Modem Router
DGND3700. After a short wait, you should see the login screen of the wireless modem
router (unless another PC already has the N600 Wireless Dual Band Gigabit ADSL2+
Modem Router DGND3700 management interface open).
• Gateway-to-gateway configuration. Test the VPN tunnel by pinging the remote network
from a PC attached to Gateway A (the wireless modem router).
a. Open a command prompt (for example, Start > Run > cmd).
b. Type ping 192.168.3.1.
Note: The pings might fail the first time. If they do, then try the pings a
second time.
This log shows the details of recent VPN activity, including the building of the VPN tunnel.
If there is a problem with the VPN tunnel, refer to the log for information about what might
be the cause of the problem.
• Click Refresh to see the most recent entries.
• Click Clear Log to delete all log entries.
3. On the VPN Status/Log screen, click VPN Status to display the Current VPN Tunnels (SAs)
screen.
This table lists the following data for each active VPN tunnel.
• SPI. Each SA has a unique SPI (security parameter index) for traffic in each direction.
For manual key exchange, the SPI is specified in the policy definition. For automatic
key exchange, the SPI is generated by the IKE protocol.
• Policy Name. The VPN policy associated with this SA.
• Remote Endpoint. The IP address on the remote VPN endpoint.
• Action. Either a Drop or a Connect button.
• SLifeTime (Secs). The remaining soft lifetime for this security association (SA) in
seconds. When the soft lifetime becomes 0 (zero), the SA is renegotiated.
• HLifeTime (Secs). The remaining hard lifetime for this SA in seconds. When the hard
lifetime becomes 0 (zero), the SA is terminated. (It is reestablished if required.)
Use the Policy Table on the VPN Policies Screen to Deactivate a VPN Tunnel
To deactivate a VPN tunnel:
1. Log in to the wireless modem router.
2. On the main menu, select VPN Policies to display the VPN Policies screen:
3. In the Policy Table, clear the Enable check box for the VPN tunnel that you want to
deactivate, and then click Apply. (To reactivate the tunnel, select the Enable check box, and
then click Apply.)
3. Click VPN Status. The Current VPN Tunnels (SAs) screen displays:
4. Click Drop for the VPN tunnel that you want to deactivate.
parameters. You have more control over the process; however, the process is more
complex, and there are more opportunities for errors or configuration mismatches
between your N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700 and
the corresponding VPN endpoint gateway or client workstation.
The DGND3700 VPN tunnel network connection fields are defined in the following table.
Table 19. VPN - Auto Policy screen settings
General Policy Name Enter a unique name. This name is not supplied to the remote VPN
endpoint. It is used only to help you manage the policies.
Remote VPN • The remote VPN endpoint has to have this VPN’s gateway address
Endpoint entered as its remote VPN endpoint.
• If the remote endpoint has a dynamic IP address, select Dynamic IP
Address. No address data input is required. You can set up multiple
remote dynamic IP policies, but only one such policy can be enabled
at a time. Otherwise, select an option (IP address or domain name)
and enter the address of the remote VPN endpoint to which you want
to connect.
IKE Keep Alive • If you want to ensure that a connection is kept open, or, if that is not
possible, that it is quickly reestablished when disconnected, select
this check box.
• The ping IP address has to be associated with the remote endpoint.
The remote LAN address has to be used. This IP address will be
pinged periodically to generate traffic for the VPN tunnel. The remote
keep-alive IP address has to be covered by the remote LAN IP range
and has to correspond to a device that can respond to ping. The
range should be made as narrow as possible to meet this objective.
The remote VPN Single/Start IP • Enter the IP address for a single address, or the starting address for
endpoint has to Address an address range. A single address setting is used when you want to
have these IP make a single server on your LAN available to remote users. A range
addresses entered must be an address range used on your LAN.
as its remote • Any. The remote VPN endpoint can be at any IP address.
addresses.
Finish IP Address For an address range, enter the finish IP address. This must be an
address range used on your LAN.
Remote LAN IP Address Single PC - no Subnet. Select this option if there is no LAN (only a
single PC) at the remote endpoint. If this option is selected, no
The remote VPN additional data is required. The typical application is a PC running the
endpoint has to VPN client at the remote end.
have these IP
addresses entered Single/Start IP • Enter an IP address that is on the remote LAN. You can use this
as its local Address setting when you want to access a server on the remote LAN.
addresses. • For a range of addresses, enter the starting IP address. This has to
be an address range used on the remote LAN.
• Any. Any outgoing traffic from the computers in the Local IP fields
triggers an attempted VPN connection to the remote VPN endpoint.
Be sure you want this option before selecting it.
Finish IP Address Enter the finish IP address for a range of addresses. This has to be an
address range used on the remote LAN.
IKE Direction This setting is used when the router determines if the IKE policy
matches the current traffic. Select an option.
• Responder only. Incoming connections are allowed, but outgoing
connections are blocked.
• Initiator and Responder. Both incoming and outgoing connections
are allowed.
Exchange Mode Ensure that the remote VPN endpoint is set to use Main Mode.
Diffie-Hellman The Diffie-Hellman algorithm is used when keys are exchanged. The
(DH) Group DH Group setting determines the bit size used in the exchange. This
value has to match the value used on the remote VPN gateway.
Local Identity Type Select an option to match the Remote Identity Type setting on the
remote VPN endpoint.
• WAN IP Address. Your Internet IP address.
• Fully Qualified Domain Name. Your domain name.
• Fully Qualified User Name. Your name, email address, or other ID.
Local Identity Data Enter the data for the local identity type that you selected. (If WAN IP
Address is selected, no input is required.)
