Home > Netgear > Router > Netgear Router WGT624 V3 User Manual

Netgear Router WGT624 V3 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Netgear Router WGT624 V3 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 137 Netgear manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							202-10090-01, April 2005
    202-10090-01 
    April 2005
    NETGEAR, Inc.
    4500 Great America Parkway 
    Santa Clara, CA 95054 USA
    Reference Manual for the 
    108 Mbps Wireless 
    Firewall Router 
    WGT624
     v3 
    						
    							ii
    202-10090-01, April 2005
    © 2005 by NETGEAR, Inc. All rights reserved. April 2005.
    Trademarks
    NETGEAR is a trademark of Netgear, Inc. 
    Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.
    Other brand and product names are registered trademarks or trademarks of their respective holders.
    Statement of Conditions
    In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to 
    make changes to the products described in this document without notice.
    NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit 
    layout(s) described herein.
    Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
    This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to  
    part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a 
    residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and 
    used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no 
    guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to 
    radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try 
    to correct the interference by one or more of the following measures:
    • Reorient or relocate the receiving antenna.
    • Increase the separation between the equipment and receiver.
    • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
    • Consult the dealer or an experienced radio/TV technician for help. 
    EN 55 022 Declaration of Conformance
    This is to certify that the WGT624 v3 108 Mbps Wireless Firewall Router is shielded against the generation of radio 
    interference in accordance with the application of Council Directive 89/336/EEC, Article 4a. Conformity is declared by 
    the application of EN 55 022 Class B (CISPR 22).
    Bestätigung des Herstellers/Importeurs
    Es wird hiermit bestätigt, daß das WGT624 v3 108 Mbps Wireless Firewall Router gemäß der im BMPT-AmtsblVfg 
    243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte 
    (z.B. Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der 
    Betriebsanleitung.
    Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt 
    gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.
    Certificate of the Manufacturer/Importer
    It is hereby certified that the WGT624 v3 108 Mbps Wireless Firewall Router has been suppressed in accordance with 
    the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/1992. The operation of some equipment (for 
    example, test transmitters) in accordance with the regulations may, however, be subject to certain restrictions. Please 
    refer to the notes in the operating instructions. 
    Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market 
    and has been granted the right to test the series for compliance with the regulations.  
    						
    							202-10090-01, April 2005
    iii
    Voluntary Control Council for Interference (VCCI) Statement
    This equipment is in the second category (information equipment to be used in a residential area or an adjacent area 
    thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing 
    Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.
    When used near a radio or TV receiver, it may become the cause of radio interference. 
    Read instructions for correct handling.
    Customer Support
    Refer to the Support Information Card that shipped with your WGT624 v3 108 Mbps Wireless Firewall Router.
    World Wide Web
    NETGEAR maintains a World Wide Web home page that you can access at the universal resource locator (URL) 
    http://www.netgear.com. A direct connection to the Internet and a Web browser such as Internet Explorer 
    or Netscape are required.
    Product and Publication Details
    Model Number:WGT624 v3
    Publication Date:April 2005
    Product Family:router
    Product Name:WGT624 v3 108 Mbps Wireless Firewall Router
    Home or Business Product:Home
    Language:English
    Publication Part Number:202-10090-01 
    						
    							Contentsv
    202-10090-01, April 2005
    Contents
    Chapter 1  
    About This Manual
    Audience, Scope, Conventions, and Formats  ................................................................ 1-1
    How to Use This Manual  ................................................................................................ 1-2
    How to Print this Manual ................................................................................................. 1-3
    Chapter 2  
    Introduction
    Key Features  ..................................................................................................................2-1
    802.11g Wireless Networking ................................................................................... 2-2
    A Powerful, True Firewall with Content Filtering  ...................................................... 2-2
    Security .................................................................................................................... 2-3
    Autosensing Ethernet Connections with Auto Uplink  ............................................... 2-3
    Extensive Protocol Support  ...................................................................................... 2-3
    Easy Installation and Management  .......................................................................... 2-4
    Maintenance and Support  ........................................................................................ 2-5
    Package Contents  .......................................................................................................... 2-5
    The Router’s Front Panel  ......................................................................................... 2-6
    The Router’s Rear Panel  ......................................................................................... 2-7
    Chapter 3  
    Configuring the Internet and Wireless Settings
    Initial Configuration  .........................................................................................................3-2
    Logging Into Your Router  ................................................................................................ 3-3
    Changing Your Configuration .......................................................................................... 3-6
    Internet Settings  ....................................................................................................... 3-6
    Wireless Settings  ................................................................................................... 3-10
    Chapter 4  
    Content Filtering
    Blocking Access to Internet Sites ................................................................................... 4-1
    Blocking Access to Internet Services ............................................................................. 4-2 
    						
