User's Manual
Table Of Contents
- Wireless-N 150 Router WNR612v2 User Manual
- Contents
- About This Manual
- Chapter 1 Configuring Basic Connectivity
- Chapter 2 Safeguarding Your Network
- Choosing Appropriate Wireless Security
- Recording Wireless-N 150 Settings Setup Information
- Changing Wireless Security Settings
- Viewing Advanced Wireless Settings
- Configuring WPS Security (Wi-Fi Protected Setup)
- Restricting Wireless Access by MAC Address
- Changing the Administrator Password
- Backing Up Your Configuration
- Understanding Your Firewall
- Chapter 3 Restricting Access From Your Network
- Chapter 4 Customizing Your Network Settings
- Chapter 5 Fine-Tuning Your Network
- Chapter 6 Using Network Monitoring Tools
- Chapter 7 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Related Documents
- Index
Wireless-N 150 Router WNR612v2 User Manual
Index-3
v1.0, March 2010
IP addresses
blocking access by 3-5
current 6-3
dynamic or static 1-5
LAN 4-2
registering domain name 4-5
reserved 4-4
IP subnet mask 4-2, 6-3
ISP settings, basic 1-4
italic text xi
K
keys, encryption 2-9
keywords, blocking by 3-1
L
LAN IP setup 4-1
LAN path, troubleshooting 7-8
LAN port settings 6-3
lease, DHCP 6-5
Legacy mode 2-7
local network, default settings A-1
local servers, port forwarding to 5-6
logging in 1-1
login required 1-7
login settings A-1
logs
sending 3-7
time-stamping entries 3-8
viewing 3-6
M
MAC addresses
attached devices 6-7
current 6-3
entering 1-6
restricting access by 2-17
spoofing 7-6
mail server, outgoing 3-7
managing router remotely 6-12
metric value 4-10
mixed mode encryption 2-3, 2-10
mode, communication 2-7, 6-4
MTU size 4-8, 5-15
N
NAT (Network Address Translation) 4-7, 4-8, 5-2
NetBIOS host name 6-7
Network Time Protocol (NTP) 3-8, 7-10
O
obstructions, connecting through 5-17
Open System authentication 2-8
optimizing performance 5-14
outgoing mail server 3-7
P
passphrases 2-8, 2-9, 2-10
password
changing 2-19
restoring 7-11
path, testing 7-9
performance, optimizing 5-14
physical specifications A-3
PIN 2-14, 2-15
ping 4-7, 7-8
placement, router 5-14
poll interval 6-6
port filtering 3-3
port forwarding
configuring 5-6
example 5-5
port numbers 3-3
port status 6-6
port triggering
configuring 5-9
example 5-3
portmap table 5-13










