WGT624v3 Reference Manual
Page 11
..., April 2005 This guide uses the following formats to highlight special messages: Note: This format is written for the WGT624 v3 wireless router according to these specifications: Table 1-2. Web site at http://kbserver.netgear.com/products/WGT624 v3.asp. Audience, Scope, Conventions, and Formats This reference manual assumes that the reader has basic to highlight information...
..., April 2005 This guide uses the following formats to highlight special messages: Note: This format is written for the WGT624 v3 wireless router according to these specifications: Table 1-2. Web site at http://kbserver.netgear.com/products/WGT624 v3.asp. Audience, Scope, Conventions, and Formats This reference manual assumes that the reader has basic to highlight information...
WGT624v3 Reference Manual
Page 17
... you to direct incoming traffic to specific PCs based on the service port number of full-duplex or half-duplex operation. Security The WGT624 v3 wireless router is equipped with several features designed to maintain security, as to a switch or hub. Autosensing Ethernet ... as described in this section. • PCs Hidden by screening for requests originating from the local network. Extensive Protocol Support The WGT624 v3 wireless router supports the Transmission Control Protocol/Internet Protocol (TCP/IP) and Routing Information Protocol (RIP). Introduction 2-3 202-10090-01, April 2005...
... you to direct incoming traffic to specific PCs based on the service port number of full-duplex or half-duplex operation. Security The WGT624 v3 wireless router is equipped with several features designed to maintain security, as to a switch or hub. Autosensing Ethernet ... as described in this section. • PCs Hidden by screening for requests originating from the local network. Extensive Protocol Support The WGT624 v3 wireless router supports the Transmission Control Protocol/Internet Protocol (TCP/IP) and Routing Information Protocol (RIP). Introduction 2-3 202-10090-01, April 2005...
WGT624v3 Reference Manual
Page 30
...JerAB in the IP Address. • Account Name (also known as the computer's MAC (Media Access Control) address. 3-8 Configuring the Internet and Wireless Settings 202-10090-01, April 2005 Select Get Dynamically From ISP. If your ISP gave you may type the domain name of 'home' and Comcast...Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 If you have a fixed (static, permanent) IP address, your ISP will have provided you with a fixed IP address, the router will have provided you with an IP address. If your ISP has given you a specific Host name, then type it is...
...JerAB in the IP Address. • Account Name (also known as the computer's MAC (Media Access Control) address. 3-8 Configuring the Internet and Wireless Settings 202-10090-01, April 2005 Select Get Dynamically From ISP. If your ISP gave you may type the domain name of 'home' and Comcast...Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 If you have a fixed (static, permanent) IP address, your ISP will have provided you with a fixed IP address, the router will have provided you with an IP address. If your ISP has given you a specific Host name, then type it is...
WGT624v3 Reference Manual
Page 52
In addition to servers for specific applications, you wish to use. Enter the first port number in the WAN Setup Menu. Click Apply at the bottom of the local server in ... the IP address of the menu. If the service does not appear in the corresponding Server IP Address box. 5. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Use the Port Forwarding menu to configure the router to forward incoming protocols to computers on your local network.
In addition to servers for specific applications, you wish to use. Enter the first port number in the WAN Setup Menu. Click Apply at the bottom of the local server in ... the IP address of the menu. If the service does not appear in the corresponding Server IP Address box. 5. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Use the Port Forwarding menu to configure the router to forward incoming protocols to computers on your local network.
WGT624v3 Reference Manual
Page 58
...Apply. • Respond to Ping on your network. This should not be done unless you are sure it is necessary for the 108 Mbps Wireless Firewall Router WGT624 v3 • Setting Up a Default DMZ Server The default DMZ server feature is usually fine. For some ISPs, particularly some cases, one... to meet the MTU requirement. In some using some of discarding this box unless you want the router to respond to a 'ping' from the Internet. If compromised, the DMZ server can have a specific reason to reduce the MTU. To change the MTU size: 6-8 Advanced Configuration 202-10090-01, ...
...Apply. • Respond to Ping on your network. This should not be done unless you are sure it is necessary for the 108 Mbps Wireless Firewall Router WGT624 v3 • Setting Up a Default DMZ Server The default DMZ server feature is usually fine. For some ISPs, particularly some cases, one... to meet the MTU requirement. In some using some of discarding this box unless you want the router to respond to a 'ping' from the Internet. If compromised, the DMZ server can have a specific reason to reduce the MTU. To change the MTU size: 6-8 Advanced Configuration 202-10090-01, ...