    							202-10090-01, April 2005 viContents Scheduling When Blocking Will Be Enforced  ................................................................. 4-4
    Configuring E-Mail Alert and Web Access Log Notifications  .......................................... 4-5
    Viewing Logs of Web Access or Attempted Web Access  ............................................... 4-6
    Chapter 5  
    Maintenance
    Viewing Wireless Router Status Information ................................................................... 5-1
    Viewing a List of Attached Devices ................................................................................. 5-5
    Upgrading the Router Software ...................................................................................... 5-5
    Configuration File Management  ..................................................................................... 5-7
    Restoring and Backing Up the Configuration  ........................................................... 5-7
    Erasing the Configuration ......................................................................................... 5-8
    Changing the Administrator Password ........................................................................... 5-8
    Chapter 6  
    Advanced Configuration
    Configuring Port Forwarding to Local Servers ................................................................ 6-1
    Adding a Port Forwarding Custom Service  .............................................................. 6-2
    Editing or Deleting a Port Forwarding Entry ............................................................. 6-2
    Local Web and FTP Server Example  ....................................................................... 6-3
    Multiple Computers for Half Life, KALI or Quake III Example  .................................. 6-3
    Using Port Triggering  ...................................................................................................... 6-4
    Port Triggering Rules Menu  ..................................................................................... 6-5
    Adding a new Rule  ............................................................................................ 6-5
    Modifying or Deleting an existing Rule:  ............................................................. 6-6
    Rules Status  ...................................................................................................... 6-6
    Configuring WAN Setup Options  .................................................................................... 6-7
    Using a Dynamic DNS Service  ....................................................................................... 6-9
    Using LAN IP Setup Options  ........................................................................................ 6-11
    Using the Router as a DHCP server  ...................................................................... 6-12
    Using Address Reservation .................................................................................... 6-13
    How to Configure Static Routes .................................................................................... 6-15
    Enabling Remote Management Access  ....................................................................... 6-17
    Using Universal Plug and Play (UPnP)  ........................................................................ 6-19
    Chapter 7  
    Troubleshooting
    Basic Functioning  ........................................................................................................... 7-1 
    						
    							Contentsvii
    202-10090-01, April 2005 Power LED Not On ................................................................................................... 7-1
    LEDs Never Turn Off  ................................................................................................ 7-2
    Local or Internet Port LEDs Not On  ......................................................................... 7-2
    Troubleshooting the Web Configuration Interface  .......................................................... 7-3
    Troubleshooting the ISP Connection  .............................................................................. 7-4
    Troubleshooting a TCP/IP Network Using a Ping Utility  ................................................. 7-5
    Testing the LAN Path to Your Router  ....................................................................... 7-5
    Testing the Path from Your PC to a Remote Device  ................................................ 7-6
    Restoring the Default Configuration and Password ........................................................ 7-7
    Problems with Date and Time ......................................................................................... 7-7
    Appendix A  
    Technical Specifications
    Appendix B  
    Network, Routing, Firewall, and Basics
    Related Publications  ...................................................................................................... B-1
    Basic Router Concepts  .................................................................................................. B-1
    What is a Router?  ................................................................................................... B-1
    Routing Information Protocol ................................................................................... B-2
    IP Addresses and the Internet  ....................................................................................... B-2
    Netmask .................................................................................................................. B-4
    Subnet Addressing  .................................................................................................. B-4
    Private IP Addresses ............................................................................................... B-7
    Single IP Address Operation Using NAT  ....................................................................... B-7
    MAC Addresses and Address Resolution Protocol  ................................................. B-8
    Related Documents ................................................................................................. B-9
    Domain Name Server .............................................................................................. B-9
    IP Configuration by DHCP  ........................................................................................... B-10
    Internet Security and Firewalls .................................................................................... B-10
    What is a Firewall?  ................................................................................................ B-10
    Stateful Packet Inspection  ...............................................................................B-11
    Denial of Service Attack  ..................................................................................B-11
    Ethernet Cabling  ...........................................................................................................B-11
    Category 5 Cable Quality  ...................................................................................... B-12
    Inside Twisted Pair Cables  .................................................................................... B-12
    Uplink Switches, Crossover Cables, and MDI/MDIX Switching  ............................ B-14 
    						
