Netgear Router WGR614 V5 User Manual
Have a look at the manual Netgear Router WGR614 V5 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Glossary 3 June 2004 202-10036-01 The DMZ sits between the Internet and an internal networks line of defense, usually some combination of firewalls and bastion hosts. Typically, the DMZ contains devices accessible to Internet traffic, such as Web (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. DNS Short for Domain Name System (or Service), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, theyre easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesnt know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. Domain Name A descriptive name for an address or group of addresses on the Internet. Domain names are of the form of a registered entity name plus one of a number of predefined top level suffixes such as .com, .edu, .uk, etc. For example, in the address mail.NETGEAR.com, mail is a server name and NETGEAR.com is the domain. DoS A hacker attack designed to prevent your computer or network from operating or communicating. DSL Short for digital subscriber line, but is commonly used in reference to the asymmetric version of this technology (ADSL) that allows data to be sent over existing copper telephone lines at data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate). ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world gain access. DSLAM DSL Access Multiplexor. The piece of equipment at the telephone company central office that provides the ADSL signal. Dynamic Host Configuration Protocol DHCP. An Ethernet protocol specifying how a centralized DHCP server can assign network configuration information to multiple DHCP clients. The assigned information includes IP addresses, DNS addresses, and gateway (router) addresses. EAP Extensible Authentication Protocol is a general protocol for authentication that supports multiple authentication methods. EAP, an extension to PPP, supports such authentication methods as token cards, Kerberos, one-time passwords, certificates, public key authentication and smart cards. In wireless communications using EAP, a user requests connection to a WLAN through an AP, which then requests the identity of the user and
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 4Glossary June 2004 202-10036-01 transmits that identity to an authentication server such as RADIUS. The server asks the AP for proof of identity, which the AP gets from the user and then sends back to the server to complete the authentication. EAP is defined by RFC 2284. ESP Encapsulating Security Payload. ESSID The Extended Service Set Identification (ESSID) is a thirty-two character (maximum) alphanumeric key identifying the wireless local area network. Gateway A local device, usually a router, that connects hosts on a local network to other networks. IETF Internet Engineering Task Force. Working groups of the IETF propose standard protocols and procedures for the Internet, which are published as RFCs (Request for Comment) at www.ietf.org. An open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. IP Internet Protocol is the main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control Protocol (TCP) to form TCP/IP. IP Address A four-byte number uniquely defining each host on the Internet, usually written in dotted-decimal notation with periods separating the bytes (for example, 134.177.244.57). Ranges of addresses are assigned by Internic, an organization formed for this purpose. IPX Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating systems. Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-level protocols, such as SPX and NCP, are used for additional error recovery services. ISP Internet service provider. Internet Protocol The main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control Protocol (TCP) to form TCP/IP. LAN A communications network serving users within a limited area, such as one floor of a building.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Glossary 5 June 2004 202-10036-01 LDAP A set of protocols for accessing information directories. Lightweight Directory Access Protocol LDAP. A set of protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because its a simpler version of X.500, LDAP is sometimes called X.500-lite. local area network LAN. A communications network serving users within a limited area, such as one floor of a building. A LAN typically connects multiple personal computers and shared network devices such as storage and printers. Although many technologies exist to implement a LAN, Ethernet is the most common for connecting personal computers. MAC address The Media Access Control address is a unique 48-bit hardware address assigned to every network interface card. Usually written in the form 01:23:45:67:89:ab. Mbps Megabits per second. MDI/MDIX In cable wiring, the concept of transmit and receive are from the perspective of the computer, which is wired as a Media Dependant Interface (MDI). In MDI wiring, a computer transmits on pins 1 and 2. At the hub, switch, router, or access point, the perspective is reversed, and the hub receives on pins 1 and 2. This wiring is referred to as Media Dependant Interface - Crossover (MDI-X). See also AES. Maximum Receive Unit The size in bytes of the largest packet that can be sent or received. Maximum Transmit Unit The size in bytes of the largest packet that can be sent or received. Most Significant Bit or Most Significant Byte MSB. The portion of a number, address, or field that is farthest left when written as a single number in conventional hexadecimal ordinary notation. The part of the number having the most value. MRU The size in bytes of the largest packet that can be sent or received. MSB MSB. The portion of a number, address, or field that is farthest left when written as a single number in conventional hexadecimal ordinary notation. The part of the number having the most value.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 6Glossary June 2004 202-10036-01 MTU The size in bytes of the largest packet that can be sent or received. NAT A technique by which several hosts share a single IP address for access to the Internet. NetBIOS The Network Basic Input Output System is an application programming interface (API) for sharing services and information on local-area networks (LANs). Provides for communication between stations of a network where each station is given a name. These names are alphanumeric names, up to 16 characters in length. Network Address Translation NAT. A technique by which several hosts share a single IP address for access to the Internet. NIC Network Interface Card. An adapter in a computer which provides connectivity to a network. NID Network Interface Device. The point of demarcation, where the telephone line comes into the house. packet A block of information sent over a network. A packet typically contains a source and destination network address, some protocol and length information, a block of data, and a checksum. Perfect Forward Secrecy Perfect Forward Secrecy (PFS) provides additional security by means of a Diffie-Hellman shared secret value. With PFS, if one key is compromised, previous and subsequent keys are secure because they are not