Hardware Manual
Page 5
Contents About This Manual ...ix Audience ...ix Typographical Conventions ix Special Message Formats x Chapter 1 Hardware Overview...1-1 About the CG814WG ...1-1 Built-in Cable Modem 1-1 A Powerful, True Firewall 1-1 802.11g Standards-based Wireless Networking 1-2 Configurable Auto Uplink™ Ethernet Connection 1-2 USB Port ...1-3 Protocol Support ...1-3 Easy Installation and Management 1-3 What's in the Box? ...1-5 The ...
Contents About This Manual ...ix Audience ...ix Typographical Conventions ix Special Message Formats x Chapter 1 Hardware Overview...1-1 About the CG814WG ...1-1 Built-in Cable Modem 1-1 A Powerful, True Firewall 1-1 802.11g Standards-based Wireless Networking 1-2 Configurable Auto Uplink™ Ethernet Connection 1-2 USB Port ...1-3 Protocol Support ...1-3 Easy Installation and Management 1-3 What's in the Box? ...1-5 The ...
Hardware Manual
Page 6
... Users Installing a CG814WG C-4 Wireless Connection Indicators C-8 Interpreting the LED on the CG814WG C-8 Interpreting System Tray Icon Colors C-9 Basic Troubleshooting Tips C-10 Appendix D Networks, Routing, and Firewall Basics D-1 Related Publications ...D-1 vi Contents
... Users Installing a CG814WG C-4 Wireless Connection Indicators C-8 Interpreting the LED on the CG814WG C-8 Interpreting System Tray Icon Colors C-9 Basic Troubleshooting Tips C-10 Appendix D Networks, Routing, and Firewall Basics D-1 Related Publications ...D-1 vi Contents
Hardware Manual
Page 7
Basic Router Concepts D-1 What is a Router D-2 Routing Information Protocol D-2 IP Addresses and the Internet D-2 Netmask ...D-4 Subnet Addressing D-5 Single IP Address Operation Using NAT D-7 MAC Addresses and Address Resolution Protocol D-8 Related Documents D-9 Domain Name Server D-9 IP Configuration by DHCP D-10 Internet Security and Firewalls D-10 What is a Firewall D-10 Stateful Packet Inspection D-11 Ethernet Cabling ...D-11 Uplink Switches and Crossover Cables D-11 Cable Quality ...D-12 Contents vii
Basic Router Concepts D-1 What is a Router D-2 Routing Information Protocol D-2 IP Addresses and the Internet D-2 Netmask ...D-4 Subnet Addressing D-5 Single IP Address Operation Using NAT D-7 MAC Addresses and Address Resolution Protocol D-8 Related Documents D-9 Domain Name Server D-9 IP Configuration by DHCP D-10 Internet Security and Firewalls D-10 What is a Firewall D-10 Stateful Packet Inspection D-11 Ethernet Cabling ...D-11 Uplink Switches and Crossover Cables D-11 Cable Quality ...D-12 Contents vii
Hardware Manual
Page 9
This manual describes the features of the gateway and provides installation and configuration instructions. However, basic computer network, Internet, firewall, and PC networking technologies tutorial information is used for purchasing the NETGEAR™ CG814WG Wireless Cable Modem Gateway. SMALL CAPS File and directory names. About This Manual ix User input courier font Screen...
This manual describes the features of the gateway and provides installation and configuration instructions. However, basic computer network, Internet, firewall, and PC networking technologies tutorial information is used for purchasing the NETGEAR™ CG814WG Wireless Cable Modem Gateway. SMALL CAPS File and directory names. About This Manual ix User input courier font Screen...
Hardware Manual
Page 11
The CG814WG offers the following features. A Powerful, True Firewall Unlike simple Internet sharing NAT routers, the CG814WG is a true firewall, using an integrated cable modem. Built-in cable modem. Its firewall features include: Hardware Overview 1-1 The CG814WG provides highly reliable Internet access ...Hardware Manual for the Model CG814WG Wireless Cable Modem Gateway Chapter 1 Hardware Overview This chapter describes the features of the NETGEAR CG814WG Wireless Cable Modem Gateway. The modem is a complete security solution that it will work with your network from attacks...
