Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page1of41 Page ID #:1053 EXHIBIT KE EXHIBIT EE Case 2412-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 20f41 Page ID #:1054 Case3:12-cv-04221-SC Document22 Filed01/30/13 Page1 of 4 1 || Brett L. Gibbs, Esq. (SBN 251000) 38 Miller Avenue, #263 2 || Mill Valley, CA 94941 415-325-5900 blgibbs@wefightpiracy.com Withdrawing Attorney for Plaintiff Paul Duffy (Bar No. 224159) Anti-Piracy Law Group 161 N. Clark St., Suite 3200 Chicago, IL 60601 8 || Phone: (800) 380-0840 E-mail: paduffy@antipiracylawgroup.com 1 Incoming Attorney for Plaintiff ll IN THE UNITED STATES DISTRICT COURT FOR THE 12 NORTHERN DISTRICT OF CALIFORNIA 13 14 || AF HOLDINGS LLC, ) No. 3:12-cv-04221-SC 15 Plaintiff, MOTION FOR WITHDRAWAL AND v. ) SUBSTITUTION OF COUNSEL 7 ANDREW MAGSUMBOL, - Defendant. 18 ) 19 - MOTION FOR WITHDRAWAL AND SUBSTITUTION OF COUNSEL 1 Brett L. Gibbs, counsel for Plaintiff AF Holdings LLC (‘Plaintiff’), hereby moves the Court 22 || pursuant to Eastern District of California Local Rule (“L.R.”) 182(g), for an order permitting him to 23 || withdraw as counsel of record for Plaintiff in this action. Concurrently, attorney Paul Duffy hereby 24 |! moves the Court for permission to be substituted in place of Brett L. Gibbs as attorney for Plaintiff. = As grounds for this Motion: 26 1. Brett L. Gibbs has been counsel for Plaintiff since the commencement of the action. 27 a 2. Brett L. Gibbs wishes to withdraw as counsel for Plaintiff. Case 2412-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 3o0f41 Page ID #:1055 Case3:12-cv-04221-SC Document22 Filed01/30/13 Page2 of 4 1 3. Brett L. Gibbs has provided written notice of his withdrawal to Plaintiff. The client 2 || understands and accepts the withdrawal of Brett L. Gibbs. ? 4. Brett L. Gibbs has provided written notice of his withdrawal to all other parties who have appeared in this case, and there were no objections. 6 5. Paul Duffy is licensed to practice in the Eastern District of California, and requests 7 || that he be designated Counsel of Record on behalf of Plaintiff. 8 6. Brett L. Gibbs, Paul Duffy, and Plaintiff are all in agreement that this withdrawal and 9 || substitution are necessary to allow this case to proceed. 10 WHEREFORE, the Court should grant Brett L. Gibbs’ and Paul Duffy’s Motion for 11 Withdrawal and Substitution of Counsel. 12 DATED: January 30, 2013. 13 14 15 Respectfully Submitted, Respectfully Submitted, 16 17 || By: /s/_ Brett L. Gibbs, Esq. By: /s/ Paul Duffy Brett L. Gibbs, Esq. (SBN 251000) Paul Duffy (Bar No. 224159) 19 38 Miller Avenue, #263 Anti-Piracy Law Group Mill Valley, CA 94941 161 N. Clark St., Suite 3200 0 bleibbs@wefightpiracy.com Chicago, IL 60601 415-325-5900 Phone: (800) 380-0840 1 E-mail: paduffy@antipiracylawgroup.com yy) Withdrawing Attorney for Plaintiff Incoming Attorney for Plaintiff 23 ; ; By: /s/ Brett L. Gibbs, Esq. - Brett L. Gibbs, Esq. 5 In-House Counsel, AF Holdings LLC 26 27 2 28 MOTION FOR WITHDRAWAL AND SUBSTITUTION OF COUNSEL Case 2412-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 4of41 Page ID #:1056 Case3:12-cv-04221-SC Document22 Filed01/30/13 Page3 of 4 IT IS SO ORDERED. 4 || Dated: United States District Judge 3 MOTION FOR WITHDRAWAL AND SUBSTITUTION OF COUNSEL Case 2 2-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 5of41 Page ID #:1057 Case3:12-cv-04221-SC Document22 Filed01/30/13 Page4 of 4 CERTIFICATE OF SERVICE The undersigned hereby certify that on January 30, 2013, all individuals of record who are deemed to have consented to electronic service are being served a true and correct copy of the foregoing document, and all attachments and related documents, using the Court’s ECF system. /s/ Brett L. Gibbs /s/ Paul Duffy Brett L. Gibbs, Esq. Paul Duffy 4 MOTION FOR WITHDRAWAL AND SUBSTITUTION OF COUNSEL Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 6of41 Page ID #:1058 EXHIBIT KF EXHIBIT FF Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 7of41 Page ID #:1059 IN THE CIRC"? COURT OF THE TWENTIETH JUDICIAL CIRCUIT ST. CLAIR COUNTY, ILLINOIS LAW DIVISION GUAVA, LLC, ) ) Petitioner, ) Case No. 12-MR-417 v. ) ) Honorable Judge Andrew J. Gleeson COMCAST CABLE ) COMMUNICATIONS, LLC, ) ) ) ) Respondent. } OPPOSITION TO MOTION TO QUASH An attorney purporting to act on behalf of one “John Doe” (“Movant”) identified only by Internet Protocol (“IP”) address 68.58.68.84 has filed a “Motion to Quash, Motion for Protective Order and Application to Proceed Under Fictitious Name.” The Movant also filed a Motion for of an Order for Rule to Show Cause for various fictitious complaints about Plaintiff and its undersigned counsel, which even if true (they are utterly false) the nonparty Movant could not assert. (The two motions are referred to collectively as “Motion” or “Mot.”) The Motion is festooned with irresponsible, factually baseless and false statements on a number of subjects. The Movant has violated a number of Illinois Supreme Court rules, the Illinois Code of Civil Procedure and other governing laws. Among other things, the Movant --- not a party here --- has chosen to amend the caption so that rather than identifying the Plaintiff, it names a non-party, which has no corporate or other relation to the Plaintiff, as “Lightspeed Media Corporation d/b/a, a/k/a/ Guava, LLC.” Nonparties, of course, are not permitted to unilaterally change case captions and substitute a party for a non-party when filing a discovery motion. Furthermore, the Movant has filed what it purports to be a “Rule 237 Notice to Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 8o0f41 Page ID #:1060 Produce” for the hearing, in which it (again, a nonparty) seeks to compel appearances of “Alan Moay” [sic], counsel for Plaintiff, the owner of nonparty Lightspeed Media Corporation, “all officers, directors, managers and other Guava LLC and Lightspeed personnel responsible for” filing the Petition in this case. A nonparty has no