derived from previous keys. PKIX PKIX. The most widely used standard for defining digital certificates. Point-to-Point Protocol PPP. A protocol allowing a computer using TCP/IP to connect directly to the Internet. PPP A protocol allowing a computer using TCP/IP to connect directly to the Internet. PPPoA PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Glossary 7 June 2004 202-10036-01 PPPoE PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPP over ATM PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPP over Ethernet PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPTP Point-to-Point Tunneling Protocol. A method for establishing a virtual private network (VPN) by embedding Microsoft’s network protocol into Internet packets. PSTN Public Switched Telephone Network. RADIUS Short for Remote Authentication Dial-In User Service, RADIUS is an authentication system. Using RADIUS, you must enter your user name and password before gaining access to a network. This information is passed to a RADIUS server, which checks that the information is correct, and then authorizes access. Though not an official standard, the RADIUS specification is maintained by a working group of the IETF. RFC Request For Comment. Refers to documents published by the Internet Engineering Task Force (IETF) proposing standard protocols and procedures for the Internet. RFCs can be found at www.ietf.org. RIP A protocol in which routers periodically exchange information with one another so that they can determine minimum distance paths between sources and destinations. router A device that forwards data between networks. An IP router forwards data based on IP source and destination addresses. Routing Information Protocol RIP. A protocol in which routers periodically exchange information with one another so that they can determine minimum distance paths between sources and destinations.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 8Glossary June 2004 202-10036-01 SSID A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID. Subnet Mask A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator to further divide an IP address into two or more subnets. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network. Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001 The Class B network part is: 10010110.11010111 and the host address is 00010001.00001001 If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet. The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. Its called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address: Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000 IP Address 150.215.017.009 10010110.11010111.00010001.00001001 Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000 The subnet address, therefore, is 150.215.016.000. TCP/IP The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with the Transfer Control Protocol (TCP) form TCP/IP. TLS Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between client/server applications communicating over the Internet. The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Glossary 9 June 2004 202-10036-01 an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable. Universal Plug and Play UPnP. A networking architecture that provides compatibility among networking technology. UPnP compliant routers provide broadband users at home and small businesses with a seamless way to participate in online games, videoconferencing and other peer-to-peer services. UTP Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks. WA N Wide Area Network. A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN. WEB Proxy Server A Web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a firewall. The proxy server listens for requests from clients within the firewall and forwards these requests to remote Internet servers outside the firewall. The proxy server reads responses from the external servers and then sends them to internal client clients. WEP Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for data encryption. wide area network WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN. Wi-Fi A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 802.11b devices. Windows Internet Naming Service WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names to IP addresses. If a remote network contains a WINS server, your Windows PCs can gather information from that WINS server about its local hosts. This allows your PCs to browse that remote network using the Windows Network Neighborhood feature.
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 10Glossary June 2004 202-10036-01 WINS WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names to IP addresses. Wireless Network Name (SSID) Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or ESSID configuration parameter. WPA Wi-Fi Protected Access (WPA) is a specification of standards-based, interoperable security enhancements that increase the level of data protection and access control for existing and future wireless LAN systems.
Index1 Numerics 802.11b D-1 A Account Name 3-14, 6-2 Address Resolution Protocol B-8 ad-hoc mode D-2 Auto MDI/MDI-X B-15, G-2 Auto Uplink 2-3, B-15, G-2 B backup configuration 6-6 Basic Wireless Connectivity 4-7 Basic Wireless Settings 4-11 BSSID D-2 C Cabling B-11 Cat5 cable B-12, C-1, G-2 configuration automatic by DHCP 2-4 backup 6-6 erasing 6-7 restore 6-8 router, initial 3-1 content filtering 2-2, 5-1 conventions typography 1-1 crossover cable 2-3, 8-2, B-14, B-15, G-2 customer support 1-iii D date and time 8-8 Daylight Savings Time 8-8 daylight savings time 5-8 Default DMZ Server 7-8 Denial of Service (DoS) protection 2-2 denial of service attack B-11 DHCP B-10 DHCP Client ID C-18 DMZ 2-3, 7-4, 7-8 DMZ Server 7-8 DNS Proxy 2-4 DNS server C-22 DNS, dynamic 7-13 domain C-22 Domain Name 3-14 domain name server (DNS) B-9 DoS attack B-11 Dynamic DNS 7-13 E EnterNet C-20 erase configuration 6-7 ESSID 4-8, D-2 Ethernet 2-3 Ethernet cable B-11 F factory settings, restoring 6-7 firewall features 2-2 Flash memory, for firmware upgrade 2-2 Index
2Index front panel 2-6, 2-7 fully qualified domain name (FQDN) 4-5 G gateway address C-22 H Half Life 7-6 host name 3-14 I IANA contacting B-2 IETF B-1 Web site address B-7 infrastructure mode D-2 installation 2-4 Internet account address information C-20 establishing C-20 IP addresses C-21, C-22 and NAT B-7 and the Internet B-2 assigning B-2, B-9 auto-generated 8-3 private B-7 translating B-9 IP configuration by DHCP B-10 IP networking for Macintosh C-18 for Windows C-4, C-9 K KALI 7-6 L LAN IP Setup Menu 7-10 LEDs troubleshooting 8-2 logsending 5-7 log entries 5-6 Logout 3-11, 3-12 M MAC address 8-7, B-8 spoofing 3-14, 8-5 Macintosh C-21 configuring for IP networking C-18 DHCP Client ID C-18 Obtaining ISP Configuration Information C-22 masquerading C-20 MDI/MDI-X B-15, G-2 MDI/MDI-X wiring B-14, G-5 metric 7-15 N NAT C-20 NAT. See Network Address Translation netmask translation table B-6 Network Address Translation 2-4, B-7, C-20 Network Time Protocol 5-8, 8-8 NTP 5-8, 8-8 O Open System authentication D-4 P package contents 2-5 Passphrase 4-4, 4-6, 4-10, 4-11 passphrase 2-2 password restoring 8-7 PC, using to configure C-23 ping 7-8 placement 4-1 port filtering 5-3