Home > Netgear > Router > Netgear Router WGR614 User Manual

Netgear Router WGR614 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGR614 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							  Glossary
    1
    Glossary
    Use the list below to find definitions for technical terms used in this manual.
    List of Glossary Terms
    10BASE-T 
    IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
    100BASE-Tx 
    IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
    3DES
    3DES (Triple DES) achieves a high level of security by encrypting the data three times using DES with three 
    different, unrelated keys.
    802.1x
    802.1x defines port-based, network access control used to provide authenticated network access and 
    automated data encryption key management. 
    The IEEE 802.1x draft standard offers an effective framework for authenticating and controlling user traffic 
    to a protected network, as well as dynamically varying encryption keys. 802.1x uses a protocol called EAP 
    (Extensible Authentication Protocol) and supports multiple authentication methods, such as token cards, 
    Kerberos, one-time passwords, certificates, and public key authentication. For details on EAP specifically, 
    refer to IETFs RFC 2284.
    802.11a
    IEEE specification for wireless networking at 54 Mbps operating in unlicensed radio bands over 5GHz.
    802.11b
    IEEE specification for wireless networking at 11 Mbps using direct-sequence spread-spectrum (DSSS) 
    technology and operating in the unlicensed radio spectrum at 2.5GHz.
    802.11g
    A soon to be ratified IEEE specification for wireless networking at 54 Mbps using direct-sequence 
    spread-spectrum (DSSS) technology and operating in the unlicensed radio spectrum at 2.5GHz. 802.11g is 
    backwards compatible with 802.11b. 
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    2Glossary
     
    ADSL
    Short for asymmetric digital subscriber line, a technology that allows data to be sent over existing copper 
    telephone lines at data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and 
    from 16 to 640 Kbps when sending data (known as the upstream rate). 
    ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world 
    gain access. 
    AES
    Advanced Encryption Standard, a symmetric 128-bit block data encryption technique. 
    It is an iterated block cipher with a variable block length and a variable key length. The block length and the 
    key length can be independently specified to 128, 192 or 256 bits.The U.S government adopted the 
    algorithm as its encryption technique in October 2000, replacing the DES encryption it used. AES works at 
    multiple network layers simultaneously.
    AH
    Authentication Header.
    ARP
    Address Resolution Protocol, a TCP/IP protocol used to convert an IP address into a physical address (called 
    a DLC address), such as an Ethernet address. 
    A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host 
    on the network that has the IP address in the request then replies with its physical hardware address. There is 
    also Reverse ARP (RARP) which can be used by a host to discover its IP address. In this case, the host 
    broadcasts its physical address and a RARP server replies with the hosts IP address.
    Auto Uplink
    Auto UplinkTM technology (also called MDI/MDIX) eliminates the need to worry about crossover vs. 
    straight-through Ethernet cables. Auto UplinkTM will accommodate either type of cable to make the right 
    connection.
    CA
    A Certificate Authority is a trusted third-party organization or company that issues digital certificates used 
    to create digital signatures and public-private key pairs. 
    Cat 5
    Category 5 unshielded twisted pair (UTP) cabling. An Ethernet network operating at 10 Mbits/second 
    (10BASE-T) will often tolerate low quality cables, but at 100 Mbits/second (10BASE-Tx) the cable must be 
    rated as Category 5, or Cat 5 or Cat V, by the Electronic Industry Association (EIA). 
    This rating will be printed on the cable jacket. Cat 5 cable contains eight conductors, arranged in four 
    twisted pairs, and terminated with an RJ45 type connector. In addition, there are restrictions on maximum 
    cable length for both 10 and 100 Mbits/second networks.
    Certificate Authority 
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    Glossary
    3
     
