Netgear Router WGT624 V3 User Manual
Here you can view all the pages of manual Netgear Router WGT624 V3 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 111
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Preparing Your Network C-17 202-10090-01, April 2005 2.If not already selected, select Built-in Ethernet in the Configure list. 3.If not already selected, Select Using DHCP in the TCP/IP tab. 4.Click Save. Verifying TCP/IP Properties for Macintosh Computers After your Macintosh is configured and has rebooted, you can check the TCP/IP configuration by returning to the TCP/IP Control Panel. From the Apple menu, select Control Panels,...
Page 112
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 C-18 Preparing Your Network 202-10090-01, April 2005 Verifying the Readiness of Your Internet Account For broadband access to the Internet, you need to contract with an Internet service provider (ISP) for a single-user Internet access account using a cable modem or DSL modem. This modem must be a separate physical box (not a card) and must provide an Ethernet port intended for connection to a Network Interface Card (NIC) in a...
Page 113
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Preparing Your Network C-19 202-10090-01, April 2005 • An IP address and subnet mask • A gateway IP address, which is the address of the ISP’s router • One or more domain name server (DNS) IP addresses • Host name and domain suffix For example, your account’s full server names may look like this: mail.xxx.yyy.com In this example, the domain suffix is xxx.yyy.com. If any of these items are dynamically supplied by the ISP, your firewall...
Page 114
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 C-20 Preparing Your Network 202-10090-01, April 2005 If an IP address appears under Installed Gateways, write down the address. This is the ISP’s gateway address. Select the address and then click Remove to remove the gateway address. 6.Select the DNS Configuration tab. If any DNS server addresses are shown, write down the addresses. If any information appears in the Host or Domain information box, write it down. Click Disable DNS....
Page 115
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Preparing Your Network C-21 202-10090-01, April 2005 Restarting the Network Once you’ve set up your computers to work with the firewall, you must reset the network for the devices to be able to communicate correctly. Restart any computer that is connected to the firewall. After configuring all of your computers for TCP/IP networking and restarting them, and connecting them to the local network of your WGT624 v3 wireless router, you...
Page 116
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 C-22 Preparing Your Network 202-10090-01, April 2005
Page 117
Wireless Networking Basics D-1 202-10090-01, April 2005 Appendix D Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The WGT624 v3 wireless router conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.11b and 802.11g standards for wireless LANs (WLANs). On an 802.11b or g wireless link, data is encoded using direct-sequence spread-spectrum (DSSS) technology and is transmitted in the unlicensed radio spectrum at...
Page 118
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-2 Wireless Networking Basics 202-10090-01, April 2005 Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network - each node can generally communicate with any other node. There is no Access Point involved in this configuration. This mode enables you to quickly set up a small wireless workgroup and allows workgroup members to...
Page 119
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Wireless Networking Basics D-3 202-10090-01, April 2005 •Shared Key. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network. Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. 802.11 Authentication The 802.11...
Page 120
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-4 Wireless Networking Basics 202-10090-01, April 2005 2.The access point authenticates the station. 3.The station associates with the access point and joins the network. This process is illustrated below. Figure 7-4: Open system authentication Shared Key Authentication The following steps occur when two devices use Shared Key Authentication: 1.The station sends an authentication request to the access point. 2.The access point sends...