Home > Netgear > Router > Netgear Router WGR614 V5 User Manual

Netgear Router WGR614 V5 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGR614 V5 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Glossary
    3
    June 2004 202-10036-01
    The DMZ sits between the Internet and an internal networks line of defense, usually some combination of 
    firewalls and bastion hosts. Typically, the DMZ contains devices accessible to Internet traffic, such as Web 
    (HTTP) servers, FTP servers, SMTP (e-mail) servers and DNS servers. 
    DNS
    Short for Domain Name System (or Service), an Internet service that translates domain names into IP 
    addresses. 
    Because domain names are alphabetic, theyre easier to remember. The Internet however, is really based on 
    IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the 
    corresponding IP address. For example, the domain name www.example.com might translate to 
    198.105.232.4. The DNS system is, in fact, its own network. If one DNS server doesnt know how to 
    translate a particular domain name, it asks another one, and so on, until the correct IP address is returned. 
    Domain Name
    A descriptive name for an address or group of addresses on the Internet. Domain names are of the form of a 
    registered entity name plus one of a number of predefined top level suffixes such as .com, .edu, .uk, etc. For 
    example, in the address mail.NETGEAR.com, mail is a server name and NETGEAR.com is the domain.
    DoS
    A hacker attack designed to prevent your computer or network from operating or communicating.
    DSL
    Short for digital subscriber line, but is commonly used in reference to the asymmetric version of this 
    technology (ADSL) that allows data to be sent over existing copper telephone lines at data rates of from 1.5 
    to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data 
    (known as the upstream rate). 
    ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world 
    gain access. 
    DSLAM
    DSL Access Multiplexor. The piece of equipment at the telephone company central office that provides the 
    ADSL signal.
    Dynamic Host Configuration Protocol
    DHCP. An Ethernet protocol specifying how a centralized DHCP server can assign network configuration 
    information to multiple DHCP clients. The assigned information includes IP addresses, DNS addresses, and 
    gateway (router) addresses.
    EAP
    Extensible Authentication Protocol is a general protocol for authentication that supports multiple 
    authentication methods. 
    EAP, an extension to PPP, supports such authentication methods as token cards, Kerberos, one-time 
    passwords, certificates, public key authentication and smart cards. In wireless communications using EAP, a 
    user requests connection to a WLAN through an AP, which then requests the identity of the user and  
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    4Glossary
    June 2004 202-10036-01
    transmits that identity to an authentication server such as RADIUS. The server asks the AP for proof of 
    identity, which the AP gets from the user and then sends back to the server to complete the authentication. 
    EAP is defined by RFC 2284.
    ESP
    Encapsulating Security Payload.
    ESSID
    The Extended Service Set Identification (ESSID) is a thirty-two character (maximum) alphanumeric key 
    identifying the wireless local area network. 
    Gateway
    A local device, usually a router, that connects hosts on a local network to other networks.
    IETF
    Internet Engineering Task Force. Working groups of the IETF propose standard protocols and procedures for 
    the Internet, which are published as RFCs (Request for Comment) at 
    www.ietf.org.
    An open international community of network designers, operators, vendors, and researchers concerned with 
    the evolution of the Internet architecture and the smooth operation of the Internet. 
    IP
    Internet Protocol is the main internetworking protocol used in the Internet. Used in conjunction with the 
    Transfer Control Protocol (TCP) to form TCP/IP.
    IP Address
    A four-byte number uniquely defining each host on the Internet, usually written in dotted-decimal notation 
    with periods separating the bytes (for example, 134.177.244.57). 
    Ranges of addresses are assigned by Internic, an organization formed for this purpose. 
    IPX
    Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating 
    systems. 
    Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-level protocols, 
    such as SPX and NCP, are used for additional error recovery services. 
    ISP
    Internet service provider.
    Internet Protocol
    The main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control 
    Protocol (TCP) to form TCP/IP.
    LAN
    A communications network serving users within a limited area, such as one floor of a building. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Glossary
    5
    June 2004 202-10036-01
    LDAP
    A set of protocols for accessing information directories. 
    Lightweight Directory Access Protocol
    LDAP. A set of protocols for accessing information directories. 
    LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And 
    unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because its a 
    simpler version of X.500, LDAP is sometimes called 
    X.500-lite. 
    local area network
    LAN. A communications network serving users within a limited area, such as one floor of a building. 
    A LAN typically connects multiple personal computers and shared network devices such as storage and 
    printers. Although many technologies exist to implement a LAN, Ethernet is the most common for 
    connecting personal computers.
    MAC address
    The Media Access Control address is a unique 48-bit hardware address assigned to every network interface 
    card. Usually written in the form 01:23:45:67:89:ab.
    Mbps
    Megabits per second.
    MDI/MDIX
    In cable wiring, the concept of transmit and receive are from the perspective of the computer, which is wired 
    as a Media Dependant Interface (MDI). In MDI wiring, a computer transmits on pins 1 and 2. At the hub, 
    switch, router, or access point, the perspective is reversed, and the hub receives on pins 1 and 2. This wiring 
    is referred to as Media Dependant Interface - Crossover (MDI-X). See also AES.