right or standing to compel the appearance of parties or other nonparties at a motion hearing under Rule 237, and the filing is baseless and frivolous. Movant’s counsel has acted vexatiously and wantonly in filing its papers. Despite many requests to “quash” a “subpoena,” there is no subpoena; the Court entered an Order on December 14, 2012 directing Comcast Cable Communications LLC to produce the Movant’s identifying information. And Illinois Supreme Court Rules sharply limit the grounds upon which a nonmovant may object to discovery, which Movant, through its attempts to assert multiple conspiracy theories, has strayed far beyond. Even if it had the right to assert defenses and challenge the sufficiency of the Petition (which as a nonparty, the Petitioner does not), its arguments fail. Petitioner has filed a combined omnibus response to the motions to quash filed in this action. To the extent the Movant here includes in its Motion the same arguments addressed in the omnibus response, Petitioner incorporates its responses by reference as if fully set forth herein. The remainder of Movant’s argument is baseless, frivolous, false and impermissible for a nonparty to make, The Court should deny its Motion to “Quash” and its Motion for Entry of Rule to Show Cause. Moreover, the Court should strike its Rule 237 Notice to Produce, LEGAL STANDARD The Illinois Supreme Court’s Rules “are not aspirational; rather, they have the force of law.” Bright v. Dicke, 166 Ill.2d 204, 210, 652 N.E.2d 275, 277-78 (1995). They expressly Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 9of41 Page ID #:1061 limit the grounds upon which nonparties, such as Movant, may object to a subpoena. The Movant here has recklessly and vexatiously strayed beyond those limitations. Illinois Supreme Court Rule 201 permits a party to “obtain by discovery full disclosure regarding any matter relevant to the subject matter involved in the pending action, whether it relates to the claim or defense... .” Ill. Sup. Ct. R. 201(b)(1). Minois Supreme Court Rule 224 permits a party to identify unknown defendants so it can bring an action against them. John Gaynor v. Burlington Northern and Santa Fe Railway, 750 N.E.2d 307, 312 (Ill. App. Ct. 2001) (“Rule 224’s use is appropriate in situations where a plaintiff has suffered injury but does not know the identity of one from whom recovery may be sought.”); Roth v. St. Elizabeth’s Hospital, 607 N.E.2d 1356, 1361 (Ill. App. Ct. 1993) (“[Rule 224] provides a tool by which a person or entity may, with leave of court, compel limited discovery before filing a lawsuit in an effort to determine the identity of one who may be liable in damages.”) (Quoting 134 Ill. 2d R. 224, Committee Comments, at 188-89)). Once the identities are obtained a separate action is necessary to actually litigate the claims, Roth, 607 at 1360 (“Once the identity of such persons or entities has been ascertained, the purpose of the rule has been accomplished and the action should be dismissed.”). Illinois Supreme Court Rule 201, and the case law interpreting it, clearly establishes the grounds upon which a nonparty may object to a subpoena served upon it. The Movant here has not established that any of those grounds exist, and it does not have standing to make the substantive challenges to the Complaint, and assert defenses to liability, that are available only to the actual parties to a lawsuit. Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 10of41 Page ID #:1062 I. IMPERMISSIBLE RULE 237 “NOTICE TO PRODUCE.” Movant accompanies its Motions with a purported notice pursuant to Illinois Supreme Court Rule 237(b) seeking to compel Plaintiff's officers, directors, managers and others to appear, along with nonparties Lightspeed Media Corporation, Steve Jones and Plaintiff's undersigned counsel. The purported notice fails for several reasons. Rule 237(b) provides: Rule 237. Compelling Appearances of Witnesses at Trial (b) Notice of Parties et ai. at Trial or Other Evidentiary Hearings. The appearance at the trial or other evidentiary hearing of a party or a person who at the time of trial or other evidentiary hearing is an officer, director, or employee of a party may be required by serving the party with a notice designating the person who is required to appear. The notice also may require the production at the trial or other evidentiary hearing of the originals of those documents or tangible things previously produced during discovery. If the party or person is a nonresident of the county, the court may order any terms and conditions in connection with his or her appearance at the trial or other evidentiary hearing that are just, including payment of his or her reasonable expenses. Upon a failure to comply with the notice, the court may enter any order that is just, including any sanction or remedy provided for in Rule 219(c) that may be appropriate. Rule 237 by its own terms is limited to notice “of parties” to “a party or a person ... [who] is an officer, director, or employee of a party...” Movant of course is not a party, and Rule 237 does not provide it any basis to compel anyone to appear at a trial or other evidentiary hearing. Its Rule 237 notice is not a “Notice of Party” and the Court should strike it. Furthermore, the purported notice seeks to compel the attendance of several non-parties: Alan Moay, undersigned counsel and Steve Jones. The notice is defective for that reason as well. Ik. ARGUMENTS RELATING TO VERIFICATION ARE INVALID. Movant also expends considerable time and vitriol taking issue with the verification on the Petition. Movant lacks standing to raise that issue, and in any event, its arguments and invectives relate to a name other than what appears on the Petition. 