N 150 Wireless Router WNR1000 v2h2 User Manual NETGEAR, Inc. 350 E. Plumeria Drive San Jose, CA 95134 USA August 2010 v1.
©2010 by NETGEAR, Inc. All rights reserved. Product Registration, Support, and Documentation Register your product at http://www.netgear.com/register. Registration is required before you can use our telephone support service. Product updates and Web support are always available at http://www.netgear.com/support. Setup documentation is available on the CD, on the support website, and on the documentation website.
NOTE: This product's firmware limits operation to only the channels allowed in a particular Region or Country. Therefore, all options described in this user's guide may not be available in your version of the product. Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC.
Español [Spanish] Por medio de la presente [NETGEAR Inc.] declara que el [WNR1000 v2h2] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. Eλληνική [Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [NETGEAR Inc.] ΔΗΛΩΝΕΙ ΟΤΙ [WNR1000 v2h2] ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ. Français [French] Par la présente [NETGEAR Inc.
FCC Requirements for Operation in the United States Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
• This device may not cause harmful interference, and • This device must accept any interference received, including interference that may cause undesired operation. FCC Radio Frequency Interference Warnings & Instructions This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Product and Publication Details Model Number: WNR1000 v2h2 Publication Date: August 2010 Product Family: Wireless Router Product Name: N 150 Wireless Router WNR1000 v2h2 Home or Business Product: Home Language: English Publication Part Number: 202-10546-01 vii v1.
Contents About This Manual Conventions, Formats, and Scope ................................................................................... xi How to Use This Manual ................................................................................................. xii How to Print This Manual ................................................................................................xiii Revision History .................................................................................................
Restricting Wireless Access by MAC Address .............................................................2-18 Changing the Administrator Password .........................................................................2-20 Backing Up Your Configuration ....................................................................................2-21 Understanding Your Firewall ........................................................................................
Chapter 5 Fine-Tuning Your Network Allowing Inbound Connections to Your Network ............................................................5-1 How Your Computer Accesses a Remote Computer through Your Router .............5-2 How Port Triggering Changes the Communication Process ....................................5-3 How Port Forwarding Changes the Communication Process ..................................5-5 How Port Forwarding Differs from Port Triggering ...................................................
Chapter 7 Troubleshooting Quick Tips .......................................................................................................................7-1 Troubleshooting Basic Functions ...................................................................................7-2 Login Problems ...............................................................................................................7-5 Checking the Internet Service Connection ..............................................................
About This Manual The user manual provides information for configuring the features of the NETGEAR®N 150 Wireless Router WNR1000 v2h2 beyond initial configuration settings. Initial configuration instructions can be found in the NETGEAR Wireless Router Setup Manual. You should have basic to intermediate computer and Internet skills. Conventions, Formats, and Scope The conventions, formats, and scope of this manual are described in the following paragraphs: • • Typographical conventions.
Danger: This is a safety warning. Failure to take heed of this notice might result in personal injury or death. • Scope. This manual is written for the WNR1000 v2h2 router according to these specifications: Product Version N 150 Wireless Router WNR1000 v2h2 Manual Publication Date August 2010 For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR website in Appendix B, “Related Documents.” Note: Product updates are available on the NETGEAR, Inc.
How to Print This Manual To print this manual, your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe Web site at http://www.adobe.com. Tip: If your printer supports printing two pages on a single sheet of paper, you can save paper and printer ink by selecting this feature. Revision History NETGEAR, Inc. is constantly searching for ways to improve its products and documentation.
Chapter 1 Configuring Basic Connectivity This chapter describes the settings for your Internet connection and your wireless local area network (LAN) connection. When you perform the initial configuration of your wireless router using the Resource CD as described in the NETGEAR Wireless Router Setup Manual, these settings are specified automatically for you.
Logging In To Your Wireless Router When the wireless router is connected to your network, you can access and configure the router using your browser. The Default Access login information is printed on the bottom label of your router. To access the router: 1. Connect to the wireless router by typing http://www.routerlogin.net in the address field of your browser, and then press Enter. A login window displays.
– The Checking for Firmware Updates screen appears unless you previously cleared the Check for Updated Firmware Upon Log-in check box. Figure 1-2 This message displays if the router discovers that new firmware is available. (If no new firmware is available, the router will proceed to the router status screen.) Figure 1-3 – To automatically update to the new firmware, click Yes to allow the router to download and install the new firmware file from NETGEAR.