WGT624v3 Reference Manual
Page 79
Appendix A Technical Specifications This appendix provides technical specifications for the WGT624 v3 108 Mbps Wireless Firewall Router. Network Protocol and Standards Compatibility Data and Routing Protocols: TCP/IP, RIP-1, RIP-2, DHCP PPP over Ethernet (PPPoE) ...Japan: 100V, 50/60 Hz, input All regions (output): 12 V DC @ 1 A output, 22W maximum Physical Specifications Dimensions: 28 x 175 x 118 mm (1.1 x 6.89 x 4.65 in.) Weight: 0.3 kg (0.66 lb) Environmental Specifications Operating temperature: Operating humidity: 0° to 40° C (32º to 104º F) 90% maximum ...
Appendix A Technical Specifications This appendix provides technical specifications for the WGT624 v3 108 Mbps Wireless Firewall Router. Network Protocol and Standards Compatibility Data and Routing Protocols: TCP/IP, RIP-1, RIP-2, DHCP PPP over Ethernet (PPPoE) ...Japan: 100V, 50/60 Hz, input All regions (output): 12 V DC @ 1 A output, 22W maximum Physical Specifications Dimensions: 28 x 175 x 118 mm (1.1 x 6.89 x 4.65 in.) Weight: 0.3 kg (0.66 lb) Environmental Specifications Operating temperature: Operating humidity: 0° to 40° C (32º to 104º F) 90% maximum ...
WGT624v3 Reference Manual
Page 80
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Electromagnetic Emissions Meets requirements of: Interface Specifications LAN: WAN: Wireless Radio Data Rates Frequency Data Encoding: Maximum Computers Per Wireless Network: Operating Frequency Ranges: Encryption: FCC Part 15 Class B VCCI Class B EN 55 022 (CISPR ...18, 24, 36, 48, 54, and 108 Mbps Auto Rate Sensing 2.4-2.5 GHz Direct Sequence Spread Spectrum (DSSS) Limited by the amount of wireless network traffic generated by each node. Typically 30-70 nodes. 2.412~2.462 GHz (US) 2.412~2.484 GHz (Japan) 2.412~2.472 GHz (...
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Electromagnetic Emissions Meets requirements of: Interface Specifications LAN: WAN: Wireless Radio Data Rates Frequency Data Encoding: Maximum Computers Per Wireless Network: Operating Frequency Ranges: Encryption: FCC Part 15 Class B VCCI Class B EN 55 022 (CISPR ...18, 24, 36, 48, 54, and 108 Mbps Auto Rate Sensing 2.4-2.5 GHz Direct Sequence Spread Spectrum (DSSS) Limited by the amount of wireless network traffic generated by each node. Typically 30-70 nodes. 2.412~2.462 GHz (US) 2.412~2.484 GHz (Japan) 2.412~2.472 GHz (...
WGT624v3 Reference Manual
Page 87
...For more information about IP address translation, refer to the hosts without problems. However, the IANA has reserved the following three blocks of IP addresses specifically for private networks: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 Choose ...Single IP Address Operation Using NAT In the past, if multiple PCs on its segment neighbors, it uses a destination address of the WGT624 v3 wireless router is isolated from this address sharing by your particular situation, do not create an arbitrary IP address; Reference Manual for the 108 Mbps...
...For more information about IP address translation, refer to the hosts without problems. However, the IANA has reserved the following three blocks of IP addresses specifically for private networks: 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 Choose ...Single IP Address Operation Using NAT In the past, if multiple PCs on its segment neighbors, it uses a destination address of the WGT624 v3 wireless router is isolated from this address sharing by your particular situation, do not create an arbitrary IP address; Reference Manual for the 108 Mbps...
WGT624v3 Reference Manual
Page 96
... server. The Network window opens, which displays a list of the PC preparation process, you need to "Appendix B, "Network, Routing, Firewall, and Basics." The WGT624 v3 wireless router is shipped preconfigured as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address. In most cases, you may need to ...IP addresses. Configuring Windows 95, 98, and Me for IP networking: 1. you should install TCP/IP so that the PC obtains its specific network configuration information automatically from a DHCP server during the TCP/IP installation process.
... server. The Network window opens, which displays a list of the PC preparation process, you need to "Appendix B, "Network, Routing, Firewall, and Basics." The WGT624 v3 wireless router is shipped preconfigured as a subnet mask (netmask), a domain name server (DNS) address, and a default gateway address. In most cases, you may need to ...IP addresses. Configuring Windows 95, 98, and Me for IP networking: 1. you should install TCP/IP so that the PC obtains its specific network configuration information automatically from a DHCP server during the TCP/IP installation process.
WGT624v3 Reference Manual
Page 98
... the Network panel as shown below. Select Client, and then click Add. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 If you through the configuration process for each PC must be assigned specific information about itself and resources that are available on it and right-click your PC for the changes...
