background image

ii

 

 

© 2005 by NETGEAR, Inc. All rights reserved.

Trademarks

NETGEAR is a trademark of Netgear, Inc. 

Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation.

Other brand and product names are registered trademarks or trademarks of their respective holders.

Statement of Conditions

In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to 
make changes to the products described in this document without notice.

NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit 
layout(s) described herein.

Federal Communications Commission (FCC) Compliance Notice: Radio Frequency 
Notice

This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to 

 

part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a 
residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and 
used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no 
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to 
radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try 
to correct the interference by one or more of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.

Consult the dealer or an experienced radio/TV technician for help. 

EN 55 022 Declaration of Conformance

This is to certify that the CG814WG v2 Wireless Cable Modem Gateway is shielded against the generation of radio 
interference in accordance with the application of Council Directive 89/336/EEC, Article 4a. Conformity is declared by 
the application of EN 55 022 Class B (CISPR 22).

Bestätigung des Herstellers/Importeurs

Es wird hiermit bestätigt, daß das CG814WG v2 Wireless Cable Modem Gateway gemäß der im BMPT-AmtsblVfg 243/
1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das vorschriftsmäßige Betreiben einiger Geräte (z.B. 
Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der 
Betriebsanleitung.

Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt 
gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.

Summary of Contents for CG814WG V2

Page 1: ...NETGEAR Inc 4500 Great America Parkway Santa Clara CA 95054 USA Phone 1 888 NETGEAR 202 10074 01 January 2005 Reference Manual for the Wireless Cable Modem Gateway CG814WG v2...

Page 2: ...nstallation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the...

Page 3: ...to be used in a residential area or an adjacent area thereto and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipment and Electronic Office Mach...

Page 4: ...iv...

Page 5: ...Ethernet Connection 2 2 USB Port 2 3 Protocol Support 2 3 Easy Installation and Management 2 3 What s in the Box 2 4 The Gateway s Front Panel 2 4 The Gateway s Rear Panel 2 6 Chapter 3 Connecting th...

Page 6: ...Day 5 6 Using Port Blocking 5 6 Port Forwarding 5 7 Using Port Triggering 5 9 Setting Up A Default DMZ Host 5 10 Respond to Ping on Internet WAN Port 5 11 Enabling or Disabling Content Filtering Servi...

Page 7: ...l Specifications A 1 Appendix B Networks Routing and Firewall Basics B 1 Related Publications B 1 Basic Router Concepts B 1 What is a Router B 1 Routing Information Protocol B 2 IP Addresses and the I...

Page 8: ...Get the Internet Configuration Parameters C 2 Record Your Internet Connection Information C 3 Preparing Your Computers for TCP IP Networking C 4 Configuring Windows 95 98 and Me for TCP IP Networking...

Page 9: ...work C 20 Appendix D Wireless Networking Basics D 1 Wireless Networking Overview D 1 Infrastructure Mode D 1 Ad Hoc Mode Peer to Peer Workgroup D 2 Network Name Extended Service Set Identification ESS...

Page 10: ...vi Contents...

Page 11: ...skills However basic computer network Internet firewall and networking technology tutorial information is provided in the Appendices This guide uses the following typographical conventions This guide...

Page 12: ...on of the chapter you were viewing Click the print icon in the upper left of the window Tip If your printer supports printing two pages on a single sheet of paper you can save paper and printer ink by...

Page 13: ...ur network from attacks and intrusions Unlike simple Internet sharing routers that rely on Network Address Translation NAT for security the CG814WG v2 uses Stateful Packet Inspection for Denial of Ser...

Page 14: ...teway allows you to control access to Internet content by screening for keywords within Web addresses Dual login allows an adult to configure content filtering while still allowing a child to configur...

Page 15: ...PCs to share an Internet account using only a single IP address which may be statically or dynamically assigned by your Internet service provider ISP This technique known as Network Address Translati...

Page 16: ...nitoring The gateway s front panel LEDs provide an easy way to monitor its status and activity What s in the Box The product package should contain the following items CG814WG v2 Wireless Cable Modem...

Page 17: ...he cable interface is still in progress Upload Traffic Blink Off Data is being transmitted to the cable interface The cable interface is idle Download Traffic Blink Off Data is being received from the...

Page 18: ...way s Rear Panel The rear panel of the CG814WG v2 Figure 2 2 contains the connections identified below Figure 2 2 CG814WG v2 Rear Panel AC power adapter input wireless antenna reset button USB port 4...

