Page 86 / 120 Scroll up to view Page 81 - 85
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
C-8
Network, Routing, Firewall, and Cabling Basics
202-10060-01, September 2004
The following figure illustrates a single IP address operation.
Figure C-3:
Single IP Address Operation Using NAT
This scheme offers the additional benefit of firewall-like protection because the internal LAN
addresses are not available to the Internet through the translated connection. All incoming
inquiries are filtered out by the router. This filtering can prevent intruders from probing your
system. However, using port forwarding, you can allow one PC (for example, a Web server) on
your local network to be accessible to outside users.
For more information about IP address translation, refer to RFC 1631,
The IP Network Address
Translator (NAT)
.
IP Configuration by DHCP
When an IP-based local area network is installed, each PC must be configured with an IP address.
If the PCs need to access the Internet, they should also be configured with a gateway address and
one or more DNS server addresses. As an alternative to manual configuration, there is a method by
which each PC on the network can automatically obtain this configuration information. A device
on the network may act as a Dynamic Host Configuration Protocol (DHCP) server. The DHCP
server stores a list or pool of IP addresses, along with other information (such as gateway and DNS
addresses) that it may assign to the other devices on the network. The WG602 v3 Access Point has
the capacity to act as a DHCP server.
7786EA
192.168.0.2
192.168.0.3
192.168.0.4
192.168.0.5
192.168.0.1
172.21.15.105
Private IP addresses
assigned by user
Internet
IP addresses
assigned by ISP
Page 87 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
Network, Routing, Firewall, and Cabling Basics
C-9
202-10060-01, September 2004
The WG602 v3 Access Point also functions as a DHCP client when connecting to the ISP. The
firewall can automatically obtain an IP address, subnet mask, DNS server addresses, and a
gateway address if the ISP provides this information by DHCP.
Domain Name Server
Many of the resources on the Internet can be addressed by simple descriptive names such as
www.netgear.com
. This addressing is very helpful at the application level, but the descriptive name
must be translated to an IP address in order for a user to actually contact the resource. Just as a
telephone directory maps names to phone numbers, or as an ARP table maps IP addresses to MAC
addresses, a domain name system (DNS) server maps descriptive names of network resources to
IP addresses.
When a PC accesses a resource by its descriptive name, it first contacts a DNS server to obtain the
IP address of the resource. The PC sends the desired message using the IP address. Many large
organizations, such as ISPs, maintain their own DNS servers and allow their customers to use the
servers to look up addresses.
Routing Protocols
Two protocols routers use extensively are:
Routing Information Protocol (RIP)
Address Resolution Protocol (ARP)
These two protocols are introduced below.
RIP
One of the protocols used by a router to build and maintain a picture of the network is RIP. Using
RIP, routers periodically update one another and check for changes to add to the routing table.
The WG602 v3 Access Point supports both the older RIP-1 and the newer RIP-2 protocols.
Among other improvements, RIP-2 supports subnet and multicast protocols. RIP is not required
for most home applications.
Page 88 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
C-10
Network, Routing, Firewall, and Cabling Basics
202-10060-01, September 2004
MAC Addresses and ARP
An IP address alone cannot be used to deliver data from one LAN device to another. To send data
between LAN devices, you must convert the IP address of the destination device to its media
access control address (MAC address). Each device on an Ethernet network has a unique MAC
address, which is a 48-bit number assigned to each device by the manufacturer. The technique that
associates the IP address with a MAC address is known as address resolution. Internet Protocol
uses the ARP to resolve MAC addresses.
If a device sends data to another station on the network and the destination MAC address is not yet
recorded, ARP is used. An ARP request is broadcast onto the network. All stations on the network
receive and read the request. The destination IP address for the chosen station is included as part of
the message so that only the station with this IP address responds to the ARP request. All other
stations discard the request.
The station with the correct IP address responds with its own MAC address directly to the sending
device. The receiving station provides the transmitting station with the required destination MAC
address. The IP address data and MAC address data for each station are held in an ARP table. The
next time data is sent, the address can be obtained from the address information in the table.