4 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 11of41 Page ID #:1063 As set forth above, Movant lacks standing to raise sustentative challenges to the Petition because it is not a party. Such challenges fall far beyond what a nonparty may use to challenge a discovery request. Comcast, an actual party here, did not challenge the verification. The Petition upon its face shows that it was verified, and notarized; the Movants have based their claims on the pointless inquiry of whether a name other than that appearing on the Petition is valid. Illinois Supreme Court Rule 224’s only requirement relating to verification is that the petition must be “verified.” R. 224(a)(1)(ii). The Petition is clearly verified. Movant seeks to challenge the verification on the ground that its attorney was unable to identify a person named “Alan Moay” through whatever research he performed or caused to be performed. He need not have bothered because that name does not appear on the Petition. Alan Mony, not “Moay,” | verified the Petition. Furthermore, that was notarized by a notary public. If Movant seeks to challenge the Petition (which as a nonparty he may not), he should focus on the actual person signing and the fact that it was notarized. 1. PETITIONER WILL USE MOVANT’S IDENTIFYING INFORMATION TO PROTECT ITS COMPUTER SYSTEMS. Movant argues that Petitioner is seeking its identifying information solely to coerce Movants into settlements. (Mot. at 3-4.) Movant goes to great length to portray itself as a victim in this matter and is seemingly outraged that Petitioner would seek its identifying information. But in reality, Movant hacked into and tampered with Petitioner’s protected computer systems. Movant put Petitioner’s company and livelihood at risk by its actions. Petitioner simply wishes to identify the individual(s) that participated in these actions and hold them accountable. While Movant understandably does not want to be held accountable for its unlawful actions, its Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 12 of41 Page ID #:1064 groundless and unsupported arguments are not a basis to prevent the release of the identifying information. Petitioner has every intention of litigating its claims against those that hacked into its computer systems, That being said, public policy favors settlement. Wal-Mart Stores, Inc. v. Visa U.S.A. Inc., 396 F.3d 96, 116-17 (2d Cir. 2005); accord Williams v. First Nat'l Bank, 216 U.S. 582, 595 (1910) (““Compromises of disputed claims are favored by the courts.”); TBK Partners, Ltd. v. W. Union Corp., 675 F.2d 456, 461 (2d Cir. 1982) (noting “the paramount policy of encouraging settlements”). For Plaintiff to reach a private resolution of its claims with those who hacked into it computer systems—in lieu of taking a matter to trial—is not abusive, but encouraged. The only choices available to Petitioner are to avail itself of the legal process or to accept the hacking of its systems. Proper use of the legal process cannot plausibly serve as a basis for the relief Movants seek. Movant further argues that its identifying information should not be released because it will be embarrassed if its names are linked to the adult content associated with Petitioner. Movant essentially argues that because Petitioner’s business is associated with adult content, Petitioner should not be allowed to protect its rights through the legal system. Petitioner is, not surprisingly, upset by the prospect of inferior access to the courts by virtue of its participation in the adult industry. Petitioner has a constitutional right of access to the courts. Just because Petitioner may arguably be an unpopular litigant (e.g. an adult content producer) does not mean it should be denied access to the courts. Litigation is inherently embarrassing for everyone involved, including Petitioner, but that does not prevent them being able to seek justice through the courts. Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 13 of41 Page ID #:1065 IV. NOBASIS TO PROCEED ANONYMOUSLY. Movant has failed to show (Mot. at 5) any valid basis to proceed anonymously. Illinois law strongly disfavors the use of fictitious names in judicial proceedings. At common law, suits involving fictitious parties were considered to be void ab initio. Bogseth v. Emanuel, 166 Ill.2d 507, 513, 655 N.E.2d 888 (1995). The reason is that courts only have subject matter jurisdiction over justiciable matters, which are matters in controversy between an actual plaintiff and an actual defendant. Jd. at 514. The use of a fictitious name in Illinois must be explicitly authorized by statute in order for a court to have jurisdiction, and because they are in derogation of the common law, statutes authorizing the use of fictitious names must do so explicitly. Jd. at 507; citing Hailey v. Interstate Machinery Co., 121 Ul. App. 3d 237, 238, 459 N.E.2d 346 (3d Dist. 1984). Illinois law provides that: Designation of Parties — “...( c) A party shall set forth in the body of his or her pleading the names of all parties for and against whom relief is sought thereby ... (e) Upon application and for good cause shown the parties may appear under fictitious names. 735 ILCS 5/2-401. The identification of “the parties to a proceeding is an important dimension of publicness [and] the public has a right to know who is utilizing the courts that its tax dollars support.” .P. v. M.E.E., 354 Ill. App. 3d 989, 1003, 821 N.E.2d 1238 (1* Dist. 2004). In considering whether to allow an entity to proceed anonymously, a court must evaluate whether the person seeking to use a pseudonym has shown a privacy interest that outweighs the public’s interest in judicial proceedings being open to the public. Doe v. Doe, 282 Ill. App. 3d 1078, 1088, 668 N.E.2d 1160 (1* Dist. 1996), In order to proceed anonymously, a person must show that his or her privacy interest is exceptional, and that it involves matters of a highly personal nature, such as matters relating to adoption, sexual orientation or religion. Jd. Furthermore, the use of a fictitious name Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 14 of41 Page ID #:1066 is permissible when necessary to protect the privacy