Remote Identity Select the option that matches the Local Identity Type setting on the
Type remote VPN endpoint.
• IP Address. The Internet IP address of the remote VPN endpoint.
• Fully Qualified Domain Name. The domain name of the remote
VPN endpoint.
• Fully Qualified User Name. The name, email address, or other ID of
the remote VPN endpoint.
Remote Identity Enter the data for the remote identity type that you selected. If IP
Data Address is selected, no input is required.
Parameters Encryption The encryption algorithm used for both IKE and IPSec. This setting has
Algorithm to match the setting used on the remote VPN gateway. DES and 3DES
are supported.
• DES. The Data Encryption Standard (DES) processes input data that
is 64 bits wide, encrypting these values using a 56-bit key. Faster but
less secure than 3DES.
• 3DES. (Triple DES) achieves a higher level of security by encrypting
the data three times using DES with three different, unrelated keys.
Authentication The authentication algorithm used for both IKE and IPSec. This setting
Algorithm must match the setting used on the remote VPN gateway. Auto, MD5,
and SHA-1 are supported. Auto negotiates with the remote VPN
endpoint and is not available in responder-only mode.
• MD5. 128 bits, faster but less secure.
• SHA-1. 160 bits, slower but more secure. This is the default.
Pre-shared Key The key has to be entered both here and on the remote VPN gateway.
Parameters SA Life Time The time interval before the SA (security association) expires. (It is
(Continued) automatically reestablished as required.) While using a short time
period (or data amount) increases security, it also degrades
performance. It is common to use periods over an hour (3600 seconds)
for the SA life-time. This setting applies to both IKE and IPSec SAs.
Enable IPSec PFS • If this check box is selected, security is enhanced by ensuring that
(Perfect Forward the key is changed at regular intervals. Also, even if one key is
Secrecy) broken, subsequent keys are no easier to break. (Each key has no
relationship to the previous key.)
• This setting applies to both IKE and IPSec SAs. When configuring
the remote endpoint to match this setting, you might have to specify
the key group used. For this device, the key group is the same as the
DH Group setting in the IKE section.
General Policy Name Enter a unique name to identify this policy. This name is not supplied to
the remote VPN endpoint. It is used only to help you manage the
policies.
Remote VPN • The remote VPN endpoint has to have this VPN gateway’s address
Endpoint entered as its remote VPN endpoint.
• If the remote endpoint has a dynamic IP address, select Dynamic IP
address. No address data input is required. You can set up multiple
remote dynamic IP policies, but only one such policy can be enabled
at a time. Otherwise, select an option (IP address or domain name)
and enter the address of the remote VPN endpoint to which you want
to connect.
IKE Keep Alive • If you want to ensure that a connection is kept open, or, if that is not
possible, that it is quickly reestablished when disconnected, select
this check box.
• The ping IP address has to be associated with the remote endpoint.
The remote LAN address has to be used. This IP address will be
pinged periodically to generate traffic for the VPN tunnel. The remote
keep-alive IP address has to be covered by the remote LAN IP range
and has to correspond to a device that can respond to ping. The
range should be made as narrow as possible to meet this objective.
Gateway A Gateway B
Internet
Figure 46.
VPN Endpoint Local IPSecID LAN IP Address Subnet Mask FQDN or Gateway
IP (WAN IP Address
1. Set the LAN IPs on each wireless modem router to different subnets and configure each
correctly for the Internet. On the main menu, select VPN Policies and click the Add
Auto Policy button.
Remote LAN IP Address Select Subnet address from the drop-down list.
4. Repeat these steps for the N600 Wireless Dual Band Gigabit ADSL2+ Modem Router
DGND3700 on LAN B. Pay special attention to the following network settings:
• General, Remote Address Data (for example, 14.15.16.17)
• Remote LAN, Start IP Address
- IP Address (for example, 192.168.0.1)
- Subnet Mask (for example, 255.255.255.0)
- Pre-shared Key (for example, 12345678)
5. Use the VPN Status screen to activate the VPN tunnel:
Note: The VPN Status screen is only one of three ways to active a VPN
tunnel. See Activate a VPN Tunnel on page 105 for information
about the other ways.
a. From the main menu, select VPN Status to display the VPN Status/Log screen. Then
click VPN Status to display the Current VPN Tunnels (SAs) screen:
b. Click Connect for the VPN tunnel that you want to activate. Review the VPN
Status/Log screen (Figure a on page 104) to verify that the tunnel is connected.
On the main menu, select VPN Policies, and then click the Add Manual Policy radio button
to display the VPN - Manual Policy screen:
The following table explains the fields in the VPN - Manual Policy screen.
Table 21. VPN Manual Policy fields and settings
The remote VPN Single PC - no Select this option if there is no LAN (only a single PC) at the
endpoint has to have Subnet remote endpoint. If this option is selected, no additional data is
these IP addresses required.
entered as its remote
Single/Start IP • The IP address for a single address, or the starting address for
addresses.
Address an address range used on the LAN. If you want to make a single
server on your LAN available to remote users, use a single
address settings.
• Any. The remote VPN endpoint can be at any IP address.
Finish IP For an address range, enter the finish IP address. This has to be
Address an address range used on your LAN.
Remote LAN IP Address IP Address Single PC - no Subnet. Select this option if there is no LAN (only
a single PC) at the remote endpoint. If this option is selected, no
The remote VPN additional data is required. The typical application is a PC running
endpoint has to have the VPN client at the remote end.
these IP addresses
entered as its local Single/Start IP • Enter an IP address on the remote LAN. You can use this setting
addresses. Address to access a server.
• For a range of addresses, enter the starting IP address. This has
to be an address range used on the remote LAN.