3. If there is no new firmware, the login will take you to the Router Status screen displayed here. Figure 1-4 If the wireless router is connected to the Internet, you can select Knowledge Base or Documentation under Web Support in the main menu to view support information or the documentation for the wireless router. If you do not click Logout, the wireless router will wait for 5 minutes after no activity before it automatically logs you out.
Figure 1-5 The language is set to English by default. The default language is always stored in memory. When you select a language other than the default, that language as well as English is stored in memory. The additional language stored is the most recently selected. For example, if you select Deutsch, German and English will be stored. If you next select Chinese, Chinese and English will be stored. To specify a language to be used on your router manager screens, do the following: 1.
The language you select is then downloaded and displayed in the language selection box, and your screen display will be in the selected language. Note: You can select from the entire list of supported languages only when the router is connected to the Internet. When the router is not connected to the Internet, you can select one of the stored languages only.
Your Internet Connection Does Not Require a Login If no login is required by your ISP, the following settings appear in the Basic Settings screen. No login required Figure 1-6 • • • Account Name (might also be called Host Name). The account name is provided to the ISP during a DHCP request from your router. In most cases, this setting is not required, but some ISPs require it for access to ISP services such as mail or news servers. Domain Name.
– • If your ISP has assigned you a permanent, fixed (static) IP address for your computer, select Use Static IP Address. Enter the IP address that your ISP assigned. Also, enter the subnet mask and the gateway IP address. The gateway is the ISP’s router to which your router will connect. Domain Name Server (DNS) Address.
Your Internet Connection Does Require a Login If a login is required by your ISP, the following settings appear in the Basic Settings screen: Login required Figure 1-7 • Does Your Internet Connection Require A Login? If you usually must use a login program such as WinPOET to access the Internet, your Internet connection requires a login. After you select Yes, the Basic Settings screen displays.
• Internet Service Provider. This drop-down list contains a few ISPs that need special protocols for connection. Not all ISPs are listed here. The ones on this list have special requirements. The list includes: Figure 1-8 – – PPTP (Point to Point Tunneling Protocol), used primarily in Austrian DSL services Telstra Bigpond, an Australian residential cable modem service Note: The Telstra Bigpond setting is only for older cable modem service accounts still requiring a Bigpond login utility.
• Dial on Demand. The router logs in only when outgoing traffic is present and logs out after the idle time-out. • Manually Connect. The router logs in or logs out only when the user clicks Connect or Disconnect in the Router Status screen. – • Idle Timeout. Your Internet connection is logged out if there is no data transfer during the specified time interval. Domain Name Server (DNS) Address.
2. As appropriate, select the region in which the wireless interface will operate. Note: In North America, you will not be able to change the region setting. 3. For the wireless network name (SSID), use the default name, or choose a suitable descriptive name. In the Name (SSID) field, you can enter a value of up to 32 alphanumeric characters. The default SSID is NETGEAR. Note: The SSID is case-sensitive; NETGEAR is not the same as nETgear.
Wireless-N 150 Router WNR1000v2 User Manual 6. Select Wireless Settings under Advanced in the main menu of the WNR1000 v2h2 router. Figure 1-11 7. Make sure that the Enable Wireless Router Radio, Enable SSID Broadcast, and Enable WMM check boxes are selected. 8. Click Setup Access List. 9. Make sure that the Turn Access Control On check box is not selected. 10. Configure and test your wireless computer for wireless connectivity.
Chapter 2 Safeguarding Your Network The N 150 Wireless Router WNR1000 v2h2 provides highly effective security features, which are covered in detail in this chapter.
WEP connections can take slightly longer to establish. Also, WEP, WPA-PSK, and WPA2-PSK encryption can consume more battery power on a notebook computer, and can cause significant performance degradation with a slow computer. Note: NETGEAR recommends that you change the administration password of your router. Default passwords are well known, and an intruder can use your administrator access to read or disable your security settings.
• Use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/ WPA2 security on both the router and the client device. If the clients in your network are WPS capable, you can use Wi-Fi Protected Setup (WPS) to automatically set the SSID and implement WPA/WPA2 security on both the router and the client device (see “Using Push 'N' Connect (Wi-Fi Protected Setup)” on page 2-13). Basic security options are listed in order of increasing effectiveness in Table 2-1.
