Page 146 / 152 Scroll up to view Page 141 - 145
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
10
Glossary
M-10153-01
The TLS protocol is made up of two layers. The TLS Record Protocol ensures that a connection is private by
using symmetric data encryption and ensures that the connection is reliable. The second TLS layer is the
TLS Handshake Protocol, which allows authentication between the server and client and the negotiation of
an encryption algorithm and cryptographic keys before data is transmitted or received. Based on Netscape’s
SSL 3.0, TLS supercedes and is an extension of SSL. TLS and SSL are not interoperable.
Universal Plug and Play
UPnP. A networking architecture that provides compatibility among networking technology. UPnP
compliant routers provide broadband users at home and small businesses with a seamless way to participate
in online games, videoconferencing and other peer-to-peer services.
UTP
Unshielded twisted pair is the cable used by 10BASE-T and 100BASE-Tx Ethernet networks.
VCI
Virtual Channel Identifier. Together with the VPI, defines a Virtual Channel through an ATM network. Used
by ATM switching equipment to route data through the network.
VPI
Virtual Path Identifier. Together with the VCI, defines a Virtual Channel through an ATM network. Used by
ATM switching equipment to route data through the network.
VPN
Virtual Private Network. A method for securely transporting data between two private networks by using a
public network such as the Internet as a connection.
WAN
A long distance link used to extend or connect remotely located local area networks. The Internet is a large
WAN.
WEB Proxy Server
A web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a
firewall.
The proxy server listens for requests from clients within the firewall and forwards these requests to remote
Internet servers outside the firewall. The proxy server reads responses from the external servers and then
sends them to internal client clients.
WEP
Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks.
All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for
data encryption.
Page 147 / 152
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
Glossary
11
M-10153-01
wide area network
WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a
large WAN.
Wi-Fi
A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility
Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among
802.11b devices.
Windows Internet Naming Service
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
If a remote network contains a WINS server, your Windows PCs can gather information from that WINS
server about its local hosts. This allows your PCs to browse that remote network using the Windows
Network Neighborhood feature.
WINS
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
Wireless Network Name (SSID)
Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or
ESSID configuration parameter.
Page 148 / 152
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v2
12
Glossary
M-10153-01
Page 149 / 152
Index
1
Numerics
64 or 128 bit WEP
4-6
802.11b
D-1
A
Account Name
3-11, 3-14, 6-2
Address Resolution Protocol
B-8
ad-hoc mode
D-2
Authentication Server
3-10
Auto MDI/MDI-X
B-14, G-2
Auto Uplink
2-3, B-14, G-2
B
backup configuration
6-7
Basic Wireless Connectivity
4-8
BSSID
D-2
C
Cabling
B-11
Cat5 cable
3-1, B-12, G-2
configuration
automatic by DHCP
2-4
backup
6-7
erasing
6-8
restore
6-6
router, initial
3-1
content filtering
2-2, 5-1
conventions
typography
1-1
crossover cable
2-3, 8-2, B-14, G-2
customer support
1-v
D
date and time
8-7
Daylight Savings Time
8-7
daylight savings time
5-8
Default DMZ Server
7-4
Denial of Service (DoS) protection
2-2
denial of service attack
B-11
DHCP
B-10
DHCP Client ID
C-16
DMZ
2-3, 7-2, 7-5
DMZ Server
7-4
DNS Proxy
2-4
DNS server
3-11, C-20
DNS, dynamic
7-6
documentation updates
1-1, 3-8, 6-5, 8-1
domain
C-20
Domain Name
3-11, 3-14
domain name server (DNS)
B-9
DoS attack
B-11
Dynamic DNS
7-6
E
Encryption Strength
4-6
End Port
7-2
EnterNet
C-18
erase configuration
6-8
ESSID
4-8, D-2
Ethernet
2-3
Ethernet cable
B-11
Index
Page 150 / 152
2
Index
F
factory settings, restoring
6-8
firewall features
2-2
Flash memory, for firmware upgrade
2-2
front panel
2-6, 2-7
fully qualified domain name (FQDN)
4-4
G
gateway address
C-20
H
Half Life
7-3
host name
3-11, 3-14
I
IANA
contacting
B-2
IETF
B-1
Web site address
B-7
infrastructure mode
D-2
installation
2-4
Internet account
address information
C-18
establishing
C-18
Internet Service Provider
3-1
IP addresses
C-19, C-20
and NAT
B-7
and the Internet
B-2
assigning
B-2, B-9
auto-generated
8-3
private
B-7
translating
B-9
IP configuration by DHCP
B-10
IP networking
for Macintosh
C-16
for Windows
C-2, C-7
ISP
3-1
K
KALI
7-3
L
LAN IP Setup Menu
7-7
LEDs
description
2-6
troubleshooting
8-2
log
sending
5-7
log entries
5-5
Login
3-10
M
MAC address
8-7, B-8
spoofing
3-10, 3-14, 8-5
Macintosh
C-19
configuring for IP networking
C-16
DHCP Client ID
C-16
Obtaining ISP Configuration Information
C-20
masquerading
C-18
MDI/MDI-X
B-14, G-2
MDI/MDI-X wiring
B-14, G-6
metric
7-11
N
NAT
C-18
NAT.
See
Network Address Translation
netmask
translation table
B-6
Network Address Translation
2-4, B-7, C-18
Network Time Protocol
5-8, 8-7
NTP
5-8, 8-7
O
Open System authentication
D-3

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top