background image

202-10051-01, March 2005

202-10051-01 
March 2005

NETGEAR

, Inc.

4500 Great America Parkway 
Santa Clara, CA 95054 USA

Reference Manual for the 
54 Mbps Wireless Router 
with Phone Adapter 
WGR826V

Содержание WGR826V

Страница 1: ...202 10051 01 March 2005 202 10051 01 March 2005 NETGEAR Inc 4500 Great America Parkway Santa Clara CA 95054 USA Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V ...

Страница 2: ...eparation between the equipment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help EN 55 022 Declaration of Conformance This is to certify that the WGR826V 54 Mbps Wireless Router with Phone Adapter is shielded against the generation of radio interference in accordan...

Страница 3: ...f radio interference Read instructions for correct handling Customer Support Refer to the Support Information Card that shipped with your WGR826V 54 Mbps Wireless Router with Phone Adapter World Wide Web NETGEAR maintains a World Wide Web home page that you can access at the universal resource locator URL http www netgear com A direct connection to the Internet and a Web browser such as Internet E...

Страница 4: ...202 10051 01 March 2005 iv This page intentionally left blank ...

Страница 5: ...onnect the Wireless Router to Your Network 3 1 Now Set Up a Computer for Wireless Connectivity 3 10 Troubleshooting Tips 3 10 Chapter 4 Content Filtering Content Filtering Overview 4 1 Firewall Rules 4 1 Outbound Services 4 4 Inbound Services 4 6 Blocking Access to Internet Sites 4 8 Blocking Access to Internet Services 4 9 Configuring a User Defined Service 4 10 Configuring Services Blocking by I...

Страница 6: ...nostics 6 7 Reviewing the VoIP and QoS Settings 6 8 Chapter 7 Setting Up Advanced Router Configurations Using the LAN IP Setup Options 7 1 Configuring LAN TCP IP Setup Parameters 7 2 Using the Router as a DHCP server 7 3 Using Address Reservation 7 4 Configuring Static Routes 7 4 Configuring WAN Setup Options 7 6 Setting Up a Default DMZ Server 7 7 Setting the MTU Size 7 8 Port Triggering 7 8 Acce...

Страница 7: ... and the Internet B 2 Netmask B 4 Subnet Addressing B 5 Private IP Addresses B 7 Single IP Address Operation Using NAT B 8 MAC Addresses and Address Resolution Protocol B 9 Related Documents B 9 Domain Name Server B 9 IP Configuration by DHCP B 10 Internet Security and Firewalls B 10 What is a Firewall B 11 Stateful Packet Inspection B 11 Denial of Service Attack B 11 Ethernet Cabling B 11 Categor...

Страница 8: ...in Windows XP C 10 DHCP Configuration of TCP IP in Windows 2000 C 12 DHCP Configuration of TCP IP in Windows NT4 C 15 Verifying TCP IP Properties for Windows XP 2000 and NT4 C 17 Configuring the Macintosh for TCP IP Networking C 18 MacOS 8 6 or 9 x C 18 MacOS X C 18 Verifying TCP IP Properties for Macintosh Computers C 19 Verifying the Readiness of Your Internet Account C 20 Are Login Protocols Us...

Страница 9: ...11i D 10 What are the Key Features of WPA and WPA2 Security D 10 WPA WPA2 Authentication Enterprise level User Authentication via 802 1x EAP and RADIUS D 12 WPA WPA2 Data Encryption Key Management D 14 Is WPA WPA2 Perfect D 16 Product Support for WPA WPA2 D 16 Supporting a Mixture of WPA WPA2 and WEP Wireless Clients is Discouraged D 16 Changes to Wireless Access Points D 17 Changes to Wireless Ne...

Страница 10: ...202 10051 01 March 2005 x Contents This page intentionally left blank ...

Страница 11: ...ollowing typographical conventions This guide uses the following formats to highlight special messages This manual is written for the WGR826V Wireless Router according to these specifications Table 1 1 Typographical Conventions italics Emphasis books CDs URL names bold User input fixed Screen text file and server names extensions commands IP addresses Note This format is used to highlight informat...

Страница 12: ... and for browsing forwards or backwards through the manual one page at a time A button that displays the table of contents and an button Double click on a link in the table of contents or index to navigate directly to where the topic is described in the manual A button to access the full NETGEAR Inc online knowledge base for the product model Links to PDF versions of the full manual and individual...

Страница 13: ... you were viewing opens in a browser window Note Your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files The Acrobat reader is available on the Adobe Web site at http www adobe com Click the print icon in the upper left of the window Tip If your printer supports printing two pages on a single sheet of paper you can save paper and printer ink by selectin...

Страница 14: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 1 4 About This Manual 202 10051 01 March 2005 This page intentionally left blank ...

Страница 15: ... This chapter introduces the NETGEAR WGR826V 54 Mbps Wireless Router with Phone Adapter Package Contents The product package should contain the following items WGR826V 54 Mbps Wireless Router with Phone Adapter AC power adapter A Category 5 CAT5 Ethernet cable The Setup CD including This guide Application Notes and other helpful information Support Registration card If any of the parts are incorre...

Страница 16: ...ion Power On Green Solid Off Power is supplied to the router Power is not supplied to the router Call Agent On Green Solid Blinking Off The router is registered with the call agent The router is registering with the call agent The router is not registered Internet Port On Blink The Internet port has detected a link with an attached device Data is being transmitted or received by the Internet port ...

Страница 17: ...n Slow Blinking 30Hz Twice and then OFF for 5 seconds Port is ready to use and currently on hook with Message Waiting If the phone goes off hook then it will be Green Slow Blinking 30Hz OFF Port account is disabled inactive Green ON Port is ready to use and currently on hook LAN Ports Green Amber The LAN port has detected a 100 Mbps link with an attached device The LAN port has detected a 10 Mbps ...

Страница 18: ...ems listed below Figure 1 2 WGR826V Rear Panel Viewed from left to right the rear panel contains the following features Outlet for 12V DC 1 5A output AC power adapter Two phone ports Factory default reset push button Three LAN phone ports Internet WAN Ethernet port for connecting the router to a cable or DSL modem Wireless antenna Power 2 Phone Reset Wireless 2 1 Antenna Button 3 LAN 3 2 1 Ports I...

