Login:
Stimmen - 0, Durchschnittliche Bewertung: 0 ( )

Anleitung NETGEAR, modell R6200v2

Hersteller: NETGEAR
Dateigröße: 3.12 mb
Dateiname:
Unterrichtssprache:en
Link zum kostenlosen Download Hinweise finden Sie am Ende der Seite



Dieses Gerät hat auch andere Anweisungen:
Netzwerk - R6200v2 (3.24 mb)
Netzwerk - R6200v2 (3.03 mb)
Netzwerk - R6200v2 (1.08 mb)en
Netzwerk - R6200v2 (662.42 kb)en

Anleitung Zusammenfassung


You can usually determine this information by contacting the publisher of the application or user groups or news groups. 1.Select ADVANCED > Advanced Setup > Port Forwarding/Port Triggering. 2.Select the Port Triggering radio button. 3.Clear the Disable Port Triggering check box. Note:If the Disable Port Triggering check box is selected after you configure port triggering, port triggering is disabled. However, any port triggering configuration information you added to the router is retained even though it is not used. 4.In the Port Triggering Time-out field, enter a value up to 9999 minutes. This value controls the inactivity timer for the designated inbound ports. The inbound ports close when the inactivity time expires. The time-out value is required so that the router can determine when the application has terminated. 1.On the Port Forwarding/Port Triggering screen, click the Add Service button. 2.In the Service Name field, type a descriptive service name. 3.In the Service User list, select Any, or select Single address and enter the IP address of one computer. •Any (the default), allows any computer on the Internet to use this service. •Single address restricts the service to a particular computer. 4.Select the service type, either TCP or UDP or TCP/UDP (both). If you are not sure, select TCP/UDP. 5.In the Triggering Port field, enter the number of the outbound traffic port that will trigger the inbound ports to open. 6.Enter the inbound connection port information in the Connection Type, Starting Port, and Ending Port fields. 7.Click the Apply button. The service appears in the Port Triggering Portmap table. 8.Make sure that you enable port triggering so that the service that you added will be used. Schedule Blocking You can specify the days and time that you want to block Internet access. 1.Select ADVANCED > Security > Schedule. 2.Set up the schedule for blocking keywords and services. •Days to Block. Select days on which you want to apply blocking by selecting the appropriate check boxes, or select the Every Day check box to select the check boxes for all days. •Time of Day to Block. Select a start and end time in 24-hour format, or select the All Day check box for 24-hour blocking. 3.Select your time zone from the list. If you use daylight savings time, select the Automatically adjust for daylight savings time check box. 4.Click the Apply button. Your settings are saved. Set Up Security Event Email Notifications To receive logs and alerts by email, provide your email information in the E-mail screen, and specify which alerts you want to receive and how often. 1.Select ADVANCED > Security > E-mail. 2.Select the Turn E-mail Notification On check box. 3.In the Your Outgoing Mail Server field, enter the name of your ISP’s outgoing (SMTP) mail server (such as mail.myISP.com). You might be able to find this information in the configuration screen of your email program. If you leave this field blank, log and alert messages are not sent. 4.Enter the email address to which logs and alerts are sent in the Send to This E-mail Address field. This email address is also used for the From address. If you leave this field blank, log and alert messages are not sent. 5.If your outgoing email server requires authentication, select the My Mail Server requires authentication check box. Fill in the User Name and Password fields for the outgoing email server. 6.(Optional) Select the Send Alerts Immediately check box. Email alerts are sent immediately when someone attempts to visit a blocked site. 7.(Optional) Fill in the fields in the Send logs according to this schedule section of the screen. Logs are sent automatically. If the log fills up before the specified time, the log is emailed. After the log is sent, the log is cleared from the router memory. If the router cannot email the log file, the log buffer might fill up. In this case, the router overwrites the log and discards its contents. 8.Click the Apply button. Your settings are saved. 8. Administration Managing your network This chapter describes the router settings for administering and maintaining your router and home network. This chapter includes the following sections: •Update the Router Firmware •View Router Status •View Logs •Manage the Configuration File •Change the Password •Password Recovery For information about upgrading or checking the status of your router over the Internet, see Remote Management on page 103. For information about monitoring Internet traffic, see Traffic Meter on page 114. The router firmware (routing software) is stored in flash memory. You can update the firmware from the Administration menu on the Advanced tab. You might see a message at the top of the genie screens when new firmware is available for your product. You can use the Check button on the Router Update screen to check if new firmware is available, and to update your product. 1.Select ADVANCED > Administration > Router Update. 2.Click the Check button. The router finds ne...


Bewertungen



Bewerten
Vorname:
Geben Sie zwei Ziffern:
capcha





Kategorien