• Any. Any outgoing traffic from specified Local IP computers
triggers an attempted VPN connection to the remote VPN
endpoint. Be sure you want this option before selecting it.
Finish IP Enter the finish IP address for a range of addresses. This must be
Address an address range used on the remote LAN.
ESP Configuration SPI Enter the required security policy indexes (SPIs). Each policy has
to have unique SPIs. These settings have to match the remote
ESP (encapsulating VPN endpoint. The in setting here has to match the out setting on
security payload) the remote VPN endpoint, and the out setting here has to match
provides security for the the in setting on the remote VPN endpoint.
payload (data) sent
through the VPN tunnel. Encryption Select an encryption algorithm, and enter the key in the field
provided. For 3DES, the keys should be 24 ASCII characters, and
for DES, the keys should be 8 ASCII characters.
• DES. The Data Encryption Standard (DES) processes input data
that is 64 bits wide, encrypting these values using a 56-bit key.
Faster but less secure than 3DES.
• 3DES. (Triple DES) achieves a higher level of security by
encrypting the data three times using DES with three different,
unrelated keys.
122
WAN Setup
Select Advanced > WAN Setup to display the following screen:
WAN Preference
Configure whether the wireless modem router uses only one WAN port exclusively (either
ADSL WAN or Ethernet WAN) or detects automatically the WAN port to use.
Note: For security reasons, you should avoid using the default DMZ server
feature. When a computer is designated as the default DMZ server,
it loses much of the protection of the firewall and is exposed to many
exploits from the Internet. If compromised, the computer can be
used to attack your network.
Advanced Settings
123
Incoming traffic from the Internet is usually discarded by the wireless modem router unless
the traffic is a response to one of your local computers or a service that you have configured
in the Ports screen. Instead of discarding this traffic, you can have it forwarded to one
computer on your network. This computer is called the default DMZ server.
To assign a computer or server to be a default DMZ server:
1. In the WAN Setup screen, select the Default DMZ Server check box.
NAT Filtering
This option determines how the router deals with inbound traffic. The Secured option
provides a secured firewall to protect the PCs on LAN from attacks from the Internet, but it
might cause some Internet games, point-to-point applications, and multimedia applications
no work. The Open option, on the other hand, provides a much less secured firewall, while it
allows almost all Internet applications to work.
Advanced Settings
124
Dynamic DNS
If your network has a permanently assigned IP address, you can register a domain name and
have that name linked with your IP address by public Domain Name Servers (DNS).
However, if your Internet account uses a dynamically assigned IP address, you do not know
in advance what your IP address is, and the address can change frequently. In this case, use
a commercial Dynamic DNS service that lets you register your domain to its IP address and
forwards traffic directed at your domain to your frequently changing IP address.
The router has a client that can connect to a Dynamic DNS service provider. Once you have
configured your ISP account information in the router, whenever your ISP-assigned IP
address changes, your router contacts your Dynamic DNS service provider, logs in to your
account, and registers your new IP address.
To enable dynamic DNS:
1. Select Advanced > Dynamic DNS to display the following screen.
2. Access the website of one of the Dynamic DNS service providers whose names appear in
the Service Provider drop-down list, and register for an account. For example, for
dyndns.org, go to www.dyndns.org.
3. Select the Use a Dynamic DNS Service check box.
4. Select the name of your Dynamic DNS service provider.
5. Type the host name that your Dynamic DNS service provider gave you. The Dynamic DNS
service provider might call this the domain name. If your URL is myName.dyndns.org, then
your host name is myName.
6. Type the user name for your Dynamic DNS account.
7. Type the password (or key) for your Dynamic DNS account.
Advanced Settings
125
8. If your Dynamic DNS provider allows the use of wildcards in resolving your URL, you can
select the Use Wildcards check box to activate this feature. For example, the wildcard
feature causes *.yourhost.dyndns.org to be aliased to the same IP address as
yourhost.dyndns.org.
9. Click Apply to save your settings.
LAN Setup
The LAN Setup screen allows configuration of LAN IP services such as DHCP and Routing
Information Protocol (RIP). The wireless modem router is shipped preconfigured to use
private IP addresses on the LAN side and to act as a DHCP server. The wireless modem
router’s default LAN IP configuration is as follows:
• LAN IP address. 192.168.0.1
• Subnet mask. 255.255.255.0
These addresses are part of the private address range designated by the Internet
Engineering Task Force (IETF http://www.ietf.org/) for use in private networks, and should be
suitable in most applications. If your network has a requirement to use a different IP
addressing scheme, you can make those changes in the LAN IP Setup screen.
Note: If you change the LAN IP address of the wireless modem router
while connected through the browser, you are disconnected. To
reconnect, open a new connection to the new IP address and log in.
Advanced Settings
126
To set up a LAN:
1. Select Advanced > LAN Setup.
2. Enter the LAN Setup configuration and click Apply to save your changes.
Note: The default DHCP and TCP/IP values work for most users.
• Device Name. This is an abbreviated name of the wireless modem router. You see
this name for the router in Network Explorer on Windows systems.
• Use Auto IP. Select this check box if you want the wireless modem router to set up
the LAN IP addresses automatically.
• IP Address. The LAN IP address of the wireless modem router.
• IP Subnet Mask. The LAN subnet mask of the wireless modem router. Combined
with the IP address, the IP subnet mask allows a device to know which other
addresses are local to it, and which have to be reached through a gateway or wireless
modem router.
• Use Router as DHCP Server. By default, the wireless modem router functions as a
Dynamic Host Configuration Protocol (DHCP) server, allowing it to assign IP, DNS
server, and default gateway addresses to all computers connected to the wireless
modem router’s LAN. The assigned default gateway address is the LAN address of
the router. IP addresses are assigned to the attached PCs from a pool of addresses
specified in this screen. Each pool address is tested before it is assigned to avoid
duplicate addresses on the LAN.
