Page 176 / 180 Scroll up to view Page 171 - 175
Reference Manual for the 108 Mbps Wireless Media Router WGT634U
Glossary
11
April 2004, 202-10018-02
WAN
A long distance link used to extend or connect remotely located local area networks. The Internet is a large
WAN.
WEB Proxy Server
A Web proxy server is a specialized HTTP server that allows clients access to the Internet from behind a
firewall.
The proxy server listens for requests from clients within the firewall and forwards these requests to remote
Internet servers outside the firewall. The proxy server reads responses from the external servers and then
sends them to internal client clients.
WEP
Wired Equivalent Privacy is a data encryption protocol for 802.11b wireless networks.
All wireless nodes and access points on the network are configured with a 64-bit or 128-bit Shared Key for
data encryption.
wide area network
WAN. A long distance link used to extend or connect remotely located local area networks. The Internet is a
large WAN.
Wi-Fi
A trade name for the 802.11b wireless networking standard, given by the Wireless Ethernet Compatibility
Alliance (WECA, see http://www.wi-fi.net), an industry standards group promoting interoperability among
802.11b devices.
Windows Internet Naming Service
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
If a remote network contains a WINS server, your Windows PCs can gather information from that WINS
server about its local hosts. This allows your PCs to browse that remote network using the Windows
Network Neighborhood feature.
WINS
WINS. Windows Internet Naming Service is a server process for resolving Windows-based computer names
to IP addresses.
Wireless Network Name (SSID)
Wireless Network Name (SSID) is the name assigned to a wireless network. This is the same as the SSID or
ESSID configuration parameter.
Page 177 / 180
Index
1
Numerics
64 or 128 bit WEP
4-5
802.11b
D-1
A
Account Name
3-13, 3-16, 7-2
Address Resolution Protocol
B-8
ad-hoc mode
D-2
Authentication Server
3-12
Auto MDI/MDI-X
B-14, G-2
Auto Uplink
2-5, B-14, G-2
B
backup configuration
7-9
Basic Wireless Connectivity
4-8, 5-11
BSSID
D-2
C
Cabling
B-11
Cat5 cable
3-1, B-12, G-2
configuration
automatic by DHCP
2-5
backup
7-9
erasing
7-9
restore
7-8
router, initial
3-1
content filtering
2-4, 6-1
conventions
typography
1-1
Counter-Strike
8-3
crossover cable
2-5, 9-2, B-14, G-2
customer support
1-iv
D
date and time
9-8
Daylight Savings Time
9-8
daylight savings time
6-8
Default DMZ Server
8-5
Denial of Service (DoS) protection
2-4
denial of service attack
B-11
DHCP
B-10
DHCP Client ID
C-16
DMZ
2-4, 8-2, 8-5
DMZ Server
8-5
DNS Proxy
2-5
DNS server
3-13, C-20
DNS, dynamic
8-6
domain
C-20
Domain Name
3-13, 3-16
domain name server (DNS)
B-9
DoS attack
B-11
Dynamic DNS
8-6
E
Encryption Strength
4-5
End Port
8-2
EnterNet
C-18
erase configuration
7-9
ESSID
4-8, D-2
Ethernet
2-4
Ethernet cable
B-11
F
factory settings, restoring
7-9
Index
Page 178 / 180
2
Index
firewall features
2-4
Flash memory, for firmware upgrade
2-2
front panel
2-8, 2-9
fully qualified domain name (FQDN)
4-10
G
gateway address
C-20
H
host name
3-13, 3-16
I
IANA
contacting
B-2
IETF
B-1
Web site address
B-7
infrastructure mode
D-2
installation
2-5
Internet account
address information
C-18
establishing
C-18
Internet Service Provider
3-1
IP addresses
C-19, C-20
and NAT
B-7
and the Internet
B-2
assigning
B-2, B-9
auto-generated
9-3
private
B-7
translating
B-9
IP configuration by DHCP
B-10
IP networking
for Macintosh
C-16
for Windows
C-2, C-7
ISP
3-1
L
LAN IP Setup Menu
8-7
LEDs
description
2-8
troubleshooting
9-2
log
sending
6-7
log entries
6-5
Login
3-12
M
MAC address
9-7, B-8
spoofing
3-12, 3-16, 9-5
Macintosh
C-19
configuring for IP networking
C-16
DHCP Client ID
C-16
Obtaining ISP Configuration Information
C-20
masquerading
C-18
MDI/MDI-X
B-14, G-2
MDI/MDI-X wiring
B-14, G-6
metric
8-11
N
NAT
C-18
NAT.
See
Network Address Translation
netmask
translation table
B-6
Network Address Translation
2-5, B-7, C-18
Network Time Protocol
6-8, 9-8
NTP
6-8, 9-8
O
Open System authentication
D-2
P
package contents
2-7
Passphrase
4-5, 4-7, 4-12
passphrase
2-3
Password
3-12
password
restoring
9-7
PC, using to configure
C-21
ping
8-5
Page 179 / 180
Index
3
placement
4-1
port filtering
6-2
Port Forwarding
8-1
port forwarding behind NAT
B-8
Port Forwarding Menu
8-1
port numbers
6-3
PPP over Ethernet
2-5, C-18
PPPoE
C-18
Primary DNS Server
3-11, 3-13, 3-14, 3-16
protocols
Address Resolution
B-8
DHCP
B-10
Routing Information
2-5, B-2
support
2-2
publications, related
B-1
Q
Quake III
8-3
R
range
4-1
range, port forwarding
8-2
rear panel
2-9
Remote Management
8-12
remote management
8-12
requirements
hardware
3-1
reserved IP adresses
8-9
restore configuration
7-8
restore factory settings
7-9
Restrict Wireless Access by MAC Address
4-10
RFC
1466
B-7, B-9
1597
B-7, B-9
1631
B-7, B-9
finding
B-7
RIP (Router Information Protocol)
8-8
router concepts
B-1
Router Status
7-1
Routing Information Protocol
2-5, B-2
S
Scope of Document
1-1
Secondary DNS Server
3-11, 3-13, 3-14, 3-16
security
2-4
service numbers
6-3
Setup Wizard
3-1
Shared Key authentication
D-3
SMTP
6-7
spoof MAC address
9-5
SSID
2-10, 4-4, 4-8, 4-9, D-2
Start Port
8-2
stateful packet inspection
2-4, B-11
Static Routes
8-6
subnet addressing
B-4
subnet mask
B-5, C-19, C-20
T
TCP/IP
configuring
C-1
network, troubleshooting
9-5
TCP/IP properties
verifying for Macintosh
C-17
verifying for Windows
C-6, C-15
time of day
9-8
time zone
6-8
time-stamping
6-8
troubleshooting
9-1
Trusted Host
6-2
U
Universal Plug and Play
8-13
Unmounting a USB Drive
5-10
Unreal Tournament
8-3
Uplink switch
B-14
UPnP
8-13
USB
C-18
Page 180 / 180
4
Index
USB Configuration Settings
5-4
USB disk drive
5-1
W
WAN
8-4
WAN Setup
8-4
WEP
2-10, D-3
Wi-Fi
D-1
Windows, configuring for IP routing
C-2, C-7
winipcfg utility
C-6
WinPOET
C-18
Wired Equivalent Privacy.
See
WEP
Wireless Access
3-3
Wireless Authentication
4-4
wireless authentication scheme
4-5
Wireless Encryption
4-4
Wireless Ethernet
D-1
wireless network name
2-10
Wireless Performance
4-1
Wireless Range Guidelines
4-1
Wireless Security
4-2
World Wide Web
1-iv

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top