Страница 19: ...perform the wireless router setup steps be sure to use the computer you first registered with your cable ISP For DSL Service You may need information such as the DSL login name e mail address and password in order to complete the wireless router setup Before proceeding with the wireless router installation familiarize yourself with the contents of the Setup CD especially this manual and the tutori...

Страница 20: ...er Locate the Internet port Securely insert the Ethernet cable from your modem cable 1 in the diagram below into the Internet port of the wireless router as shown in point B of the diagram below Figure 3 2 Connect the wireless router to the modem Note Place the WGR826V Wireless Router in a location which conforms to the Observe Performance Placement and Range Guidelines on page 5 1 The stand provi...

Страница 21: ...Wireless Router using a standard phone cord not included Your network cables are connected and you are ready to restart your network 2 RESTART YOUR NETWORK IN THE CORRECT SEQUENCE Warning Failure to restart your network in the correct sequence could prevent you from connecting to the Internet a First plug in and turn on the broadband modem Wait about 2 minutes b Now plug in the power cord to your ...

Страница 22: ...ernet The Internet port light should be lit If not make sure the Ethernet cable is securely attached to the wireless router Internet port and the modem and the modem is powered on Wireless The wireless lights should be lit If not see Troubleshooting Tips on page 3 10 Phone The Phone light will not be lit until your phone service provider provisions the phone service Check the user guide from your ...

Страница 23: ...omputer you just set up open a browser such as Internet Explorer or Netscape Navigator Note If your browser connects you to the Internet you can skip this section and proceed to the Now Set Up a Computer for Wireless Connectivity section below 2 Connect to the wireless router by typing http 192 168 15 1 in the address field of your browser then click Enter 3 For security reasons the router has its...

Страница 24: ...cables are connected correctly that the router is powered on and that the networking setup of your computer is set to obtain its settings automatically via DHCP It should be set to obtain both IP and DNS server addresses automatically which is usually so For help with this please see the tutorials on the CD After logging in to the router you will see the settings main page Figure 3 6 Settings main...

Страница 25: ...ere Figure 3 7 Browser based configuration Basic Settings menus 1 Connect to the wireless router by typing http 192 168 15 1 in the address field of your browser then click Enter 2 For security reasons the wireless router has its own user name and password When prompted enter admin for the router user name and password for the router password both in lower case letters 3 Click Basic Settings on th...

Страница 26: ...nd enter the IP address of your ISP s Primary DNS Server If a Secondary DNS Server address is available enter it also Note If you enter an address here restart the computers on your network so that these settings take effect d Router s MAC Address This section determines the Ethernet MAC address that will be used by the router on the Internet port Some ISPs will register the Ethernet MAC address o...

Страница 27: ...tings menu c Configure your computer to use the Network Name SSID NETGEAR with WEP Security disabled Warning The SSID is case sensitive Entering nETgear will not work d To verify wireless connectivity connect to the Internet or log in to the WGR826V Wireless Router from a computer with a wireless adapter You are now connected to the Internet and the wireless feature of the wireless router is enabl...

Страница 28: ...uter go to a computer that is connected via an Ethernet cable to the wireless router and simply open a browser Enter http 192 168 15 1 in your browser Then when prompted enter admin as the user name and password for the password both in lower case letters You are now wirelessly connected to the Internet with strong security Troubleshooting Tips Here are some tips for correcting simple problems you...

Страница 29: ... network settings of the computer are correct LAN and wirelessly connected computers must be configured to obtain an IP address automatically via DHCP Please see Appendix C Preparing Your Network or the animated tutorials on the CD for help with this Some cable modem ISPs require you to use the MAC address of the computer registered on the account If so in the Router MAC Address section of the Bas...

Страница 30: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 3 12 Connecting the Router to the Internet 202 10051 01 March 2005 This page intentionally left blank ...

Страница 31: ...restricted access policies based on time of day Web addresses and Web address keywords You can also block Internet access by applications and services such as chat or games To configure these features of your router click on the subheadings under the Content Filtering heading in the Main Menu of the browser interface The subheadings are described below Firewall Rules The Firewall will always block...

Страница 32: ...s for outbound traffic If you have not defined any firewall rules only the default firewall rule will be listed The default firewall rule allows all outgoing traffic To create a new firewall rule a Click the Add button It does not matter which radio button is selected The Outbound Service screen will be displayed This screen has its own help file b Complete the Outbound Service screen and save the...

Страница 33: ...n is selected The Inbound Service screen will be displayed This screen has its own help file b Complete the Inbound Service screen and save the data The new rule will be listed in the table when you return to this screen To make changes to an existing firewall rule a Click the radio button next to a row in the table b Click the button for the desired actions Edit to make any changes to the firewal...

Страница 34: ...ll work in normal mode In stealth mode the router silently discards the incoming packets that do not have access policies Check on enable the SYN Flood Check will enable the Router to perform SYN Flood attack check on the traffic Unchecking the checkbox will disable the Router to conduct the SYN Flood check Outbound Services You can use this screen to define a new Outbound Firewall rule or edit an...

Страница 35: ...settings determine which computers on your network are affected by this firewall rule based on their source LAN IP address Select the desired option Any All local IP addresses are covered by this firewall rule Address range If this option is selected you must enter the Start and Finish fields Single address Enter the required address in the Start fields WAN Servers These settings determine which I...

Страница 36: ...desired Service This determines which packets are covered by this firewall rule If necessary you can define a new Service on the Services screen by defining the protocols and port numbers used by the Service If you want to create a new custom service with incoming protocol and port or range of ports here itself then select Create custom service Select TCP or UDP or TCP UDP and then enter incoming ...

Страница 37: ...tion selected is Block Always If you want to forward the traffic to a single port then enter port value in start port and leave finish port empty If you want to forward the traffic to range of ports then enter non zero value in finish port and make sure that service record attached to this rule has range of ports and range is equal to that of forwarding ports For example if you select Service as H...

Страница 38: ...re 4 4 Block Sites menu To add a keyword or domain type it in the Keyword box click Add Keyword then click Apply To delete a keyword or domain select it from the list click Delete Keyword then click Apply Keyword application examples If the keyword XXX is specified the URL http www badstuff com xxx html is blocked If the keyword com is specified only Web sites with other domain suffixes such as ed...