For most applications, the default DHCP and TCP/IP settings of the router are
satisfactory.
• Reserved IP Addresses Setup. When you specify a reserved IP address for a
computer on the LAN, that computer always receives the same IP address each time
it accesses the router’s DHCP server. Reserved IP addresses should be assigned to
servers that require permanent IP settings.
Advanced Settings
127
To reserve an IP address:
1. Select Advanced > LAN Setup and click the Add button.
2. In the IP Address field, type the IP address to assign to the computer or server. Choose an
IP address from the router’s LAN subnet, such as 192.168.0.x.
3. Type the MAC address of the computer or server.
Tip: If the computer is already present on your network, copy its MAC
address from the Attached Devices screen and paste it here.
Note: The reserved address is not assigned until the next time the
computer contacts the router’s DHCP server. Reboot the computer
or access its IP configuration to force a DHCP release and renew.
Advanced Settings
128
2. Click Setup QoS rule. The QoS Priority Rule list displays:
Advanced Settings
129
5. To edit a rule, click Edit. To add a custom rule, click Add Priority Rule.
6. Click Apply to save this rule to the QoS Policy list and return to the QoS Setup screen.
7. In the QoS Setup screen, click Apply.
Note: The WPS Settings section is not displayed if you selected WEP as
the security option.
2. If you make changes, click Apply. Note that the WLAN settings come from the settings you
made in the Wireless Settings Screen on page 42.
Advanced Settings
130
Note: The wireless router is already configured with the optimum settings.
Do not alter these settings unless directed by NETGEAR support.
Incorrect settings might disable the wireless router unexpectedly.
WPS Settings
Router’s PIN. The PIN number that you use on a registrar (for example, from the Network
Explorer on a Vista Windows PC) to configure the wireless modem router’s wireless settings
through WPS. You can also find the PIN on the wireless modem router’s product label.
Disable Router’s PIN. The PIN function might temporarily be disabled when the wireless
modem router detects suspicious attempts to break into the wireless modem router’s wireless
settings by using the wireless modem router’s PIN through WPS. You can manually enable
the PIN function by clearing the Disable Router’s PIN check box.
Keep Existing Wireless Settings. By default, the Keep Existing Wireless Settings check
box is selected. This shows whether the router is in the WPS configured state.
If the Keep Existing Wireless Settings check box is not selected, adding a new wireless client
changes the router’s wireless settings to an automatically generated random SSID and
security key. NETGEAR does not recommend this. In addition, if this option is selected, some
external registrars (e.g., Network Explorer on Vista Windows) might not see the router.
Configuring the basic wireless settings from the router’s management interface selects this
option automatically.
Wireless Card Access List. By default, any wireless PC that is configured with the correct
SSID is allowed access to your wireless network. For increased security, you can restrict
access to the wireless network to allow only specific PCs based on their MAC addresses. On
Advanced Settings
131
the Wireless Settings screen, select Setup Access List to display the Wireless Access List
screen.
Note: The wireless bridging and repeating feature uses the default
security profile to send and receive traffic.
Advanced Settings
132
To view or change these configurations, from the main menu, select Wireless Repeating
Function:
Enable Wireless Repeating. Select this if you wish to use either bridge mode or repeater
mode, and then select the mode you want for your environment.
Wireless Repeater. In this mode, the router communicates only with another base
station–mode wireless station. You have to enter the MAC address (physical address) of the
other base station–mode wireless station in the field provided. WEP can (and should) be
used to protect this communication.
Wireless Base Station. Select this only if this router is the master for a group of
repeater-mode wireless stations. The other repeater-mode wireless stations have to be set to
wireless repeater mode, using this router’s MAC address. They then send all traffic to this
master, rather than communicating directly with each other. WEP can (and should) be used
to protect this traffic.
If this option is selected, you have to enter the MAC addresses of the other access points in
the fields provided.
Advanced Settings
133
other bridge-mode wireless station in the field provided. Use wireless security to protect this
communication. The following figure shows an example of point-to-point bridge mode.
Both access points (APs) are in
point-to-point bridge mode.
AP 2
Internet
Multi-Point Bridge
Multi-point bridge mode allows a router to bridge to multiple peer access points
simultaneously. Wireless client associations are disabled. Only wired clients can be
connected. Multi-point bridge mode configuration includes the following steps:
• Enter the MAC addresses of the other access points in the fields provided.
• Set the other bridge-mode access points to point-to-point bridge mode, using the MAC
address of this DGND3700 as the remote MAC address.
• Use wireless security to protect this traffic.
Advanced Settings
134
Point-to-point
bridge mode
DGND3700 AP 3
AP 1
Point-to-point
bridge mode
Internet
192.168.0.1
LAN Segment 1
PCs
LAN Segment 3
Hub or switch
Advanced Settings
135
• All APs, including the DGND3700 wireless modem router, have to use the same
SSID, channel, authentication mode, if any, and WEP security settings if security is in
use.
• All point-to-point APs have to have the MAC address of AP 1 (the DGND3700
wireless modem router in the previous figure) in the Remote AP MAC address field.
4. Verify connectivity across the LANs. A computer on any LAN segment should be able to
connect to the Internet or share files and printers with any other PCs or servers connected to
any of the three LAN segments.
Advanced Settings
136
Wireless PC
associated
with AP 1
Wireless PC
associated
with AP 2
DGND3700
AP 2 in repeater mode
Internet Wireless PC
192.168.0.1 associated
with AP 3
PCs
Remote Management
The Remote Management screen lets you allow a user or users on the Internet to configure,
upgrade, and check the status of your wireless modem router.