    							202-10090-01, April 2005 viiiContents Appendix C  
    Preparing Your Network
    Preparing Your Computers for TCP/IP Networking  ....................................................... C-1
    Configuring Windows 95, 98, and Me for TCP/IP Networking  ....................................... C-2
    Install or Verify Windows Networking Components ................................................. C-2
    Enabling DHCP to Automatically Configure TCP/IP Settings  ................................. C-4
    Selecting Windows’ Internet Access Method .......................................................... C-6
    Verifying TCP/IP Properties  .................................................................................... C-6
    Configuring Windows NT4, 2000 or XP for IP Networking  ............................................ C-7
    Install or Verify Windows Networking Components ................................................. C-7
    DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4  ............................... C-8
    DHCP Configuration of TCP/IP in Windows XP   ..................................................... C-8
    DHCP Configuration of TCP/IP in Windows 2000  ................................................ C-10
    DHCP Configuration of TCP/IP in Windows NT4  .................................................. C-13
    Verifying TCP/IP Properties for Windows XP, 2000, and NT4  .............................. C-15
    Configuring the Macintosh for TCP/IP Networking ...................................................... C-16
    MacOS 8.6 or 9.x  .................................................................................................. C-16
    MacOS X  ............................................................................................................... C-16
    Verifying TCP/IP Properties for Macintosh Computers  ......................................... C-17
    Verifying the Readiness of Your Internet Account ....................................................... C-18
    Are Login Protocols Used?  ................................................................................... C-18
    What Is Your Configuration Information?  .............................................................. C-18
    Obtaining ISP Configuration Information for Windows Computers  ....................... C-19
    Obtaining ISP Configuration Information for Macintosh Computers  ..................... C-20
    Restarting the Network  ................................................................................................ C-21
    Appendix D  
    Wireless Networking Basics
    Wireless Networking Overview  ...................................................................................... D-1
    Infrastructure Mode  ................................................................................................. D-1
    Ad Hoc Mode (Peer-to-Peer Workgroup)  ................................................................ D-2
    Network Name: Extended Service Set Identification (ESSID) ................................ D-2
    Authentication and WEP Data Encryption  ..................................................................... D-2
    802.11 Authentication .............................................................................................. D-3
    Open System Authentication ................................................................................... D-3
    Shared Key Authentication ...................................................................................... D-4 
    						
    							Contentsix
    202-10090-01, April 2005 Overview of WEP Parameters  ................................................................................ D-5
    Key Size  .................................................................................................................. D-6
    WEP Configuration Options  .................................................................................... D-7
    Wireless Channels ......................................................................................................... D-7
    WPA and WPA2 Wireless Security  ................................................................................ D-8
    How Does WPA Compare to WEP? ........................................................................ D-9
    How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................ D-10
    What are the Key Features of WPA and WPA2 Security?  .................................... D-10
    WPA/WPA2 Authentication: Enterprise-level User  
    Authentication via 802.1x/EAP and RADIUS .................................................. D-12
    WPA/WPA2 Data Encryption Key Management ............................................. D-14
    Is WPA/WPA2 Perfect?  ......................................................................................... D-16
    Product Support for WPA/WPA2  ........................................................................... D-16
    Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
    Changes to Wireless Access Points  ............................................................... D-17
    Changes to Wireless Network Adapters  ......................................................... D-17
    Changes to Wireless Client Programs ............................................................ D-18
     Glossary 
    						
    							202-10090-01, April 2005 xContents 
    						
    All Netgear manuals Comments (0)

    Related Manuals for Netgear Router WGT624 V3 User Manual