Page 261 / 268 Scroll up to view Page 256 - 260
Reference Manual for the Model Wireless ADSL Firewall Router DG834G
NETGEAR VPN Configuration
F-27
202-10006-05, June 2005
Viewing the VPN Router’s VPN Status and Log Information
To view information on the status of the VPN client connection, open the VPN router’s VPN
Status screen by following the steps below:
1.
To view this screen, click the
Router Status
link of the VPN router’s main menu, then click
the
VPN Status
button. The
VPN Status/Log
screen for a connection is shown below:
Figure F-26:
VPN Status/Log screen
Page 262 / 268
Reference Manual for the Model Wireless ADSL Firewall Router DG834G
F-28
NETGEAR VPN Configuration
202-10006-05, June 2005
2.
To view the VPN tunnels status, click the
VPN Status
link on the right side of the main menu.
Current VPN Tunnels (SAs) screen
Page 263 / 268
Glossary
1
Glossary
10BASE-T
IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
100BASE-Tx
IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
802.11b
IEEE specification for wireless networking at 11 Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
802.11g
IEEE specification for wireless networking at 54 Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
802.11x
802.1x defines port-based, network access control used to provide
authenticated network access and automated data encryption key
management.
The IEEE 802.1x draft standard offers an effective framework for
authenticating and controlling user traffic to a protected network, as well as
dynamically varying encryption keys. 802.1x uses a protocol called EAP
(Extensible Authentication Protocol) and supports multiple authentication
methods, such as token cards, Kerberos, one-time passwords, certificates, and
public key authentication. For details on EAP specifically, refer to IETF's
RFC 2284.
Access Control List
(ACL)
An ACL is a database that an Operating System uses to track each user’s
access rights to system objects (such as file directories and/or files).
Ad-hoc Mode
An 802.11 networking framework in which devices or stations communicate
directly with each other, without the use of an access point (AP). Ad-hoc
mode is also referred to as peer-to-peer mode or an Independent Basic Service
Set (IBSS). Ad-hoc mode is useful for establishing a network where wireless
infrastructure does not exist or where services are not required.
ADSL
See
Asymmetric Digital Subscriber Line
Asymmetric Digital
Subscriber Line
A technology for sending data over regular telephone lines. ADSL allows data
rates up to 8 Mbps downstream and 640 Kbps upstream.
Page 264 / 268
Reference Manual for the Model Wireless ADSL Firewall Router DG834G
2
Glossary
Cat 5
Category 5
unshielded twisted pair (UTP) cabling. An Ethernet network
operating at 10 Mbits/second (10BASE-T) will often tolerate low quality
cables, but at 100 Mbits/second (10BASE-Tx) the cable must be rated as
Category 5, or Cat 5 or Cat V, by the Electronic Industry Association (EIA).
This rating will be printed on the cable jacket. Cat 5 cable contains eight
conductors, arranged in four twisted pairs, and terminated with an RJ45 type
connector. In addition, there are restrictions on maximum cable length for
both 10 and 100 Mbits/second networks.
Denial of Service
attack
DoS. A hacker attack designed to prevent your computer or network from
operating or communicating.
DHCP
See
Dynamic Host Configuration Protocol.
DMZ
Specifying a Default DMZ Server allows you to set up a computer or server
that is available to anyone on the Internet for services that you have not
defined. There are security issues with doing this, so only do this if you are
willing to risk open access
DNS
See
Domain Name Server.
Domain Name
A descriptive name for an address or group of addresses on the Internet.
Domain names are of the form of a registered entity name plus one of a
number of predefined top level suffixes such as .com, .edu, .uk, and so on. For
example, in the address mail.NETGEAR.com, mail is a server name and
NETGEAR.com is the domain.
Domain Name Server
A Domain Name Server (DNS) resolves descriptive names of network
resources (such as www.NETGEAR.com) to numeric IP addresses.
DSLAM
DSL Access Multiplexor. The piece of equipment at the telephone company
central office that provides the ADSL signal.
Dynamic Host
Configuration
Protocol
DHCP. An Ethernet protocol specifying how a centralized DHCP server can
assign network configuration information to multiple DHCP clients. The
assigned information includes IP addresses, DNS addresses, and gateway
(router) addresses.
Gateway
A local device, usually a router, that connects hosts on a local network to other
networks.
IP
See
Internet Protocol.
Page 265 / 268
Reference Manual for the Model Wireless ADSL Firewall Router DG834G
Glossary
3
IP Address
A four-byte number uniquely defining each host on the Internet. Ranges of
addresses are assigned by Internic, an organization formed for this purpose.
Usually written in dotted-decimal notation with periods separating the bytes
(for example, 134.177.244.57).
IPSec
Internet Protocol Security. IPSec is a series of guidelines for securing private
information transmitted over public networks. IPSec is a VPN method
providing a higher level of security than PPTP.
ISP
Internet service provider.
Internet Protocol
The main internetworking protocol used in the Internet. Used in conjunction
with the Transfer Control Protocol (TCP) to form TCP/IP.
LAN
See
local area network.
local area network
LAN. A communications network serving users within a limited area, such as
one floor of a building. A LAN typically connects multiple personal
computers and shared network devices such as storage and printers. Although
many technologies exist to implement a LAN, Ethernet is the most common
for connecting personal computers.
MAC address
Media Access Control address. A unique 48-bit hardware address assigned to
every Ethernet node. Usually written in the form 01:23:45:67:89:ab.
Mbps
Megabits per second.
MDI/MDIX
In cable wiring, the concept of transmit and receive are from the perspective
of the computer, which is wired as a Media Dependant Interface (MDI). In
MDI wiring, a computer transmits on pins 1 and 2. At the hub, switch, router,
or access point, the perspective is reversed, and the hub receives on pins 1 and
2. This wiring is referred to as Media Dependant Interface - Crossover
(MDI-X).
MSB
See
Most Significant Bit or Most Significant Byte.
MTU
See
Maximum Transmission Unit.
Maximum Transmit
Unit
The size in bytes of the largest packet that can be sent or received.
Most Significant Bit or
Most Significant Byte
The portion of a number, address, or field that is farthest left when written as a
single number in conventional hexadecimal ordinary notation. The part of the
number having the most value.
NAT
See
Network Address Translation.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top