Netgear Router WGT624 V2 User Manual
Have a look at the manual Netgear Router WGT624 V2 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Glossary 5 M-10153-01 IKE Internet Key Exchange. An automated method for exchanging and managing encryption keys between two VPN devices. IP Internet Protocol is the main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control Protocol (TCP) to form TCP/IP. IP Address A four-byte number uniquely defining each host on the Internet, usually written in dotted-decimal notation with periods separating the bytes (for example, 134.177.244.57). Ranges of addresses are assigned by Internic, an organization formed for this purpose. IPSec Internet Protocol Security. IPSec is a series of guidelines for securing private information transmitted over public networks. IPSec is a VPN method providing a higher level of security than PPTP. IPX Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating systems. Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-level protocols, such as SPX and NCP, are used for additional error recovery services. ISP Internet service provider. Internet Protocol The main internetworking protocol used in the Internet. Used in conjunction with the Transfer Control Protocol (TCP) to form TCP/IP. LAN A communications network serving users within a limited area, such as one floor of a building. LDAP A set of protocols for accessing information directories. Lightweight Directory Access Protocol LDAP. A set of protocols for accessing information directories. LDAP is based on the standards contained within the X.500 standard, but is significantly simpler. And unlike X.500, LDAP supports TCP/IP, which is necessary for any type of Internet access. Because its a simpler version of X.500, LDAP is sometimes called X.500-lite. local area network LAN. A communications network serving users within a limited area, such as one floor of a building.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 6Glossary M-10153-01 A LAN typically connects multiple personal computers and shared network devices such as storage and printers. Although many technologies exist to implement a LAN, Ethernet is the most common for connecting personal computers. MAC address The Media Access Control address is a unique 48-bit hardware address assigned to every network interface card. Usually written in the form 01:23:45:67:89:ab. Mbps Megabits per second. MD5 MD5 creates digital signatures using a one-way hash function, meaning that it takes a message and converts it into a fixed string of digits, also called a message digest. When using a one-way hash function, one can compare a calculated message digest against the message digest that is decrypted with a public key to verify that the message hasnt been tampered with. This comparison is called a hashcheck. MDI/MDIX In cable wiring, the concept of transmit and receive are from the perspective of the PC, which is wired as a Media Dependant Interface (MDI). In MDI wiring, a PC transmits on pins 1 and 2. At the hub, switch, router, or access point, the perspective is reversed, and the hub receives on pins 1 and 2. This wiring is referred to as Media Dependant Interface - Crossover (MDI-X). See also AES. Maximum Receive Unit The size in bytes of the largest packet that can be sent or received. Maximum Transmit Unit The size in bytes of the largest packet that can be sent or received. Most Significant Bit or Most Significant Byte MSB. The portion of a number, address, or field that is farthest left when written as a single number in conventional hexadecimal ordinary notation. The part of the number having the most value. MRU The size in bytes of the largest packet that can be sent or received. MSB MSB. The portion of a number, address, or field that is farthest left when written as a single number in conventional hexadecimal ordinary notation. The part of the number having the most value. MTU The size in bytes of the largest packet that can be sent or received.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Glossary 7 M-10153-01 NAT A technique by which several hosts share a single IP address for access to the Internet. NetBIOS The Network Basic Input Output System is an application programming interface (API) for sharing services and information on local-area networks (LANs). Provides for communication between stations of a network where each station is given a name. These names are alphanumeric names, up to 16 characters in length. Network Address Translation NAT. A technique by which several hosts share a single IP address for access to the Internet. NIC Network Interface Card. An adapter in a computer which provides connectivity to a network. NID Network Interface Device. The point of demarcation, where the telephone line comes into the house. packet A block of information sent over a network. A packet typically contains a source and destination network address, some protocol and length information, a block of data, and a checksum. Perfect Forward Secrecy Perfect Forward Secrecy (PFS) provides additional security by means of a Diffie-Hellman shared secret value. With PFS, if one key is compromised, previous and subsequent keys are secure because they are not derived from previous keys. PKIX PKIX. The most widely used standard for defining digital certificates. Point-to-Point Protocol PPP. A protocol allowing a computer using TCP/IP to connect directly to the Internet. PPP A protocol allowing a computer using TCP/IP to connect directly to the Internet. PPPoA PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPPoE PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 8Glossary M-10153-01 PPP over ATM PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPP over Ethernet PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPTP Point-to-Point Tunneling Protocol. A method for establishing a virtual private network (VPN) by embedding Microsoft’s network protocol into Internet packets. PSTN Public Switched Telephone Network. Public Key Infrastructure PKIX. The most widely used standard for defining digital certificates. X.509 is actually an ITU Recommendation, which means that it has not yet been officially defined or approved. As a result, companies have implemented the standard in different ways. For example, both