of children, sexual assault victims and other types of particularly vulnerable parties or witnesses. See A.P., 354 Ill. App. 3d at 1003. Movant has failed to meet the high threshold for obtaining permission to proceed anonymously, and has failed to articulate any support in Illinois law suggesting that he has any exceptional privacy interest in not disclosing its identifying information, or that Petitioner is seeking any information of a highly personal nature that would allow it to continue to proceed anonymously. The Court should deny this request. Vv. ARGUMENT REGARDING “SUBPOENA’S VERY INTENT” FAILS. Movant’s final argument in its “Motion to Quash” is that “[t]he subpoena is actually invalid on its face because” it seeks disclosure of information to Petitioner. This argument fails for two reasons. First, there is no subpoena, a fact Movant persistently fails to recognize. As such, his argument is irrelevant. Furthermore, Movant’s citation to a 1979 case for the proposition that documents responsive to a subpoena should be turned over to the Court, which in tum “determines the relevance and materiality of the subpoenaed materials,” ignores the modern practice of law. Courts do not routinely review and respond to subpoenas for the benefit of litigants. This argument fails as well. CONCLUSION For all of the foregoing reasons, Petitioner respectfully requests that the Court deny the Motion, and grant Petitioner any and all further relief that the Court deems to be reasonable and appropriate under the circumstances. Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 15 of 41 Page ID Dated: February 12, 2013 #:1067 Respectfully submitted, GUAVA LLC By: By: Paul A. Duffy, Esq. Prenda Law, Inc. 161 N. Clark Street Suite 3200 Chicago, IL 60601 Telephone: (312) 880-9160 Facsimile: (312) 893-5677 E-mail: paduffy@wefightpiracy.com Attorney for Petitioner C Kevin T. Hoerner, Esq. Becker, Paulson, Hoerner & Thompson, P.C. 5111 West Main Street Belleville, IL 62226 Telephone: (618) 235-0020 Attorney for Petitioner Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 16 of 41 Page ID #:1068 CERTIFICATE OF SERVICE The undersigned hereby certifies that a copy of the foregoing instrument was served upon all counsel of record or movants in this cause via hand delivery and/or by enclosing same in an envelope addressed to such parties as indicated by the pleadings herein, with postage fully prepaid, and by depositing said envelope in a U.S. Post Office mail box in Belleville, Illinois on this 13" day of February, 2013. on, Mt Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page17of41 Page ID #:1069 EXHIBIT GG EXHIBIT GG Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 18 o0f41 PageID #:1070 I, Alan Mooney, bemg duly sworn, depose and state: 1. Tam over the age of eighteen, suffer no legal disabilities, have personal knowledge of the facts set forth below, and am competent to testify. 2. OnNovember 20, 2012, I executed a verification in a case captioned Guava LLC v. Comcast Cable Communications, LLC, which is currently pending m the Circuit Court of the Twentieth Judicial Circuit St. Clar County, Illinois (Case no. 12-mr-417). 3. I have been informed that questions have arisen as to the authenticity of the verification. 1 can attest that the verification is and was authentic and that the statements set forth the the petition continue to be accurate. 4. My company is suffermg severe financial losses due to the criminal activity outlined in the petition and I believe it is my responsibility as a principal of Guava LLC to seek redress m the courts. 5. In order to put to rest the bizarre conspiracy theories raised by certain attorneys regarding my November 20, 2012 verification, ] have taken the extra step of completing this affidavit and having a different notary authenticate my signature. I trust that the step of havj F independent notaries verify my identity will allow my attorneys to proce Ly . company from future harm. FILED — ST. CLAIR COUNTY ee FEB 2 1 2013 STATE OF MINNESOTA SS. Hebd, A Cg IRCUIT CLE COUNTY OF Hennepin The foregoing instrument was acknowledged before me this 15th day of February, 2013. TITLEOR RANK); NOTARIAL STAMP OR SEAL (OR O — Zi A SF al ae SIGNATURE OF NOTARY OR AUTHORIZED OFFICIAL My Commission Expires: ™ ROBERT EDMUND JONES NOTARY PUBLIC - MINNESOTA 9 wy COMMISSION EXPIRES 1/31/2015 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 19of41 Page ID #:1071 EXHIBIT HA EXHIBIT HH Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 20 of 41 Page ID #:1072 ATTORNEYS John Steele Paul Duffy Brett Gibbs 235 Paul Bisnis DICicn Michael Dugas Lutz = “Principal” Gibbs = In House Counsel Dugas’ wife also Counsel Lutz = Paralegal LAW FIRMS Counsel Boy Racer, Inc é& | Bubble Gum Prods., LLC UPR Interriationaley/ CP Productions, Inc. VPR, Inc. (Nevada) First Time Videos, LLC Future Blue, Inc. Hard Drive Prods., Inc Ingenuity 13, LLC (Nevis) Millennium TGA, Inc. 4532 East Villa Theresa Drive, Arte de Oaxaca, LLC Phoenix, AZ (Unknown) Pink Lotus Entertainment a=) COMPUTER “FORENSICS” Sunlust Pictures Openmind Solutions, Inc. Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 21 0f41 Page ID #:1073 EXHIBIT I EXHIBIT II thestgate Rd 1 ED =W-Betterav ia-Rd Image’<: 2013 DigitalGlobe 7G PAORER Eoxate | 3 re ve, Vi 2 n > 4 4 \ ’ x 1 ed js a G ne BI “ \ ios ey ‘Rarer A9—a er wee ~ai eee UI. They Es P } ale 636 S Vandérwel ilpAve- West Covi 91m ' * = | ; a te =i. wn | | Se SE = eee v iN} we, ~ Dr © ade s a: Si S @ x a 2 dil ime pe er L = = ra —. a | EN Ee >. k 8 8 ia | ~ Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 24 o0f41 Page ID #:1076 EXHIBIT JJ EXHIBIT JJ Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 25 o0f41 PageID #:1077 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 NETGEAR NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA M-10153-01 Version 1.0 August 2003 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 26 of 41 Page ID #:1078 © 2003 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR is a trademark of Netgear, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other brand and product names are registered trademarks or trademarks of their respective holders. Statement of Conditions In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: * Reorient or relocate the receiving antenna. * Increase the separation between the equipment and receiver. * — Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. * — Consult the dealer or an experienced radio/TV technician for help. FCC Caution 1. FCC RF Radiation Exposure Statement: The equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This Transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment. M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 27 of 41 Page ID #:1079 Europe - EU Declaration of Conformity This device is a 2.4 GHz low power RF device intended for home and office use in EU and EFTA fr ‘, member states. In some EU / EFTA member states | ] some restrictions may apply. Please contact local } ‘“ A spectrum management authorities for further details before putting this device into operation. Marking by the above symbol indicates compliance with the Essential Requirements of the R&TTE Directive of the European Union (1999/5/EC). This equipment meets the following conformance standards: EN300 328, EN301 489-17, EN60950, EN 60950 1992 2nd Edition (A1-A4, A1l1) Safety of Information Technology Equipment, Including Electrical Business Equipment EN 300 328-1 V1.3.1 (2001-12); EN 300328-2 V1.2.1 (2001-12) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission system; data transmission equipment operating in the 2.4 Ghz ISM band and using spread spectrum modulation techniques; Part 1: Technical characteristics and test conditions; Part 2; Harmonized EN covering essential requirements under article 3.2 of the R&TTE Directive. EN 301 489-1, Aug. 2000; EN 301489-17, Sept. 2000 - Electromagnetic compatibility and radio spectrum matters (ERM); electromagnetic compatibility (EMC); standard for radio equipment and services: Part 1: Common technical requirements; Part 17: Specific conditions for Wideband Data and Hiperlan equipment. EN 55 022 Declaration of Conformance This is to certify that the 108 Mbps Wireless Firewall Router WGT624 is shielded against the generation of radio interference in accordance with the application of Council Directive 89/336/EEC, Article 4a. Conformity is declared by the application of EN 55 022 Class B (CISPR 22). Compliance with the applicable regulations is dependent upon the use of shielded cables. It is the responsibility of the user to procure the appropriate cables. Requirements For Operation in the European Community Countries of Operation and Conditions of Use in the European Community The user should run the configuration utility program provided with this product to check the current channel of operation and confirm that the device is operating in conformance with the spectrum usage rules for European Community countries as described in this section. European standards dictate a maximum radiated transmit power of 100mW EIRP and a frequency range of 2.400 - 2.4835 Ghz. Operation Using 2.4 GHz Channels in France The following radio channel usage limitations apply in France. The radio spectrum regulator in France, Autorité de regulation des telecommunications (ART), enforces the following tules with respect to use of 2.4GHz spectrum in various locations in France. Please check ART's web site for latest M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 28 of 41 Page ID #:1080 requirements for use of the 2.4GHz band in France: http://www.art-telecom.fr/eng/index.htm. When operating in France, this device may be operated under the following conditions: Indoors only, using any channel in the 2.4465-2.4835 GHz band. M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 29 of 41 Page ID #:1081 Bestatigung des Herstellers/Importeurs Es wird hiermit bestatigt, dal} das 108 Mbps Wireless Firewall Router WGT624 gemaf der im BMPT-Amtsbl Vfg 243/ 1991 und Vfg 46/1992 aufgefiihrten Bestimmungen entstért ist. Das vorschriftsmabige Betreiben einiger Gerate (z.B. Testsender) kann jedoch gewissen Beschrankungen unterliegen. Lesen Sie dazu bitte die Anmerkungen in der Betriebsanleitung. Das Bundesamt fiir Zulassungen in der Telekommunikation wurde davon unterrichtet, daB dieses Gerat auf den Markt gebracht wurde und es ist berechtigt, die Serie auf die Erfiillung der Vorschriften hin zu tiberpriifen. Certificate of the Manufacturer/Importer It is hereby certified that the 108 Mbps Wireless Firewall Router WGT624 has been suppressed in accordance with the conditions set out in the BMPT-Amtsbl Vfg 243/1991 and Vfg 46/1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations may, however, be subject to certain restrictions. Please refer to the notes in the operating instructions. Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations. Voluntary Control Council for Interference (VCCI) Statement This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas. When used near a radio or TV receiver, it may become the cause of radio interference. Read instructions for correct handling. Customer Support Refer to the Support Information Card that shipped with your 108 Mbps Wireless Firewall Router WGT624. World Wide Web NETGEAR maintains a World Wide Web home page that you can access at the universal resource locator (URL) http://www.netgear.com. A direct connection to the Internet and a web browser such as Internet Explorer or Netscape are required. M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 30 of 41 Page ID #:1082 Chapter 4 Wireless Configuration This chapter describes how to configure the wireless features of your WGT624 wireless router. In planning your wireless network, you should consider the level of security required. You should also select the physical placement of your firewall in order to maximize the network