User's Manual

Table Of Contents
vii
v1.0, May 2005
Contents
DG834N RangeMax
TM
NEXT Wireless ADSL2+ Modem Router Reference
Manual
Chapter 1
Introduction
What’s in the Box? ..........................................................................................................1-1
The Router’s Front Panel .........................................................................................1-2
The Router’s Rear Panel .........................................................................................1-3
Connecting the Router to the Internet ............................................................................1-4
Chapter 2
Wireless Configuration
Considerations for a Wireless Network ..........................................................................2-1
Observe Performance, Placement, and Range Guidelines .....................................2-1
Implement Appropriate Wireless Security ................................................................2-2
Understanding Wireless Settings ...................................................................................2-4
How to Set Up and Test Basic Wireless Connectivity ..............................................2-7
Restricting Wireless Access to Your Network ..........................................................2-8
How to Configure WPA-PSK/WPA2-PSK Security ................................................. 2-11
Choosing Alternative Authentication and Encryption Methods ..............................2-12
Chapter 3
Protecting Your Network
Protecting Access to Your Wireless Modem Router .......................................................3-1
How to Change the Built-In Password .....................................................................3-1
Changing the Administrator Login Timeout ..............................................................3-2
Configuring Basic Firewall Services ...............................................................................3-2
Blocking Keywords, Sites, and Services ..................................................................3-3
How to Block Keywords and Sites ...........................................................................3-3
Firewall Rules .................................................................................................................3-5
Inbound Rules (Port Forwarding) .............................................................................3-6