Table 2-2. Other Features That Enhance Security Security Type Description Disable the wireless router radio. If you disable the wireless router radio, wireless devices cannot communicate with the router at all. You might disable this when you are away or when other users of your network all use wired connections. For more information, see “Viewing Advanced Wireless Settings” on page 2-11. Turn off the broadcast of the wireless network name SSID.
Recording Basic Wireless Settings Setup Information Before and after customizing your wireless settings, print this section, and record the following information. If you are working with an existing wireless network, the person who set up or is responsible for the network can provide this information. Otherwise, you must choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces provided. • Wireless Network Name (SSID).
– Passphrase. ______________________________ These characters are case-sensitive. Enter a word or group of printable characters. When you use WPA-PSK, the other devices in the network will not connect unless they are also set to WPA-PSK and are configured with the correct passphrase. Similarly, when you use WPA2-PSK, the other devices in the network will not connect unless they are also set to WPA2-PSK and are configured with the correct passphrase.
• Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. When more than one wireless network is active, different wireless network names provide a way to separate the traffic. For a wireless device to participate in a particular wireless network, it must be configured with the SSID for that network. The WNR1000 v2h2 default SSID is NETGEAR. You can disable this broadcast as described in “Viewing Advanced Wireless Settings” on page 2-11.
– • Up to 150 Mbps - Performance Mode - Maximum Nx speeds up to 150 Mbps. Using channel expansion to achieve the 150 Mbps data rate, the WNR1000 v2h2 will use the channel you selected as the primary channel and expand to the secondary channel (primary channel +4 or –4) to achieve a 40 MHz frame-by-frame bandwidth. The WNR1000 v2h2 will detect channel usage and will disable frame-by-frame expansion if the expansion would result in interference with the data transmission of other access points or clients.
To configure WEP data encryption: Note: If you use a wireless computer to configure WEP settings, you will be disconnected when you click Apply. You must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired computer to make any further changes. Not all wireless adapter configuration utilities support passphrase key generation. 1. Select Wireless Settings under Setup in the main menu. 2. In the Security Options section, select WEP.
Configuring WPA-PSK and WPA2-PSK Wireless Security Wi-Fi Protected Access with Pre-Shared Key (WPA-PSK and WPA2-PSK) data encryption provides extremely strong data security, very effectively blocking eavesdropping. Because WPA and WPA2 are relatively new standards, older wireless adapters and devices might not support them. Check whether newer drivers are available from the manufacturer.
Figure 2-4 4. Click Apply to save your settings. Viewing Advanced Wireless Settings This section describes the wireless settings that you can view and specify in the Advanced Wireless Settings screen, which you access under Advanced in the main menu. To configure the advanced wireless security settings of your router: 1. Log in to the router as described in “Logging In To Your Wireless Router” on page 1-2. 2. Select Wireless Settings under Advanced in the main menu.
Figure 2-5 The available settings in this screen are: • Enable Wireless Router Radio. If you disable the wireless router radio, wireless devices cannot connect to the WNR1000 v2h2 router. If you will not be using your wireless network for a period of time, you can clear this check box and disable all wireless connectivity. • Enable SSID Broadcast. Clear this check box to disable broadcast of the SSID, so that only devices that know the correct SSID can connect.
. Using Push 'N' Connect (Wi-Fi Protected Setup) If your wireless clients support Wi-Fi Protected Setup (WPS), you can use this feature to configure the router’s network name (SSID) and security settings and, at the same time, connect a wireless client securely and easily to the router. Look for the symbol on your client device.
2. On the wireless client, follow its specific networking instructions to enable WPS, to allow it to connect to the router. The WNR1000 v2h2 router’s green conditions occurs: light ceases blinking and remains on when one of these • The router and the client establish a wireless connection. • The 2-minute window period expires for establishing a WPS connection. If the connection is not established, no WPS security settings will be specified in the WNR1000 v2h2 router.
The green light on the WNR1000 v2h2 router begins to blink in a regular pattern. While the button light is blinking, you have 2 minutes to enable WPS on the device you are trying to connect to the router. 5. In the wireless client, follow its specific networking instructions to enable WPS, to allow it to connect to the router. The WNR1000 v2h2 router’s green conditions occurs: light ceases blinking and remains on when one of these • The router and the client establish a wireless connection.