speed. For further information on wireless networking, refer to in Appendix D, “Wireless Networking Basics. Observe Performance, Placement, and Range Guidelines The operating distance or range of your wireless connection can vary significantly based on the physical placement of the wireless firewall. The latency, data throughput performance, and notebook power consumption of wireless adapters also vary depending on your configuration choices. —>| Note: Failure to follow these guidelines can result in significant performance w= degradation or inability to wirelessly connect to the router. For complete range/ performance specifications, please see Appendix A, “Technical Specifications.” For best results, place your firewall: ¢ Near the center of the area in which your PCs will operate. * In an elevated location such as a high shelf where the wirelessly connected PCs have line-of-sight access (even if through walls). ¢ Away from sources of interference, such as PCs, microwaves, and 2.4 GHz cordless phones. ¢ Away from large metal surfaces. The time it takes to establish a wireless connection can vary depending on both your security settings and placement. WEP connections can take slightly longer to establish. Also, WEP encryption can consume more battery power on a notebook PC. Wireless Configuration 4-1 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 31 0f41 PageID #:1083 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 Implement Appropriate Wireless Security = Note: Indoors, computers can connect over 802.11b/g wireless networks at =) ranges of up to 500 feet. Such distances can allow for others outside of your immediate area to access your network. Unlike wired network data, your wireless data transmissions can be received well beyond your walls by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The WGT624 wireless router provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. Wireless Data Security Options _Range: Up to 300 Foot Radius — ne — WGT624 \ Mes —” 1) Open System: Easy but no security 2) MAC Access List: No data security =m] = Servers PC's 3) WEP: Security but some performance impact Figure 4-1: WGT624 wireless data security options There are several ways you can enhance the security of you wireless network. * Restrict Access Based on MAC address. You can restrict access to only trusted PCs o that unknown PCs cannot wirelessly connect to the WGT624. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. ¢ Turn Off the Broadcast of the Wireless Network Name SSID. If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network ‘discovery’ feature of some products such as Windows XP, but the data is still fully exposed to a determined snoop using specialized test equipment like wireless sniffers. ¢ WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper. 4-2 Wireless Configuration M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 32 of 41 Page ID #:1084 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 ¢ Turn Off the Wired LAN. If you disable the wireless LAN, wireless devices cannot communicate with the router at all. You might choose to turn off the wireless the LAN when you are away and the others in the household all use wired connections. Understanding Wireless Settings To configure the Wireless settings of your firewall, click the Wireless link in the main menu of the browser interface. The Wireless Settings menu will appear, as shown below. Wireless Settings Wireless Network Name (SSID}: Earl Region: ‘United States »| Channel: 1 v Mode: v Wireless Access Point Enable Wireless Access Point Allow Broadcast of Name (SSID) Wireless Card Access List Setup Access List Security Encryption (WEP) Authentication Type: Automatic | Encryption Strength: Disable wy Security Encryption (WEP) Key Passphrase: Key 1: © Key 2:© | Key 3:O Key 4: O Figure 4-2: Wireless Settings menu Wireless Configuration 4-3 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 33 of 41 Page ID #:1085 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 The 802.11b and 802.11g wireless networking protocols are configured in exactly the same fashion. Name (SSID). The SSID is also known as the wireless network name. Enter a value of up to 32 alphanumeric characters. In a setting where there is more than one wireless network, different wireless network names provide a means for separating the traffic. Any device you want to participate in a particular wireless network will need to use this SSID for that network. The WGT624 default SSID is: NETGEAR. Region. This field identifies the region where the WGT624 can be used. It may not be legal to operate the wireless features of the wireless router in a region other than one of those identified in this field. Channel. This field determines which operating frequency will be used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby access point. For more information on the wireless channel frequencies please refer to “Wireless Channels” on page D-7. Mode. This field determines which data communications protocol will be used. You can select “g only,” 108 Mbps Turbo g only, or “g and b.” “g only” dedicates the WGT624 to communicating with the higher bandwidth 802.11g wireless devices exclusively. The “g and b” mode provides backward compatibility with the slower 802.11b wireless devices while still enabling 802.11g communications. The 108 Mbps Turbo mode only works with other 802.11g turbo devices that support this turbo mode. Allow Broadcast of Name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. Disabling SSID broadcast nullifies the wireless network ‘discovery’ feature of some products such as Windows XP. Enable Wireless Access Point. If you disable the wireless access point, wireless devices cannot connect to the WGT624. Wireless Card Access List. When the Trusted PCs Only radio button is selected, the WGT624 checks the MAC address of the wireless station and only allows connections to PCs identified on the trusted PCs list. 