Page 19: ...on for your cable modem account Hardware Requirements The CG814WG v2 Gateway connects to your LAN using either its twisted pair Ethernet USB or 802 11b or 802 11g wireless port To use the CG814WG v2 G...

Page 20: ...cting the CG814WG v2 Gateway Before using your gateway you need to do the following Connect to your computer using either Ethernet USB or wireless Connect the line from your cable service provider to...

Page 21: ...rates Auto UplinkTM technology Each LOCAL Ethernet port will automatically sense whether the cable plugged into the port should have a normal connection e g connecting to a PC or an uplink connection...

Page 22: ...rdware Wizard window Browse to the Resource CD and install the USB driver by clicking through the Windows wizard prompts e Plug in your CG814WG v2 and wait about 30 seconds for the lights to stop blin...

Page 23: ...ns as shown below Figure 3 4 Login window b For security reasons the gateway has two sets of user names and passwords one for a parent and one for children Only the parent s login can be used to set u...

Page 24: ...has assigned you a permanent fixed static IP address for your PC select Static IP If you select Static IP enter the IP address that your ISP assigned Also enter the Static IP Mask also known as netmas...

Page 25: ...Networks Routing and Firewall Basics Implement Appropriate Security Unlike wired network data your wireless data transmissions can extend beyond your walls and can be received by anyone with a compati...

Page 26: ...lacement of the wireless gateway For best results place your gateway Near the center of the area in which your PCs will operate In an elevated location such as a high shelf Away from potential sources...

Page 27: ...Configuration 4 3 Configuring Wireless Settings To configure the Wireless interface of your gateway click on the Wireless Settings heading in the Setup section of the browser interface The Wireless S...

Page 28: ...default is to enable the wireless network Allow Broadcast of Name SSID Use this checkbox to turn on or turn off broadcast of the wireless network Name SSID The default is to broadcast the wireless net...

Page 29: ...list of Connected Wireless Devices or by manual entering MAC addresses To restrict access based on MAC addresses 1 For your convenience this menu displays a list of currently Connected Wireless Devic...

Page 30: ...em 64 bit sometimes called 40 bit encryption 128 bit encryption Authentication Type Select the appropriate value Open System or Shared Key Check your wireless card s documentation to see what method t...

Page 31: ...es below to change the gateway s password and the amount of time for the administrator s login timeout Note The user name and password are not the same as any user name or password your may use to log...

Page 32: ...e new password Blocking Keywords Sites and Services The gateway provides a variety of options for blocking Internet based content and communications services With its content filtering feature the CG8...

Page 33: ...ticular Web site For example for the address www NETGEAR com the domain name is NETGEAR com 1 Log in to the gateway at its default LAN address of http 192 168 0 1 with its parent default User Name of...

Page 34: ...n If the domain badstuff com is specified the URL http www badstuff com xxx html is blocked along with all other urls in the badstuff com site Up to eight entries are supported in the Keyword list 6 T...

Page 35: ...ice to the MAC Filtering list 1 Enter the MAC address If the desired device is in the Trusted Devices table click the radio button of that PC to capture is MAC address If the desired device is not in...

Page 36: ...e side to the other Inbound rules WAN to LAN restrict access by outsiders to private resources selectively allowing only specific outside users to access specific resources Instructions for setting up...

Page 37: ...would like to block and select whether the ports are TCP UDP or Both Click Add To delete an existing rule select its button on the left side of the table and click Delete Port Forwarding Because the...

Page 38: ...default Attempts by local PCs to access the server using the external WAN IP address will fail Remember that allowing inbound services opens holes in your firewall Only enable those ports that are ne...

Page 39: ...it is static and has some limitations Ports will be open to traffic from the internet until the port forwarding rule is removed Additionally port forwarding does not work well for some applications wh...

Page 40: ...ure 5 7 Port Triggering menu with IRC example Setting Up A Default DMZ Host The Default DMZ Server feature is helpful when using some online games and videoconferencing applications that are incompati...

Page 41: ...e DMZ Host enter 0 and click Apply Respond to Ping on Internet WAN Port If you want the gateway to respond to a ping from the Internet click the Respond to Ping on WAN Port check box This should only...

Page 42: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 5 12 Protecting Your Network...

Page 43: ...to perform network management tasks with your CG814WG v2 Wireless Cable Modem Gateway Network Status Information The CG814W provides a variety of status and usage information which is discussed below...

Page 44: ...ervice Provider Device MAC Address The MAC address of the router side of the gateway This is the equivalent of your PC when connected to a cable modem You can use the MAC Cloning feature to replace th...

