Home > Netgear > Router > Netgear Router WGT624 V2 User Manual

Netgear Router WGT624 V2 User Manual

Here you can view all the pages of manual Netgear Router WGT624 V2 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 131

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
Wireless Networking Basics D-3
M-10153-01
Authentication and WEP
The absence of a physical connection between nodes makes the wireless links vulnerable to 
eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 
standard has defined two types of authentication methods, Open System and Shared Key. With 
Open System authentication, a wireless PC can join any network and receive any messages that are...

Page 132

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
D-4 Wireless Networking Basics
M-10153-01
• Shared Key Authentication requires that the station and the access point have the same WEP 
Key to authenticate. These two authentication procedures are described below.
Open System Authentication
The following steps occur when two devices use Open System Authentication:
1.The station sends an authentication request to the access point.
2.The access point authenticates the station.
3.The...

Page 133

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
Wireless Networking Basics D-5
M-10153-01
5.The station connects to the network.
If the decrypted text does not match the original challenge text (i.e., the access point and station do 
not share the same WEP Key), then the access point will refuse to authenticate the station and the 
station will be unable to communicate with either the 802.11 network or Ethernet network.
This process is illustrated in below.
Figure 7-5:  Shared key...

Page 134

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
D-6 Wireless Networking Basics
M-10153-01
3. Use WEP for Authentication and Encryption: A transmitting 802.11 device encrypts the data 
portion of every packet it sends using a configured WEP Key. The receiving 802.11 device 
decrypts the data using the same WEP Key. For authentication purposes, the 802.11 network uses 
Shared Key Authentication.
Note: Some 802.11 access points also support Use WEP for Authentication Only (Shared Key...

Page 135

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
Wireless Networking Basics D-7
M-10153-01
WEP Configuration Options
The WEP settings must match on all 802.11 devices that are within the same wireless network as 
identified by the SSID. In general, if your mobile clients will roam between access points, then all 
of the 802.11 access points and all of the 802.11 client adapters on the network must have the same 
WEP settings. 
Note: Whatever keys you enter for an AP, you must also...

Page 136

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
D-8 Wireless Networking Basics
M-10153-01
The radio frequency channels used are listed in Ta b l e  7 - 1:
Note: The available channels supported by the wireless products in various countries are different.
The preferred channel separation between the channels in neighboring wireless networks is 25 
MHz (5 channels). This means that you can apply up to three different channels within your 
wireless network. There are only 11 usable...

Page 137

M-10153-01 Glossary
1
Glossary
Use the list below to find definitions for technical terms used in this manual.
List of Glossary Terms
10BASE-T 
IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
100BASE-Tx 
IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
3DES
3DES (Triple DES) achieves a high level of security by encrypting the data three times using DES with three 
different, unrelated keys.
802.1x
802.1x defines port-based, network access control used to...

Page 138

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
2Glossary
M-10153-01
ADSL
Short for asymmetric digital subscriber line, a technology that allows data to be sent over existing copper 
telephone lines at data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and 
from 16 to 640 Kbps when sending data (known as the upstream rate). 
ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world 
gain access. 
AES
Advanced...

Page 139

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
Glossary
3
M-10153-01
A Certificate Authority is a trusted third-party organization or company that issues digital certificates used 
to create digital signatures and public-private key pairs. 
The role of the CA in this process is to guarantee that the individual granted the unique certificate is, in fact, 
who he or she claims to be. Usually, this means that the CA has an arrangement with a financial institution, 
such as a credit...

Page 140

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
4Glossary
M-10153-01
DSL
Short for digital subscriber line, but is commonly used in reference to the asymmetric version of this 
technology (ADSL) that allows data to be sent over existing copper telephone lines at data rates of from 1.5 
to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data 
(known as the upstream rate). 
ADSL requires a special ADSL modem. ADSL is growing in popularity...
Start reading Netgear Router WGT624 V2 User Manual

Related Manuals for Netgear Router WGT624 V2 User Manual

All Netgear manuals