4-4 Wireless Configuration M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 34 o0f41 PageID #:1086 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 Understanding WEP Authentication and Encryption Restricting wireless access to your network prevents intruders from connecting to your network. However, the wireless data transmissions are still vulnerable to snooping. Using the WEB data encryption settings described below will prevent a determined intruder from eavesdropping on your wireless data communications. Also, if you are using the Internet for such activities as purchases or banking, those Internet sites use another level of highly secure encryption called SSL. You can tell if a web site is using SSL because the web address begins with HTTPS rather than HTTP. Authentication Scheme Selection Security Encryption (WEP) Authentication Type Automatic ¥ Encryption Strength Disable ¥ Figure 4-3: Encryption Strength The WGT6724 lets you select the following wireless authentication schemes. ¢ Automatic. ¢ Open System. ¢ Shared key. Note: The authentication scheme is separate from the data encryption. You can = | choose an authentication scheme which requires a shared key but still leave the data transmissions unencrypted. If you require strong security, use both the Shared Key and WEP encryption settings. Be sure to set your wireless adapter according to the authentication scheme you choose for the WGT6724 wireless router. Please refer to “Authentication and WEP” on page D-3 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. Wireless Configuration 4-5 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 35 of41 Page ID #:1087 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 Encryption Strength Choices Choose the encryption strength from the drop-down list. Please refer to “Overview of WEP Parameters” on page D-5 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. ¢ Disable. No encryption will be applied. This setting is useful for troubleshooting your wireless connection, but leaves your wireless data fully exposed. * 64-bit or 128-bit WEP. When 64-bit or 128-bit is selected, WEP encryption will be applied. If WEP is enabled, you can manually or automatically program the four data encryption keys. These values must be identical on all PCs and access points in your network. There are two methods for creating WEP encryption keys: ¢ Passphrase. Enter a word or group of printable characters in the Passphrase box and click the Generate button. These characters are case sensitive. ¢ Manual. For 64-bit WEP, enter 10 hexadecimal digits (any combination of 0-9, a-f, or A-F). For 128-bit WEP, enter 26 hexadecimal digits (any combination of 0-9, a-f, or A-F). These values are not case sensitive. Default Factory Settings When you first recetve your WGT624, the default factory settings are shown below. You can restore these defaults with the Factory Default Restore button on the rear panel. After you install the WGT624 wireless router, use the procedures below to customize any of the settings to better meet your networking needs. FEATURE DEFAULT FACTORY SETTINGS Wireless Access Point Enabled Wireless Access List (MAC Filtering) All wireless stations allowed SSID broadcast Enabled SSID NETGEAR 11b/g RF Channel 11 Mode gandb Authentication Type Open System WEP Disabled 4-6 Wireless Configuration M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 36 of 41 Page ID #:1088 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 Before You Change the SSID and WEP Settings Before customizing your wireless settings, print this form and record the following information. If your working with an existing wireless network, the person who set up or is responsible for the network will be able to provide this information. Otherwise, you will choose the settings for your wireless network. Either way, record the settings for your wireless network in the spaces below. Network Name (SSID): The Service Set Identification (SSID), called the wireless network name in Windows XP, identifies the wireless network. You may use up to 32 alphanumeric characters. Record your customized SSID on the line below. Name (SSID): Note: The SSID in the wireless router is the SSID you configure in the wireless adapter card. For the access point and wireless nodes to communicate with each other, all must be configured with the same SSID. Authentication. The authentication setting, “Open System” or “Shared Key,” is unrelated to encryption of transmissions. The two bands can use different authentication settings. Choose “Shared Key” for more security, circle one: Open System or Shared Key Note: If you select shared key, the other devices in the network will not connect unless they are set to Shared Key as well. WEP Encryption Strength. Choose the key size. Circle one: 64 or 128 bits. WEP Encryption Keys. The WGT624 provides two methods for creating WEP encryption keys: — Passphrase. Enter a word or group of printable characters. These characters are case sensitive. When you enter the Passphrase and click the Generate button on the WGT624, the keys will be generated. — Manual. For 64-bit WEP, enter 10 hexadecimal digits (any combination of 0-9 or a-f). These values are not case sensitive. For 128-bit WEP, enter 26 hexadecimal digits. Whichever method you use, record the key values in the spaces below. Key |: Key 2: Key 3: Key 4: Use the procedures described in the following sections to configure the WGT624. Store this information in a safe place. Wireless Configuration 4-7 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 37 of 41 Page ID #:1089 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 How to Set Up and Test Basic Wireless Connectivity Follow the instructions below to set up and test basic wireless connectivity. Once you have established basic wireless connectivity, you can enable security settings appropriate to your needs. 1. Log into the WGT624 firewall at its default LAN address of http://192.168.0.1 with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. 