Netscape and Microsoft use X.509 certificates to implement SSL in their web servers and browsers. But an X.509 Certificate generated by Netscape may not be readable by Microsoft products, and vice versa. RADIUS Short for Remote Authentication Dial-In User Service, RADIUS is an authentication system. Using RADIUS, you must enter your user name and password before gaining access to a network. This information is passed to a RADIUS server, which checks that the information is correct, and then authorizes access. Though not an official standard, the RADIUS specification is maintained by a working group of the IETF. RFC Request For Comment. Refers to documents published by the Internet Engineering Task Force (IETF) proposing standard protocols and procedures for the Internet. RFCs can be found at www.ietf.org. RIP A protocol in which routers periodically exchange information with one another so that they can determine minimum distance paths between sources and destinations. router A device that forwards data between networks. An IP router forwards data based on IP source and destination addresses. Routing Information Protocol RIP. A protocol in which routers periodically exchange information with one another so that they can determine minimum distance paths between sources and destinations.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Glossary 9 M-10153-01 router A device that forwards data between networks. An IP router forwards data based on IP source and destination addresses. SSID A Service Set Identification is a thirty-two character (maximum) alphanumeric key identifying a wireless local area network. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. This is typically the configuration parameter for a wireless PC card. It corresponds to the ESSID in the wireless Access Point and to the wireless network name. See also Wireless Network Name and ESSID. Subnet Mask A mask used to determine what subnet an IP address belongs to. Subnetting enables a network administrator to further divide an IP address into two or more subnets. An IP address has two components, the network address and the host address. For example, consider the IP address 150.215.017.009. Assuming this is part of a Class B network, the first two numbers (150.215) represent the Class B network address, and the second two numbers (017.009) identify a particular host on this network. Subnetting enables the network administrator to further divide the host part of the address into two or more subnets. In this case, a part of the host address is reserved to identify the particular subnet. This is easier to see if we show the IP address in binary format. The full address is: 10010110.11010111.00010001.00001001 The Class B network part is: 10010110.11010111 and the host address is 00010001.00001001 If this network is divided into 14 subnets, however, then the first 4 bits of the host address (0001) are reserved for identifying the subnet. The subnet mask is the network address plus the bits reserved for identifying the subnetwork. (By convention, the bits for the network address are all set to 1, though it would also work if the bits were set exactly as in the network address.) In this case, therefore, the subnet mask would be 11111111.11111111.11110000.00000000. Its called a mask because it can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address. The result is the subnetwork address: Subnet Mask 255.255.240.000 11111111.11111111.11110000.00000000 IP Address 150.215.017.009 10010110.11010111.00010001.00001001 Subnet Address 150.215.016.000 10010110.11010111.00010000.00000000 The subnet address, therefore, is 150.215.016.000. TCP/IP The main internetworking protocols used in the Internet. The Internet Protocol (IP) used in conjunction with the Transfer Control Protocol (TCP) form TCP/IP. TLS Short for Transport Layer Security, TLS is a protocol that guarantees privacy and data integrity between client/server applications communicating over the Internet.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 10Glossary M-10153-01 The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable. Universal Plug and Play UPnP. A networking architecture that provides compatibility among networking technology. UPnP compliant routers provide broadband users at home and small businesses with a seamless way to participate in online games, videoconferencing and other peer-to-peer services. UTP Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks. VCI Virtual Channel Identifier. Together with the VPI, defines a Virtual Channel through an ATM network. Used by ATM switching equipment to route data through the network. VPI Virtual Path Identifier. Together with the VCI, defines a Virtual Channel through an ATM network. Used by ATM switching equipment to route data through the network. VPN Virtual Private Network. A method for securely transporting data between two private networks by using a public network such as the Internet as a connection. WA N A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN. WEB Proxy Server A web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a firewall. The proxy server listens for requests from clients within the firewall and forwards these requests to remote Internet servers outside the firewall. The proxy server reads responses from the external servers and then sends them to internal client clients. WEP Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks. All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for data encryption.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 Glossary 11 M-10153-01 wide area network WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a large WAN. Wi-Fi A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among 802.11b devices. Windows Internet Naming Service WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names to IP addresses. If a remote network contains a WINS server, your Windows PCs can gather information from that WINS server about its local hosts. This allows your PCs to browse that remote network using the Windows Network Neighborhood feature. WINS WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names to IP addresses. Wireless Network Name (SSID) Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or ESSID configuration parameter.
