WGT624v3 Reference Manual
Page 5
... to Print this Manual 1-3 Chapter 2 Introduction Key Features ...2-1 802.11g Wireless Networking 2-2 A Powerful, True Firewall with Content Filtering 2-2 Security ...2-3 Autosensing Ethernet Connections with Auto Uplink 2-3 Extensive Protocol Support 2-3 Easy Installation and Management 2-4 Maintenance and Support 2-5 Package Contents ...2-5 The Router's Front Panel 2-6 The Router's Rear Panel 2-7 Chapter 3 Configuring the Internet and Wireless Settings Initial Configuration ...3-2 Logging Into Your...
... to Print this Manual 1-3 Chapter 2 Introduction Key Features ...2-1 802.11g Wireless Networking 2-2 A Powerful, True Firewall with Content Filtering 2-2 Security ...2-3 Autosensing Ethernet Connections with Auto Uplink 2-3 Extensive Protocol Support 2-3 Easy Installation and Management 2-4 Maintenance and Support 2-5 Package Contents ...2-5 The Router's Front Panel 2-6 The Router's Rear Panel 2-7 Chapter 3 Configuring the Internet and Wireless Settings Initial Configuration ...3-2 Logging Into Your...
WGT624v3 Reference Manual
Page 8
...Network Preparing Your Computers for TCP/IP Networking C-1 Configuring Windows 95, 98, and Me for TCP/IP Networking C-2 Install or Verify Windows Networking Components C-2 Enabling DHCP to Automatically Configure TCP/IP Settings C-4 Selecting Windows' Internet Access Method C-6 Verifying TCP/IP Properties C-6 Configuring Windows NT4, 2000 or XP for IP Networking... C-7 Install or Verify Windows Networking...IP Networking C-16...Network C-21 Appendix D Wireless Networking Basics Wireless Networking Overview D-1 Infrastructure Mode D-1 Ad Hoc Mode (Peer-to-Peer Workgroup D-2 Network...
...Network Preparing Your Computers for TCP/IP Networking C-1 Configuring Windows 95, 98, and Me for TCP/IP Networking C-2 Install or Verify Windows Networking Components C-2 Enabling DHCP to Automatically Configure TCP/IP Settings C-4 Selecting Windows' Internet Access Method C-6 Verifying TCP/IP Properties C-6 Configuring Windows NT4, 2000 or XP for IP Networking... C-7 Install or Verify Windows Networking...IP Networking C-16...Network C-21 Appendix D Wireless Networking Basics Wireless Networking Overview D-1 Infrastructure Mode D-1 Ad Hoc Mode (Peer-to-Peer Workgroup D-2 Network...
WGT624v3 Reference Manual
Page 9
Overview of WEP Parameters D-5 Key Size ...D-6 WEP Configuration Options D-7 Wireless Channels ...D-7 WPA and WPA2 Wireless Security D-8 How Does WPA Compare to WEP D-9 How Does WPA Compare to WPA2 (IEEE 802.11i D-10 What are the Key Features of WPA and WPA2 Security D-10 WPA/WPA2 .../WPA2 Data Encryption Key Management D-14 Is WPA/WPA2 Perfect D-16 Product Support for WPA/WPA2 D-16 Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16 Changes to Wireless Access Points D-17 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18...
Overview of WEP Parameters D-5 Key Size ...D-6 WEP Configuration Options D-7 Wireless Channels ...D-7 WPA and WPA2 Wireless Security D-8 How Does WPA Compare to WEP D-9 How Does WPA Compare to WPA2 (IEEE 802.11i D-10 What are the Key Features of WPA and WPA2 Security D-10 WPA/WPA2 .../WPA2 Data Encryption Key Management D-14 Is WPA/WPA2 Perfect D-16 Product Support for WPA/WPA2 D-16 Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16 Changes to Wireless Access Points D-17 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18...
WGT624v3 Reference Manual
Page 15
...8226; Front panel LEDs for use the router within minutes. In addition to 253 computers. This chapter describes the features of the NETGEAR WGT624 v3 108 Mbps Wireless Firewall Router. Key Features The WGT624 v3 108 Mbps Wireless Firewall Router with the ability to operate in 802.... Parents and network administrators can install and use by a single computer. The WGT624 v3 wireless router provides the following features: • 802.11g wireless networking, with 4-port switch connects your purchase of the NETGEAR® WGT624 v3 108 Mbps Wireless Firewall Router. Introduction 2-1...
