Linksys WRV200 manual Appendix F Glossary, Http HyperText Transport Protocol

Page 59

Appendix F

Appendix F:

Glossary

This glossary contains some basic networking terms you may come across when using this product.

WEB: For additional terms, please visit the glossary at www.linksys.com/glossary

Access Point  A device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network.

Ad-hoc A group of wireless devices communicating directly with each other (peer-to-peer) without the use of an access point.

AES(AdvancedEncryptionStandard)  Asecuritymethod that uses symmetric 128-bit block data encryption.

Bandwidth  The transmission capacity of a given device or network.

Bit  A binary digit.

Boot  To start a device and cause it to start executing instructions.

Broadband  An always-on, fast Internet connection.

Browser  An application program that provides a way to look at and interact with all the information on the World Wide Web.

Byte  A unit of data that is usually eight bits long

Cable Modem  A device that connects a computer to the cable television network, which in turn connects to the Internet.

Daisy Chain  A method used to connect devices in a series, one after the other.

DDNS (Dynamic Domain Name System)  Allows the hosting of a website, FTP server, or e-mail server with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address.

Default Gateway  A device that forwards Internet traffic from your local area network.

DHCP (Dynamic Host Configuration Protocol)  A networking protocol that allows administrators to assign temporary IP addresses to network computers by“leasing” an IP address to a user for a limited amount of time, instead of assigning permanent IP addresses.

Glossary

DMZ (Demilitarized Zone)  Removes the Router’s firewall protection from one PC, allowing it to be “seen” from the Internet.

DNS (Domain Name Server)  The IP address of your ISP’s server, which translates the names of websites into IP addresses.

Domain  A specific name for a network of computers. Download  To receive a file transmitted over a network.

DSL (Digital Subscriber Line)  An always-on broadband connection over traditional phone lines.

Dynamic IP Address  A temporary IP address assigned by a DHCP server.

EAP (Extensible Authentication Protocol)  A general authentication protocol used to control network access. Many specific authentication methods work within this framework.

Encryption  Encoding data transmitted in a network.

Ethernet  IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium.

Firewall  A set of related programs located at a network gateway server that protects the resources of a network from users from

Firmware  The programming code that runs a networking device.

FTP (File Transfer Protocol)  A protocol used to transfer files over a TCP/IP network.

Full Duplex  The ability of a networking device to receive and transmit data simultaneously.

Gateway  A device that interconnects networks with different, incompatible communications protocols.

Half Duplex  Data transmission that can occur in two directions over a single line, but only one direction at a time.

HTTP (HyperText Transport Protocol)  The

communications protocol used to connect to servers on the World Wide Web.

Infrastructure  A wireless network that is bridged to a wired network via an access point.

IP (Internet Protocol)  A protocol used to send data over a network.

IP Address  The address used to identify a computer or device on a network.

IPCONFIG  A Windows 2000 and XP utility that displays the IP address for a particular networking device.

Wireless-G VPN Router with RangeBooster

54

Image 59
Contents Wireless-G VPN Router with RangeBooster About This Guide About This GuideTable of Contents Appendix B Wireless Security Checklist Appendix a TroubleshootingAppendix J Contact Information Appendix E Gateway-to-Gateway VPN TunnelAppendix I Regulatory Information Introduction ChapterNetwork Layout Chapter Planning Your Wireless NetworkAd-Hoc versus Infrastructure Mode Network TopologyChapter Planning Your Virtual Private Network VPN Why do I need a VPN?What is a VPN? VPN Router to VPN Router Computer using the Linksys VPN client software to VPN RouterBack Panel Chapter Product OverviewProduct Overview Front PanelOverview Chapter Configuring the Wireless-G VPN RouterInternet Setup How to Access the Web-based UtilitySetup Setup Basic SettingsPptp LAN Setup Optional Settings Required by some ISPsTime Settings Setup VlanSetup Ddns Ddns Setup MAC Address CloneStatic Routing Setup Advanced RoutingDynamic Routing Wireless Network Mode WirelessWireless Basic Wireless Settings Wireless Wireless SecurityWPA2 Enterprise WPA2 PersonalWPA Enterprise WPA2 Enterprise Mixed WPA2 Personal MixedWireless Network Access Wireless Wireless Network AccessAdvanced Wireless Settings Wireless Advanced Wireless SettingsWireless WDS Internet Block FirewallFirewall General Firewall Port ForwardingFirewall DMZ Firewall Port TriggeringFirewall URL Filtering Firewall Access RestrictionVPN VPN Client Access Certificate Management VPN VPN PassthroughVPN Client List Table Remote Secure Group VPN IPSec VPNLocal Secure Group Tunnel Options Remote Secure GatewayKey Management VPN VPN Summary Priority Queue QoSQoS Application-Based QoS QoS Port-Based QoSLocal Router Access AdministrationAdministration Management Admin PasswordUPnP Administration LogBackup and Restore Ping Test Administration DiagnosticsAdministration Factory Default Administration Firmware UpgradeInformation Administration RebootStatus Status RouterLocal Network Status WirelessStatus Local Network Status System PerformanceVPN Summary Status VPN ClientsSystem Performance Windows Appendix a TroubleshootingTroubleshooting Appendix aTroubleshooting Need to set up a server behind my Router Go to the Firewall DMZ tab Click Save SettingsClick the Firewall Port Triggering tab Go to the Setup Basic Setup tabWRV200 does not support NetBIOS Broadcast over Frequently Asked QuestionsIs the Router cross-platform compatible? General Network Security Guidelines Appendix B Wireless Security ChecklistWireless Security Checklist Appendix BOverview Before You Begin Installing from the CD-ROMAppendix C Appendix CVersion Number of the QuickVPN Client Using the Linksys QuickVPN Software\Program Files\Linksys\QuickVPN Client\ Select VPN, then VPN Client AccessDistributing Certificates to QuickVPN Users Create an IPSec Policy Appendix DIntroduction EnvironmentFilter List 2 router win Tunnel 1 win-Router Configure Individual Tunnel RulesTunnel 2 Router-win Rules Tab Your tunnel should now be established Assign New IPSec PolicyCreate a Tunnel Through the Web-Based Utility Click IPSec VPN Configuration of the WRV200Appendix E Appendix E Gateway-to-Gateway VPN TunnelClick the Gateway to Gateway tab Configuration of the RV082Configuration of PC 1 and PC RV082 WRV200 Dynamic IP B.B.B.B with Configuration when Both Gateways Use Dynamic IP Addresses RV082 VPN Settings Http HyperText Transport Protocol Appendix FAppendix F Glossary GlossarySmtp Simple Mail Transfer Protocol The standard e GlossaryAppendix F Appendix G Appendix G SpecificationsSpecifications Specifications Exclusions and Limitations Warranty InformationObtaining Warranty Service Appendix HTechnical Support Warranty InformationRegulatory Information AppendixAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix Norsk Norwegian Miljøinformasjon for kunder i EU Appendix Contact Information Appendix J
Related manuals
Manual 2 pages 11.27 Kb