NETGEAR DG834 v3 Network Router User Manual


 
Reference Manual for the ADSL Modem Router DG834 v3
Introduction 2-5
v1.1, October 2006
Virtual Private Networking (VPN)
The DG834 ADSL Modem Router provides a secure encrypted connection between your local
area network (LAN) and remote networks or clients. It includes the following VPN features:
Supports 5 VPN connections.
Supports industry standard VPN protocols
The DG834 ADSL Modem Router supports standard Manual or IKE keying methods,
standard MD5 and SHA-1 authentication methods, and standard DES and 3DES encryption
methods. It is compatible with many other VPN products.
Supports 3DES encryption for maximum security.
VPN Wizard based on VPNC recommended settings.
Auto Sensing and Auto Uplink™ LAN Ethernet Connections
With its internal 4-port 10/100 switch, the DG834 v3 can connect to either a 10 Mbps standard
Ethernet network or a 100 Mbps Fast Ethernet network. The local LAN ports are autosensing and
capable of full-duplex or half-duplex operation.
The modem router incorporates Auto Uplink
TM
technology. Each local Ethernet port will
automatically sense whether the Ethernet cable plugged into the port should have a ‘normal’
connection such as to a computer or an ‘uplink’ connection such as to a switch or hub. That port
will then configure itself to the correct configuration. This feature also eliminates the need to
worry about crossover cables, as Auto Uplink will accommodate either type of cable to make the
right connection.
Content Filtering
With its content filtering feature, the DG834 v3 prevents objectionable content from reaching your
PCs. The modem router allows you to control access to Internet content by screening for keywords
within Web addresses. You can configure the modem router to log and report attempts to access
objectionable Internet sites.
Trend Micro Home Network Security
This service bundle from Trend Micro has three components:
Trend Micro dashboard
This component is free for unlimited use. From the dashboard you can:
Scan your computer and entire network for security vulnerabilities
View individual computer and network-wide security reports