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2 12Glossary M-10153-01
Index1 Numerics 64 or 128 bit WEP 4-6 802.11b D-1 A Account Name 3-11, 3-14, 6-2 Address Resolution Protocol B-8 ad-hoc mode D-2 Authentication Server 3-10 Auto MDI/MDI-X B-14, G-2 Auto Uplink 2-3, B-14, G-2 B backup configuration 6-7 Basic Wireless Connectivity 4-8 BSSID D-2 C Cabling B-11 Cat5 cable 3-1, B-12, G-2 configuration automatic by DHCP 2-4 backup 6-7 erasing 6-8 restore 6-6 router, initial 3-1 content filtering 2-2, 5-1 conventions typography 1-1 crossover cable 2-3, 8-2, B-14, G-2 customer support 1-v D date and time 8-7 Daylight Savings Time 8-7 daylight savings time 5-8 Default DMZ Server 7-4 Denial of Service (DoS) protection 2-2 denial of service attack B-11 DHCP B-10 DHCP Client ID C-16 DMZ 2-3, 7-2, 7-5 DMZ Server 7-4 DNS Proxy 2-4 DNS server 3-11, C-20 DNS, dynamic 7-6 documentation updates 1-1, 3-8, 6-5, 8-1 domain C-20 Domain Name 3-11, 3-14 domain name server (DNS) B-9 DoS attack B-11 Dynamic DNS 7-6 E Encryption Strength 4-6 End Port 7-2 EnterNet C-18 erase configuration 6-8 ESSID 4-8, D-2 Ethernet 2-3 Ethernet cable B-11 Index
2Index F factory settings, restoring 6-8 firewall features 2-2 Flash memory, for firmware upgrade 2-2 front panel 2-6, 2-7 fully qualified domain name (FQDN) 4-4 G gateway address C-20 H Half Life 7-3 host name 3-11, 3-14 I IANA contacting B-2 IETF B-1 Web site address B-7 infrastructure mode D-2 installation 2-4 Internet account address information C-18 establishing C-18 Internet Service Provider 3-1 IP addresses C-19, C-20 and NAT B-7 and the Internet B-2 assigning B-2, B-9 auto-generated 8-3 private B-7 translating B-9 IP configuration by DHCP B-10 IP networking for Macintosh C-16 for Windows C-2, C-7 ISP 3-1 K KALI 7-3 L LAN IP Setup Menu 7-7 LEDs description 2-6 troubleshooting 8-2 log sending 5-7 log entries 5-5 Login 3-10 M MAC address 8-7, B-8 spoofing 3-10, 3-14, 8-5 Macintosh C-19 configuring for IP networking C-16 DHCP Client ID C-16 Obtaining ISP Configuration Information C-20 masquerading C-18 MDI/MDI-X B-14, G-2 MDI/MDI-X wiring B-14, G-6 metric 7-11 N NAT C-18 NAT. See Network Address Translation netmask translation table B-6 Network Address Translation 2-4, B-7, C-18 Network Time Protocol 5-8, 8-7 NTP 5-8, 8-7 O Open System authentication D-3