The CG814WG offers the following features. A Powerful, True Firewall Unlike simple Internet sharing NAT routers, the CG814WG is a true firewall, using an integrated cable modem. Built-in cable modem. Its firewall features include: Hardware Overview 1-1 The CG814WG provides highly reliable Internet access ...Hardware Manual for the Model CG814WG Wireless Cable Modem Gateway Chapter 1 Hardware Overview This chapter describes the features of the NETGEAR CG814WG Wireless Cable Modem Gateway. The modem is a complete security solution that it will work with your network from attacks...
Hardware Manual
Page 13
... DHCP The CG814WG dynamically assigns network configuration information, including IP, gateway, and domain name server (DNS) addresses, to the attached PCs. Appendix D, "Networks, Routing, and Firewall Basics" provides further information on the LAN using the Dynamic Host Configuration Protocol (DHCP). You can install, configure, and operate the CG814WG within minutes after...
... DHCP The CG814WG dynamically assigns network configuration information, including IP, gateway, and domain name server (DNS) addresses, to the attached PCs. Appendix D, "Networks, Routing, and Firewall Basics" provides further information on the LAN using the Dynamic Host Configuration Protocol (DHCP). You can install, configure, and operate the CG814WG within minutes after...
Hardware Manual
Page 19
... networking with TCP/IP: • All Windows® 98 SE or later includes the software components for further information. Refer to Appendix D, "Networks, Routing, and Firewall Basics." In your PC, then TCP/ IP is shipped preconfigured as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address. Most operating...
... networking with TCP/IP: • All Windows® 98 SE or later includes the software components for further information. Refer to Appendix D, "Networks, Routing, and Firewall Basics." In your PC, then TCP/ IP is shipped preconfigured as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address. Most operating...
Hardware Manual
Page 35
... may also be able to communicate correctly. Hardware Manual for the devices to be prompted to insert your Windows CD. This is connected to the firewall. Click OK. 9. Preparing Your Network 2-17 Restarting the Network Once you've set up your computers to work with the gateway, you are returned to...
... may also be able to communicate correctly. Hardware Manual for the devices to be prompted to insert your Windows CD. This is connected to the firewall. Click OK. 9. Preparing Your Network 2-17 Restarting the Network Once you've set up your computers to work with the gateway, you are returned to...
Hardware Manual
Page 57
...order to various RFC documents for further information. Hardware Manual for the Model CG814WG Wireless Cable Modem Gateway Appendix D Networks, Routing, and Firewall Basics This chapter provides an overview of the slower WAN link, a mechanism must be in a local area network (LAN). Related Publications...easily and relatively inexpensively in place for selecting and transmitting only the data traffic meant for the Internet. Networks, Routing, and Firewall Basics D-1 However, providing high bandwidth between a local network and the Internet can be directed to make the best use of IP...
...order to various RFC documents for further information. Hardware Manual for the Model CG814WG Wireless Cable Modem Gateway Appendix D Networks, Routing, and Firewall Basics This chapter provides an overview of the slower WAN link, a mechanism must be in a local area network (LAN). Related Publications...easily and relatively inexpensively in place for selecting and transmitting only the data traffic meant for the Internet. Networks, Routing, and Firewall Basics D-1 However, providing high bandwidth between a local network and the Internet can be directed to make the best use of IP...
Hardware Manual
Page 58
... address: 11000011 00100010 00001100 00000111 is a device that transmitted data reaches the correct destination. A router is normally written as: 195.34.12.7 D-2 Networks, Routing, and Firewall Basics Hardware Manual for changes to add to the routing table. In these routing tables, a router builds up a logical picture of physical WAN connection they...