Figure 2-8 4. On the wireless client, obtain its security PIN, or follow its specific networking instructions to generate a client security PIN. 5. In the Add WPS Client screen of the WNR1000 v2h2 router, enter the client security PIN in the Enter Client’s PIN field. 6. Click Next. The following screen displays, and the Smart Wizard initiates the wireless connection: Figure 2-9 Configuring the WPS Settings 1. Log in to the router as described in “Logging In To Your Wireless Router” on page 1-2. 2.
These options are available under WPS Settings: • Router’s PIN. The PIN is displayed so that you can use it to configure the router through WPS (Wi-Fi Protected Setup). It is also displayed on the router’s label. • Disable Router’s PIN. If the router’s PIN is disabled, you cannot configure the router’s wireless settings with WPS. However, if your settings are already configured, you can still add WPS-enabled wireless clients.
To connect both non-WPS-enabled and WPS-enabled clients to the WNR1000 v2h2 router: 1. Configure the settings of the WNR1000 v2h2 router (shown in the Wireless Settings screen) for WPA-PSK or WPA2-PSK security, and record that information. See “Configuring WPA-PSK and WPA2-PSK Wireless Security” on page 2-10. When you change security settings, all existing connected wireless clients that do not share those settings are disassociated and disconnected from the router. 2.
2. In the Advanced Wireless Settings screen, click Setup Access List to display the Wireless Card Access List. Figure 2-11 3. Click Add to add a wireless device to the wireless access control list. The Wireless Card Access Setup screen opens and displays a list of currently active wireless cards and their Ethernet MAC addresses. Figure 2-12 4.
5. Click Add to add this wireless device to the Wireless Card Access List. The screen changes back to the list screen. 6. Repeat step 3 through step 5 for each additional device you want to add to the list. 7. Select the Turn Access Control On check box. Note: When configuring the router from a wireless computer whose MAC address is not in the Trusted PC list, if you select Turn Access Control On, you lose your wireless connection when you click Apply.
To change the administrator password: 1. On the main menu, under Maintenance, select Set Password to display the Set Password screen. Figure 2-13 2. To change the password, first enter the old password, then enter the new password twice. 3. Click Apply. Backing Up Your Configuration The configuration settings of the WNR1000 v2h2 router are stored within the router in a configuration file. You can back up (save) this file and retrieve it later.
Understanding Your Firewall Your N 150 Wireless Router WNR1000 v2h2 contains a true firewall to protect your network from attacks and intrusions. A firewall is a device that protects one network from another while allowing communication between the two. Using a process called Stateful Packet Inspection, the firewall analyzes all inbound and outbound traffic to determine whether or not it will be allowed to pass through.
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the N 150 Wireless Router WNR1000 v2h2 to protect your network.
To block access to Internet sites: 1. Select Block Sites under Content Filtering in the main menu. The Block Sites screen displays. Figure 3-1 2. Enable keyword blocking by selecting either Per Schedule or Always. To block by schedule, be sure to specify a time period in the Schedule screen. For information about scheduling, see “Scheduling Blocking” on page 3-5. Block all access to Internet browsing during a scheduled period by entering a dot (.
Blocking Access to Internet Services The WNR1000 v2h2 router allows you to block the use of certain Internet services by computers on your network. This is called service blocking or port filtering. Services are functions performed by server computers at the request of client computers. For example, Web servers serve Web pages, time servers serve time and date information, and game hosts serve data about other players’ moves.
3. Specify a service for blocking by clicking Add. The Block Services Setup screen displays. Figure 3-3 4. From the Service Type list, select the application or service to be allowed or blocked. The list already displays several common services, but you are not limited to these choices. To add any additional services or applications that do not already appear, select User Defined. To define a service, first you must determine which port number or range of numbers is used by the application.
Blocking Services by IP Address Range In the Filter Services For area, you can block the specified service for a single computer, a range of computers (having consecutive IP addresses), or all computers on your network. Scheduling Blocking TheWNR1000 v2h2 router allows you to specify when blocking is enforced. To schedule blocking: 1. Select Schedule under Content Filtering in the main menu. The Schedule screen displays. Figure 3-4 2. Configure the schedule for blocking keywords and services. a.
