NETGEAR MR814v2 User Manual
Page 6

vi
Contents
Observe Performance, Placement, and Range Guidelines .....................................3-1
Implement Appropriate Wireless Security ................................................................3-2
Choosing Authentication and Security Encryption Methods ....................................3-6
How to Set Up and Test Basic Wireless Connectivity ..............................................3-8
How to Restrict Wireless Access by MAC Address .................................................3-9
Configure WEP ......................................................................................................3-10
Content Filtering Overview .............................................................................................4-1
Blocking Access to Internet Sites ...................................................................................4-2
Blocking Access to Internet Services .............................................................................4-3
Configuring a User Defined Service .........................................................................4-4
Configuring Services Blocking by IP Address Range ..............................................4-5
Scheduling When Blocking Will Be Enforced .................................................................4-5
Viewing Logs of Web Access or Attempted Web Access ...............................................4-6
Configuring E-Mail Alert and Web Access Log Notifications ..........................................4-7
Viewing Router Status Information .................................................................................5-1
Viewing a List of Attached Devices .................................................................................5-5
Upgrading the Router Software ......................................................................................5-5
Configuration File Management .....................................................................................5-6
Restoring and Backing Up the Configuration ...........................................................5-7
Erasing the Configuration .........................................................................................5-8