... the Network panel as shown below. Select Client, and then click Add. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 If you through the configuration process for each PC must be assigned specific information about itself and resources that are available on it and right-click your PC for the changes...
WGT624v3 Reference Manual
Page 124
... overlap. The preferred channel separation between the channels in Europe and Australia. WPA and WPA2 Wireless Security Wi-Fi Protected Access (WPA and WPA2) is a specification of standards-based, interoperable security enhancements that increase the level of WEP. and Canada, and... with existing 802.11 products and offers forward compatibility with 802.11i, the new wireless security architecture that remedies the shortcomings of data protection and access control for the 108 Mbps Wireless Firewall Router WGT624 v3 Table D-2: 802.11b/g Radio Frequency Channels Channel 4 5 6 7 8 ...
... overlap. The preferred channel separation between the channels in Europe and Australia. WPA and WPA2 Wireless Security Wi-Fi Protected Access (WPA and WPA2) is a specification of standards-based, interoperable security enhancements that increase the level of WEP. and Canada, and... with existing 802.11 products and offers forward compatibility with 802.11i, the new wireless security architecture that remedies the shortcomings of data protection and access control for the 108 Mbps Wireless Firewall Router WGT624 v3 Table D-2: 802.11b/g Radio Frequency Channels Channel 4 5 6 7 8 ...
WGT624v3 Reference Manual
Page 125
...TKIP replaces WEP with a sniffing tool can monitor your network for the 108 Mbps Wireless Firewall Router WGT624 v3 WPA and WPA2 offer the following benefits: • Enhanced data privacy ...Temporal Key Integrity Protocol (TKIP) is now performing interoperability certification testing on EAP specifically, refer to WEP? In the 802.11 standard, 802.1x authentication was ratified...products. For 802.11, WEP encryption is not intended as a user authentication mechanism. NETGEAR is required in 2004. TKIP provides important data encryption enhancements including a per-packet key...
...TKIP replaces WEP with a sniffing tool can monitor your network for the 108 Mbps Wireless Firewall Router WGT624 v3 WPA and WPA2 offer the following benefits: • Enhanced data privacy ...Temporal Key Integrity Protocol (TKIP) is now performing interoperability certification testing on EAP specifically, refer to WEP? In the 802.11 standard, 802.1x authentication was ratified...products. For 802.11, WEP encryption is not intended as a user authentication mechanism. NETGEAR is required in 2004. TKIP provides important data encryption enhancements including a per-packet key...
WGT624v3 Reference Manual
Page 126
WPA is forward compatible with the WPA2 security specification. Michael message integrity code (MIC) - The RADIUS server holds (..., Probe Response, and (Re) Association Requests. AES support (WPA2, requires hardware support) • Support for wireless infrastructure networks as 802.1x and TKIP. Information in the WPA and WPA2 standard: • WPA and WPA2 ... required hardware upgrades to implement. These features were either not yet ready for the 108 Mbps Wireless Firewall Router WGT624 v3 How Does WPA Compare to WPA2 (IEEE 802.11i)? This occurs at the 802.11...
WPA is forward compatible with the WPA2 security specification. Michael message integrity code (MIC) - The RADIUS server holds (..., Probe Response, and (Re) Association Requests. AES support (WPA2, requires hardware support) • Support for wireless infrastructure networks as 802.1x and TKIP. Information in the WPA and WPA2 standard: • WPA and WPA2 ... required hardware upgrades to implement. These features were either not yet ready for the 108 Mbps Wireless Firewall Router WGT624 v3 How Does WPA Compare to WPA2 (IEEE 802.11i)? This occurs at the 802.11...
WGT624v3 Reference Manual
Page 130
...point. The access point uses the session keys to build, sign and encrypt an EAP key message that the software supporting the specific EAP type resides on the authentication server and within the operating system or application "supplicant" software on the wired side of digital...to implement dynamic key exchange, the 802.1x authentication server can verify the client's identity using an authentication server (for the 108 Mbps Wireless Firewall Router WGT624 v3 3. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for every frame, and the change ...
...point. The access point uses the session keys to build, sign and encrypt an EAP key message that the software supporting the specific EAP type resides on the authentication server and within the operating system or application "supplicant" software on the wired side of digital...to implement dynamic key exchange, the 802.1x authentication server can verify the client's identity using an authentication server (for the 108 Mbps Wireless Firewall Router WGT624 v3 3. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for every frame, and the change ...
WGT624v3 Reference Manual
Page 132
...Router WGT624 v3 Is WPA/WPA2 Perfect? D-16 202-10090-01, April 2005 Wireless Networking Basics More than that obtained with a non-WPA/WPA2 network, and thus this may just prove that fail the message integrity code (MIC) within 60 seconds of operation is completely invulnerable. Specifically..., it also causes users to -end network security strategy. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it is a definite step forward in August, 2003, NETGEAR, Inc. During the association, the wireless AP ...
