User Manual
Table Of Contents
- NETGEAR Wireless-N Router WNR2000 User Manual
- Contents
- About This Manual
- Chapter 1 Configuring Basic Connectivity
- Chapter 2 Safeguarding Your Network
- Choosing Appropriate Wireless Security
- Recording Basic Wireless Settings Setup Information
- Changing Wireless Security Settings
- Viewing Advanced Wireless Settings
- Using Push 'N' Connect (Wi-Fi Protected Setup)
- Restricting Wireless Access by MAC Address
- Changing the Administrator Password
- Backing Up Your Configuration
- Understanding Your Firewall
- Chapter 3 Restricting Access From Your Network
- Chapter 4 Customizing Your Network Settings
- Chapter 5 Fine-Tuning Your Network
- Allowing Inbound Connections to Your Network
- Configuring Port Forwarding to Local Servers
- Configuring Port Triggering
- Using Universal Plug and Play
- Optimizing Wireless Performance
- Configuring Quality of Service
- Changing the MTU Size
- Optimizing Your Network Bandwidth
- Overview of Home and Small Office Networking Technologies
- Chapter 6 Using Network Monitoring Tools
- Chapter 7 Troubleshooting
- Troubleshooting Quick Tips
- Troubleshooting Basic Functions
- Troubleshooting the Web Configuration Interface
- Troubleshooting the Internet Connection
- Troubleshooting a Network Using the Ping Utility
- Problems with Date and Time
- Solving Wireless Connection Problems
- Restoring the Default Configuration and Password
- Appendix A Technical Specifications
- Appendix B Related Documents
- Index
NETGEAR Wireless-N Router WNR2000 User Manual
Index-5
v1.0, May 2008
S
sample network, figure 5-22
scheduling blocking 3-5
secondary DNS server 1-7, 1-10
security
options, compared 2-2
setting up 2-1
security PIN 2-16, 2-18
service name 1-9
service numbers 3-4
services, blocking 3-3
setting time 3-9
settings, default. See default factory settings
setup information, gathering 2-5
Setup Manual 1-1
Shared Key authentication 2-5, 2-9
Smart Setup Wizard 1-5
SMTP server 3-8
software push button configuration (WPS) 2-15
software, upgrading 6-8
specifications
general A-3
technical A-1
speed requirements 5-24
SPI (Stateful Packet Inspection) firewall 4-7
spoofing MAC addresses 1-7
SSID 2-7, 6-3, 7-11
SSID broadcast 2-13, 7-13
standards, compatibility A-3
static IP addresses 1-7
static routes 4-9
statistics, usage
6-5
status lights, troubleshooting and 7-3
status, viewing 6-1
streaming video and audio 5-24
subnet mask 4-3, 6-3
system up time 6-5
T
TCP/IP network, troubleshooting 7-7
technical specifications A-1
Telstra Bigpond 1-8
testing wireless connections 7-10
time of day, troubleshooting 7-9
time to live, advertisement 5-13
time, setting 3-9
time-out
idle 1-10
port triggering 5-11
TKIP (Temporal Key Integrity Protocol) encryption 2-11
trademarks ii
traffic, prioritizing 5-14
transfer time (backing up) 5-24
troubleshooting 7-1
trusted user 3-3
typographical conventions xi
U
Universal Plug and Play (UPnP) 5-12
up time, system 6-5
upgrading router software 6-8
URLs
typography for xi
Web Configuration Manager 1-2
usage statistics 6-5
user-defined services 3-4
V
version, RIP (Router Information Protocol) 4-3
viewing
advanced wireless settings 2-12
attached devices 6-6
basic security settings 2-6
logs 3-6
status 6-1