    A Certificate Authority is a trusted third-party organization or company that issues digital certificates used 
    to create digital signatures and public-private key pairs. 
    The role of the CA in this process is to guarantee that the individual granted the unique certificate is, in fact, 
    who he or she claims to be. Usually, this means that the CA has an arrangement with a financial institution, 
    such as a credit card company, which provides it with information to confirm an individuals claimed 
    identity. CAs are a critical component in data security and electronic 
    commerce because they guarantee that 
    the two parties exchanging information are really who they claim to be.
    CRL
    Certificate Revocation List. Each Certificate Authority (CA) maintains a revoked certificates list. 
    Denial of Service attack
    DoS. A hacker attack designed to prevent your computer or network from operating or communicating.
    DHCP
    An Ethernet protocol specifying how a centralized DHCP server can assign network configuration 
    information to multiple DHCP clients. The assigned information includes IP addresses, DNS addresses, and 
    gateway (router) addresses.
    DMZ
    A Demilitarized Zone is used by a company that wants to host its own Internet services without sacrificing 
    unauthorized access to its private network. 
    The DMZ sits between the Internet and an internal networks line of defense, usually some combination of 
    firewalls and bastion hosts. Typically, the DMZ contains devices accessible to Internet traffic, such as Web 
    (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. 
    DNS
    Short for Domain Name System (or Service), an Internet service that translates domain names into IP 
    addresses. 
    Because domain names are alphabetic, theyre easier to remember. The Internet however, is really based on 
    IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the 
    corresponding IP address. For example, the domain name www.example.com might translate to 
    198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesnt know how to 
    translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. 
    Domain Name
    A descriptive name for an address or group of addresses on the Internet. Domain names are of the form of a 
    registered entity name plus one of a number of predefined top level suffixes such as .com, .edu, .uk, etc. For 
    example, in the address mail.NETGEAR.com, mail is a server name and NETGEAR.com is the domain.
    DoS
    A hacker attack designed to prevent your computer or network from operating or communicating. 
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    4Glossary
     
    DSL
    Short for digital subscriber line, but is commonly used in reference to the asymmetric version of this 
    technology (ADSL) that allows data to be sent over existing copper telephone lines at data rates of from 1.5 
    to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data 
    (known as the upstream rate). 
    ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world 
    gain access. 
    DSLAM
    DSL Access Multiplexor. The piece of equipment at the telephone company central office that provides the 
    ADSL signal.
    Dynamic Host Configuration Protocol
    DHCP. An Ethernet protocol specifying how a centralized DHCP server can assign network configuration 
    information to multiple DHCP clients. The assigned information includes IP addresses, DNS addresses, and 
    gateway (router) addresses.
    EAP
    Extensible Authentication Protocol is a general protocol for authentication that supports multiple 
    authentication methods. 
    EAP, an extension to PPP, supports such authentication methods as token cards, Kerberos, one-time 
    passwords, certificates, public key authentication and smart cards. In wireless communications using EAP, a 
    user requests connection to a WLAN through an AP, which then requests the identity of the user and 
    transmits that identity to an authentication server such as RADIUS. The server asks the AP for proof of 
    identity, which the AP gets from the user and then sends back to the server to complete the authentication. 
    EAP is defined by RFC 2284.
    ESP
    Encapsulating Security Payload.
    ESSID
    The Extended Service Set Identification (ESSID) is a thirty-two character (maximum) alphanumeric key 
    identifying the wireless local area network. 
    Gateway
    A local device, usually a router, that connects hosts on a local network to other networks.
    IETF
    Internet Engineering Task Force. Working groups of the IETF propose standard protocols and procedures for 
    the Internet, which are published as RFCs (Request for Comment) at 
    www.ietf.org.
    An open international community of network designers, operators, vendors, and researchers concerned with 
    the evolution of the Internet architecture and the smooth operation of the Internet.  
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    Glossary
    5
     
    IKE
    Internet Key Exchange. An automated method for exchanging and managing encryption keys between two 
    VPN devices.
    IP
    Internet Protocol is the main internetworking protocol used in the Internet. Used in conjunction with the 
    Transfer Control Protocol (TCP) to form TCP/IP.
    IP Address
    A four-byte number uniquely defining each host on the Internet, usually written in dotted-decimal notation 
    with periods separating the bytes (for example, 134.177.244.57). 
    Ranges of addresses are assigned by Internic, an organization formed for this purpose. 
    IPSec
    Internet Protocol Security. IPSec is a series of guidelines for securing private information transmitted over 
    public networks. IPSec is a VPN method providing a higher level of security than PPTP.
    IPX
    Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating 
    systems. 
    Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-level protocols, 
    such as SPX and NCP, are used for additional error recovery services. 
    ISP
    Internet service provider.
    Internet Protocol
    The main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control 
    Protocol (TCP) to form TCP/IP.
    LAN
    A communications network serving users within a limited area, such as one floor of a building.
    LDAP
    A set of protocols for accessing information directories. 
    Lightweight Directory Access Protocol
    LDAP. A set of protocols for accessing information directories. 
    LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And 
    unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because its a 
    simpler version of X.500, LDAP is sometimes called 
    X.500-lite. 
    local area network
    LAN. A communications network serving users within a limited area, such as one floor of a building.  
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    6Glossary
     