...Router WGT624 v3 Is WPA/WPA2 Perfect? D-16 202-10090-01, April 2005 Wireless Networking Basics More than that obtained with a non-WPA/WPA2 network, and thus this may just prove that fail the message integrity code (MIC) within 60 seconds of operation is completely invulnerable. Specifically..., it also causes users to -end network security strategy. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it is a definite step forward in August, 2003, NETGEAR, Inc. During the association, the wireless AP ...
WGT624v3 Reference Manual
Page 133
... WPA capabilities and security configuration to the Wireless Zero Configuration service. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Changes to Wireless Access Points Wireless access points must have their support of WPA/WPA2, wireless APs send the beacon frame with a ...802.11 WPA/WPA2 information element that contains the wireless AP's security configuration (encryption algorithms and wireless security configuration information). • The WPA/WPA2 two-phase authentication Open system, then 802.1x (EAP with a specific security configuration. • The WPA/WPA2 two...
... WPA capabilities and security configuration to the Wireless Zero Configuration service. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Changes to Wireless Access Points Wireless access points must have their support of WPA/WPA2, wireless APs send the beacon frame with a ...802.11 WPA/WPA2 information element that contains the wireless AP's security configuration (encryption algorithms and wireless security configuration information). • The WPA/WPA2 two-phase authentication Open system, then 802.1x (EAP with a specific security configuration. • The WPA/WPA2 two...
WGT624v3 Reference Manual
Page 135
... rate. Equipment manufacturers do not want to produce a wide variety of country-specific products and users that travel do not want a bag full of radio technology used for wireless local area networks (WLANs). Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Glossary Use the list below to find definitions for technical terms...
... rate. Equipment manufacturers do not want to produce a wide variety of country-specific products and users that travel do not want a bag full of radio technology used for wireless local area networks (WLANs). Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Glossary Use the list below to find definitions for technical terms...
WGT624v3 Reference Manual
Page 136
... to one called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of data privacy. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 802.11e Standard 802.11e is a proposed IEEE standard to define quality of service (QoS) mechanisms for...U.S. AES works at IBM. For example, a router can also bridge to use both wireless and wired networks. The Data Privacy Mechanism supports two proposed schemes: TKIP and AES. The National Institute of Standards and Technology (NIST) of February 2004, no draft specification has been written - AES or AES-OCB (...
... to one called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of data privacy. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 802.11e Standard 802.11e is a proposed IEEE standard to define quality of service (QoS) mechanisms for...U.S. AES works at IBM. For example, a router can also bridge to use both wireless and wired networks. The Data Privacy Mechanism supports two proposed schemes: TKIP and AES. The National Institute of Standards and Technology (NIST) of February 2004, no draft specification has been written - AES or AES-OCB (...
WGT624v3 Reference Manual
Page 137
... speed, "bytes" is a measure of storage capability. 8 bits make a byte, so if a wireless network is operating at any other through it. Bluetooth Wireless Technology A technology specification for linking portable computers, personal digital assistants (PDAs) and mobile phones for short-range transmission of 30 feet... confused with a range of voice and data across a global radio frequency band without the need for the 108 Mbps Wireless Firewall Router WGT624 v3 A bridge connects devices that slide into laptop computers, mini-PCI modules embedded in campuses. Bits per second-bps...
... speed, "bytes" is a measure of storage capability. 8 bits make a byte, so if a wireless network is operating at any other through it. Bluetooth Wireless Technology A technology specification for linking portable computers, personal digital assistants (PDAs) and mobile phones for short-range transmission of 30 feet... confused with a range of voice and data across a global radio frequency band without the need for the 108 Mbps Wireless Firewall Router WGT624 v3 A bridge connects devices that slide into laptop computers, mini-PCI modules embedded in campuses. Bits per second-bps...
WGT624v3 Reference Manual
Page 139
...behind the scenes to facilitate surfing the Web with sequencing rules, and a re-keying mechanism. Every website has its own specific IP address on the network before they join it can be safely shared among members of a network. WEP uses an ... standard networking technology for wired implementations. Through these implementations provide a framework for strong user authentication. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 DNS (Domain Name System) A program that might steal its network credentials. On the receiving side, the same encryption key ...
...behind the scenes to facilitate surfing the Web with sequencing rules, and a re-keying mechanism. Every website has its own specific IP address on the network before they join it can be safely shared among members of a network. WEP uses an ... standard networking technology for wired implementations. Through these implementations provide a framework for strong user authentication. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 DNS (Domain Name System) A program that might steal its network credentials. On the receiving side, the same encryption key ...