Reference ManualTable of ContentsReference Manual for the Model Wireless ADSL Firewall Router DG834G1Product and Publication Details3Contents5Chapter 1 About This Manual15Audience, Scope, Conventions, and Formats15How to Use This Manual16How to Print this Manual17Chapter 2 Introduction19About the Router19Key Features19A Powerful, True Firewall20802.11 Standards-based Wireless Networking20Easy Installation and Management21Protocol Support21Virtual Private Networking (VPN)23Content Filtering23Auto Sensing and Auto Uplink™ LAN Ethernet Connections23What’s in the Box?23The Router’s Front Panel24The Router’s Rear Panel25Chapter 3 Connecting the Router to the Internet27What You Need Before You Begin27ADSL Microfilter Requirements27ADSL Microfilter27ADSL Microfilter with Built-In Splitter28Ethernet Cabling Requirements28Computer Hardware Requirements28LAN Configuration Requirements28Internet Configuration Requirements29Where Do I Get the Internet Configuration Parameters?29Record Your Internet Connection Information29Connecting the DG834G to Your LAN31How to Connect the Router31Auto-Detecting Your Internet Connection Type35Wizard-Detected PPPoE Login Account Setup36Wizard-Detected PPPoA Login Account Setup37Wizard-Detected Dynamic IP Account Setup37Wizard-Detected IP Over ATM Account Setup38Wizard-Detected Fixed IP (Static) Account Setup39Testing Your Internet Connection40Manually Configuring Your Internet Connection40How to Perform Manual Configuration41Internet Connection Requires Login and Uses PPPoE42Internet Connection Requires Login and Uses PPPoA43Internet Connection Does Note Require A Login44ADSL Settings45Chapter 4 Wireless Configuration47Considerations for a Wireless Network47Observe Performance, Placement, and Range Guidelines47Implement Appropriate Wireless Security48Understanding Wireless Settings49How to Set Up and Test Basic Wireless Connectivity53How to Restricting Wireless Access to Your Network54Restricting Access to Your Network by Turning Off Wireless Connectivity55Restricting Wireless Access Based on the Wireless Network Name (SSID)55Restricting Wireless Access Based on the Wireless Station Access List55Choosing WEP Authentication and Security Encryption Methods57Authentication Type Selection57Encryption Choices58How to Configure WEP59How to Configure WPA-PSK60Chapter 5 Protecting Your Network61Protecting Access to Your DG834G Wireless ADSL Firewall Router61How to Change the Built-In Password61Changing the Administrator Login Timeout62Configuring Basic Firewall Services62Blocking Keywords, Sites, and Services63How to Block Keywords and Sites63Firewall Rules65Inbound Rules (Port Forwarding)66Inbound Rule Example: A Local Public Web Server66Inbound Rule Example: Allowing Videoconferencing68Considerations for Inbound Rules68Outbound Rules (Service Blocking)69Outbound Rule Example: Blocking Instant Messenger69Order of Precedence for Rules71Services72How to Define Services72Setting Times and Scheduling Firewall Services73How to Set Your Time Zone73How to Schedule Firewall Services74Chapter 6 Managing Your Network77Backing Up, Restoring, or Erasing Your Settings77How to Back Up the Configuration to a File77How to Restore the Configuration from a File78How to Erase the Configuration78Upgrading the Router’s Firmware78How to Upgrade the Router Firmware79Network Management Information80Viewing Router Status and Usage Statistics80Viewing Attached Devices85Viewing, Selecting, and Saving Logged Information85Selecting What Information to Log87Saving Log Files on a Server88Examples of Log Messages88Activation and Administration88Dropped Packets88Enabling Security Event E-mail Notification89Running Diagnostic Utilities and Rebooting the Router90Enabling Remote Management91Configuring Remote Management91Chapter 7 Advanced Configuration93Configuring Advanced Security93Setting Up A Default DMZ Server93How to Configure a Default DMZ Server94Connect Automatically, as Required95Disable Port Scan and DOS Protection95Respond to Ping on Internet WAN Port95MTU Size95Configuring LAN IP Settings95DHCP97Use Router as DHCP server97Reserved IP addresses98How to Configure LAN TCP/IP Settings99Configuring Dynamic DNS99How to Configure Dynamic DNS100Using Static Routes101Static Route Example101How to Configure Static Routes102Universal Plug and Play (UPnP)104Chapter 8 Virtual Private Networking (Advanced Feature)107Overview of VPN Configuration108Client-to-Gateway VPN Tunnels108Gateway-to-Gateway VPN Tunnels108Planning a VPN109VPN Tunnel Configuration112How to Set Up a Client-to-Gateway VPN Configuration112Step 1: Configuring the Client-to-Gateway VPN Tunnel on the DG834G113Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC118How to Set Up a Gateway-to-Gateway VPN Configuration126VPN Tunnel Control133Activating a VPN Tunnel133Using the VPN Status Page to Activate a VPN Tunnel133Activate the VPN Tunnel by Pinging the Remote Endpoint134Start Using a VPN Tunnel to Active It136Verifying the Status of a VPN Tunnel136Deactivating a VPN Tunnel138Using the Policy Table