...8226; Front panel LEDs for use the router within minutes. In addition to 253 computers. This chapter describes the features of the NETGEAR WGT624 v3 108 Mbps Wireless Firewall Router. Key Features The WGT624 v3 108 Mbps Wireless Firewall Router with the ability to operate in 802.... Parents and network administrators can install and use by a single computer. The WGT624 v3 wireless router provides the following features: • 802.11g wireless networking, with 4-port switch connects your purchase of the NETGEAR® WGT624 v3 108 Mbps Wireless Firewall Router. Introduction 2-1...
WGT624v3 Reference Manual
Page 16
... of Service (DoS) protection. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 • Flash memory for Wi-Fi Protected Access (WPA) data encryption which provides strong data encryption and authentication based on a pre-shared key. • Wireless access can be restricted by MAC address. • Wireless network name broadcast can be generated manually or by passphrase...
... of Service (DoS) protection. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 • Flash memory for Wi-Fi Protected Access (WPA) data encryption which provides strong data encryption and authentication based on a pre-shared key. • Wireless access can be restricted by MAC address. • Wireless network name broadcast can be generated manually or by passphrase...
WGT624v3 Reference Manual
Page 33
... Auto 108 Mbps: All 802.11g, 802.11b and NETGEAR 108 Mbps wireless stations can be used. - Disable: no data encryption - "Open System" or "Shared Key" Check your network. This value is not listed, please check with another nearby access point. • Mode: Select the desired wireless mode....Wired Equivalent Privacy): use . Configuring the Internet and Wireless Settings 202-10090-01, April 2005 3-11 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Note: Failure to follow these guidelines can result in your wireless card's documentation to see what method to use ...
... Auto 108 Mbps: All 802.11g, 802.11b and NETGEAR 108 Mbps wireless stations can be used. - Disable: no data encryption - "Open System" or "Shared Key" Check your network. This value is not listed, please check with another nearby access point. • Mode: Select the desired wireless mode....Wired Equivalent Privacy): use . Configuring the Internet and Wireless Settings 202-10090-01, April 2005 3-11 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Note: Failure to follow these guidelines can result in your wireless card's documentation to see what method to use ...
WGT624v3 Reference Manual
Page 34
... your network. • Automatic Key Generation (Passphrase): Enter a word or group of the four key boxes will automatically be populated with key values. For 64 bit WEP: Enter ten hexadecimal digits (any combination of printable characters in the Passphrase box. The Passphrase must be used and enter the matching WEP key information for the 108 Mbps Wireless Firewall Router WGT624...
... your network. • Automatic Key Generation (Passphrase): Enter a word or group of the four key boxes will automatically be populated with key values. For 64 bit WEP: Enter ten hexadecimal digits (any combination of printable characters in the Passphrase box. The Passphrase must be used and enter the matching WEP key information for the 108 Mbps Wireless Firewall Router WGT624...
WGT624v3 Reference Manual
Page 118
...a small wireless workgroup and allows workgroup members to the network - Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers are brought together as network name. In an ad hoc wireless network with the... you to quickly set up a wireless network. Authentication and WEP Data Encryption The absence of the wireless local area network. D-2 Wireless Networking Basics 202-10090-01, April 2005 thus, there is a thirty-two character (maximum) alphanumeric key identifying the name of a physical connection...
...a small wireless workgroup and allows workgroup members to the network - Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers are brought together as network name. In an ad hoc wireless network with the... you to quickly set up a wireless network. Authentication and WEP Data Encryption The absence of the wireless local area network. D-2 Wireless Networking Basics 202-10090-01, April 2005 thus, there is a thirty-two character (maximum) alphanumeric key identifying the name of a physical connection...
WGT624v3 Reference Manual
Page 119
.... 802.11 Authentication The 802.11 standard defines several services that are described below. The station listens for the 108 Mbps Wireless Firewall Router WGT624 v3 • Shared Key. Alternatively, the device can now communicate with an Ethernet network through the access point. Open System Authentication The following events must authenticate a station before an 802.11 Station...
.... 802.11 Authentication The 802.11 standard defines several services that are described below. The station listens for the 108 Mbps Wireless Firewall Router WGT624 v3 • Shared Key. Alternatively, the device can now communicate with an Ethernet network through the access point. Open System Authentication The following events must authenticate a station before an 802.11 Station...
WGT624v3 Reference Manual
Page 120
...108 Mbps Wireless Firewall Router WGT624 v3 2. If the decrypted text matches the original challenge text, then the access point and the station share the same WEP Key and the access point authenticates the station. 5. The station connects to the station. 3. The access point compares the decrypted text with either the 802.11 network or Ethernet network...an authentication request to the access point. 4. The station uses its configured WEP Key that corresponds to network Access Point (AP) Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET LNK W LA N LO CA L MODEL ...