3. Click Apply to save your settings. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of the websites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries appear only when keyword blocking is enabled and no log entries are made for the trusted user. Select Logs under Content Filtering in the main menu. The Logs screen displays. Figure 3-5 Table 3-1 describes the log entries. Table 3-1.
To refresh the log screen, click the Refresh button. To clear the log entries, click the Clear Log button. To e-mail the log immediately, click the Send Log button. Configuring E-mail Alert and Web Access Log Notifications To receive logs and alerts by e-mail, you must provide your e-mail account information. To configure e-mail alert and web access log notifications: 1. Select E-mail under Content Filtering in the main menu. The E-mail screen displays. Figure 3-6 2.
3. If your e-mail server requires authentication, select the My Mail Server requires authentication check box. a. Enter your user name for the e-mail server in the User Name field. b. Enter your password for the e-mail server in the Password field. 4. You can specify that logs are automatically sent by e-mail with these options: • Send alert immediately. Select this check box for immediate notification of attempted access to a blocked site or service. • Send Logs According to this Schedule.
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the N 150 Wireless Router WNR1000 v2h2 , including LAN, WAN, and routing settings.
Configuring a Device Name The device name is a user-friendly name for the router. This name is shown in the Network on Windows Vista and the Network Explorer on all Windows systems. The Device Name field cannot be blank. The default name is WNR1000 v2h2. Configuring LAN TCP/IP Setup Parameters These are advanced settings that you might configure if you are a network administrator and your network contains multiple routers.
– – – RIP-1 is universally supported. RIP-1 is usually adequate unless you have an unusual network setup. RIP-2B carries more information than RIP-1 and uses subnet broadcasting. RIP-2M carries more information than RIP-1 and uses multicasting. Using the Router as a DHCP Server By default, the router functions as a DHCP server, allowing it to assign IP, DNS server, and default gateway addresses to all computers connected to the router’s LAN.
Using Address Reservation When you specify a reserved IP address for a computer on the LAN, that computer always receives the same IP address each time it accesses the router’s DHCP server. Reserved IP addresses should be assigned to computers or servers that require permanent IP settings. Figure 4-2 To reserve an IP address: 1. Click Add. 2. In the IP Address field, enter the IP address to assign to the computer or server. (Choose an IP address from the router’s LAN subnet, such as 192.168.1.x.) 3.
Using a Dynamic DNS Service If your Internet Service Provider (ISP) gave you a permanently assigned IP address, you can register a domain name and have that name linked with your IP address by public Domain Name Servers (DNS). However, if your Internet account uses a dynamically assigned IP address, you do not know in advance what your IP address will be, and the address can change frequently.
2. Select the Use a Dynamic DNS Service check box. 3. Select the name of your Dynamic DNS service provider. 4. Enter the host name (or domain name) that your Dynamic DNS service provider gave you. 5. Enter the user name for your Dynamic DNS account. This is the name that you use to log in to your account, not your host name. 6. Enter the password (or key) for your Dynamic DNS account. 7.
known exploits such as malformed, oversized, or out-of-sequence packets. The firewall should be disabled only in special circumstances, such as when you are troubleshooting application issues. Setting Up a Default DMZ Server The default DMZ server feature is helpful when you are using some online games and videoconferencing applications that are incompatible with Network Address Translation (NAT).
Setting the MTU Size The normal MTU value for most Ethernet networks is 1500 bytes, 1492 bytes for PPPoE connections, or 1450 for PPTP connections. For some ISPs, you might need to reduce the MTU size, but this is rarely required and should not be done unless you are sure it is necessary for your ISP connection. For more information, see “Changing the MTU Size” on page 5-15. To change the MTU size: 1. In the MTU Size field, enter a new size between 64 and 1500. 2. Click Apply to save the new configuration.
When you first configured your router, two implicit static routes were created. A default route was created with your ISP as the gateway, and a second static route was created to your local network for all 192.168.1.x addresses. With this configuration, if you attempt to access a device on the 134.177.0.0 network, your router forwards your request to the ISP. The ISP forwards your request to the company where you are employed, and the request is likely to be denied by the company’s firewall.
2. Click Add to expand the Static Routes screen. Figure 4-6 3. In the Route Name field, enter a name for this static route. (This is for identification purposes only.) 4. Select the Private check box if you want to limit access to the LAN only. If Private is selected, the static route is not reported in RIP. 5. Select the Active check box to make this route effective. 6. In the Destination IP Address field, enter the IP address of the final destination. 7.
