Login:
Votes - 0, Average rating: 0 ( )

User manual NETGEAR, model D6200

Manafacture: NETGEAR
File size: 4.4 mb
File name:
Language of manual:en
Free link for this manual available at the bottom of the page



Other manuals for this model:

manual abstract


If this is the first time you are accessing the utility, you are asked to select the printer and click the Connect button. •Disconnect. Click the Disconnect button at any time to release the connection. •Network Scanner. This button activates the Scanner window so that you can use the printer for scanning. Your printer must support scanning and be in the Available state. Use the Scan Feature of a Multifunction USB Printer If your USB printer supports scanning, you can also use the USB printer for scanning. 1.Launch the NETGEAR USB Control Center the same way you launch any application program on your Windows or MAC computer. 2.Make sure that the printer’s status shows as Available. 3.Click the Network Scanner button. The scanner window opens so you can use the USB printer for scanning. 7. Security Keep unwanted content out of your network This chapter explains how to use the basic firewall features of the WiFi DSL modem router to prevent objectionable content from reaching the computers and other devices connected to your network. This chapter includes the following sections: •Keyword Blocking of HTTP Traffic •Firewall Rules •Add Custom Services to Allow or Block •Schedule for Firewall Rules •Security Event Email Notifications Use keyword blocking to prevent certain types of HTTP traffic from accessing your network. The blocking can be always or according to a schedule. 1.Select ADVANCED > Security > Block Sites. 2.Select one of the keyword blocking options: •Per Schedule. Turn on keyword blocking according to the Schedule screen settings. For more information, see Schedule for Firewall Rules on page 90. •Always. Turn on keyword blocking all the time, independent of the Schedule screen. 3.In the Keyword field, enter a keyword or domain, and click Add Keyword. The Keyword list supports up to 32 entries. Here are some sample entries: •Specify XXX to block •Specify .com if you want to allow only sites with domain suffixes such as .edu or .gov. •Enter a period (.) to block all Internet browsing access. 4.Click Apply. 1.Select the keyword you want to delete from the list. 2.Click Delete Keyword. 3.Click Apply You can exempt one trusted computer from blocking and logging. The computer you exempt must have a fixed IP address. 1.In the Trusted IP Address field, enter the IP address. 2.Click Apply. Firewall Rules Services are functions performed by server computers at the request of client computers. For example, web servers serve web pages, time servers serve time and date information, and game hosts serve data about other players’ moves. When a computer on the Internet sends a request for service to a server computer, the requested service is identified by a service or port number. This number appears as the destination port number in the transmitted IP packets. For example, a packet that is sent with the destination port number 80 is an HTTP (web server) request. The service numbers for many common protocols are defined by the Internet Engineering Task Force (IETF at and published in RFC1700, “Assigned Numbers.” Service numbers for other applications are typically chosen from the range 1024–65535 by the authors of the application. Although the WiFi DSL modem router already holds a list of many service port numbers, you are not limited to these choices. You can often determine port number information by contacting the publisher of the application, by asking user groups or newsgroups, or by searching. Note:This feature is for advanced administrators only! Incorrect configuration can cause serious problems. 1.Select ADVANCED > Security > Firewall Rules. The Firewall Rules screen lists all firewall rule settings. The default rules allow all outgoing traffic and block all incoming traffic. 2.Under Outbound Services, click Add. 3.Configure the following settings: •Service. Select the service or application to be covered by this rule. If the service or application you want does not appear in the list, you have to define it as described in Add Custom Services to Allow or Block on page 89. •Action. Select the action you want for traffic covered by this rule: - BLOCK always. Always block the traffic covered by this rule. - BLOCK by schedule, otherwise Allow. Allow the traffic covered by this rule, unless it is blocked according to the schedule specified on the Schedule screen. - ALLOW always. Always allow the traffic covered by this rule. - ALLOW by schedule, otherwise Block. Block the traffic covered by this rule, unless it is blocked according to the schedule specified on the Schedule screen. ALLOW rules are useful only when the traffic is already covered by a BLOCK rule. You would use these rules when you want to allow a subset of traffic that is blocked by another rule. •LAN Users. These settings determine which computers on your network are affected by this rule, based on their source (LAN) IP address. Select the option you want: - Any. All local IP addresses are...


Reviews



Your review
Your name:
Please, enter two numbers from picture:
capcha





Category