Home > Netgear > Router > Netgear Router WGT624 V2 User Manual

Netgear Router WGT624 V2 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGT624 V2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Glossary
    5
    M-10153-01
    IKE
    Internet Key Exchange. An automated method for exchanging and managing encryption keys between two 
    VPN devices.
    IP
    Internet Protocol is the main internetworking protocol used in the Internet. Used in conjunction with the 
    Transfer Control Protocol (TCP) to form TCP/IP.
    IP Address
    A four-byte number uniquely defining each host on the Internet, usually written in dotted-decimal notation 
    with periods separating the bytes (for example, 134.177.244.57). 
    Ranges of addresses are assigned by Internic, an organization formed for this purpose. 
    IPSec
    Internet Protocol Security. IPSec is a series of guidelines for securing private information transmitted over 
    public networks. IPSec is a VPN method providing a higher level of security than PPTP.
    IPX
    Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating 
    systems. 
    Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-level protocols, 
    such as SPX and NCP, are used for additional error recovery services. 
    ISP
    Internet service provider.
    Internet Protocol
    The main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control 
    Protocol (TCP) to form TCP/IP.
    LAN
    A communications network serving users within a limited area, such as one floor of a building.
    LDAP
    A set of protocols for accessing information directories. 
    Lightweight Directory Access Protocol
    LDAP. A set of protocols for accessing information directories. 
    LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And 
    unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because its a 
    simpler version of X.500, LDAP is sometimes called 
    X.500-lite. 
    local area network
    LAN. A communications network serving users within a limited area, such as one floor of a building.  
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    6Glossary
    M-10153-01
    A LAN typically connects multiple personal computers and shared network devices such as storage and 
    printers. Although many technologies exist to implement a LAN, Ethernet is the most common for 
    connecting personal computers.
    MAC address
    The Media Access Control address is a unique 48-bit hardware address assigned to every network interface 
    card. Usually written in the form 01:23:45:67:89:ab.
    Mbps
    Megabits per second.
    MD5
    MD5 creates digital signatures using a one-way hash function, meaning that it takes a message and converts 
    it into a fixed string of digits, also called a message digest. 
    When using a one-way hash function, one can compare a calculated message digest against the message 
    digest that is decrypted with a public key to verify that the message hasnt been tampered with. This 
    comparison is called a hashcheck. 
    MDI/MDIX
    In cable wiring, the concept of transmit and receive are from the perspective of the PC, which is wired as a 
    Media Dependant Interface (MDI). In MDI wiring, a PC transmits on pins 1 and 2. At the hub, switch, 
    router, or access point, the perspective is reversed, and the hub receives on pins 1 and 2. This wiring is 
    referred to as Media Dependant Interface - Crossover (MDI-X). See also AES.
    Maximum Receive Unit
    The size in bytes of the largest packet that can be sent or received.
    Maximum Transmit Unit
    The size in bytes of the largest packet that can be sent or received.
    Most Significant Bit or Most Significant Byte
    MSB. The portion of a number, address, or field that is farthest left when written as a single number in 
    conventional hexadecimal ordinary notation. The part of the number having the most value.
    MRU
    The size in bytes of the largest packet that can be sent or received.
    MSB
    MSB. The portion of a number, address, or field that is farthest left when written as a single number in 
    conventional hexadecimal ordinary notation. The part of the number having the most value.
    MTU
    The size in bytes of the largest packet that can be sent or received. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Glossary
    7
    M-10153-01
    NAT
    A technique by which several hosts share a single IP address for access to the Internet.
    NetBIOS
    The Network Basic Input Output System is an application programming interface (API) for sharing services 
    and information on local-area networks (LANs). 
    Provides for communication between stations of a network where each station is given a name. These names 
    are alphanumeric names, up to 16 characters in length. 
    Network Address Translation
    NAT. A technique by which several hosts share a single IP address for access to the Internet.
    NIC
    Network Interface Card. An adapter in a computer which provides connectivity to a network.
    NID
    Network Interface Device. The point of demarcation, where the telephone line comes into the house.
    packet
    A block of information sent over a network. A packet typically contains a source and destination network 
    address, some protocol and length information, a block of data, and a checksum.
    Perfect Forward Secrecy
    Perfect Forward Secrecy (PFS) provides additional security by means of a Diffie-Hellman shared secret 
    value. With PFS, if one key is compromised, previous and subsequent keys are secure because they are not 
    derived from previous keys. 
    PKIX
    PKIX. The most widely used standard for defining digital certificates. 