... address: 11000011 00100010 00001100 00000111 is a device that transmitted data reaches the correct destination. A router is normally written as: 195.34.12.7 D-2 Networks, Routing, and Firewall Basics Hardware Manual for changes to add to the routing table. In these routing tables, a router builds up a logical picture of physical WAN connection they...
Hardware Manual
Page 59
... the Model CG814WG Wireless Cable Modem Gateway The latter version is used by the TCP/IP software to identify the address class. Networks, Routing, and Firewall Basics D-3 In addition, the 32 bits of hosts on the address range and the application. The dividing point may vary depending on a network. After the...
... the Model CG814WG Wireless Cable Modem Gateway The latter version is used by the TCP/IP software to identify the address class. Networks, Routing, and Firewall Basics D-3 In addition, the 32 bits of hosts on the address range and the application. The dividing point may vary depending on a network. After the...
Hardware Manual
Page 60
... . When combined (using an AND operator) with : 11111111 11111111 11111111 00000000 (255.255.255.0) Equals: 11000000 10101000 10101010 00000000 (192.168.170.0) D-4 Networks, Routing, and Firewall Basics Also, the top address of the range (host address of the address remains: 11000000 10101000 10101010 11101101 (192.168.170.237) combined with an...
... . When combined (using an AND operator) with : 11111111 11111111 11111111 00000000 (255.255.255.0) Equals: 11000000 10101000 10101010 00000000 (192.168.170.0) D-4 Networks, Routing, and Firewall Basics Also, the top address of the range (host address of the address remains: 11000000 10101000 10101010 11101101 (192.168.170.237) combined with an...
Hardware Manual
Page 61
... a network manager to the IP address, following a backward slash (/), as IP network address 172.16, subnet number 97, and node number 235. Networks, Routing, and Firewall Basics D-5 In the example, the address could be interpreted as "/n."
... a network manager to the IP address, following a backward slash (/), as IP network address 172.16, subnet number 97, and node number 235. Networks, Routing, and Firewall Basics D-5 In the example, the address could be interpreted as "/n."
Hardware Manual
Page 62
... partition your Class C network with the dotted-decimal value of the first subnet. Netmask Formats Dotted-Decimal 255.0.0.0 255.255.0.0 Masklength /8 /16 D-6 Networks, Routing, and Firewall Basics Note: The number 192.68.135.127 is not assigned because it is 255.255.255.128. The first subnet has network number 192...
... partition your Class C network with the dotted-decimal value of the first subnet. Netmask Formats Dotted-Decimal 255.0.0.0 255.255.0.0 Masklength /8 /16 D-6 Networks, Routing, and Firewall Basics Note: The number 192.68.135.127 is not assigned because it is 255.255.255.128. The first subnet has network number 192...
Hardware Manual
Page 63
...single user with all hosts on a LAN needed to use the same netmask for the host address. For more costly than a router. Networks, Routing, and Firewall Basics D-7 Hardware Manual for this address sharing by translating the internal LAN IP addresses to a single address that hosts recognize local IP broadcast packets When...255.255.240 /28 255.255.255.248 /29 255.255.255.252 /30 255.255.255.254 /31 255.255.255.255 /32 NETGEAR strongly recommends that you had to share an Internet account using only a single IP address, which are remote Single IP Address Operation Using NAT ...
...single user with all hosts on a LAN needed to use the same netmask for the host address. For more costly than a router. Networks, Routing, and Firewall Basics D-7 Hardware Manual for this address sharing by translating the internal LAN IP addresses to a single address that hosts recognize local IP broadcast packets When...255.255.240 /28 255.255.255.248 /29 255.255.255.252 /30 255.255.255.254 /31 255.255.255.255 /32 NETGEAR strongly recommends that you had to share an Internet account using only a single IP address, which are remote Single IP Address Operation Using NAT ...
Hardware Manual
Page 64
Each device on your system. D-8 Networks, Routing, and Firewall Basics To send data between LAN devices, you can prevent intruders from one PC (for the Model CG814WG Wireless Cable Modem Gateway 192.168.0.2 Private ...) on an Ethernet network has a unique MAC address, which is known as address resolution. However, using port forwarding, you must convert the IP address of firewall-like protection because the internal LAN addresses are filtered out by the manufacturer. This filtering can allow one LAN device to resolve MAC addresses.