...108 Mbps Wireless Firewall Router WGT624 v3 2. If the decrypted text matches the original challenge text, then the access point and the station share the same WEP Key and the access point authenticates the station. 5. The station connects to the station. 3. The access point compares the decrypted text with either the 802.11 network or Ethernet network...an authentication request to the access point. 4. The station uses its configured WEP Key that corresponds to network Access Point (AP) Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET LNK W LA N LO CA L MODEL ...
WGT624v3 Reference Manual
Page 121
... text and to connect sends it sends using a configured WEP Key. The receiving device decrypts the data using the same WEP Key. For authentication purposes, the wireless network uses Shared Key Authentication. Note: Some 802.11 access points also support Use WEP...(Shared Key Authentication without data encryption). The receiving device decrypts the data using the same WEP Key. Typically, there are three WEP Encryption options available for the 108 Mbps Wireless Firewall Router WGT624 v3 This process is illustrated below. For authentication purposes, the network uses ...
... text and to connect sends it sends using a configured WEP Key. The receiving device decrypts the data using the same WEP Key. For authentication purposes, the wireless network uses Shared Key Authentication. Note: Some 802.11 access points also support Use WEP...(Shared Key Authentication without data encryption). The receiving device decrypts the data using the same WEP Key. Typically, there are three WEP Encryption options available for the 108 Mbps Wireless Firewall Router WGT624 v3 This process is illustrated below. For authentication purposes, the network uses ...
WGT624v3 Reference Manual
Page 122
...manufacturers support only one . Similar to encrypt/decrypt all data transmitted via the wireless interface. The 128-bit WEP Key is a 40-bit WEP Key. Each 40-bit WEP Key is stronger than 40-bit encryption, but 128-bit encryption may not be ...key is a 128-bit WEP Key. Additionally, 24 factory-set bits are not user-configurable). D-6 Wireless Networking Basics 202-10090-01, April 2005 When configured for 40-bit encryption, 802.11 products typically support up to generate a 64-bit encryption key. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Key...
...manufacturers support only one . Similar to encrypt/decrypt all data transmitted via the wireless interface. The 128-bit WEP Key is a 40-bit WEP Key. Each 40-bit WEP Key is stronger than 40-bit encryption, but 128-bit encryption may not be ...key is a 128-bit WEP Key. Additionally, 24 factory-set bits are not user-configurable). D-6 Wireless Networking Basics 202-10090-01, April 2005 When configured for 40-bit encryption, 802.11 products typically support up to generate a 64-bit encryption key. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Key...
WGT624v3 Reference Manual
Page 123
... the AP must match WEP key 2 on the client adapter, and so on. The radio frequency channels used by the SSID. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 WEP Configuration Options The WEP settings must match on all of channel cross-talk, and provide a noticeable performance increase over networks with minimal channel separation...
... the AP must match WEP key 2 on the client adapter, and so on. The radio frequency channels used by the SSID. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 WEP Configuration Options The WEP settings must match on all of channel cross-talk, and provide a noticeable performance increase over networks with minimal channel separation...
WGT624v3 Reference Manual
Page 125
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 WPA and WPA2 offer the following benefits: • Enhanced data privacy • Robust key management • Data origin authentication • Data integrity protection The Wi-Fi Alliance is that the keys are cumbersome to change.... access points and client wireless adapters on existing wireless devices to perform encryption operations. Wireless Networking Basics D-9 202-10090-01, April 2005 Starting August of known WEP vulnerabilities. NETGEAR is required. How Does WPA Compare to update the keys. With 802.11 WEP...
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 WPA and WPA2 offer the following benefits: • Enhanced data privacy • Robust key management • Data origin authentication • Data integrity protection The Wi-Fi Alliance is that the keys are cumbersome to change.... access points and client wireless adapters on existing wireless devices to perform encryption operations. Wireless Networking Basics D-9 202-10090-01, April 2005 Starting August of known WEP vulnerabilities. NETGEAR is required. How Does WPA Compare to update the keys. With 802.11 WEP...
WGT624v3 Reference Manual
Page 126
...WEP vulnerabilities and is discouraged These features are included in these elements includes the authentication method (802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). The following security features are discussed below. WPA/WPA2...operations include: • Network security capability determination. WPA is communicated through WPA information elements in Beacon, Probe Response, and (Re) Association Requests. WPA is forward compatible with the WPA2 security specification. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 How Does WPA...