    A LAN typically connects multiple personal computers and shared network devices such as storage and 
    printers. Although many technologies exist to implement a LAN, Ethernet is the most common for 
    connecting personal computers.
    MAC address
    The Media Access Control address is a unique 48-bit hardware address assigned to every network interface 
    card. Usually written in the form 01:23:45:67:89:ab.
    Mbps
    Megabits per second.
    MD5
    MD5 creates digital signatures using a one-way hash function, meaning that it takes a message and converts 
    it into a fixed string of digits, also called a message digest. 
    When using a one-way hash function, one can compare a calculated message digest against the message 
    digest that is decrypted with a public key to verify that the message hasnt been tampered with. This 
    comparison is called a hashcheck. 
    MDI/MDIX
    In cable wiring, the concept of transmit and receive are from the perspective of the PC, which is wired as a 
    Media Dependant Interface (MDI). In MDI wiring, a PC transmits on pins 1 and 2. At the hub, switch, 
    router, or access point, the perspective is reversed, and the hub receives on pins 1 and 2. This wiring is 
    referred to as Media Dependant Interface - Crossover (MDI-X). See also AES.
    Maximum Receive Unit
    The size in bytes of the largest packet that can be sent or received.
    Maximum Transmit Unit
    The size in bytes of the largest packet that can be sent or received.
    Most Significant Bit or Most Significant Byte
    MSB. The portion of a number, address, or field that is farthest left when written as a single number in 
    conventional hexadecimal ordinary notation. The part of the number having the most value.
    MRU
    The size in bytes of the largest packet that can be sent or received.
    MSB
    MSB. The portion of a number, address, or field that is farthest left when written as a single number in 
    conventional hexadecimal ordinary notation. The part of the number having the most value.
    MTU
    The size in bytes of the largest packet that can be sent or received. 
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    Glossary
    7
     
    NAT
    A technique by which several hosts share a single IP address for access to the Internet.
    NetBIOS
    The Network Basic Input Output System is an application programming interface (API) for sharing services 
    and information on local-area networks (LANs). 
    Provides for communication between stations of a network where each station is given a name. These names 
    are alphanumeric names, up to 16 characters in length. 
    Network Address Translation
    NAT. A technique by which several hosts share a single IP address for access to the Internet.
    NIC
    Network Interface Card. An adapter in a computer which provides connectivity to a network.
    NID
    Network Interface Device. The point of demarcation, where the telephone line comes into the house.
    packet
    A block of information sent over a network. A packet typically contains a source and destination network 
    address, some protocol and length information, a block of data, and a checksum.
    Perfect Forward Secrecy
    Perfect Forward Secrecy (PFS) provides additional security by means of a Diffie-Hellman shared secret 
    value. With PFS, if one key is compromised, previous and subsequent keys are secure because they are not 
    derived from previous keys. 
    PKIX
    PKIX. The most widely used standard for defining digital certificates. 
    Point-to-Point Protocol
    PPP. A protocol allowing a computer using TCP/IP to connect directly to the Internet.
    PPP
    A protocol allowing a computer using TCP/IP to connect directly to the Internet.
    PPPoA
    PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPPoE
    PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection. 
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    8Glossary
     
