Page 121 / 154 Scroll up to view Page 116 - 120
Reference Manual for the Model DG824M Wireless ADSL Modem Gateway
Network and Routing Basics
B-13
Stateful Packet Inspection
Unlike simple Internet sharing routers, a firewall uses a process called stateful packet inspection to
ensure secure firewall filtering to protect your network from attacks and intrusions. Since
user-level applications such as FTP and Web browsers can create complex patterns of network
traffic, it is necessary for the firewall to analyze groups of network connection "states." Using
Stateful Packet Inspection, an incoming packet is intercepted at the network layer and then
analyzed for state-related information associated with all network connections. A central cache
within the firewall keeps track of the state information associated with all network connections.
All traffic passing through the firewall is analyzed against the state of these connections in order to
determine whether or not it will be allowed to pass through or rejected.
Denial of Service Attack
A hacker may be able to prevent your network from operating or communicating by launching a
Denial of Service (DoS) attack. The method used for such an attack can be as simple as merely
flooding your site with more requests than it can handle. A more sophisticated attack may attempt
to exploit some weakness in the operating system used by your router or gateway. Some operating
systems can be disrupted by simply sending a packet with incorrect length information.
Wireless Networking
The DG824M gateway conforms to the Institute of Electrical and Electronics Engineers (IEEE)
802.11b standard for wireless LANs (WLANs). On an 802.11b wireless link, data is encoded using
direct-sequence spread-spectrum (DSSS) technology and is transmitted in the unlicensed radio
spectrum at 2.5GHz. The maximum data rate for the wireless link is 11 Mbps, but it will
automatically back down from 11 Mbps to 5.5, 2, and 1 Mbps when the radio signal is weak or
when interference is detected.
The 802.11b standard is also called Wireless Ethernet or Wi-Fi by the Wireless Ethernet
Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standard group promoting
interoperability among 802.11b devices.
Wireless Network Configuration
The 802.11b standard offers two methods for configuring a wireless network - ad hoc and
infrastructure.
Page 122 / 154
Reference Manual for the Model DG824M Wireless ADSL Modem Gateway
B-14
Network and Routing Basics
Ad Hoc Mode (Peer-to-Peer Workgroup)
In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed
points to the network - each node can generally communicate with any other node. There is no
Access Point involved in this configuration. This mode enables you to quickly set up a small
wireless workgroup and allows workgroup members to exchange data or share printers as
supported by Microsoft Networking in the various Windows operating systems. Some vendors
also refer to ad hoc networking as Peer-to-Peer group networking.
In this configuration, network packets are directly sent and received by the intended transmitting
and receiving stations. As long as the stations are within range of one another, this is the easiest
and least expensive way to set up a wireless network.
Infrastructure Mode
With a wireless Access Point, you can operate the wireless LAN in the infrastructure mode. This
mode provides wireless connectivity to multiple wireless network devices within a fixed range or
area of coverage, interacting with wireless nodes via an antenna.
In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet
data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access
Points via a wired Ethernet backbone can further extend the wireless network coverage. As a
mobile computing device moves out of the range of one access point, it moves into the range of
another. As a result, wireless clients can freely roam from one Access Point domain to another and
still maintain seamless network connection.
Extended Service Set Identification (ESSID)
The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification
(SSID). In an ad-hoc wireless network with no access points, the Basic Service Set Identification
(BSSID) is used. In an infrastructure wireless network that includes an access point, the Extended
Service Set Identification (ESSID) is used, but may still be referred to as SSID.
An SSID is a thirty-two character (maximum) alphanumeric key identifying the wireless local area
network. Some vendors refer to the SSID as network name. For the wireless devices in a network
to communicate with each other, all devices must be configured with the same SSID.
Page 123 / 154
Reference Manual for the Model DG824M Wireless ADSL Modem Gateway
Network and Routing Basics
B-15
Authentication and WEP Encryption
The absence of a physical connection between nodes makes the wireless links vulnerable to
eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11
standard has defined two types of authentication methods, Open System and Shared Key. With
Open System authentication, a wireless PC can join any network and receive any messages that are
not encrypted. With Shared Key authentication, only those PCs that possess the correct
authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an
Open System network.
Wired Equivalent Privacy (WEP) data encryption is utilized when the wireless nodes or access
points are configured to operate in Shared Key authentication mode. There are two shared key
methods implemented in most commercially available products, 64-bit and 128-bit WEP data
encryption.
The 64-bit WEP data encryption method, allows for a five-character (40-bit) input. Additionally,
24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. (The 24
factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt all
data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption
as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits
wide.
The 128-bit WEP data encryption method consists of 104 user-configurable bits. Similar to the
forty-bit WEP data encryption method, the remaining 24 bits are factory set and not user
configurable. Some vendors allow passphrases to be entered instead of the cryptic hexadecimal
characters to ease encryption key entry.
Wireless Channel Selection
IEEE 802.11 wireless nodes communicate with each other using radio frequency signals in the
ISM (Industrial, Scientific, and Medical) band between 2.4Ghz and 2.5Ghz. Neighboring channels
are 5Mhz apart. However, due to spread spectrum effect of the signals, a node sending signals
using a particular channel will utilize frequency spectrum12.5Mhz above and below the center
channel frequency. As a result, two separate wireless networks using neighboring channels (for
example, channel 1 and channel 2) in the same general vicinity will interfere with each other.
Applying two channels that allow the maximum channel separation will decrease the amount of
channel cross-talk, and provide a noticeable performance increase over networks with minimal
channel separation.
Page 124 / 154
Reference Manual for the Model DG824M Wireless ADSL Modem Gateway
B-16
Network and Routing Basics
The radio frequency channels used are listed in
Table 7-2
:
Note:
The available channels supported by the wireless products in various countries are different.
The preferred channel separation between the channels in neighboring wireless networks is 25
MHz (5 channels). This means that you can apply up to three different channels within your
wireless network. There are only 11 usable wireless channels in the United States. It is
recommended that you start using channel 1 and grow to use channel 6, and 11 when necessary, as
these three channels do not overlap.
Table 7-2.
802.11 Radio Frequency Channels
Channel
Center Frequency
Frequency Spread
1
2412Mhz
2399.5Mhz - 2424.5Mhz
2
2417Mhz
2404.5Mhz - 2429.5Mhz
3
2422Mhz
2409.5Mhz - 2434.5Mhz
4
2427Mhz
2414.5Mhz - 2439.5Mhz
5
2432Mhz
2419.5Mhz - 2444.5Mhz
6
2437Mhz
2424.5Mhz - 2449.5Mhz
7
2442Mhz
2429.5Mhz - 2454.5Mhz
8
2447Mhz
2434.5Mhz - 2459.5Mhz
9
2452Mhz
2439.5Mhz - 2464.5Mhz
10
2457Mhz
2444.5Mhz - 2469.5Mhz
11
2462Mhz
2449.5Mhz - 2474.5Mhz
12
2467Mhz
2454.5Mhz - 2479.5Mhz
13
2472Mhz
2459.5Mhz - 2484.5Mhz
Page 125 / 154
Preparing Your Network
C-1
Appendix C
Preparing Your Network
This appendix describes how to prepare your network to connect to the Internet through the Model
RP614 Web Safe Router and how to verify the readiness of broadband Internet service from an
Internet service provider (ISP).
Preparing Your Computers for TCP/IP Networking
Computers access the Internet using a protocol called TCP/IP (Transmission Control Protocol/
Internet Protocol). Each computer on your network must have TCP/IP installed and selected as its
networking protocol. If a Network Interface Card (NIC) is already installed in your PC, then TCP/
IP is probably already installed as well.
Most operating systems include the software components you need for networking with TCP/IP:
Windows
®
95 or later includes the software components for establishing a TCP/IP network.
Windows 3.1 does not include a TCP/IP component. You need to purchase a third-party TCP/
IP application package such as NetManage Chameleon.
Macintosh Operating System 7 or later includes the software components for establishing a
TCP/IP network.
Note:
If an ISP technician configured your computer during the installation of a
broadband modem, or if you configured it using instructions provided by your ISP, you
may need to copy the current configuration information for use in the configuration of
your firewall. Write down this information before reconfiguring your computers. Refer
to
“Obtaining ISP Configuration Information for Windows Computers
” on
page C-19
or
“Obtaining ISP Configuration Information for Macintosh Computers
” on
page C-20
for
further information.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top