Netgear Router WGT624 V2 User Manual
Here you can view all the pages of manual Netgear Router WGT624 V2 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 131
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Wireless Networking Basics D-3 M-10153-01 Authentication and WEP The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined two types of authentication methods, Open System and Shared Key. With Open System authentication, a wireless PC can join any network and receive any messages that are...
Page 132
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 D-4 Wireless Networking Basics M-10153-01 • Shared Key Authentication requires that the station and the access point have the same WEP Key to authenticate. These two authentication procedures are described below. Open System Authentication The following steps occur when two devices use Open System Authentication: 1.The station sends an authentication request to the access point. 2.The access point authenticates the station. 3.The...
Page 133
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Wireless Networking Basics D-5 M-10153-01 5.The station connects to the network. If the decrypted text does not match the original challenge text (i.e., the access point and station do not share the same WEP Key), then the access point will refuse to authenticate the station and the station will be unable to communicate with either the 802.11 network or Ethernet network. This process is illustrated in below. Figure 7-5: Shared key...
Page 134
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 D-6 Wireless Networking Basics M-10153-01 3. Use WEP for Authentication and Encryption: A transmitting 802.11 device encrypts the data portion of every packet it sends using a configured WEP Key. The receiving 802.11 device decrypts the data using the same WEP Key. For authentication purposes, the 802.11 network uses Shared Key Authentication. Note: Some 802.11 access points also support Use WEP for Authentication Only (Shared Key...
Page 135
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Wireless Networking Basics D-7 M-10153-01 WEP Configuration Options The WEP settings must match on all 802.11 devices that are within the same wireless network as identified by the SSID. In general, if your mobile clients will roam between access points, then all of the 802.11 access points and all of the 802.11 client adapters on the network must have the same WEP settings. Note: Whatever keys you enter for an AP, you must also...
Page 136
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 D-8 Wireless Networking Basics M-10153-01 The radio frequency channels used are listed in Ta b l e 7 - 1: Note: The available channels supported by the wireless products in various countries are different. The preferred channel separation between the channels in neighboring wireless networks is 25 MHz (5 channels). This means that you can apply up to three different channels within your wireless network. There are only 11 usable...
Page 137
M-10153-01 Glossary 1 Glossary Use the list below to find definitions for technical terms used in this manual. List of Glossary Terms 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring. 100BASE-Tx IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring. 3DES 3DES (Triple DES) achieves a high level of security by encrypting the data three times using DES with three different, unrelated keys. 802.1x 802.1x defines port-based, network access control used to...
Page 138
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 2Glossary M-10153-01 ADSL Short for asymmetric digital subscriber line, a technology that allows data to be sent over existing copper telephone lines at data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate). ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world gain access. AES Advanced...
Page 139
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Glossary 3 M-10153-01 A Certificate Authority is a trusted third-party organization or company that issues digital certificates used to create digital signatures and public-private key pairs. The role of the CA in this process is to guarantee that the individual granted the unique certificate is, in fact, who he or she claims to be. Usually, this means that the CA has an arrangement with a financial institution, such as a credit...
Page 140
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 4Glossary M-10153-01 DSL Short for digital subscriber line, but is commonly used in reference to the asymmetric version of this technology (ADSL) that allows data to be sent over existing copper telephone lines at data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate). ADSL requires a special ADSL modem. ADSL is growing in popularity...