    PPP over ATM
    PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPP over Ethernet
    PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPTP
    Point-to-Point Tunneling Protocol. A method for establishing a virtual private network (VPN) by embedding 
    Microsoft’s network protocol into Internet packets.
    PSTN
    Public Switched Telephone Network.
    Public Key Infrastructure
    PKIX. The most widely used standard for defining digital certificates. 
    X.509 is actually an ITU Recommendation, which means that it has not yet been officially defined or 
    approved. As a result, companies have implemented the standard in different ways. For example, both 
    Netscape
     and Microsoft use X.509 certificates to implement SSL in their Web servers and browsers. But an 
    X.509 Certificate generated by Netscape may not be readable by Microsoft products, and vice versa.
    RADIUS
    Short for Remote Authentication Dial-In User Service, RADIUS is an authentication system. 
    Using RADIUS, you must enter your user name and password before gaining access to a network. This 
    information is passed to a RADIUS server, which checks that the information is correct, and then authorizes 
    access. Though not an official standard, the RADIUS specification is maintained by a working group of the 
    IETF. 
    RFC
    Request For Comment. Refers to documents published by the Internet Engineering Task Force (IETF) 
    proposing standard protocols and procedures for the Internet. RFCs can be found at 
    www.ietf.org.
    RIP
    A protocol in which routers periodically exchange information with one another so that they can determine 
    minimum distance paths between sources and destinations.
    router
    A device that forwards data between networks. An IP router forwards data based on IP source and 
    destination addresses.
    Routing Information Protocol
    RIP. A protocol in which routers periodically exchange information with one another so that they can 
    determine minimum distance paths between sources and destinations. 
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    Glossary
    9
     
    router
    A device that forwards data between networks. An IP router forwards data based on IP source and 
    destination addresses.
    SSID
    A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless 
    local area network. For the wireless devices in a network to communicate with each other, all devices must 
    be configured with the same SSID. 
    This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the 
    wireless Access Point and to the wireless network name. 
    See also Wireless Network Name and ESSID.
    Subnet Mask
    A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator 
    to further divide an IP address into two or more subnets.
    An IP address has two components, the network address and the host address. For example, consider the IP 
    address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) 
    represent the Class B network address, and the second two numbers (017.009) identify a particular host on 
    this network. 
    Subnetting enables the network administrator to further divide the host part of the address into two or more 
    subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to 
    see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001 
    The Class B network part is: 10010110.11010111 
    and the host address is 00010001.00001001 
    If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are 
    reserved for identifying the subnet. 
    The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By 
    convention, the bits for the network address are all set to 1, though it would also work if the bits were set 
    exactly as in the network address.) In this case, therefore, the subnet mask would be 
    11111111.11111111.11110000.00000000. Its called a mask because it can be used to identify the subnet to 
    which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The 
    result is the subnetwork address: Subnet Mask 255.255.240.000  11111111.11111111.11110000.00000000 
    IP Address 150.215.017.009  10010110.11010111.00010001.00001001 
    Subnet Address 150.215.016.000  10010110.11010111.00010000.00000000 
    The subnet address, therefore, is 150.215.016.000. 
    TCP/IP
    The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with 
    the Transfer Control Protocol (TCP) form TCP/IP.
    TLS
    Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between 
    client/server applications communicating over the Internet.  
    						
    							Reference Manual for Cable/DSL Wireless Router WGR614 
    10Glossary
     
    The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by 
    using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the 
    TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of 
    an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s 
    SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
    Universal Plug and Play
    UPnP. A networking architecture that provides compatibility among networking technology. UPnP 
    compliant routers provide broadband users at home and small businesses with a seamless way to participate 
    in online games, videoconferencing and other peer-to-peer services.
    UTP
    Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
    VCI
    Virtual Channel Identifier. Together with the VPI, defines a Virtual Channel through an ATM network. Used 
    by ATM switching equipment to route data through the network.
    VPI
    Virtual Path Identifier. Together with the VCI, defines a Virtual Channel through an ATM network. Used by 
    ATM switching equipment to route data through the network.
    VPN
    Virtual Private Network. A method for securely transporting data between two private networks by using a 
    public network such as the Internet as a connection.
    WA N
    A long distance link used to extend or connect remotely located local area networks. The Internet is a large 
    WAN.
    WEB Proxy Server
    A Web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a 
    firewall. 
    The proxy server listens for requests from clients within the firewall and forwards these requests to remote 
    Internet servers outside the firewall. The proxy server reads responses from the external servers and then 
    sends them to internal client clients. 
    WEP
    Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. 
    All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for 
    data encryption. 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGR614 User Manual