For more information about address assignment, refer to the IETF documents RFC 1597,
Address
Allocation for Private Internets,
and RFC 1466,
Guidelines for Management of IP Address Space
.
Internet Security and Firewalls
When your LAN connects to the Internet through a router, an opportunity is created for outsiders
to access or disrupt your network. A NAT router provides some protection because by the very
nature of the process, the network behind the router is shielded from access by outsiders on the
Internet. However, there are methods by which a determined hacker can possibly obtain
information about your network or at the least can disrupt your Internet access. A greater degree of
protection is provided by a firewall router.
Page 89 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
Network, Routing, Firewall, and Cabling Basics
C-11
202-10060-01, September 2004
What is a Firewall?
A firewall is a device that protects one network from another, while allowing communication
between the two. A firewall incorporates the functions of the NAT router, while adding features for
dealing with a hacker intrusion or attack. Several known types of intrusion or attack can be
recognized when they occur. When an incident is detected, the firewall can log details of the
attempt, and can optionally send email to an administrator notifying them of the incident. Using
information from the log, the administrator can take action with the ISP of the hacker. In some
types of intrusions, the firewall can fend off the hacker by discarding all further packets from the
hacker’s IP address for a period of time.
Stateful Packet Inspection
Unlike simple Internet sharing routers, a firewall uses a process called stateful packet inspection to
ensure secure firewall filtering to protect your network from attacks and intrusions. Since
user-level applications such as FTP and Web browsers can create complex patterns of network
traffic, it is necessary for the firewall to analyze groups of network connection states. Using
Stateful Packet Inspection, an incoming packet is intercepted at the network layer and then
analyzed for state-related information associated with all network connections. A central cache
within the firewall keeps track of the state information associated with all network connections.
All traffic passing through the firewall is analyzed against the state of these connections in order to
determine whether or not it will be allowed to pass through or rejected.
Denial of Service Attack
A hacker may be able to prevent your network from operating or communicating by launching a
Denial of Service (DoS) attack. The method used for such an attack can be as simple as merely
flooding your site with more requests than it can handle. A more sophisticated attack may attempt
to exploit some weakness in the operating system used by your router or gateway. Some operating
systems can be disrupted by simply sending a packet with incorrect length information.
Ethernet Cabling
Although Ethernet networks originally used thick or thin coaxial cable, most installations currently
use unshielded twisted pair (UTP) cabling. The UTP cable contains eight conductors, arranged in
four twisted pairs, and terminated with an RJ45 type connector. A normal straight-through UTP
Ethernet cable follows the EIA568B standard wiring as described below in
Table C-1
Page 90 / 120
User’s Guide for the WG602 v3 54 Mbps Wireless Access Point
C-12
Network, Routing, Firewall, and Cabling Basics
202-10060-01, September 2004
.
Category 5 Cable Quality
Category 5 distributed cable that meets ANSI/EIA/TIA-568-A building wiring standards can be a
maximum of 328 feet (ft.) or 100 meters (m) in length, divided as follows:
20 ft. (6 m) between the hub and the patch panel (if used)
295 ft. (90 m) from the wiring closet to the wall outlet
10 ft. (3 m) from the wall outlet to the desktop device
The patch panel and other connecting hardware must meet the requirements for 100 Mbps
operation (Category 5). Only 0.5 inch (1.5 cm) of untwist in the wire pair is allowed at any
termination point.
A twisted pair Ethernet network operating at 10 Mbits/second (10BASE-T) will often tolerate low
quality cables, but at 100 Mbits/second (10BASE-Tx) the cable must be rated as Category 5, or
Cat 5, by the Electronic Industry Association (EIA). This rating will be printed on the cable jacket.
A Category 5 cable will meet specified requirements regarding loss and crosstalk. In addition,
there are restrictions on maximum cable length for both 10 and 100 Mbits/second networks.
Table C-1.
UTP Ethernet cable wiring, straight-through
Pin
Wire color
Signal
1
Orange/White
Transmit (Tx) +
2
Orange
Transmit (Tx) -
3
Green/White
Receive (Rx) +
4
Blue
5
Blue/White
6
Green
Receive (Rx) -
7
Brown/White
8
Brown

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top