User's Manual
202-10005-05, June 2005
vi Contents
Then, connect to the Internet. ..................................................................................3-6
Testing Your Internet Connection ....................................................................................3-7
Manually Configuring Your Internet Connection .............................................................3-7
Chapter 4
Wireless Configuration
Considerations for a Wireless Network ..........................................................................4-1
Observe Performance, Placement, and Range Guidelines .....................................4-1
Implement Appropriate Wireless Security ................................................................4-2
Understanding Wireless Settings ...................................................................................4-3
How to Set Up and Test Basic Wireless Connectivity ..............................................4-7
How to Restricting Wireless Access to Your Network ..............................................4-8
Restricting Access to Your Network by Turning Off Wireless Connectivity ........4-9
Restricting Wireless Access Based on the Wireless Network Name (SSID) .....4-9
Restricting Wireless Access Based on the Wireless Station Access List ..........4-9
Choosing WEP Authentication and Security Encryption Methods ......................... 4-11
Authentication Type Selection ......................................................................... 4-11
Encryption Choices ..........................................................................................4-12
How to Configure WEP ..........................................................................................4-13
How to Configure WPA-PSK ..................................................................................4-14
Chapter 5
Protecting Your Network
Protecting Access to Your 54Mbps Mobile Broadband Router MBR814 ........................5-1
How to Change the Built-In Password .....................................................................5-1
Changing the Administrator Login Timeout ..............................................................5-2
Configuring Basic Firewall Services ...............................................................................5-2
Blocking Keywords, Sites, and Services ..................................................................5-3
How to Block Keywords and Sites ...........................................................................5-3
Firewall Rules .................................................................................................................5-5
Inbound Rules (Port Forwarding) .............................................................................5-6
Inbound Rule Example: A Local Public Web Server ..........................................5-7
Inbound Rule Example: Allowing Videoconferencing ........................................5-8
Considerations for Inbound Rules .....................................................................5-9
Outbound Rules (Service Blocking) .........................................................................5-9
Outbound Rule Example: Blocking Instant Messenger .....................................5-9
Order of Precedence for Rules .............................................................................. 5-11