    Point-to-Point Protocol
    PPP. A protocol allowing a computer using TCP/IP to connect directly to the Internet.
    PPP
    A protocol allowing a computer using TCP/IP to connect directly to the Internet.
    PPPoA
    PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPPoE
    PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    8Glossary
    M-10153-01
    PPP over ATM
    PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPP over Ethernet
    PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on 
    connection by simulating a dial-up connection.
    PPTP
    Point-to-Point Tunneling Protocol. A method for establishing a virtual private network (VPN) by embedding 
    Microsoft’s network protocol into Internet packets.
    PSTN
    Public Switched Telephone Network.
    Public Key Infrastructure
    PKIX. The most widely used standard for defining digital certificates. 
    X.509 is actually an ITU Recommendation, which means that it has not yet been officially defined or 
    approved. As a result, companies have implemented the standard in different ways. For example, both 
    Netscape
     and Microsoft use X.509 certificates to implement SSL in their web servers and browsers. But an 
    X.509 Certificate generated by Netscape may not be readable by Microsoft products, and vice versa.
    RADIUS
    Short for Remote Authentication Dial-In User Service, RADIUS is an authentication system. 
    Using RADIUS, you must enter your user name and password before gaining access to a network. This 
    information is passed to a RADIUS server, which checks that the information is correct, and then authorizes 
    access. Though not an official standard, the RADIUS specification is maintained by a working group of the 
    IETF. 
    RFC
    Request For Comment. Refers to documents published by the Internet Engineering Task Force (IETF) 
    proposing standard protocols and procedures for the Internet. RFCs can be found at 
    www.ietf.org.
    RIP
    A protocol in which routers periodically exchange information with one another so that they can determine 
    minimum distance paths between sources and destinations.
    router
    A device that forwards data between networks. An IP router forwards data based on IP source and 
    destination addresses.
    Routing Information Protocol
    RIP. A protocol in which routers periodically exchange information with one another so that they can 
    determine minimum distance paths between sources and destinations. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Glossary
    9
    M-10153-01
    router
    A device that forwards data between networks. An IP router forwards data based on IP source and 
    destination addresses.
    SSID
    A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless 
    local area network. For the wireless devices in a network to communicate with each other, all devices must 
    be configured with the same SSID. 
    This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the 
    wireless Access Point and to the wireless network name. 
    See also Wireless Network Name and ESSID.
    Subnet Mask
    A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator 
    to further divide an IP address into two or more subnets.
    An IP address has two components, the network address and the host address. For example, consider the IP 
    address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) 
    represent the Class B network address, and the second two numbers (017.009) identify a particular host on 
    this network. 
    Subnetting enables the network administrator to further divide the host part of the address into two or more 
    subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to 
    see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001 
    The Class B network part is: 10010110.11010111 
    and the host address is 00010001.00001001 
    If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are 
    reserved for identifying the subnet. 
    The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By 
    convention, the bits for the network address are all set to 1, though it would also work if the bits were set 
    exactly as in the network address.) In this case, therefore, the subnet mask would be 
    11111111.11111111.11110000.00000000. Its called a mask because it can be used to identify the subnet to 
    which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The 
    result is the subnetwork address: Subnet Mask 255.255.240.000  11111111.11111111.11110000.00000000 
    IP Address 150.215.017.009  10010110.11010111.00010001.00001001 
    Subnet Address 150.215.016.000  10010110.11010111.00010000.00000000 
    The subnet address, therefore, is 150.215.016.000. 
    TCP/IP
    The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with 
    the Transfer Control Protocol (TCP) form TCP/IP.
    TLS
    Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between 
    client/server applications communicating over the Internet.  
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    10Glossary
    M-10153-01
    The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by 
    using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the 
    TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of 
    an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s 
    SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
    Universal Plug and Play
    UPnP. A networking architecture that provides compatibility among networking technology. UPnP 
    compliant routers provide broadband users at home and small businesses with a seamless way to participate 
    in online games, videoconferencing and other peer-to-peer services.
    UTP
    Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
    VCI
    Virtual Channel Identifier. Together with the VPI, defines a Virtual Channel through an ATM network. Used 
    by ATM switching equipment to route data through the network.
    VPI
    Virtual Path Identifier. Together with the VCI, defines a Virtual Channel through an ATM network. Used by 
    ATM switching equipment to route data through the network.
    VPN
    Virtual Private Network. A method for securely transporting data between two private networks by using a 
    public network such as the Internet as a connection.
    WA N
    A long distance link used to extend or connect remotely located local area networks. The Internet is a large 
    WAN.
