User Manual
Table Of Contents
- RangeMax NEXT Wireless Router WNR834A Reference Manual
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- Prepare to Install Your Wireless Router
- First, Use the Smart Wizard to Configure the Wireless Router
- Now, Set Up a Computer for Wireless Connectivity
- Troubleshooting Tips
- How to Manually Configure Your Internet Connection
- Using the Smart Setup Wizard
- NETGEAR Product Registration, Support, and Documentation
- Chapter 4 Wireless Configuration
- Chapter 5 Content Filtering
- Chapter 6 Maintenance
- Chapter 7 Advanced Configuration of the Router
- Configuring Advanced Wireless Settings
- Configuring Port Triggering and Port Forwarding
- Configuring Port Forwarding to Local Servers
- Configuring the WAN Setup Options
- Using the LAN IP Setup Options
- Using a Dynamic DNS Service
- Configuring Static Routes
- Enabling Remote Management Access
- Using Universal Plug and Play (UPnP)
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Related Documents
RangeMax NEXT Wireless Router WNR834A Reference Manual
Wireless Configuration 4-15
v1.0, April 2006
How to Restrict Wireless Access by MAC Address
To restrict access based on MAC addresses, follow these steps:
1. Log in to the WNR834A firewall at its default LAN address of http://www.routerlogin.net
with its default user name of admin and default password of password, or using whatever
LAN address and password you have set up.
2. Click Wireless Settings in the Advanced section of the main menu of the WNR834A
firewall.
3. From the Wireless Settings menu, click Setup Access List to display the Wireless Access
menu shown below.
4. Click the Turn Access Control On check box.
Note: When configuring the firewall from a wireless computer whose MAC address
is not in the Trusted PC list, if you select Turn Access Control On, you will
lose your wireless connection when you click Apply. You must then access the
wireless router from a wired computer or from a wireless computer which is on
the access control list to make any further changes.
Figure 4-7