Advanced Settings
137
Advanced Settings
138
Static Routes
Static routes provide additional routing information to your router. Under normal
circumstances, the router has adequate routing information after it has been configured for
Internet access, and you do not need to configure additional static routes. You have to
configure static routes only for unusual cases such as multiple routers or multiple IP subnets
located on your network.
Advanced Settings
139
b. In the Route Name field, enter a route name for this static route. This name is for
identification purpose only.
c. Select Private if you want to limit access to the LAN only. The static route will not be
reported in RIP.
d. Select Active to make this route effective.
e. Enter the IP address of the final destination.
f. Enter the IP subnet mask for this destination. If the destination is a single host, type
255.255.255.255.
g. Enter the gateway IP address, which has to be a router on the same LAN segment
as the router.
h. In the Metric field, enter a number between 2 and 15 as the metric value. This
represents the number of routers between your network and the destination. Usually,
a setting of 2 or 3 works.
Advanced Settings
140
3. Click Apply to save your changes. The Static Routes table is updated to show the new
entry.
Advanced Settings
141
(internal and external) that device has opened. The UPnP Portmap Table also
displays what type of port is opened and if that port is still active for each IP address.
3. To save, cancel your changes, or refresh the table:
• To save the new settings to the wireless modem router, click Apply.
• To disregard any unsaved changes, click Cancel.
• To update the portmap table and to show the active ports that are currently opened by
UPnP devices, click Refresh.
For more information about USB settings, see Chapter 6, USB Storage.
Advanced Settings
142
Traffic Meter
Traffic metering allows you to monitor the volume of Internet traffic passing through your
wireless modem router’s Internet port. With the Traffic Meter utility, you can set limits for
traffic volume, set a monthly limit, and get a live update of traffic usage.
To monitor traffic on your router:
1. Under Advanced on the main menu, select Traffic Meter.
2. To enable the Traffic Meter, select the Enable Traffic Meter check box.
Advanced Settings
143
3. If you would like to record and restrict the volume of Internet traffic, select the Traffic
volume control by radio button. You can select one of the following options for controlling
the traffic volume:
• No Limit. No restriction is applied when the traffic limit is reached.
• Download only. The restriction is applied to incoming traffic only.
• Both Directions. The restriction is applied to both incoming and outgoing traffic.
4. You can limit the amount of data traffic allowed per month:
• By specifying how many Mbytes per month are allowed.
• By specifying how many hours of traffic are allowed.
5. Set the Traffic Counter to begin at a specific time and date.
6. Set up Traffic Control to issue a warning message before the monthly limit of Mbytes or
hours is reached. You can select one of the following to occur when the limit is attained:
• The Internet LED flashes green or amber.
• The Internet connection is disconnected and disabled.
7. Set up Internet Traffic Statistics to monitor the data traffic.
8. Click the Traffic Status button if you want a live update on Internet traffic status on your
router.
9. Click Apply to save your settings.
Advanced Settings
144
145
Router Not On
When you turn the power on, the Power, LAN, Wireless, DSL, and Internet LEDs should light
as described here. If they do not, refer to the sections that follow for help.
1. When power is first applied, the Power LED lights.
2. After approximately 10 seconds, other LEDs light as follows:
a. The LAN ports LED lights when any local port is connected.
b. The 2.4 GHz and 5 GHz Wireless LEDs light.
c. The DSL LED lights when there is a link through the ADSL phone lines.
d. The Internet LED lights to indicate a connection to the ISP.
USB port
Internet
DSL
5 GHZ Wireless
2.4 GHz Wireless
USB
LAN ports
Power
Troubleshooting
146
If the error persists, you could have a hardware problem and should contact NETGEAR
technical support.
Troubleshooting
147
No ISP Connection
If your router cannot access the Internet, first check the ADSL connection, and then check
the WAN TCP/IP connections. See Figure 60, Front panel LEDs on page 146 for the location
of the LEDs.
ADSL Link
First determine whether you have an ADSL link with the service provider. The state of this
connection is indicated by the DSL LED.
Troubleshooting
148
Troubleshooting
149
Note: Unless you connect manually, the wireless modem router does not
authenticate with PPPoE or PPPoA until data is transmitted to the
network.
Troubleshooting
150
Troubleshooting
151
Cannot Log In
If you cannot log in to the wireless modem router from a computer on your local network,
check the following:
• The router is plugged in and it is on.
• You are using the correct login information. The login name is admin, and the password
is password. Make sure that Caps Lock is off when you enter this information.
• If you cannot connect wirelessly, try an Ethernet connection and view the router wireless
settings and set up your wireless computer with corresponding wireless settings.
• If you are using an Ethernet-connected computer, check the Ethernet connection
between the computer and the router. The LAN LED for the port you are using on the
router should light up to show your connection.
• Your computer’s IP address is on the same subnet as the router. If you are using the
recommended addressing scheme, your computer’s address should be in the range
192.168.0.2 to 192.168.0.254.
• If the computer IP address is 169.254.x.x, recent versions of Windows and Mac OS
generate and assign an IP address when the computer cannot reach a DHCP server. The
Troubleshooting
152
autogenerated addresses are in the range 169.254.x.x. If your IP address is in this range,
check the connection from the computer to the router and reboot your computer.
• If your router’s IP address was changed and you do not know the current IP address,
clear the router’s configuration to factory defaults as explained in Factory Settings on
page 156. This sets the router’s IP address to 192.168.0.1.