Page 45: ...detailed information about the status of the connection to your cable service provider that can be used for troubleshooting The gateway goes through the following steps to be provisioned 1 Acquire and...

Page 46: ...of the IETF designated private address range for use in private networks and should be suitable in most applications If your network has a requirement to use a different IP addressing scheme you can...

Page 47: ...g the Starting IP Address and Ending IP Address These addresses should be part of the same IP address subnet as the gateway s LAN IP address Using the default addressing scheme you should define a ran...

Page 48: ...to which the logs will be sent Use a full e mail address for example ChrisXY myISP com In the SMTP Server Name box type the outgoing SMTP mail server of your ISP for example mail myISP com You may be...

Page 49: ...under Maintenance select Set Password Select Yes for Restore Factory Defaults and click Apply 2 The gateway will then reboot automatically After an erase the gateway s password will be password the LA...

Page 50: ...PC using the Ping command From the main menu of the browser interface under the Maintenance heading select the Diagnostics menu shown below Figure 6 5 Diagnostics menu To perform a Ping test 1 In the...

Page 51: ...gement Web interface to a custom port by entering that number in the box provided Choose a number between 1024 and 65535 but do not use the number of any common service port The default is 8080 which...

Page 52: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 6 10 Managing Your NetworkSoftware Version BNX v1 2...

Page 53: ...ateway but I can t access the Internet Go to Troubleshooting the ISP Connection on page 7 4 I can t remember the gateway s configuration password I want to clear the configuration and start over again...

Page 54: ...e a hardware problem and should contact technical support Local Link LEDs Not On If the Local Port Link LEDs do not light when the Ethernet connection is made check the following Make sure that the Et...

Page 55: ...the computer cannot reach a DHCP server These auto generated addresses are in the range of 169 254 x x If your IP address is in this range check the connection from the PC to the gateway and reboot y...

Page 56: ...ontain a ping utility that sends an echo request packet to the designated device The device then responds with an echo reply Troubleshooting a TCP IP network is made easier by using the ping utility i...

Page 57: ...s your ISP s DNS server If the path is functioning correctly replies as in the previous section are displayed If you do not receive replies Check that your PC has the IP address of your gateway listed...

Page 58: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 7 6 TroubleshootingSoftware Version BNX v1 2...

Page 59: ...c PPTP Power Adapter North America input 120V 60 Hz input All regions output 12 V DC 1 25A output 15W maximum Physical Specifications Dimensions 175 by 114 by 30 mm 6 9 by 4 5 by 1 2 in Weight 0 31 kg...

Page 60: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 A 2 Technical Specifications...

Page 61: ...ocal network and the Internet can be very expensive Because of this expense Internet access is usually provided by a slower speed wide area network WAN link such as a cable or DSL modem In order to ma...

Page 62: ...ernet Protocol IP uses a 32 bit address structure The address is usually written in dot notation also called dotted decimal notation in which each group of eight bits is written in decimal form separa...

Page 63: ...65 354 hosts on a network A Class B address uses a 16 bit network number and a 16 bit node number Class B addresses are in this range 128 1 x x to 191 254 x x Class C Class C addresses can have 254 ho...

Page 64: ...C addresses are 255 0 0 0 255 255 0 0 and 255 255 255 0 respectively For example the address 192 168 170 237 is a Class C IP address whose network portion is the upper 24 bits When combined using an A...

Page 65: ...ng the number of addresses available subnet addressing provides other benefits Subnet addressing allows a network manager to construct an address scheme for the network by using different subnets for...

Page 66: ...t mask 255 255 255 0 into 16 subnets 4 bits the new subnet mask becomes 255 255 255 240 The following table displays several common netmask values in both the dotted decimal and the mask length format...

Page 67: ...tically assign private addresses Regardless of your particular situation do not create an arbitrary IP address always follow the guidelines explained here For more information about address assignment...

Page 68: ...r on your local network to be accessible to outside users MAC Addresses and Address Resolution Protocol An IP address alone cannot be used to deliver data from one LAN device to another To send data b...

Page 69: ...n the table For more information about address assignment refer to the IETF documents RFC 1597 Address Allocation for Private Internets and RFC 1466 Guidelines for Management of IP Address Space For m...

Page 70: ...Firewalls When your LAN connects to the Internet through a router an opportunity is created for outsiders to access or disrupt your network A NAT router provides some protection because by the very n...

Page 71: ...flooding your site with more requests than it can handle A more sophisticated attack may attempt to exploit some weakness in the operating system used by your router or gateway Some operating systems...

Page 72: ...workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft networking in the various Windows operating systems Some vendors also refer to ad hoc networking as...

Page 73: ...events must occur before an 802 11b Station can communicate with an Ethernet network through an access point such as the one built in to the CG814WG v2 1 Turn on the wireless station 2 The station li...

Page 74: ...he station 3 The station uses its configured 64 bit or 128 bit default key to encrypt the challenge text and sends the encrypted text to the access point 4 The access point decrypts the encrypted text...

Page 75: ...Authentication 2 Use WEP for Encryption A transmitting 802 11b device encrypts the data portion of every packet it sends using a configured WEP Key The receiving 802 11b device decrypts the data using...

Page 76: ...c hexadecimal characters to ease encryption key entry 128 bit encryption is stronger than 40 bit encryption but 128 bit encryption may not be available outside of the United States due to U S export r...

Page 77: ...fic and Medical band between 2 4 GHz and 2 5 GHz Neighboring channels are 5 MHz apart However due to spread spectrum effect of the signals a node sending signals using a particular channel will utiliz...

Page 78: ...do not overlap Ethernet Cabling Although Ethernet networks originally used thick or thin coaxial cable most installations currently use unshielded twisted pair UTP cabling The UTP cable contains eight...

Page 79: ...the transmit and receive pairs are exchanged at one of the two cable connectors Crossover cables are often unmarked as such and must be identified by comparing the two connectors Since the cable conne...

Page 80: ...Reference Manual for the Wireless Cable Modem Gateway CG814WG v2 B 20 Networks Routing and Firewall Basics...

Page 81: ...ided with your router The cable or DSL broadband modem must provide a standard 10 Mbps 10BASE T or 100 Mbps 100BASE Tx Ethernet interface Computer Network Configuration Requirements The router include...

Page 82: ...her the required Internet connection information Your Internet service provides all the information needed to connect to the Internet If you cannot locate this information you can ask your Internet se...

Page 83: ...alid IP address Fixed or Static Internet IP Address ______ ______ ______ ______ Gateway IP Address ______ ______ ______ ______ Subnet Mask ______ ______ ______ ______ ISP DNS Server Addresses If you w...

Page 84: ...or Linux include TCP IP components Follow the instructions provided with your operating system or networking software to install TCP IP on your computer In your IP network each computer and the route...

Page 85: ...ngs and then click Control Panel 2 Double click the Network icon The Network window opens and displays a list of installed components 3 Make sure that the following components are installed Client for...

Page 86: ...rks and then click OK 6 Restart your computer for the changes to take effect Enabling DHCP to Automatically Configure TCP IP Settings in Windows 95B 98 and Me After the TCP IP protocol components are...

Page 87: ...utton If the icon is not on the desktop On the Windows taskbar click the Start button point to Settings and then click Control Panel Locate the Network Neighborhood icon and click on it The Network pa...

Page 88: ...n of Windows on your network Selecting the Windows Internet Access Method 1 On the Windows taskbar click the Start button point to Settings and then click Control Panel 2 Double click the Internet Opt...

Page 89: ...y components for IP networking 1 On the Windows taskbar click the Start button then click Control Panel 2 Double click the Network Connections icon 3 If an Ethernet adapter is present in your computer...

Page 90: ...ation of TCP IP in Windows XP 1 Open the Network Connection Window a Select Control Panel from the Windows XP Start menu b Select the Network Connections icon on the Control Panel The Network Connecti...

Page 91: ...ort tab page b Select Internet Protocol and click Properties to view the configuration information 4 Set DHCP for TCP IP a Verify that the following two radio buttons are selected Obtain an IP address...

Page 92: ...HCP for Windows 2000 1 Check the Local Area Connection Properties Settings a Click the My Network Places icon on the Windows desktop The Network and Dial up Connections window opens b Right click on L...

Page 93: ...rnet Protocol TCP IP Properties dialog box b Verify that the following items are selected Obtain an IP address automatically Obtain DNS server address automatically c Click OK to return to Local Area...

Page 94: ...ronment for Windows NT 4 0 Follow this procedure to configure TCP IP with DHCP in Windows NT 4 0 1 Open the Network panel a Choose Settings from the Start menu b Select Control Panel to display Contro...

Page 95: ...2000 and NT4 To check your computer s TCP IP configuration 1 On the Windows taskbar click the Start button and then click Run The Run window opens 2 Type cmd and then click OK A command window opens...

Page 96: ...the Apple menu select Control Panels then TCP IP The TCP IP Control Panel opens 2 From the Connect via box select your Macintosh s Ethernet interface 3 From the Configure box select Using DHCP Server...

Page 97: ...rnet you need to contract with an Internet service provider ISP for a single user Internet access account using a cable modem or DSL modem This modem must be a separate physical box not a card and mus...

Page 98: ...m such as WinPOET or EnterNet then your account uses Point to Point Protocol over Ethernet PPPoE When you configure your router you need to enter your login name and password in the router s configura...

Page 99: ...1 On the Windows taskbar click the Start button point to Settings and then click Control Panel 2 Double click the Network icon The Network window opens and displays a list of installed components 3 Se...

Page 100: ...n this case close the Control Panel and skip the rest of this section 2 If an IP address and subnet mask are shown write down the information 3 If an IP address appears under Router address write down...

Page 101: ...omoting interoperability among 802 11 devices The 802 11 standard offers two methods for configuring a wireless network ad hoc and infrastructure Infrastructure Mode With a wireless access point you c...

Page 102: ...reless network with no access points the Basic Service Set Identification BSSID is used In an infrastructure wireless network that includes an access point the ESSID is used but may still be referred...

Page 103: ...channels in the United States It is recommended that you start using channel 1 and grow to use channel 6 and 11 when necessary as these three channels do not overlap Table D 1 802 11g Radio Frequency...

Page 104: ...eral services that govern how two 802 11 devices communicate The following events must occur before an 802 11 Station can communicate with an Ethernet network through an access point such as the one b...

Page 105: ...e following steps occur when two devices use Open System Authentication 1 The station sends an authentication request to the access point 2 The access point authenticates the station 3 The station ass...

Page 106: ...e text If the decrypted text matches the original challenge text then the access point and the station share the same WEP key and the access point authenticates the station 5 The station connects to t...

Page 107: ...ryption 802 11 products typically support up to four WEP keys Each 40 bit WEP Key is expressed as five sets of two hexadecimal digits 0 9 and A F For example 12 34 56 78 90 is a 40 bit WEP key When co...

Page 108: ...entication and Encryption A transmitting 802 11 device encrypts the data portion of every packet it sends using a configured WEP Key The receiving 802 11 device decrypts the data using the same WEP Ke...

Page 109: ...2284 With 802 11 WEP all access points and client wireless adapters on a particular wireless LAN must use the same encryption key A major problem with the 802 11 standard is that the keys are cumberso...

Page 110: ...ity Protocol TKIP Michael message integrity code MIC AES Support Support for a Mixture of WPA and WEP Wireless Clients These features are discussed below WPA addresses most of the known WEP vulnerabil...

Page 111: ...ns successfully authenticated The supplicant in the station uses the authentication and cipher suite information contained in the information elements to decide which authentication method and cipher...

Page 112: ...type such as Transport Layer Security EAP TLS or EAP Tunneled Transport Layer Security EAP TTLS defines how the authentication takes place Note For environments with a Remote Authentication Dial In Us...

Page 113: ...esponses AP to station and Association Requests station to AP also contain WPA information elements 1 Initial 802 1x communications begin with an unauthenticated supplicant i e client device attemptin...

Page 114: ...P type without needing to upgrade an 802 1x compliant access point As a result you can update the EAP authentication type to such devices as token cards Smart Cards Kerberos one time passwords certifi...

Page 115: ...pted payload and update the encrypted ICV without being detected by the receiver With WPA a method known as Michael specifies a new algorithm that calculates an 8 byte message integrity code MIC using...

Page 116: ...ireless Wi Fi certified products will support the WPA standard NETGEAR Inc wireless products that had their Wi Fi certification approved before August 2003 will have one year to add WPA so as to maint...

Page 117: ...ation element and respond with a specific security configuration The WPA two phase authentication Open system then 802 1x EAP or preshared key TKIP Michael AES optional To upgrade your wireless networ...

Page 118: ...cs Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA authentication and preshared key and the new WPA encryption algorithms TKIP and the o...

Page 119: ...iptive name for an address or group of addresses on the Internet Domain names are of the form of a registered entity name plus one of a number of predefined top level suffixes such as com edu uk etc F...

Page 120: ...network devices such as storage and printers Although many technologies exist to implement a LAN Ethernet is the most common for connecting personal computers MAC address Media Access Control address...

Page 121: ...connection PPTP Point to Point Tunneling Protocol A method for establishing a virtual private network VPN by embedding Microsoft s network protocol into Internet packets PSTN Public Switched Telephon...

Page 122: ...4 bit or 128 bit Shared Key for data encryption wide area network WAN A long distance link used to extend or connect remotely located local area networks The Internet is a large WAN Wi Fi See 802 11b...

Reviews: