Page 11 / 268 Scroll up to view Page 6 - 10
Contents
xi
202-10006-05, June 2005
Verifying TCP/IP Properties
....................................................................................
C-6
Configuring Windows NT4, 2000 or XP for IP Networking
............................................
C-7
Installing or Verifying Windows Networking Components
.......................................
C-7
DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4
......................................
C-8
DHCP Configuration of TCP/IP in Windows XP
.....................................................
C-8
DHCP Configuration of TCP/IP in Windows 2000
................................................
C-10
DHCP Configuration of TCP/IP in Windows NT4
..................................................
C-13
Verifying TCP/IP Properties for Windows XP, 2000, and NT4
..............................
C-15
Configuring the Macintosh for TCP/IP Networking
......................................................
C-16
MacOS 8.6 or 9.x
..................................................................................................
C-16
MacOS X
...............................................................................................................
C-16
Verifying TCP/IP Properties for Macintosh Computers
.........................................
C-17
Verifying the Readiness of Your Internet Account
.......................................................
C-18
Are Login Protocols Used?
...................................................................................
C-18
What Is Your Configuration Information?
..............................................................
C-18
Obtaining ISP Configuration Information for Windows Computers
.......................
C-19
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-20
Restarting the Network
................................................................................................
C-21
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Authentication and WEP Data Encryption
.....................................................................
D-2
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-3
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
WPA Wireless Security
..................................................................................................
D-8
How Does WPA Compare to WEP?
........................................................................
D-9
How Does WPA Compare to IEEE 802.11i?
........................................................
D-10
Page 12 / 268
202-10006-05, June 2005
xii
Contents
What are the Key Features of WPA Security?
......................................................
D-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
D-12
WPA Data Encryption Key Management
........................................................
D-14
Is WPA Perfect?
....................................................................................................
D-16
Product Support for WPA
......................................................................................
D-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged
......
D-16
Changes to Wireless Access Points
...............................................................
D-16
Changes to Wireless Network Adapters
.........................................................
D-17
Changes to Wireless Client Programs
............................................................
D-18
Appendix E
Virtual Private Networking
What is a VPN?
.............................................................................................................
E-1
What Is IPSec and How Does It Work?
.........................................................................
E-2
IPSec Security Features
.........................................................................................
E-2
IPSec Components
.................................................................................................
E-2
Encapsulating Security Payload (ESP)
...................................................................
E-3
Authentication Header (AH)
....................................................................................
E-4
IKE Security Association
.........................................................................................
E-4
Mode
.................................................................................................................
E-5
Key Management
....................................................................................................
E-6
Understand the Process Before You Begin
...................................................................
E-6
VPN Process Overview
.................................................................................................
E-7
Network Interfaces and Addresses
.........................................................................
E-7
Interface Addressing
.........................................................................................
E-7
Firewalls
...........................................................................................................
E-8
Setting Up a VPN Tunnel Between Gateways
........................................................
E-8
VPNC IKE Security Parameters
..................................................................................
E-10
VPNC IKE Phase I Parameters
.............................................................................
E-10
VPNC IKE Phase II Parameters
.............................................................................
E-11
Testing and Troubleshooting
.........................................................................................
E-11
Additional Reading
.......................................................................................................
E-11
Appendix F
NETGEAR VPN Configuration
DG834G to FVL328
........................................................................................................
F-1
Configuration Profile
.................................................................................................
F-1
Page 13 / 268
Contents
xiii
202-10006-05, June 2005
Step-By-Step Configuration
......................................................................................
F-2
DG834G with FQDN to FVL328
.....................................................................................
F-6
Configuration Profile
.................................................................................................
F-6
The Use of a Fully Qualified Domain Name (FQDN)
.........................................
F-7
Step-By-Step Configuration
......................................................................................
F-8
Configuration Summary (Telecommuter Example)
.......................................................
F-13
Setting Up the Client-to-Gateway VPN Configuration (Telecommuter Example)
.........
F-14
Step 1: Configuring the Client-to-Gateway VPN Tunnel on the VPN Router at the
Employer’s Main Office
..........................................................................................
F-14
Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC at the
Telecommuter’s Home Office
.................................................................................
F-16
Monitoring the VPN Tunnel (Telecommuter Example)
..................................................
F-25
Viewing the PC Client’s Connection Monitor and Log Viewer
................................
F-25
Viewing the VPN Router’s VPN Status and Log Information
.................................
F-27
Glossary
Page 14 / 268
202-10006-05, June 2005
xiv
Contents
Page 15 / 268
About This Manual
1-1
202-10006-05, June 2005
Chapter 1
About This Manual
This chapter describes the intended audience, scope, conventions, and formats of this manual.
Audience, Scope, Conventions, and Formats
This reference manual assumes that the reader has basic to intermediate computer and Internet
skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial
information is provided in the Appendices and on the Netgear website.
This guide uses the following typographical conventions:
This guide uses the following formats to highlight special messages:
This manual is written for the DG834G wireless router according to these specifications:
Table 1-1.
Typographical Conventions
italics
Emphasis, books, CDs, URL names
bold
User input
fixed
Screen text, file and server names, extensions, commands, IP addresses
Note:
This format is used to highlight information of importance or special interest.
Table 1-2.
Manual Scope
Product Version
DG834G Wireless ADSL Firewall Router
Manual Publication Date
June 2005
Note:
Product updates are available on the NETGEAR, Inc. Web site at
.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top