• Make sure that your browser has Java, JavaScript, or ActiveX enabled. If you are using
Internet Explorer, click Refresh to be sure that the Java applet is loaded.
• Try closing the browser and relaunching it.
Troubleshooting
153
Troubleshooting
154
This appendix includes the factory default settings and technical specifications for the
N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700, and
instructions for wall-mounting the unit.
A
This appendix contains the following sections:
• Factory Settings
• Technical Specifications
155
Factory Settings
You can return the wireless modem router to its factory settings. On the bottom of the
wireless modem router, use the end of a paper clip or some other similar object to press and
hold the Restore Factory Settings button for at least 7 seconds. The wireless modem
router resets and returns to the factory settings. Your device will return to the factory
configuration settings shown in the following table.
Table 22. Factory settings description
Router Login
Internet Connection
Lan IP 192.168.0.1
DMZ Disabled
SNMP Disabled
Supplemental Information
156
Firewall
Inbound (communications coming in from Disabled (except traffic on port 80, the HTTP port)
the Internet)
Wireless
RF Channel Auto
1. Maximum wireless signal rate derived from IEEE Standard 802.11 specifications. Actual throughput will
vary. Network conditions and environmental factors, including volume of network traffic, building materials
and construction, and network overhead, lower actual data throughput rate.
Supplemental Information
157
Technical Specifications
Data and routing protocols: TCP/IP, RIP-1, RIP-2, DHCP, PPPoE or PPPoA, RFC 1483 Bridged
or Routed Ethernet, and RFC 1577 Classical IP over ATM
Power Adapter
Physical
Environmental
Regulatory Compliance
Meets requirements of FCC Part 15 Class B; VCCI Class B; EN 55 022 (CISPR 22), Class B
Interface Specifications
Supplemental Information
158
Configuration Profile
The configuration in this appendix follows the addressing and configuration mechanics
defined by the VPN Consortium. Gather necessary information before you begin
configuration. Verify that the firmware is up to date, and that you have all the addresses and
parameters to be set on both sides. Check that there are no firewall restrictions.
Table 24. Wireless modem router to Gateway B profile summary
IP addressing:
159
10.506.0/24 172.23.9.0/24
Gateway A
(DGND3700)
Gateway B
Internet
LAN IP WAN IP LAN IP
WAN IP
10.5.6.1 14.15.16.17 172.23.9.1
22.23.24.25
Step-by-Step Configuration
To configure a VPN tunnel:
1. Use the VPN Wizard to configure Gateway A (DGND3700) for a gateway-to-gateway
tunnel (see Set Up a Gateway-to-Gateway VPN Configuration on page 101), being
certain to use appropriate network addresses for the environment.
The LAN addresses used in this example are as follows:
3. On the Gateway B router menu, under VPN, select IKE Policies, and click the Edit button
to display the IKE Policy Configuration screen:
toGW_A
22.23.24.25
14.15.16.17
4. On Gateway B router menu, under VPN, select VPN Policies, and click the Edit button to
display the VPN - Auto Policy screen:
toGW_A
toGW_A
toGW_A
toGW_A
14.15.16.17
172 23 9 1
10 5 6
5. Test the VPN tunnel by pinging the remote network from a PC attached to Gateway A
(wireless modem router).
a. Open the command prompt (select Start > Run > cmd).
If the pings fail the first time, try the pings a second time.
Configuration Profile
The configuration in this section follows the addressing and configuration mechanics defined
by the VPN Consortium. Gather the necessary information before you begin configuration.
Verify that the firmware is up to date, and that you have all the addresses and parameters to
be set on both sides. Check that there are no firewall restrictions.
10.506.0/24 172.23.9.0/24
Gateway A
(DGND3700)
Gateway B
Internet
LAN IP WAN IP LAN IP
WAN IP
10.5.6.1 example.org 172.23.9.1
example2.org
(FQDN) (FQDN)
Table 25. Wireless modem router with FQDN to Gateway B profile summary
IP addressing:
Table 25. Wireless modem router with FQDN to Gateway B profile summary (continued)
NETGEAR-Gateway B FQDN
Step-by-Step Configuration
To configure a VPN tunnel:
1. Log in to Gateway A (your wireless modem router) as described in Log In to the N600
Modem Router on page 24.
This example assumes that you have set the local LAN address as 10.5.6.1 for Gateway
A and have set your own password.
2. On Gateway A, configure the Dynamic DNS settings.
c. Fill in the fields with the account and host name settings.
• In the Host and Domain Name field, enter fvl328.dyndns.org.
• In the User Name field, enter the account user name.
• In the Password field, enter the account password.
d. Click Apply.
4. Configure the N600 Wireless Dual Band Gigabit ADSL2+ Modem Router DGND3700 as in
the gateway-to-gateway procedures using the VPN Wizard (see Set Up a
Gateway-to-Gateway VPN Configuration on page 101), being certain to use appropriate
network addresses for the environment.
If the pings fail the first time, try the pings a second time.
Verify that the firmware is up to date, and make sure you have all the addresses and
parameters to be set on both sides. Assure that there are no firewall restrictions.
Table 27. Configuration summary (telecommuter example)
IP addressing:
Client Dynamic
192.168.0.1/24
Gateway A
(main office)
Gateway B Client PC
(regional office)
LAN IP WAN IP WAN IP
Internet
192.168.0.1 FQDN 0.0.0.0
ntgr.dyndns.org “toGW_A” IP: 192.168.2.3
“from_GW_A” (running NETGEAR
ProSafe VPN client)
2. Click Apply when you are finished to display the VPN Policies screen.
To view or modify the tunnel settings, select the radio button next to the tunnel entry, and then
click Edit.
Note: Before installing the software, be sure to turn off any virus protection
or firewall software you might be running on your PC.
