Detailed instructions for use are in the User's Guide.
[. . . ] Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA
202-10090-01 April 2005
202-10090-01, April 2005
© 2005 by NETGEAR, Inc. Trademarks NETGEAR is a trademark of Netgear, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. [. . . ] In the E-Mail menu, check or uncheck the box marked "Adjust for Daylight Savings Time".
·
Troubleshooting 202-10090-01, April 2005
7-7
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
7-8 202-10090-01, April 2005
Troubleshooting
Appendix A Technical Specifications
This appendix provides technical specifications for the WGT624 v3 108 Mbps Wireless Firewall Router.
Network Protocol and Standards Compatibility
Data and Routing Protocols:
Power Adapter
TCP/IP, RIP-1, RIP-2, DHCP PPP over Ethernet (PPPoE) 120V, 60 Hz, input 240V, 50 Hz, input 230V, 50 Hz, input 100V, 50/60 Hz, input 12 V DC @ 1 A output, 22W maximum 28 x 175 x 118 mm (1. 1 x 6. 89 x 4. 65 in. ) 0. 3 kg (0. 66 lb)
North America: United Kingdom, Australia: Europe: Japan: All regions (output):
Physical Specifications
Dimensions: Weight:
Environmental Specifications
Operating temperature: Operating humidity:
0° to 40° C
(32º to 104º F)
90% maximum relative humidity, noncondensing
Technical Specifications 202-10090-01, April 2005
A-1
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Electromagnetic Emissions
Meets requirements of:
FCC Part 15 Class B VCCI Class B EN 55 022 (CISPR 22), Class B
Interface Specifications
LAN: WAN: Wireless Radio Data Rates Frequency Data Encoding: Maximum Computers Per Wireless Network: Operating Frequency Ranges:
10BASE-T or 100BASE-Tx, RJ-45 10BASE-T or 100BASE-Tx, RJ-45 1, 2, 5. 5, 6, 9, 12, 18, 24, 36, 48, 54, and 108 Mbps Auto Rate Sensing 2. 4-2. 5 GHz Direct Sequence Spread Spectrum (DSSS) Limited by the amount of wireless network traffic generated by each node. 2. 412~2. 462 GHz (US) 2. 412~2. 484 GHz (Japan) 2. 412~2. 472 GHz (Europe ETSI) 40-bits (also called 64-bits), 128-bits WEP data encryption
Encryption:
A-2 202-10090-01, April 2005
Technical Specifications
Appendix B Network, Routing, Firewall, and Basics
This chapter provides an overview of IP networks, routing, and networking.
Related Publications
As you read this document, you may be directed to various RFC documents for further information. An RFC is a Request For Comment (RFC) published by the Internet Engineering Task Force (IETF), an open organization that defines the architecture and operation of the Internet. The RFC documents outline and define the standard protocols and procedures for the Internet. The documents are listed on the World Wide Web at www. ietf. org and are mirrored and indexed at many other sites worldwide.
Basic Router Concepts
Large amounts of bandwidth can be provided easily and relatively inexpensively in a local area network (LAN). However, providing high bandwidth between a local network and the Internet can be very expensive. Because of this expense, Internet access is usually provided by a slower-speed wide-area network (WAN) link such as a cable or DSL modem. In order to make the best use of the slower WAN link, a mechanism must be in place for selecting and transmitting only the data traffic meant for the Internet. The function of selecting and forwarding this data is performed by a router.
What is a Router?
A router is a device that forwards traffic between networks based on network layer information in the data and on routing tables maintained by the router. In these routing tables, a router builds up a logical picture of the overall network by gathering and exchanging information with other routers in the network. Using this information, the router chooses the best path for forwarding network traffic. Routers vary in performance and scale, number of routing protocols supported, and types of physical WAN connection they support. The WGT624 v3 108 Mbps Wireless Firewall Router is a small office router that routes the IP protocol over a single-user broadband connection.
Network, Routing, Firewall, and Basics 202-10090-01, April 2005 B-1
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
Routing Information Protocol
One of the protocols used by a router to build and maintain a picture of the network is the Routing Information Protocol (RIP). Using RIP, routers periodically update one another and check for changes to add to the routing table. The WGT624 v3 wireless router supports both the older RIP-1 and the newer RIP-2 protocols. Among other improvements, RIP-2 supports subnet and multicast protocols. RIP is not required for most home applications.
IP Addresses and the Internet
Because TCP/IP networks are interconnected across the world, every machine on the Internet must have a unique address to make sure that transmitted data reaches the correct destination. Blocks of addresses are assigned to organizations by the Internet Assigned Numbers Authority (IANA). Individual users and small organizations may obtain their addresses either from the IANA or from an Internet service provider (ISP). The Internet Protocol (IP) uses a 32-bit address structure. The address is usually written in dot notation (also called dotted-decimal notation), in which each group of eight bits is written in decimal form, separated by decimal points. For example, the following binary address:
11000011 00100010 00001100 00000111
is normally written as:
195. 34. 12. 7
The latter version is easier to remember and easier to enter into your computer. [. . . ] The Wi-Fi Alliance will call this, 'WPA-Personal. '
Wi-Fi Protected Access and IEEE 802. 11i Comparison
Wi-Fi Protected Access will be forward-compatible with the IEEE 802. 11i security specification currently under development by the IEEE. Wi-Fi Protected Access is a subset of the current 802. 11i draft, taking certain pieces of the 802. 11i draft that are ready to bring to market today, such as its implementation of 802. 1x and TKIP. These features can also be enabled on most existing Wi-Fi CERTIFIED products as a software upgrade. The main pieces of the 802. 11i draft that are not included in Wi-Fi Protected Access are secure IBSS, secure fast handoff, secure de-authentication and disassociation, as well as enhanced encryption protocols such as AES-CCMP. [. . . ]