Страница 39: ...ent computers For example Web servers serve Web pages time servers serve time and date information and game hosts serve data about other players moves When a computer on your network sends a request for service to a server computer on the Internet the requested service is identified by a service or port number This number appears as the destination port number in the transmitted IP packets For exa...

Страница 40: ...ice To define a service first you must determine which port number or range of numbers is used by the application The service numbers for many common protocols are defined by the Internet Engineering Task Force IETF and published in RFC1700 Assigned Numbers Service numbers for other applications are typically chosen from the range 1024 to 65535 by the authors of the application This information ca...

Страница 41: ... menu is shown below Figure 4 7 Schedule menu Use this schedule for blocking content Check this box if you wish to enable a schedule for Content Filtering Click Apply Days to Block Select days to block by checking the appropriate boxes Select Everyday to check the boxes for all days Click Apply Time of Day to Block Select a start and end time in 23 59 format Select All day for 24 hour blocking Cli...

Страница 42: ...0051 01 March 2005 Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of what Web sites you have accessed or attempted to access Up to 128 entries are stored in the log Log entries will only appear when keyword blocking is enabled An example is shown below Figure 4 8 Logs menu ...

Страница 43: ...om 0 to 127 The log will keep the record of the latest 128 entries Date and Time The date and time the log entry was recorded Source IP The IP address of the initiating device for this log entry Action This field displays whether the access was blocked or allowed The name or IP address of the Web site or newsgroup visited or attempted to access Table 4 2 Log action buttons Field Description Refres...

Страница 44: ...ISP com You may be able to find this information in the configuration menu of your e mail program If you leave this box blank log and alert messages will not be sent via e mail Send to this e mail address Enter the e mail address to which logs and alerts are sent This e mail address will also be used as the From address If you leave this box blank log and alert messages will not be sent via e mail...

Страница 45: ...specified e mail address After the log is sent the log is cleared from the router s memory If the router cannot e mail the log file the log buffer may fill up In this case the router overwrites the log and discards its contents The WGR826V Wireless Router uses the Network Time Protocol NTP to obtain the current time and date from one of several Network Time Servers on the Internet In order to loca...

Страница 46: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 4 16 Content Filtering 202 10051 01 March 2005 ...

Страница 47: ...power consumption of wireless adapters also vary depending on your configuration choices For best results place your Wireless Access Point Near the center of the area in which your computers will operate In an elevated location such as a high shelf where the wirelessly connected computers have line of sight access even if through walls Away from sources of interference such as computers microwaves...

Страница 48: ...ices that have the correct SSID can connect This nullifies the wireless network discovery feature of some products such as Windows XP but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers WEP Wired Equivalent Privacy WEP data encryption provides data security WEP Shared Key authentication and WEP data encryption will block all but the mos...

Страница 49: ...less Settings link in the main menu of the browser interface Figure 5 2 Wireless Settings menu Name SSID The SSID is also known as the wireless network name Enter a value of up to 32 alphanumeric characters In a setting where there is more than one wireless network different wireless network names provide a means for separating the traffic Any device you want to participate in a particular wireles...

Страница 50: ...security WEP WEP offers the following options Open System With Open Network Authentication and 64 or 128 bit WEP Data Encryption the WGR826V does perform 64 or 128 bit data encryption but does not perform any authentication Shared Key Shared Key authentication encrypts the SSID and data Choose the Encryption Strength 64 or 128 bit data encryption Manually enter the key values or enter a word or gr...

Страница 51: ...store these defaults with the Factory Default Restore button on the rear panel After you install the WGR826V Wireless Router use the procedures below to customize any of the settings to better meet your networking needs Warning The Network Name SSID and passphrase are case sensitive Typing nETgear for the SSID will not work WIRELESS FEATURE DEFAULT SETTING Wireless Access Point Enabled SSID broadc...

Страница 52: ...e encryption key size must be the same for the wireless adapters and the wireless router Data Encryption WEP Keys There are two methods for creating WEP data encryption keys Whichever method you use record the key values in the spaces below Passphrase method ______________________________ These characters are case sensitive Enter a word or group of printable characters and click the Generate Keys ...

Страница 53: ...resented in this chapter can be found accessed via links in the browser interface of the wireless router to the documentation and in the help screens Changing the Administrator Password The default password for the wireless router s Web Configuration Manager is password Change this password to a more secure password From the Main Menu of the browser interface under the Maintenance heading select S...

Страница 54: ...Router Status You can use the Router Status page to check the current settings for your Router If something needs to be changed you will have to change it on the relevant page Click on Router Status on the Main menu bar to see the Router Status page Figure 6 2 Router Status page Account Name This is the Account Name that you entered in Basic Settings ...

Страница 55: ...tings as set in the LAN IP Setup page MAC Address the physical address of the WGR826V as seen from the local LAN IP Address LAN IP address of the Router DHCP indicates if the WGR826V is acting as a DHCP Server for devices on your LAN IP Subnet Mask subnet mask associated with the LAN IP address Wireless Port These are the current settings as set in the Wireless Settings page Name SSID Service Set ...

Страница 56: ...ar to see the Attached Devices page Figure 6 3 Attached Devices page This page shows the attached devices information It lists out the device IP Address Device Name MAC Media Access Control Address Lease Start Time and Lease End Time for each computer attached to the Router You cannot change any of the values on this page To update this page and to show the current attached devices click on the Re...

Страница 57: ... s settings from this file To create a backup file of the current settings 1 Click Backup 2 If you don t have your browser set up to save downloaded files automatically locate where you want to save the file rename it if you like and click Save If you have your browser set up to save downloaded files automatically the file is saved to the your browser s download location on the hard disk and is ca...

Страница 58: ...nishes restarting When the Test light looks like a check mark stops blinking wait a few more seconds before doing anything with the Router 4 Close the message window To erase the current settings and reset the Router to the original factory default settings 1 Click Erase IMPORTANT Do not try to go online turn off the Router shutdown the computer or do anything else to the Router until the Router f...

Страница 59: ...s to send a ping packet request to the specified IP address This is often used to test a connection If the request times out no reply is received this usually means the destination is unreachable However some network devices can be configured not to respond to a ping The ping results will be displayed in a new screen click Back to return to the Diagnostics screen Trace Often called Trace Route thi...

Страница 60: ...ot restart You can use this if the Router seems to have become unstable or is not operating normally Note Rebooting will break any existing connections either to the Router such as this one or through the Router for example LAN users accessing the Internet However connections to the Internet will automatically be re established when possible Reviewing the VoIP and QoS Settings You can use the VoIP...

Страница 61: ...ing 6 9 202 10051 01 March 2005 Click on VoIP and QoS Settings on the Main menu bar to see the VoIP and QoS Settings page Figure 6 6 VoIP and QoS Settings page Firmware Image and NTP Server Image File Name This is the Firmware file name and version that the router is configured with and currently running ...

Страница 62: ...ty over others Uplink Bandwidth This value indicates the current uplink bandwidth It is computed from Gap Interval so configured by provisioning server SASVP VoIP Configuration Registration Proxy This parameter indicates the domain to be specified in the REGISTER requests sent to the NAT Proxy Port This indicates the UDP TCP port of Registration Proxy Transport This parameter indicates the transpo...

Страница 63: ...his value indicates the Payload value to be used in the RTP packets sent for DTMF relay DTMF Relay Repetitions This value indicates the repetition rate to RTP packets sent for DTMF relay Receive Gain This value in dB indicates the gain of speech to be played on the voice ports received over the network Transmit Gain This value in dB indicates the gain of speech sent out of the voice ports over the...

Страница 64: ... PORT 2 Phone Number Telephone number of port 2 Display Name Name of the customer Business Group ID Business Group Id of the customer Password Password used for digests sent in SIP REGISTER INVITE messages sent to the server Codec Priorities Indicates the codecs in the priority order to be sent to the server in call set up Click Phone Status to check the status of phone ports and their registratio...

Страница 65: ...nce Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V Doing Basic Router Housekeeping 6 13 202 10051 01 March 2005 Click Digit Map to look at the digit map configured Figure 6 8 Digit Map page ...

Страница 66: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 6 14 Doing Basic Router Housekeeping 202 10051 01 March 2005 ...

Страница 67: ...e Main Menu of the browser interface Features not presented in this chapter are presented in the User Guide and help screens available by following the links in the browser interface of the wireless router Using the LAN IP Setup Options LAN IP Setup is under the Advanced heading of the browser interface This menu allows configuration of LAN IP services such as DHCP and RIP From the Main Menu of th...

Страница 68: ...d with the IP address the IP Subnet Mask allows a device to know which other addresses are local to it and which must be reached through a gateway or router RIP Direction RIP Router Information Protocol allows a router to exchange routing information with other routers The RIP Direction selection controls how the router sends and receives RIP packets Both is the default When set to Both or Out Onl...

Страница 69: ...erver or if you will manually configure the network settings of all of your computers clear the Use router as DHCP server check box Otherwise leave it checked Specify the pool of IP addresses to be assigned by setting the Starting IP Address and Ending IP Address These addresses should be part of the same IP address subnet as the router s LAN IP address Using the default addressing scheme you shou...

Страница 70: ... Attached Devices menu and paste it here 4 Click Apply to enter the reserved address into the table Note The reserved address will not be assigned until the next time the computer contacts the router s DHCP server Reboot the computer or access its IP configuration and force a DHCP release and renew To edit or delete a reserved address entry 1 Click the button next to the reserved address you want ...

Страница 71: ... you want to limit access to the LAN only The static route will not be reported in RIP 4 Select Active to make this route effective 5 Type the Destination IP Address of the final destination 6 Type the IP Subnet Mask for this destination If the destination is a single host type 255 255 255 255 7 Type the Gateway IP Address which must be a router on the same LAN segment as the router 8 Type a numbe...

Страница 72: ... router will forward your request to the ISP The ISP forwards your request to the company where you are employed and the request will likely be denied by the company s firewall In this case you must define a static route telling your router that 134 177 0 0 should be accessed through the ISDN router at 192 168 15 100 The static route would look like Figure 7 3 In this example The Destination IP Ad...

Страница 73: ...carded by the router unless the traffic is a response to one of your local computers or a service that you have configured in the Ports menu Instead of discarding this traffic you can have it forwarded to one computer on your network This computer is called the Default DMZ Server The WAN Setup menu shown below lets you configure a Default DMZ Server To assign a computer or server to be a Default D...

Страница 74: ...e the MTU to 1492 This should not be done unless you are sure it is necessary by your ISP Any packets sent through the router that are larger than the configured MTU size will be repackaged into smaller packets to meet the MTU requirement To change the MTU size Under MTU Size enter a new size between 64 and 1500 Then click Apply to save the new configuration Port Triggering Port Triggering is used...

Страница 75: ... Triggering table and associates them with the PC 3 The remote system receives the PCs request and responds using a different port number 4 This Router matches the response to the previous request and forwards the response to the PC Without Port Triggering this response would be treated as a new connection request rather than a response As such it would be handled in accordance with the Port Forwa...

Страница 76: ...ed this rule Adding a new Rule To add a new rule click the Add and enter the following data on the resulting screen Name enter a suitable name for this rule e g the name of the application Enable Disable select the desired option Outgoing Trigger Ports enter the port number used by the application when it generates an outgoing request Incoming Response Port Range enter the range of port numbers us...

Страница 77: ...AC Address to the filter list if it doesn t exists in the list to avoid loss of connection To add an MAC Address Click Add to add an MAC address to the List Enter a MAC address in xx xx xx xx xx xx format where x is any hexadecimal character e g 00 20 78 00 98 2f when you do add operation WGR826V will automatically add your computer s MAC Address if it doesn t exists in the list to maintain the co...

Страница 78: ...n UPnP on the Main menu bar to see the UPnP Settings page Figure 7 7 UPnP Settings page Turn UPnP On UPnP can be enabled or disabled for automatic device configuration The default setting for UPnP is enabled If disabled the router will not allow any device to automatically control the resources such as port forwarding mapping of the router 1 Click the check box to Turn UPnP On 2 Click the Apply bu...

Страница 79: ...on information and provisions the Router When you login you can upgrade the image check the provision status and initiate provision process manually You can get the login details by contacting AT T CallVantage Support Staff Turn Local Provisioning On This mode enables configuration of VoIP and QoS parameters with the assistance of AT T Support Staff In order to do the configuration you need a logi...

Страница 80: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 7 14 Setting Up Advanced Router Configurations 202 10051 01 March 2005 This page intentionally left blank ...

Страница 81: ... any local ports that are connected c The Internet port light is lit If a port s light is lit a link has been established to the connected device If a LAN port is connected to a 100 Mbps device verify that the port s light is green If the port is 10 Mbps the light will be amber If any of these conditions does not occur refer to the appropriate following section Power Light Not On If the Power and ...

Страница 82: ... technical support LAN or Internet WAN Port Lights Not On If either the LAN lights or Internet light do not light when the Ethernet connection is made check the following Make sure that the Ethernet cable connections are secure at the router and at the hub or workstation Make sure that power is turned on to the connected hub or workstation Be sure you are using the correct cable When connecting th...

Страница 83: ...e Java applet is loaded Try quitting the browser and launching it again Make sure you are using the correct login information The URL for the router is http 192 168 15 1 The factory default login name is admin and the password is password both in lower case letters Make sure that CAPS LOCK is off when entering this information If the router does not save changes you have made in the Web Configurat...

Страница 84: ...to obtain an IP address from the ISP the problem may be one of the following Your ISP may require a login program Ask your ISP whether they require PPP over Ethernet PPPoE or some other type of login If your ISP requires a login you may have incorrectly set the login name and password in the router Your ISP may check for your computer s host name Assign the computer Host Name of your ISP account a...

Страница 85: ...s as described in Install or Verify Windows Networking Components on page C 9 Troubleshooting a TCP IP Network Using a Ping Utility Most TCP IP terminal devices and routers contain a ping utility that sends an echo request packet to the designated device The device then responds with an echo reply Troubleshooting a TCP IP network is made very easy by using the ping utility in your computer or work...

Страница 86: ...r verifying that the LAN path works correctly test the path from your computer to a remote device From the Windows run menu type PING n 10 IP address where IP address is the IP address of a remote device such as your ISP s DNS server If the path is functioning correctly replies as in the previous section are displayed If you do not receive replies Check that your computer has the IP address of you...

Страница 87: ...toring the Default Configuration and Password This section explains how to restore the factory default configuration settings changing the router s administration password to password You can erase the current configuration and restore factory defaults To restore the factory default configuration settings without knowing the administration password or IP address you must use the Default Reset butt...

Страница 88: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 8 8 Troubleshooting Common Problems 202 10051 01 March 2005 This page intentionally left blank ...

Страница 89: ...densing Electromagnetic Emissions Meets requirements of FCC Part 15 Class B Interface Specifications The router incorporates Auto UplinkTM technology which eliminates the need for crossover cables LAN 10BASE T or 100BASE Tx RJ 45 autosensing and capable of full duplex or half duplex operation WAN 10BASE T or 100BASE Tx RJ 45 autosensing and capable of full duplex or half duplex operation Wireless ...

Страница 90: ...the 54 Mbps Wireless Router with Phone Adapter WGR826V A 2 Technical Specifications 202 10051 01 March 2005 Operating Frequency Ranges 2 412 2 462 GHz US 802 11 Security 40 bits also called 64 bits and 128 bits WEP and WPA ...

Страница 91: ...ded easily and relatively inexpensively in a local area network LAN However providing high bandwidth between a local network and the Internet can be very expensive Because of this expense Internet access is usually provided by a slower speed wide area network WAN link such as a cable or DSL modem In order to make the best use of the slower WAN link a mechanism must be in place for selecting and tr...

Страница 92: ...works are interconnected across the world every machine on the Internet must have a unique address to make sure that transmitted data reaches the correct destination Blocks of addresses are assigned to organizations by the Internet Assigned Numbers Authority IANA Individual users and small organizations may obtain their addresses either from the IANA or from an Internet service provider ISP You ca...

Страница 93: ...n address classes including network and host sections of the address for each address type Figure B 1 Three Main Address Classes The five address classes are Class A Class A addresses can have up to 16 777 214 hosts on a single network They use an eight bit network number and a 24 bit node number Class A addresses are in this range 1 x x x to 126 x x x Class B Class B addresses can have up to 65 3...

Страница 94: ...ts network address and host address is implied by the class This partitioning scheme can also be expressed by a netmask associated with the IP address A netmask is a 32 bit quantity that when logically combined using an AND operator with an IP address yields the network address For instance the netmasks for Class A B and C addresses are 255 0 0 0 255 255 0 0 and 255 255 255 0 respectively For exam...

Страница 95: ... into multiple Class C addresses For example the IP address of 172 16 0 0 is assigned but node addresses are limited to 255 maximum allowing eight extra bits to use as a subnet address The IP address of 172 16 97 235 would be interpreted as IP network address 172 16 subnet number 97 and node number 235 In addition to extending the number of addresses available subnet addressing provides other bene...

Страница 96: ...ubnet mask becomes 255 255 255 240 The following table displays several common netmask values in both the dotted decimal and the masklength formats Note The number 192 68 135 127 is not assigned because it is the broadcast address of the first subnet The number 192 68 135 128 is not assigned because it is the network address of the second subnet Table 8 1 Netmask Notation Translation Table for One...

Страница 97: ...ernet for example when using NAT you can assign any IP addresses to the hosts without problems However the IANA has reserved the following three blocks of IP addresses specifically for private networks 10 0 0 0 10 255 255 255 172 16 0 0 172 31 255 255 192 168 0 0 192 168 255 255 Choose your private network number from this range The DHCP server of the WGR826V Wireless Router is preconfigured to au...

Страница 98: ...lating the internal LAN IP addresses to a single address that is globally unique on the Internet The internal LAN IP addresses can be either private addresses or registered addresses For more information about IP address translation refer to RFC 1631 The IP Network Address Translator NAT The following figure illustrates a single IP address operation Figure B 3 Single IP Address Operation Using NAT...

Страница 99: ...ss responds to the ARP request All other stations discard the request Related Documents The station with the correct IP address responds with its own MAC address directly to the sending device The receiving station provides the transmitting station with the required destination MAC address The IP address data and MAC address data for each station are held in an ARP table The next time data is sent...

Страница 100: ... the network may act as a Dynamic Host Configuration Protocol DHCP server The DHCP server stores a list or pool of IP addresses along with other information such as gateway and DNS addresses that it may assign to the other devices on the network The WGR826V Wireless Router has the capacity to act as a DHCP server The WGR826V Wireless Router also functions as a DHCP client when connecting to the IS...

Страница 101: ...y for the firewall to analyze groups of network connection states Using Stateful Packet Inspection an incoming packet is intercepted at the network layer and then analyzed for state related information associated with all network connections A central cache within the firewall keeps track of the state information associated with all network connections All traffic passing through the firewall is a...

Страница 102: ...operation Category 5 Only 0 5 inch 1 5 cm of untwist in the wire pair is allowed at any termination point A twisted pair Ethernet network operating at 10 Mbits second 10BASE T will often tolerate low quality cables but at 100 Mbits second 10BASE Tx the cable must be rated as Category 5 or Cat 5 by the Electronic Industry Association EIA This rating will be printed on the cable jacket A Category 5 ...

Страница 103: ...the device Computers and workstation adapter cards are usually media dependent interface ports called MDI or uplink ports Most repeaters and switch ports are configured as media dependent interfaces with built in crossover ports called MDI X or normal ports Auto Uplink technology automatically senses which connection MDI or MDI X is needed and makes the right connection Figure B 4 illustrates stra...

Страница 104: ... is referred to as Media Dependant Interface Crossover MDI X When connecting a computer to a computer or a hub port to another hub port the transmit pair must be exchanged with the receive pair This exchange is done by one of two mechanisms Most hubs provide an Uplink switch which will exchange the pairs on one port allowing that port to be connected to another hub using a normal Ethernet cable Th...

Страница 105: ...CAL Ethernet port will automatically sense whether the Ethernet cable plugged into the port should have a normal connection e g connecting to a computer or an uplink connection e g connecting to a router switch or hub That port will then configure itself to the correct configuration This feature also eliminates the need to worry about crossover cables as Auto UplinkTM will accommodate either type ...

Страница 106: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V B 16 Network Routing and Firewall Basics 202 10051 01 March 2005 ...

Страница 107: ...n of Ethernet cabling see Ethernet Cabling on page B 11 The cable or DSL broadband modem must provide a standard 10 Mbps 10BASE T or 100 Mbps 100BASE Tx Ethernet interface Computer Network Configuration Requirements The WGR826V includes a built in Web Configuration Manager To access the configuration menus on the WGR826V your must use a Java enabled Web browser program which supports HTTP uploads ...

Страница 108: ...l ways you can gather the required Internet connection information Your Internet service provides all the information needed to connect to the Internet If you cannot locate this information you can ask your Internet service to provide it or you can try one of the options below If you have a computer already connected using the Internet you can gather the configuration information from that compute...

Страница 109: ...s If you were given DNS server addresses fill in the following Primary DNS Server IP Address ______ ______ ______ ______ Secondary DNS Server IP Address ______ ______ ______ ______ Host and Domain Names Some ISPs use a specific host or domain name like CCA7324 A or home If you haven t been given host or domain names you can use the following examples as a guide If your main e mail account with you...

Страница 110: ...st cases you should install TCP IP so that the computer obtains its specific network configuration information automatically from a DHCP server during bootup For a detailed explanation of the meaning and purpose of these configuration items refer to Appendix B Network Routing and Firewall Basics The WGR826V Wireless Router is shipped preconfigured as a DHCP server The firewall assigns the followin...

Страница 111: ...rotocol and Client for Microsoft Networks If you need to install a new adapter follow these steps a Click the Add button b Select Adapter and then click Add c Select the manufacturer and model of your Ethernet adapter and then click OK If you need TCP IP a Click the Add button b Select Protocol and then click Add Note It is not necessary to remove any other network components shown in the Network ...

Страница 112: ...fect Enabling DHCP to Automatically Configure TCP IP Settings in Windows 95B 98 and Me After the TCP IP protocol components are installed each PC must be assigned specific information about itself and resources that are available on its network The simplest way to configure this information is to allow the PC to obtain the information from a DHCP server in the network You will find there are many ...

Страница 113: ...n If the icon is not on the desktop Click Start on the task bar located at the bottom left of the window Choose Settings and then Control Panel Locate the Network Neighborhood icon and click on it This will open the Network panel as shown below Verify the following settings as shown Client for Microsoft Network exists Ethernet adapter is present TCP IP is present Primary Network Logon is set to Wi...

Страница 114: ...k all boxes in the LAN Internet Configuration screen and click Next 6 Proceed to the end of the Wizard Verifying TCP IP Properties After your PC is configured and has rebooted you can check the TCP IP configuration using the utility winipcfg exe 1 On the Windows taskbar click the Start button and then click Run By default the IP Address tab is open on this window Verify the following Obtain an IP ...

Страница 115: ...PC preparation process you may need to install and configure TCP IP on each networked PC Before starting locate your Windows CD you may need to insert it during the TCP IP installation process Install or Verify Windows Networking Components To install or verify the necessary components for IP networking 1 On the Windows taskbar click the Start button point to Settings and then click Control Panel ...

Страница 116: ...will walk you through the configuration process for each of these versions of Windows DHCP Configuration of TCP IP in Windows XP Locate your Network Neighborhood icon Select Control Panel from the Windows XP new Start Menu Select the Network Connections icon on the Control Panel This will take you to the next step Now the Network Connection window displays The Connections List that shows all the n...

Страница 117: ...Connection Status window This box displays the connection status duration speed and activity statistics Administrator logon access rights are needed to use this window Click the Properties button to view details about the connection The TCP IP details are presented on the Support tab page Select Internet Protocol and click Properties to view the configuration information ...

Страница 118: ... be added by default and set to DHCP without your having to configure it However if there are problems follow these steps to configure TCP IP with DHCP for Windows 2000 Verify that the Obtain an IP address automatically radio button is selected Verify that Obtain DNS server address automatically radio button is selected Click the OK button This completes the DHCP configuration of TCP IP in Windows...

Страница 119: ...twork and Dial up Connections Right click on Local Area Connection and select Properties The Local Area Connection Properties dialog box appears Verify that you have the correct Ethernet card selected in the Connect using box Verify that at least the following two items are displayed and selected in the box of Components checked are used by this connection Client for Microsoft Networks and Interne...

Страница 120: ... to open the Internet Protocol TCP IP Properties dialogue box Verify that Obtain an IP address automatically is selected Obtain DNS server address automatically is selected Click OK to return to Local Area Connection Properties Click OK again to complete the configuration process for Windows 2000 Restart the PC Repeat these steps for each PC with this version of Windows on your network ...

Страница 121: ...stalled the network card you need to configure the TCP IP environment for Windows NT 4 0 Follow this procedure to configure TCP IP with DHCP in Windows NT 4 0 Choose Settings from the Start Menu and then select Control Panel This will display Control Panel window Double click the Network icon in the Control Panel window The Network panel will display Select the Protocols tab to continue ...

Страница 122: ...Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V C 16 Preparing Your Network 202 10051 01 March 2005 Highlight the TCP IP Protocol in the Network Protocols box and click on the Properties button ...

Страница 123: ... Your IP Configuration information will be listed and should match the values below if you are using the default TCP IP settings that NETGEAR recommends for connecting through a router or gateway The IP address is between 192 168 15 2 and 192 168 15 253 The subnet mask is 255 255 255 0 The TCP IP Properties dialog box now displays Click the IP Address tab Select the radio button marked Obtain an I...

Страница 124: ...e Macintosh On each networked Macintosh you will need to configure TCP IP to use DHCP MacOS 8 6 or 9 x 1 From the Apple menu select Control Panels then TCP IP The TCP IP Control Panel opens 2 From the Connect via box select your Macintosh s Ethernet interface 3 From the Configure box select Using DHCP Server You can leave the DHCP Client ID box empty 4 Close the TCP IP Control Panel 5 Repeat this ...

Страница 125: ...ou can check the TCP IP configuration by returning to the TCP IP Control Panel From the Apple menu select Control Panels then TCP IP The panel is updated to show your settings which should match the values below if you are using the default TCP IP settings that NETGEAR recommends The IP Address is between 192 168 15 2 and 192 168 15 253 The Subnet mask is 255 255 255 0 The Router address is 192 16...

Страница 126: ...firewall s Internet port is connected to the broadband modem the firewall appears to be a single PC to the ISP The firewall then allows the PCs on the local network to masquerade as the single PC to access the Internet through the broadband modem The method used by the firewall to accomplish this is called Network Address Translation NAT or IP masquerading Are Login Protocols Used Some ISPs requir...

Страница 127: ...he firewall These procedures are described next Obtaining ISP Configuration Information for Windows Computers As mentioned above you may need to collect configuration information from your PC so that you can use this information when you configure the WGR826V Wireless Router Following this procedure is only necessary when your ISP does not dynamically supply the account information To get the info...

Страница 128: ...n from your Macintosh so that you can use this information when you configure the WGR826V Wireless Router Following this procedure is only necessary when your ISP does not dynamically supply the account information To get the information you need to configure the firewall for Internet access 1 From the Apple menu select Control Panels then TCP IP The TCP IP Control Panel opens which displays a lis...

Страница 129: ... computers to work with the firewall you must reset the network for the devices to be able to communicate correctly Restart any computer that is connected to the firewall After configuring all of your computers for TCP IP networking and restarting them and connecting them to the local network of your WGR826V Wireless Router you are ready to access and configure the firewall ...

Страница 130: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V C 24 Preparing Your Network 202 10051 01 March 2005 ...

Страница 131: ...by the Wireless Ethernet Compatibility Alliance WECA see http www wi fi net an industry standard group promoting interoperability among 802 11 devices The 802 11 standard offers two methods for configuring a wireless network ad hoc and infrastructure Infrastructure Mode With a wireless Access Point you can operate the wireless LAN in the infrastructure mode This mode provides wireless connectivity...

Страница 132: ...ication SSID In an ad hoc wireless network with no access points the Basic Service Set Identification BSSID is used In an infrastructure wireless network that includes an access point the ESSID is used but may still be referred to as SSID An SSID is a thirty two character maximum alphanumeric key identifying the name of the wireless local area network Some vendors refer to the SSID as network name...

Страница 133: ...SSID 4 The station sends an authentication request to the access point 5 The access point authenticates the station 6 The station sends an association request to the access point 7 The access point associates with the station 8 The station can now communicate with the Ethernet network through the access point An access point must authenticate a station before the station can associate with the acc...

Страница 134: ...red WEP Key that corresponds to the station s default key The access point compares the decrypted text with the original challenge text If the decrypted text matches the original challenge text then the access point and the station share the same WEP Key and the access point authenticates the station 5 The station connects to the network If the decrypted text does not match the original challenge ...

Страница 135: ...ing the same WEP Key For authentication purposes the network uses Open System Authentication 3 Use WEP for Authentication and Encryption A transmitting 802 11 device encrypts the data portion of every packet it sends using a configured WEP Key The receiving device decrypts the data using the same WEP Key For authentication purposes the wireless network uses Shared Key Authentication Note Some 802 ...

Страница 136: ...entered instead of the cryptic hexadecimal characters to ease encryption key entry 128 bit encryption is stronger than 40 bit encryption but 128 bit encryption may not be available outside of the United States due to U S export regulations When configured for 40 bit encryption 802 11 products typically support up to four WEP Keys Each 40 bit WEP Key is expressed as 5 sets of two hexadecimal digits...

Страница 137: ...e AP s WEP key 2 is the same as the client s WEP key 2 and the AP s WEP key 3 is the same as the client s WEP key 3 Wireless Channels The wireless frequencies used by 802 11b g networks are discussed below IEEE 802 11b g wireless nodes communicate with each other using radio frequency signals in the ISM Industrial Scientific and Medical band between 2 4 GHz and 2 5 GHz Neighboring channels are 5 M...

Страница 138: ...le security enhancements that increase the level of data protection and access control for existing and future wireless LAN systems The IEEE introduced the WEP as an optional security measure to secure 802 11b Wi Fi WLANs but inherent weaknesses in the standard soon became obvious In response to this situation the Wi Fi Alliance announced a new security architecture in October 2002 that remedies t...

Страница 139: ...cally refer to IETF s RFC 2284 With 802 11 WEP all access points and client wireless adapters on a particular wireless LAN must use the same encryption key A major problem with the 802 11 standard is that the keys are cumbersome to change If you do not update the WEP keys often an unauthorized person with a sniffing tool can monitor your network for less than a day and decode the encrypted message...

Страница 140: ...rdware support Support for a mixture of WPA WPA2 and WEP wireless clients to allow a migration strategy but mixing WEP and WPA WPA2 is discouraged These features are discussed below WPA WPA2 addresses most of the known WEP vulnerabilities and is primarily intended for wireless infrastructure networks as found in the enterprise This infrastructure includes stations access points and authentication ...

Страница 141: ...s to those stations successfully authenticated The supplicant in the station uses the authentication and cipher suite information contained in the information elements to decide which authentication method and cipher suite to use For example if the access point is using the pre shared key method then the supplicant need not authenticate using full blown 802 1X Rather the supplicant must simply pro...

Страница 142: ...x the EAP type such as Transport Layer Security EAP TLS or EAP Tunneled Transport Layer Security EAP TTLS defines how the authentication takes place Note For environments with a Remote Authentication Dial In User Service RADIUS infrastructure WPA supports Extensible Authentication Protocol EAP For environments without a RADIUS infrastructure WPA supports the use of a pre shared key Together these ...

Страница 143: ...or AES Probe Responses AP to station and Association Requests station to AP also contain WPA information elements 1 Initial 802 1x communications begin with an unauthenticated supplicant client device attempting to connect with an authenticator 802 11 access point The client sends an EAP start message This begins a series of message exchanges to authenticate the client 2 The access point replies w...

Страница 144: ...an specify any EAP type without needing to upgrade an 802 1x compliant access point As a result you can update the EAP authentication type to such devices as token cards Smart Cards Kerberos one time passwords certificates and public key authentication or as newer types become available and your requirements for security change WPA WPA2 Data Encryption Key Management With 802 1x the rekeying of un...

Страница 145: ...ge bits in the encrypted payload and update the encrypted ICV without being detected by the receiver With WPA a method known as Michael specifies a new algorithm that calculates an 8 byte message integrity check MIC using the calculation facilities available on existing wireless devices The MIC is placed between the data portion of the IEEE 802 11 frame and the 4 byte ICV The MIC field is encrypte...

Страница 146: ...t for WPA WPA2 Starting in August 2003 NETGEAR Inc wireless Wi Fi certified products will support the WPA standard NETGEAR Inc wireless products that had their Wi Fi certification approved before August 2003 will have one year to add WPA so as to maintain their Wi Fi certification WPA WPA2 requires software changes to the following Wireless access points Wireless network adapters Wireless client p...

Страница 147: ...eless AP Changes to Wireless Network Adapters Wireless networking software in the adapter and possibly in the OS or client application must be updated to support the following The new WPA WPA2 information element Wireless clients must be able to process the WPA WPA2 information element and respond with a specific security configuration The WPA WPA2 two phase authentication Open system then 802 1x ...

Страница 148: ...te your Microsoft Windows wireless client all you have to do is obtain the new WPA WPA2 compatible driver and install the driver Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA WPA2 authentication and preshared key and the new WPA WPA2 encryption algorithms TKIP and AES To obtain the Microsoft WPA client program visit the Microsoft We...

Страница 149: ...eless LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbps 802 11a Standard An IEEE specification for wireless networking that operates in the 5 GHz frequency range 5 15 GHz to 5 85 GHz with a maximum 54 Mbps data transfer rate The 5 GHz frequency band...

Страница 150: ...that defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer term solution Security Association Management is addressed by a RSN Negotiation Procedures b IEEE 802 1x Authentication and c IEEE 802 1x Key management The standards are being defined to naturally...

Страница 151: ...ional capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs communicate with each other through an AP See access point and Infrastructure mode Bandwidth The amount of transmission capacity that is available on a network at any point in time Available band...

Страница 152: ...ess gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the signal would start on pin one at one end of the cable and end up on pin eight at the other end They cross over from one side to the other CSMA CA Carrier Sense Multiple Action Collision Avoidance CSMA CA is t...

Страница 153: ...o a series of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then decrypted so it can be safely shared among members of a network WEP uses an encryption key that automatically encrypts outgoing wireless data On the receiving side the same encryption key enable...

Страница 154: ...eways may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or for a fee HotSpots can be inside a coffee shop airport lounge train station convention center hotel or any other public meeting area Corporations and campuses are also implementing HotSpots to prov...

Страница 155: ...s point AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffic in the immediate neighborhood but also provides communication with the wired network See Ad Hoc and AP IP Internet Protocol address A 32 bit number that identifies each sender or receiver of in...

Страница 156: ... each of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one of the mesh routers Multiple Input Multiple Output MIMO MIMO refers to radio links with multiple antennas at the transmitter and the receiver side to improve the performance of the wireless link ...

Страница 157: ...no server or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go through an access point or hub However since there is no central base station to monitor traffic or provide Internet access the various signals can collide with each other reducing overall performan...

Страница 158: ...a stand alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may present a severe security risk Ideally it is best to have some type of WLAN system that does not allow rogue access points to easily be added to an existing WLAN Router A device that forwards data pack...

Страница 159: ...ck to the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subnets connect to the central network through a router hub or gateway Each individual wireless LAN will probably use the same subnet for all the local computers it talks to Switch A type of hub that...

Страница 160: ... a bandwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using standard analog packets over POTS Plain Old Telephone Service VPN Virtual Private Network A type of technology designed to increase the security of information transferred over the Internet VPN ...

Страница 161: ... home or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorithm that takes longer to decode it can provide better security than basic 40 bit 64 bit encryption Wi Fi Wireless Fidelity Another name for IEEE 802 11b Products certified as Wi Fi are interoperabl...

Страница 162: ...as AES CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN security requirements for the enterprise and provides a strong encryption and authentication solution prior to the ratification of the IEEE 802 11i standard In an enterprise with IT resources Wi...

Страница 163: ...e move to Wi Fi Protected Access for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture Task Group 1 of IEEE 802 16 developed a point to multipoint broadband wireless access standard for systems in the frequency range 10 66 GHz The standard covers both the Med...

Страница 164: ...Reference Manual for the 54 Mbps Wireless Router with Phone Adapter WGR826V 16 Glossary 202 10051 01 March 2005 This page intentionally left blank ...

Отзывы: