User Manual
Table Of Contents
- NETGEAR Wireless-N Router WNR2000 User Manual
- Contents
- About This Manual
- Chapter 1 Configuring Basic Connectivity
- Chapter 2 Safeguarding Your Network
- Choosing Appropriate Wireless Security
- Recording Basic Wireless Settings Setup Information
- Changing Wireless Security Settings
- Viewing Advanced Wireless Settings
- Using Push 'N' Connect (Wi-Fi Protected Setup)
- Restricting Wireless Access by MAC Address
- Changing the Administrator Password
- Backing Up Your Configuration
- Understanding Your Firewall
- Chapter 3 Restricting Access From Your Network
- Chapter 4 Customizing Your Network Settings
- Chapter 5 Fine-Tuning Your Network
- Allowing Inbound Connections to Your Network
- Configuring Port Forwarding to Local Servers
- Configuring Port Triggering
- Using Universal Plug and Play
- Optimizing Wireless Performance
- Configuring Quality of Service
- Changing the MTU Size
- Optimizing Your Network Bandwidth
- Overview of Home and Small Office Networking Technologies
- Chapter 6 Using Network Monitoring Tools
- Chapter 7 Troubleshooting
- Troubleshooting Quick Tips
- Troubleshooting Basic Functions
- Troubleshooting the Web Configuration Interface
- Troubleshooting the Internet Connection
- Troubleshooting a Network Using the Ping Utility
- Problems with Date and Time
- Solving Wireless Connection Problems
- Restoring the Default Configuration and Password
- Appendix A Technical Specifications
- Appendix B Related Documents
- Index
NETGEAR Wireless-N Router WNR2000 User Manual
Restricting Access From Your Network 3-7
v1.0, May 2008
Table 3-1 describes the log entries.
To refresh the log screen, click the Refresh button.
To clear the log entries, click the Clear Log button.
To e-mail the log immediately, click the Send Log button.
Configuring E-mail Alert and Web Access Log Notifications
To receive logs and alerts by e-mail, you must provide your e-mail account information.
To configure e-mail alert and web access log notifications:
1. Select E-mail under Content Filtering in the main menu. The E-mail screen displays.
Table 3-1. Log Entry Descriptions
Field Description
Date and time The date and time the log entry was recorded.
Source IP The IP address of the initiating device for this log entry.
Target address The name or IP address of the website or newsgroup
visited or to which access was attempted.
Action Whether the access was blocked or allowed.