on the VPN Policies Page to Deactivate a VPN Tunnel138Using the VPN Status Page to Deactivate a VPN Tunnel139Deleting a VPN Tunnel141How to Set Up VPN Tunnels in Special Circumstances141Using Auto Policy to Configure VPN Tunnels142Configuring VPN Network Connection Parameters142Example of Using Auto Policy147Using Manual Policy to Configure VPN Tunnels154Chapter 9 Troubleshooting157Basic Functioning157Power LED Not On158Test LED Never Turns On or Test LED Stays On158LAN or WAN Port LEDs Not On158Troubleshooting the Web Configuration Interface159Troubleshooting the ISP Connection160ADSL link160WAN LED Blinking Yellow160WAN LED Off160Obtaining a WAN IP Address161Troubleshooting PPPoE or PPPoA162Troubleshooting Internet Browsing162Troubleshooting a TCP/IP Network Using the Ping Utility163Testing the LAN Path to Your Router163Testing the Path from Your Computer to a Remote Device164Restoring the Default Configuration and Password165Using the Reset button165Problems with Date and Time165Appendix A Technical Specifications167Appendix B Network and Routing Basics169Related Publications169Basic Router Concepts169What is a Router?169Routing Information Protocol170IP Addresses and the Internet170Netmask172Subnet Addressing172Private IP Addresses175Single IP Address Operation Using NAT175MAC Addresses and Address Resolution Protocol176Related Documents177Domain Name Server177IP Configuration by DHCP177Internet Security and Firewalls178What is a Firewall?178Stateful Packet Inspection178Denial of Service Attack179Ethernet Cabling179Category 5 Cable Quality179Inside Twisted Pair Cables180Uplink Switches, Crossover Cables, and MDI/MDIX Switching181Appendix C Preparing Your Network183Preparing Your Computers for TCP/IP Networking183Configuring Windows 95, 98, and Me for TCP/IP Networking184Installing or Verifying Windows Networking Components184Enabling DHCP to Automatically Configure TCP/IP Settings in Windows 95B, 98, and Me186Selecting the Windows’ Internet Access Method188Verifying TCP/IP Properties188Configuring Windows NT4, 2000 or XP for IP Networking189Installing or Verifying Windows Networking Components189DHCP Configuration of TCP/IP in Windows XP, 2000, or NT4190DHCP Configuration of TCP/IP in Windows XP190DHCP Configuration of TCP/IP in Windows 2000192DHCP Configuration of TCP/IP in Windows NT4195Verifying TCP/IP Properties for Windows XP, 2000, and NT4197Configuring the Macintosh for TCP/IP Networking198MacOS 8.6 or 9.x198MacOS X198Verifying TCP/IP Properties for Macintosh Computers199Verifying the Readiness of Your Internet Account200Are Login Protocols Used?200What Is Your Configuration Information?200Obtaining ISP Configuration Information for Windows Computers201Obtaining ISP Configuration Information for Macintosh Computers202Restarting the Network203Appendix D Wireless Networking Basics205Wireless Networking Overview205Infrastructure Mode205Ad Hoc Mode (Peer-to-Peer Workgroup)206Network Name: Extended Service Set Identification (ESSID)206Authentication and WEP Data Encryption206802.11 Authentication207Open System Authentication207Shared Key Authentication208Overview of WEP Parameters209Key Size210WEP Configuration Options211Wireless Channels211WPA Wireless Security212How Does WPA Compare to WEP?213How Does WPA Compare to IEEE 802.11i?214What are the Key Features of WPA Security?214WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS216WPA Data Encryption Key Management218Is WPA Perfect?220Product Support for WPA220Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged220Changes to Wireless Access Points220Changes to Wireless Network Adapters221Changes to Wireless Client Programs222Appendix E Virtual Private Networking223What is a VPN?223What Is IPSec and How Does It Work?224IPSec Security Features224IPSec Components224Encapsulating Security Payload (ESP)225Authentication Header (AH)226IKE Security Association226Mode227Key Management228Understand the Process Before You Begin228VPN Process Overview229Network Interfaces and Addresses229Interface Addressing229Firewalls230Setting Up a VPN Tunnel Between Gateways230VPNC IKE Security Parameters232VPNC IKE Phase I Parameters232VPNC IKE Phase II Parameters233Testing and Troubleshooting233Additional Reading233Appendix F NETGEAR VPN Configuration235DG834G to FVL328235Configuration Profile235Step-By-Step Configuration236DG834G with FQDN to FVL328240Configuration Profile240The Use of a Fully Qualified Domain Name (FQDN)241Step-By-Step Configuration242Configuration Summary (Telecommuter Example)247Setting Up the Client-to-Gateway VPN Configuration (Telecommuter Example)248Step 1: Configuring the Client-to-Gateway VPN Tunnel on the VPN Router at the Employer’s Main Office248Step 2: Configuring the NETGEAR ProSafe VPN Client on the Remote PC at the Telecommuter’s Home Office250Monitoring the VPN Tunnel (Telecommuter Example)259Viewing the PC Client’s Connection Monitor and Log Viewer259Viewing the VPN Router’s VPN Status and Log Information261Glossary263Size: 7.03 MBPages: 268Language: EnglishOpen manual