Note: In this example, the connection name on the client side of the VPN
tunnel is toGW_A. It does not have to match the VPN_client connection name
used on the gateway side of the VPN tunnel because connection names do not
affect how the VPN tunnel functions.
toGW_A
a. In the Network Security Policy list, expand the new connection by double-clicking its
name or clicking the + symbol. My Identity and Security Policy appear below the
connection name.
b. Click Security Policy to show the Security Policy screen.
c. In the Select Phase 1 Negotiation Mode group, select the Main Mode radio button.
4. Configure the VPN client identity.
In this step, you provide information about the remote VPN client PC. You have to provide
the pre-shared key that you configured in the wireless modem router and either a fixed IP
address or a fixed virtual IP address of the VPN client PC.
a. In the Network Security Policy list on the left side of the Security Policy Editor window,
click My Identity.
To check the VPN connection, you can initiate a request from the remote PC to the VPN
router’s network by using the Connect option in the wireless modem router screen:
Since the remote PC has a dynamically assigned WAN IP address, it has to initiate the
request.
a. Right-click the system tray icon to open the pop-up menu.
b. Select Connect to open the My Connections list.
c. Select toDGND3300v2.
The wireless modem router reports the results of the attempt to connect. Once the
connection is established, you can access resources of the network connected to the
VPN router.
To perform a ping test using this example, start from the remote PC:
a. Establish an Internet connection from the PC.
b. On the Windows taskbar, click the Start button, and then select Run.
c. Type ping -t 192.168.0.1, and then click OK.
This causes a continuous ping to be sent to the VPN router. Within 2 minutes, the ping
response should change from timed out to reply.
Once the connection is established, you can open the browser on the PC and enter the LAN
IP address of the VPN router. After a short wait, you should see the login screen of the VPN
router (unless another PC already has the VPN router management interface open).
Note: You can use the VPN router diagnostics to test the VPN connection
from the VPN router to the client PC. To do this, on the wireless
modem router main menu, select Diagnostics.
Note: Use the active VPN tunnel information and pings to determine
whether a failed connection is due to the VPN tunnel or some
reason outside the VPN tunnel.
While the connection is being established, the connection name listed in this screen shows
SA before the name of the connection. When the connection is successful, the SA changes
to the yellow key symbol.
N ETGE A R D ua l B a nd - Wi reles s C
Regulatory Compliance Information
This section includes user requirements for operating this product in accordance with National laws for usage of radio
spectrum and operation of radio devices. Failure of the end-user to comply with the applicable requirements may
result in unlawful operation and adverse action against the end-user by the applicable National regulatory authority.
Note: Note: This product's firmware limits operation to only the channels allowed in a particular Region or Country.
Therefore, all options described in this user's guide may not be available in your version of the product.
Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the
European Union (1999/5/EC). This equipment meets the following conformance standards:
EN300 328 (2.4Ghz), EN301 489-17, EN301 893 (5Ghz), EN60950-1
For complete DoC please visit the NETGEAR EU Declarations of Conformity website at:
http://support.netgear.com/app/answers/detail/a_id/11621/
Language Statement
Cesky [Czech] NETGEAR Inc. tímto prohlašuje, že tento Radiolan je ve shode se základními požadavky
a dalšími príslušnými ustanoveními smernice 1999/5/ES.
Dansk [Danish] Undertegnede NETGEAR Inc. erklærer herved, at følgende udstyr Radiolan overholder de
væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Deutsch Hiermit erklärt NETGEAR Inc., dass sich das Gerät Radiolan in Übereinstimmung mit den
[German] grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
Eesti [Estonian] Käesolevaga kinnitab NETGEAR Inc. seadme Radiolan vastavust direktiivi 1999/5/EÜ
põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele.
English Hereby, NETGEAR Inc., declares that this Radiolan is in compliance with the essential
requirements and other relevant provisions of Directive 1999/5/EC.
177
Español [Spanish] Por medio de la presente NETGEAR Inc. declara que el Radiolan cumple con los
requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
Ελληνική [Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ NETGEAR Inc. ∆ΗΛΩΝΕΙ ΟΤΙ Radiolan ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ
ΤΙΣ ΟΥΣΙΩ∆ΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ∆ΙΑΤΑΞΕΙΣ ΤΗΣ Ο∆ΗΓΙΑΣ
1999/5/ΕΚ.
Français [French] Par la présente NETGEAR Inc. déclare que l'appareil Radiolan est conforme aux
exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Italiano [Italian] Con la presente NETGEAR Inc. dichiara che questo Radiolan è conforme ai requisiti
essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Latviski [Latvian] Ar šo NETGEAR Inc. deklarē, ka Radiolan atbilst Direktīvas 1999/5/EK būtiskajām
prasībām un citiem ar to saistītajiem noteikumiem.
Lietuvių Šiuo NETGEAR Inc. deklaruoja, kad šis Radiolan atitinka esminius reikalavimus ir kitas
[Lithuanian] 1999/5/EB Direktyvos nuostatas.
Nederlands Hierbij verklaart NETGEAR Inc. dat het toestel Radiolan in overeenstemming is met de
[Dutch] essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG.
Malti [Maltese] Hawnhekk, NETGEAR Inc., jiddikjara li dan Radiolan jikkonforma mal-htigijiet essenzjali u
ma provvedimenti ohrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Magyar Alulírott, NETGEAR Inc. nyilatkozom, hogy a Radiolan megfelel a vonatkozó alapvetõ
[Hungarian] követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Polski [Polish] Niniejszym NETGEAR Inc. oświadcza, że Radiolan jest zgodny z zasadniczymi
wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Português NETGEAR Inc. declara que este Radiolan está conforme com os requisitos essenciais e
[Portuguese] outras disposições da Directiva 1999/5/CE.
Slovensky NETGEAR Inc. týmto vyhlasuje, že Radiolan spĺňa základné požiadavky a všetky
[Slovak] príslušné ustanovenia Smernice 1999/5/ES.
Suomi [Finnish] NETGEAR Inc. vakuuttaa täten että Radiolan tyyppinen laite on direktiivin 1999/5/EY
oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Svenska Härmed intygar NETGEAR Inc. att denna Radiolan står I överensstämmelse med de
[Swedish] väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv
1999/5/EG.
Notification of Compliance
178
Íslenska Hér með lýsir NETGEAR Inc. yfir því að Radiolan er í samræmi við grunnkröfur og aðrar
[Icelandic] kröfur, sem gerðar eru í tilskipun 1999/5/EC.
Norsk NETGEAR Inc. erklærer herved at utstyret Radiolan er i samsvar med de grunnleggende
[Norwegian] krav og øvrige relevante krav i direktiv 1999/5/EF.
This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and
EFTA countries, except in France and Italy where restrictive use applies.
In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to
use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or
network services.
This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may
be limited to 10 mW EIRP in the frequency range of 2454 - 2483.5 MHz. For detailed information the end-user should
contact the national spectrum authority in France.
FCC Caution
• Any changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate this equipment.
• This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This
device may not cause harmful interference, and (2) this device must accept any interference received, including
interference that may cause undesired operation.
Notification of Compliance
179
• For product available in the USA market, only channel 1~11 can be operated. Selection of other channels is not
possible.
• This device and its antenna(s) must not be co-located or operation in conjunction with any other antenna or
transmitter.
Industry Canada
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
Caution:
The device for the band 5150-5250 MHz is only for indoor usage to reduce po-tential for harmful interference to
co-channel mobile satellite systems.
High power radars are allocated as primary users (meaning they have priority) of 5250-5350 MHz and 5650-5850 MHz
and these radars could cause interference and/or damage to LE-LAN devices.
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence.
Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage
préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de provoquer un
fonctionnement indésirable.
Avertissement:
Le dispositif fonctionnant dans la bande 5150-5250 MHz est réservé uniquement pour une utili-sation à l'intérieur afin
de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux.
Les utilisateurs de radars de haute puissance sont désignés utilisateurs principaux (c.-à-d., qu'ils ont la priorité) pour
les bandes 5250-5350 MHz et 5650-5850 MHz et que ces radars pourraient causer du brouillage et/ou des dommages
aux dispositifs LAN-EL.
Notification of Compliance
180
A C
AC power adapter input 14 case study, setting up VPN 159
access lists 44 changes not saved, router 153
access, controlling 50 clients, adding to network 40
accessing client-to-gateway VPN tunnels 87, 90
remote computer 50 compliance 177
USB drive remotely 83 configuration file 67, 68
adapter, wireless 23 connecting to UBS drive 83
adding connecting wirelessly 17
clients to network 40
connection status 72
custom service 55
guest devices 40 content filtering 48, 58
addresses, DNS 31 custom service (port forwarding) 55
ADSL microfilters 18
ADSL port 13 D
ADSL settings 33 date and time 154
ADSL. See also DSL daylight savings time 59, 154
Advanced Wireless Settings screen 130 deactivating VPN tunnels 109, 110
alerts, emailing 60 default demilitarized zone (DMZ) server 124
Application Level Gateway (ALG), disabling 125 default factory settings 156
approved USB devices 82 resetting 12
attached devices, viewing 72 deleting
authentication proposal 97 keywords 49
Auto Policy to configure VPN tunnels 112 keywords or domains 49
automatic firmware checking 65 VPN tunnels 111
automatic Internet connection 28 denial of service (DoS)
port scans 123
protection 48
B devices, adding 40
back panel 13 diagnostic utilities 73
backing up configuration 67 disable SSID 38
Basic Settings screen disabling
described 30 firewalls 32
manual setup 28 SIP ALG 125
blocking SSID broadcast 38
content and services 48 disconnecting USB drive 82
keywords, examples 49 DNS servers 50
box contents 11 Domain Name Server (DNS) addresses 31, 125
bridged networks 132 DSL port LED 15
DSL settings 32
Dynamic DNS 125
Dynamic Host Configuration Protocol (DHCP) server
181
I M
IKE protocol 112 MAC addresses
inbound traffic configuring 32
port forwarding 53 described 38
inbound traffic. See port forwarding; port triggering filtering by 45
rejected 152
Internet port 28
restricting access by 44, 46
Internet port LEDs 15 spoofing 149
Internet port, no connection 33 maintenance settings 64
182
P
passphrases 47
S
changing 46 scheduling firewall services 60
WPA-802.1x 46 secondary DNS 31
passwords. See passphrases Secure Sockets Layer (SSL) 36
pinging security association (SA) 88
VPNs 99, 174 security features 37
WAN port 124
security PIN 12, 41
Plug and Play, Universal (UPnP) 141
security policy, configuring 95
plug and play, universal (UPnP) 141
security settings 38, 48
point-to-point bridge mode 133
sending logs by email 60
Point-to-Point Tunneling Protocol (PPTP) 28
services, configuring 58
port forwarding 53, 54
Session Initiation Protocol (SIP), disabling 125
configuring 54
example 53 Setup Wizard 28
port numbers 58 SHA-1 authentication 114
port scanning, disabling 123 sharing files 75
port triggering 51, 53, 56 Simple Mail Transfer Protocol (SMTP) 61
183
184
185