    Maximum Receive Unit
    The size in bytes of the largest packet that can be sent or received.
    Maximum Transmit Unit
    The size in bytes of the largest packet that can be sent or received.
    Most Significant Bit or Most Significant Byte
    MSB. The portion of a number, address, or field that is farthest left when written as a single number in 
    conventional hexadecimal ordinary notation. The part of the number having the most value.
    MRU
    The size in bytes of the largest packet that can be sent or received.
    MSB
    MSB. The portion of a number, address, or field that is farthest left when written as a single number in 
    conventional hexadecimal ordinary notation. The part of the number having the most value. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    6Glossary
    June 2004 202-10036-01
    MTU
    The size in bytes of the largest packet that can be sent or received.
    NAT
    A technique by which several hosts share a single IP address for access to the Internet.
    NetBIOS
    The Network Basic Input Output System is an application programming interface (API) for sharing services 
    and information on local-area networks (LANs). 
    Provides for communication between stations of a network where each station is given a name. These names 
    are alphanumeric names, up to 16 characters in length. 
    Network Address Translation
    NAT. A technique by which several hosts share a single IP address for access to the Internet.
    NIC
    Network Interface Card. An adapter in a computer which provides connectivity to a network.
    NID
    Network Interface Device. The point of demarcation, where the telephone line comes into the house.
    packet
    A block of information sent over a network. A packet typically contains a source and destination network 
    address, some protocol and length information, a block of data, and a checksum.
    Perfect Forward Secrecy
    Perfect Forward Secrecy (PFS) provides additional security by means of a Diffie-Hellman shared secret 
    value. With PFS, if one key is compromised, previous and subsequent keys are secure because they are not 
    derived from previous keys. 
    PKIX
    PKIX. The most widely used standard for defining digital certificates. 
    Point-to-Point Protocol
    PPP. A protocol allowing a computer using TCP/IP to connect directly to the Internet.
    PPP
    A protocol allowing a computer using TCP/IP to connect directly to the Internet.
    PPPoA
    PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Glossary
    7
    June 2004 202-10036-01
    PPPoE
    PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPP over ATM
    PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPP over Ethernet
    PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPTP
    Point-to-Point Tunneling Protocol. A method for establishing a virtual private network (VPN) by embedding 
    Microsoft’s network protocol into Internet packets.
    PSTN
    Public Switched Telephone Network.
    RADIUS
    Short for Remote Authentication Dial-In User Service, RADIUS is an authentication system. 
    Using RADIUS, you must enter your user name and password before gaining access to a network. This 
    information is passed to a RADIUS server, which checks that the information is correct, and then authorizes 
    access. Though not an official standard, the RADIUS specification is maintained by a working group of the 
    IETF. 
    RFC
    Request For Comment. Refers to documents published by the Internet Engineering Task Force (IETF) 
    proposing standard protocols and procedures for the Internet. RFCs can be found at 
    www.ietf.org.
    RIP
    A protocol in which routers periodically exchange information with one another so that they can determine 
    minimum distance paths between sources and destinations.
    router
    A device that forwards data between networks. An IP router forwards data based on IP source and 
    destination addresses.
    Routing Information Protocol
    RIP. A protocol in which routers periodically exchange information with one another so that they can 
    determine minimum distance paths between sources and destinations. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    8Glossary
    June 2004 202-10036-01
    SSID
    A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless 
    local area network. For the wireless devices in a network to communicate with each other, all devices must 
    be configured with the same SSID. 
    This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the 
    wireless Access Point and to the wireless network name. 
    See also Wireless Network Name and ESSID.
    Subnet Mask
    A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator 
    to further divide an IP address into two or more subnets.
    An IP address has two components, the network address and the host address. For example, consider the IP 
    address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) 
    represent the Class B network address, and the second two numbers (017.009) identify a particular host on 
    this network. 
    Subnetting enables the network administrator to further divide the host part of the address into two or more 
    subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to 
    see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001 
    The Class B network part is: 10010110.11010111 
    and the host address is 00010001.00001001 
    If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are 
    reserved for identifying the subnet. 
    The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By 
    convention, the bits for the network address are all set to 1, though it would also work if the bits were set 
    exactly as in the network address.) In this case, therefore, the subnet mask would be 
    11111111.11111111.11110000.00000000. Its called a mask because it can be used to identify the subnet to 
    which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The 
    result is the subnetwork address: Subnet Mask 255.255.240.000  11111111.11111111.11110000.00000000 
    IP Address 150.215.017.009  10010110.11010111.00010001.00001001 
    Subnet Address 150.215.016.000  10010110.11010111.00010000.00000000 
    The subnet address, therefore, is 150.215.016.000. 
    TCP/IP
    The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with 
    the Transfer Control Protocol (TCP) form TCP/IP.
    TLS
    Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between 
    client/server applications communicating over the Internet. 