Chapter 5 Fine-Tuning Your Network This chapter describes how to modify the configuration of the N 150 Wireless Router WNR1000 v2h2 to allow specific applications to access the Internet or to be accessed from the Internet, and how to make adjustments to enhance your network’s performance.
How Your Computer Accesses a Remote Computer through Your Router When a computer on your network needs to access a computer on the Internet, your computer sends your router a message containing source and destination address and process information. Before forwarding your message to the remote computer, your router must modify the source information and must create and track the communication session so that replies can be routed back to your computer.
4. The Web server at www.example.com composes a return message with the requested Web page data. The return message contains the following address and port information: • The source address is the IP address of www.example.com. • The source port number is 80, the standard port number for a Web server process. • The destination address is the public IP address of your router. • The destination port number is 33333. The Web server then sends this reply message to your router. 5.
“When you initiate a session with destination port 6667, you must also allow incoming traffic on port 113 to reach the originating computer.” Using steps similar to the preceding example, the following sequence shows the effects of the port triggering rule you have defined: 1. You open an IRC client program, beginning a chat session on your computer. 2. Your IRC client composes a request message to an IRC server using a destination port number of 6667, the standard port number for an IRC server process.
How Port Forwarding Changes the Communication Process In both of the preceding examples, your computer initiates an application session with a server computer on the Internet. However, you might need to allow a client computer on the Internet to initiate a connection to a server computer on your network. Normally, your router ignores any inbound traffic that is not a response to your own outbound traffic. You can configure exceptions to this default rule by using the port forwarding feature.
How Port Forwarding Differs from Port Triggering The following points summarize the differences between port forwarding and port triggering: • Port triggering can be used by any computer on your network, although only one computer can use it at a time. • Port forwarding is configured for a single computer on your network. • Port triggering does not need to know the computer’s IP address in advance. The IP address is captured automatically.
To configure port forwarding to a local server: 1. Select Port Forwarding/Port Triggering under Advanced in the main menu. The Port Forwarding/Port Triggering screen displays. Figure 5-1 2. From the Service Name list, select the service or game that you will host on your network. If the service does not appear in the list, see the following section, “Adding a Custom Service.” 3.
2. Click Add Service (see Figure 5-1 on page 5-7).The Ports–Custom Services screen displays. Figure 5-2 3. In the Service Name field, enter a descriptive name. 4. In the Service Type field, select the protocol. If you are unsure, select TCP/UDP. 5. In the Starting Port field, enter the beginning port number. • If the application uses only a single port, enter the same port number in the Ending Port field.
2. Click Edit Service or Delete Service to make changes. 3. Click Apply. Application Example: Making a Local Web Server Public If you host a Web server on your local network, you can use port forwarding to allow Web requests from anyone on the Internet to reach your Web server. To make a local Web server public: 1. Assign your Web server either a fixed IP address or a dynamic IP address using DHCP address reservation, as explained in “Using Address Reservation” on page 4-4.
While port forwarding creates a static mapping of a port number or range to a single local computer, port triggering can dynamically open ports to any computer that needs them and can close the ports when they are no longer needed.
4. In the Port Triggering Timeout field, enter a value up to 9999 minutes. This value controls the inactivity timer for the designated inbound ports. The inbound ports close when the inactivity time expires. This is required because the router cannot be sure when the application has terminated. 5. Click Add. the Port Triggering–Services screen displays. Figure 5-5 6. In the Service Name field, enter a descriptive service name. 7.
11. Click Apply. The service appears in the Port Triggering Portmap table. Figure 5-6 Using Universal Plug and Play Universal Plug and Play (UPnP) helps devices, such as Internet appliances and computers, to access the network and connect to other devices as needed. UPnP devices can automatically discover the services from other registered UPnP devices on the network.
1. Select UPnP under Advanced the main menu. The UPnP screen displays. Figure 5-7 2. The available settings and information displayed in this screen are: • Turn UPnP On. UPnP can be enabled or disabled for automatic device configuration. The default setting for UPnP is disabled. If this check box is not selected, the router does not allow any device to automatically control the resources, such as port forwarding (mapping) of the router. • Advertisement Period.