Each device on your system. D-8 Networks, Routing, and Firewall Basics To send data between LAN devices, you can prevent intruders from one PC (for the Model CG814WG Wireless Cable Modem Gateway 192.168.0.2 Private ...) on an Ethernet network has a unique MAC address, which is known as address resolution. However, using port forwarding, you must convert the IP address of firewall-like protection because the internal LAN addresses are filtered out by the manufacturer. This filtering can allow one LAN device to resolve MAC addresses.
Hardware Manual
Page 65
... actually contact the resource. The PC sends the desired message using the IP address. All other stations discard the request. Networks, Routing, and Firewall Basics D-9 This addressing is broadcast onto the network. For more information about address assignment, refer to an IP address in the table. Just ...maps descriptive names of the resources on the Internet can be addressed by its own MAC address directly to phone numbers, or as www.NETGEAR.com. The IP address data and MAC address data for a user to IP addresses. Related Documents The station with the correct IP...
... actually contact the resource. The PC sends the desired message using the IP address. All other stations discard the request. Networks, Routing, and Firewall Basics D-9 This addressing is broadcast onto the network. For more information about address assignment, refer to an IP address in the table. Just ...maps descriptive names of the resources on the Internet can be addressed by its own MAC address directly to phone numbers, or as www.NETGEAR.com. The IP address data and MAC address data for a user to IP addresses. Related Documents The station with the correct IP...
Hardware Manual
Page 66
... an IP address, subnet mask, DNS server addresses, and a gateway address if the ISP provides this configuration information. What is a Firewall? A firewall is a device that it may act as gateway and DNS addresses) that protects one or more DNS server addresses. As an alternative ...to manual configuration, there is a method by DHCP. However, there are methods by a firewall router. Several known types of protection is provided by which each PC must be configured with other information (such as a Dynamic Host ...
... an IP address, subnet mask, DNS server addresses, and a gateway address if the ISP provides this configuration information. What is a Firewall? A firewall is a device that it may act as gateway and DNS addresses) that protects one or more DNS server addresses. As an alternative ...to manual configuration, there is a method by DHCP. However, there are methods by a firewall router. Several known types of protection is provided by which each PC must be configured with other information (such as a Dynamic Host ...
Hardware Manual
Page 67
... Ethernet networks originally used thick or thin coaxial cable, most installations currently use unshielded twisted pair (UTP) cabling. A central cache within the firewall keeps track of the state information associated with all network connections. For example, the PC transmits on pins 1 and 2. When connecting a...such as described in order to determine whether or not it will be allowed to another hub port, the Networks, Routing, and Firewall Basics D-11 All traffic passing through or rejected. Using Stateful Packet Inspection, an incoming packet is reversed, and the hub receives...
... Ethernet networks originally used thick or thin coaxial cable, most installations currently use unshielded twisted pair (UTP) cabling. A central cache within the firewall keeps track of the state information associated with all network connections. For example, the PC transmits on pins 1 and 2. When connecting a...such as described in order to determine whether or not it will be allowed to another hub port, the Networks, Routing, and Firewall Basics D-11 All traffic passing through or rejected. Using Stateful Packet Inspection, an incoming packet is reversed, and the hub receives...
Hardware Manual
Page 68
... wire colors on both 10 and 100 Mbits/second networks. A Category 5 cable will be identified by the Electronic Industry Association (EIA). D-12 Networks, Routing, and Firewall Basics This exchange is a special cable in which will be exchanged from one port, allowing that port to be rated as such, and must be...
... wire colors on both 10 and 100 Mbits/second networks. A Category 5 cable will be identified by the Electronic Industry Association (EIA). D-12 Networks, Routing, and Firewall Basics This exchange is a special cable in which will be exchanged from one port, allowing that port to be rated as such, and must be...