    The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by 
    using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the 
    TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of  
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    Glossary
    9
    June 2004 202-10036-01
    an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s 
    SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
    Universal Plug and Play
    UPnP. A networking architecture that provides compatibility among networking technology. UPnP 
    compliant routers provide broadband users at home and small businesses with a seamless way to participate 
    in online games, videoconferencing and other peer-to-peer services.
    UTP
    Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
    WA N
    Wide Area Network. A long distance link used to extend or connect remotely located local area networks. 
    The Internet is a large WAN.
    WEB Proxy Server
    A Web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a 
    firewall. 
    The proxy server listens for requests from clients within the firewall and forwards these requests to remote 
    Internet servers outside the firewall. The proxy server reads responses from the external servers and then 
    sends them to internal client clients. 
    WEP
    Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. 
    All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for 
    data encryption.
    wide area network
    WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a 
    large WAN.
    Wi-Fi
    A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility 
    Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 
    802.11b devices.
    Windows Internet Naming Service
    WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names 
    to IP addresses. 
    If a remote network contains a WINS server, your Windows PCs can gather information from that WINS 
    server about its local hosts. This allows your PCs to browse that remote network using the Windows 
    Network Neighborhood feature. 
    						
    							Reference Manual for the 54 Mbps Wireless Router WGR614 v5
    10Glossary
    June 2004 202-10036-01
    WINS
    WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names 
    to IP addresses.
    Wireless Network Name (SSID)
    Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or 
    ESSID configuration parameter. 
    WPA
    Wi-Fi Protected Access (WPA) is a specification of standards-based, interoperable security enhancements 
    that increase the level of data protection and access control for existing and future wireless LAN systems. 
    						
    							Index1
    Numerics
    802.11b  D-1
    A
    Account Name  3-14, 6-2
    Address Resolution Protocol  B-8
    ad-hoc mode  D-2
    Auto MDI/MDI-X  B-15, G-2
    Auto Uplink  2-3, B-15, G-2
    B
    backup configuration  6-6
    Basic Wireless Connectivity  4-7
    Basic Wireless Settings  4-11
    BSSID  D-2
    C
    Cabling  B-11
    Cat5 cable  B-12, C-1, G-2
    configuration
    automatic by DHCP  2-4
    backup  6-6
    erasing  6-7
    restore  6-8
    router, initial  3-1
    content filtering  2-2, 5-1
    conventions
    typography  1-1
    crossover cable  2-3, 8-2, B-14, B-15, G-2
    customer support  1-iii
    D
    date and time  8-8
    Daylight Savings Time  8-8
    daylight savings time  5-8
    Default DMZ Server  7-8
    Denial of Service (DoS) protection  2-2
    denial of service attack  B-11
    DHCP  B-10
    DHCP Client ID  C-18
    DMZ  2-3, 7-4, 7-8
    DMZ Server  7-8
    DNS Proxy  2-4
    DNS server  C-22
    DNS, dynamic  7-13
    domain  C-22
    Domain Name  3-14
    domain name server (DNS)  B-9
    DoS attack  B-11
    Dynamic DNS  7-13
    E
    EnterNet  C-20
    erase configuration  6-7
    ESSID  4-8, D-2
    Ethernet  2-3
    Ethernet cable  B-11
    F
    factory settings, restoring  6-7
    firewall features  2-2
    Flash memory, for firmware upgrade  2-2
    Index 
    						
    							2Index
    front panel  2-6, 2-7
    fully qualified domain name (FQDN)  4-5
    G
    gateway address  C-22
    H
    Half Life  7-6
    host name  3-14
    I
    IANA
    contacting  B-2
    IETF  B-1
    Web site address  B-7
    infrastructure mode  D-2
    installation  2-4
    Internet account
    address information  C-20
    establishing  C-20
    IP addresses  C-21, C-22
    and NAT  B-7
    and the Internet  B-2
    assigning  B-2, B-9
    auto-generated  8-3
    private  B-7
    translating  B-9
    IP configuration by DHCP  B-10
    IP networking
    for Macintosh  C-18
    for Windows  C-4, C-9
    K
    KALI  7-6
    L
    LAN IP Setup Menu  7-10
    LEDs
    troubleshooting  8-2
    logsending  5-7
    log entries  5-6
    Logout  3-11, 3-12
    M
    MAC address  8-7, B-8
    spoofing  3-14, 8-5
    Macintosh  C-21
    configuring for IP networking  C-18
    DHCP Client ID  C-18
    Obtaining ISP Configuration Information  C-22
    masquerading  C-20
    MDI/MDI-X  B-15, G-2
    MDI/MDI-X wiring  B-14, G-5
    metric  7-15
    N
    NAT  C-20
    NAT. See Network Address Translation
    netmask
    translation table  B-6
    Network Address Translation  2-4, B-7, C-20
    Network Time Protocol  5-8, 8-8
    NTP  5-8, 8-8
    O
    Open System authentication  D-4
    P
    package contents  2-5
    Passphrase  4-4, 4-6, 4-10, 4-11
    passphrase  2-2
    password
    restoring  8-7
    PC, using to configure  C-23
    ping  7-8
    placement  4-1
    port filtering  5-3 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGR614 V5 User Manual