...WEP vulnerabilities and is discouraged These features are included in these elements includes the authentication method (802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). The following security features are discussed below. WPA/WPA2...operations include: • Network security capability determination. WPA is communicated through WPA information elements in Beacon, Probe Response, and (Re) Association Requests. WPA is forward compatible with the WPA2 security specification. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 How Does WPA...
WGT624v3 Reference Manual
Page 127
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 The primary information conveyed in the information elements to decide which in sophisticated cryptographic and security techniques to overcome most of the pre-shared key. Possible cipher suites include: WEP, TKIP, and ...at the end of each plaintext message to ensure messages are used to those stations successfully authenticated. Wireless Networking Basics 202-10090-01, April 2005 D-11 Keys are generated after successful authentication and through a subsequent 4-way handshake between the station and Access Point ...
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 The primary information conveyed in the information elements to decide which in sophisticated cryptographic and security techniques to overcome most of the pre-shared key. Possible cipher suites include: WEP, TKIP, and ...at the end of each plaintext message to ensure messages are used to those stations successfully authenticated. Wireless Networking Basics 202-10090-01, April 2005 D-11 Keys are generated after successful authentication and through a subsequent 4-way handshake between the station and Access Point ...
WGT624v3 Reference Manual
Page 128
...mutual authentication so that a rogue wireless user does not join the network. Windows XP implements 802.1x natively, and several NETGEAR switch and wireless access point products support 802.1x. D-12 202-10090-01, April 2005 Wireless Networking Basics Together, these technologies provide... Point using pre-shared key or 802.1x Figure 4-6: WPA/WPA2 Overview Wired Network with a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports Extensible Authentication Protocol (EAP). Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 WPA/WPA2 Authentication...
...mutual authentication so that a rogue wireless user does not join the network. Windows XP implements 802.1x natively, and several NETGEAR switch and wireless access point products support 802.1x. D-12 202-10090-01, April 2005 Wireless Networking Basics Together, these technologies provide... Point using pre-shared key or 802.1x Figure 4-6: WPA/WPA2 Overview Wired Network with a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports Extensible Authentication Protocol (EAP). Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 WPA/WPA2 Authentication...
WGT624v3 Reference Manual
Page 129
...the client. 2. This begins a series of message exchanges to AP) also contain WPA information elements. 1. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Client with a WPA/ WPA2-enabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse) For example, a WPA/WPA2-enabled AP For example, a RADIUS server 1...supplicant (client device) attempting to connect with WPA/WPA2 information element to the stations in the service set. Wireless Networking Basics 202-10090-01, April 2005 D-13 The access point replies with an EAP-request identity message. Information...
...the client. 2. This begins a series of message exchanges to AP) also contain WPA information elements. 1. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Client with a WPA/ WPA2-enabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse) For example, a WPA/WPA2-enabled AP For example, a RADIUS server 1...supplicant (client device) attempting to connect with WPA/WPA2 information element to the stations in the service set. Wireless Networking Basics 202-10090-01, April 2005 D-13 The access point replies with an EAP-request identity message. Information...
WGT624v3 Reference Manual
Page 130
... authentication server (for every frame, and the change the global encryption key used for the 108 Mbps Wireless Firewall Router WGT624 v3 3. Additionally, 802.11 and 802.1x provide no mechanism to change is sent to define applicable encryption keys. D-14 202-10090-01, April 2005 Wireless Networking Basics The access point acts as a "pass through the use of...
... authentication server (for every frame, and the change the global encryption key used for the 108 Mbps Wireless Firewall Router WGT624 v3 3. Additionally, 802.11 and 802.1x provide no mechanism to change is sent to define applicable encryption keys. D-14 202-10090-01, April 2005 Wireless Networking Basics The access point acts as a "pass through the use of...
WGT624v3 Reference Manual
Page 131
...and incrementally deployed. This is that calculates an 8-byte message integrity check (MIC) using the calculation facilities available on existing wireless devices. Wireless Networking Basics 202-10090-01, April 2005 D-15 Although the ICV is encrypted, you can use cryptanalysis to deploy better security...is a pragmatic compromise that is encrypted together with the frame data and the ICV. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to the 802.11 payload and encrypted with WEP. TKIP also provides ...
...and incrementally deployed. This is that calculates an 8-byte message integrity check (MIC) using the calculation facilities available on existing wireless devices. Wireless Networking Basics 202-10090-01, April 2005 D-15 Although the ICV is encrypted, you can use cryptanalysis to deploy better security...is a pragmatic compromise that is encrypted together with the frame data and the ICV. Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to the 802.11 payload and encrypted with WEP. TKIP also provides ...