    WEB Proxy Server
    A web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a 
    firewall. 
    The proxy server listens for requests from clients within the firewall and forwards these requests to remote 
    Internet servers outside the firewall. The proxy server reads responses from the external servers and then 
    sends them to internal client clients. 
    WEP
    Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. 
    All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for 
    data encryption. 
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    Glossary
    11
    M-10153-01
    wide area network
    WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a 
    large WAN.
    Wi-Fi
    A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility 
    Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 
    802.11b devices.
    Windows Internet Naming Service
    WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names 
    to IP addresses. 
    If a remote network contains a WINS server, your Windows PCs can gather information from that WINS 
    server about its local hosts. This allows your PCs to browse that remote network using the Windows 
    Network Neighborhood feature.
    WINS
    WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names 
    to IP addresses.
    Wireless Network Name (SSID)
    Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or 
    ESSID configuration parameter.  
    						
    							Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
    12Glossary
    M-10153-01 
    						
    							Index1
    Numerics
    64 or 128 bit WEP  4-6
    802.11b  D-1
    A
    Account Name  3-11, 3-14, 6-2
    Address Resolution Protocol  B-8
    ad-hoc mode  D-2
    Authentication Server  3-10
    Auto MDI/MDI-X  B-14, G-2
    Auto Uplink  2-3, B-14, G-2
    B
    backup configuration  6-7
    Basic Wireless Connectivity  4-8
    BSSID  D-2
    C
    Cabling  B-11
    Cat5 cable  3-1, B-12, G-2
    configuration
    automatic by DHCP  2-4
    backup  6-7
    erasing  6-8
    restore  6-6
    router, initial  3-1
    content filtering  2-2, 5-1
    conventions
    typography  1-1
    crossover cable  2-3, 8-2, B-14, G-2
    customer support  1-v
    D
    date and time  8-7
    Daylight Savings Time  8-7
    daylight savings time  5-8
    Default DMZ Server  7-4
    Denial of Service (DoS) protection  2-2
    denial of service attack  B-11
    DHCP  B-10
    DHCP Client ID  C-16
    DMZ  2-3, 7-2, 7-5
    DMZ Server  7-4
    DNS Proxy  2-4
    DNS server  3-11, C-20
    DNS, dynamic  7-6
    documentation updates  1-1, 3-8, 6-5, 8-1
    domain  C-20
    Domain Name  3-11, 3-14
    domain name server (DNS)  B-9
    DoS attack  B-11
    Dynamic DNS  7-6
    E
    Encryption Strength  4-6
    End Port  7-2
    EnterNet  C-18
    erase configuration  6-8
    ESSID  4-8, D-2
    Ethernet  2-3
    Ethernet cable  B-11
    Index 
    						
    							2Index
    F
    factory settings, restoring  6-8
    firewall features  2-2
    Flash memory, for firmware upgrade  2-2
    front panel  2-6, 2-7
    fully qualified domain name (FQDN)  4-4
    G
    gateway address  C-20
    H
    Half Life  7-3
    host name  3-11, 3-14
    I
    IANA
    contacting  B-2
    IETF  B-1
    Web site address  B-7
    infrastructure mode  D-2
    installation  2-4
    Internet account
    address information  C-18
    establishing  C-18
    Internet Service Provider  3-1
    IP addresses  C-19, C-20
    and NAT  B-7
    and the Internet  B-2
    assigning  B-2, B-9
    auto-generated  8-3
    private  B-7
    translating  B-9
    IP configuration by DHCP  B-10
    IP networking
    for Macintosh  C-16
    for Windows  C-2, C-7
    ISP  3-1
    K
    KALI  7-3
    L
    LAN IP Setup Menu  7-7
    LEDs
    description  2-6
    troubleshooting  8-2
    log
    sending  5-7
    log entries  5-5
    Login  3-10
    M
    MAC address  8-7, B-8
    spoofing  3-10, 3-14, 8-5
    Macintosh  C-19
    configuring for IP networking  C-16
    DHCP Client ID  C-16
    Obtaining ISP Configuration Information  C-20
    masquerading  C-18
    MDI/MDI-X  B-14, G-2
    MDI/MDI-X wiring  B-14, G-6
    metric  7-11
    N
    NAT  C-18
    NAT. See Network Address Translation
    netmask
    translation table  B-6
    Network Address Translation  2-4, B-7, C-18
    Network Time Protocol  5-8, 8-7
    NTP  5-8, 8-7
    O
    Open System authentication  D-3 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGT624 V2 User Manual