2. Click the Wireless Settings link in the main menu of the WGT624 firewall. Wireless Settings Wireless Network Name (SSID): Earl Region: United States Channel: 11 Figure 4-4: Wireless Settings menu 3. Choose a suitable descriptive name for the wireless network name (SSID). In the SSID box, enter a value of up to 32 alphanumeric characters. The default SSID is NETGEAR. Note: The SSID of any wireless access adapters must match the SSID you configure in the 108 Mbps Wireless Firewall Router WGT624. If they do not match, you will not get a wireless connection to the WGT624. 4. Set the Region. Select the region in which the wireless interface will operate. 5. Set the Channel. The default channel is 11. This field determines which operating frequency will be used. It should not be necessary to change the wireless channel unless you notice interference problems with another nearby wireless router or access point. Select a channel that is not being used by any other wireless networks within several hundred feet of your firewall. For more information on the wireless channel frequencies please refer to “Wireless Channels” on page D-7. 6. For initial configuration and test, leave the Wireless Card Access List set to “Everyone” and the Encryption Strength set to “Disabled.” 7. Click Apply to save your changes. 4-8 Wireless Configuration M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 38 of 41 Page ID #:1090 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 Note: If you are configuring the firewall from a wireless PC and you change the firewall’s SSID, channel, or security settings, you will lose your wireless connection when you click on Apply. You must then change the wireless settings of your PC to match the firewall’s new settings. 8. Configure and test your PCs for wireless connectivity. Program the wireless adapter of your PCs to have the same SSID and channel that you configured in the router. Check that they have a wireless link and are able to obtain an IP address by DHCP from the firewall. Once your PCs have basic wireless connectivity to the firewall, then you can configure the advanced wireless security functions of the firewall. How to Restrict Wireless Access by MAC Address To restrict access based on MAC addresses, follow these steps: 1. Log into the WGT624 firewall at its default LAN address of http://192.168.0.1 with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. Note: When configuring the firewall from a wireless PC whose MAC address is not in ma | the Trusted PC list, if you select Turn Access Control On, you will lose your wireless connection when you click on Apply. You must then access the wireless router from a wired PC or from a wireless PC which is on the access control list to make any further changes. 2. Click the Wireless Settings link in the main menu of the WGT624 firewall. Wireless Configuration 4-9 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 39 of 41 Page ID #:1091 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 cP From the Wireless Settings menu, click the Setup Access List button to display the Wireless Access menu shown below. Wireless Card Access List [ Setup Access List | Wireless Card Access List Turn Access Control On i-| Wireless Card Access Setup Available Wireless Cards # Device Name MAC Address ® 1 alsallette-xp2 00:30:ab:11:ed:84 Wireless Card Entry Device Name: alsallette-xp2 MAC Address: 00:30:ab:11:ed:84 Figure 4-5: Wireless Card Access List Setup 8. Click Add to add a wireless device to the wireless access control list. The Available Wireless Cards list displays. Click the Turn Access Control On check box. Then, either select from the list of available wireless cards the WGT624 has found in your area, or enter the MAC address and device name for a device you plan to use. You can usually find the MAC address printed on the wireless adapter. Note: You can copy and paste the MAC addresses from the firewall’s Attached Devices menu into the MAC Address box of this menu. To do this, configure each wireless PC to obtain a wireless link to the firewall. The PC should then appear in the Attached Devices menu. Click Add to add this wireless device to the Wireless Card Access List. The screen changes back to the list screen. Repeat these steps for each additional device you wish to add to the list. Be sure to click Apply to save your wireless access control list settings. Now, only devices on this list will be allowed to wirelessly connect to the WGT624. 4-10 Wireless Configuration M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 40 of 41 Page ID #:1092 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 How to Configure WEP To configure WEP data encryption, follow these steps: —>| Note: If you use a wireless PC configure WEP settings, you will be disconnected when you click on Apply. You must then either configure your wireless adapter to match the wireless router WEP settings or access the wireless router from a wired PC to make any further changes. Log in to the WGT624 firewall at its default LAN address of http://192.168.0.1 with its default user name of admin and default password of password, or using whatever LAN address and password you have set up. Click the Wireless Settings link in the main menu of the WGT624 firewall. From the Security Encryption menu drop-down list, select the WEP encryption strength you will use. Security Encryption (WEP) Key Passphrase | Generate | Key! © Key2 © Key3 O Key4 O Figure 4-6. Wireless Settings encryption menu 4, 5. You can manually or automatically program the four data encryption keys. These values must be identical on all PCs and Access Points in your network. ¢ Automatic - Enter a word or group of printable characters in the Passphrase box and click the Generate button. The four key boxes will be automatically populated with key values. ¢ Manual - Enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F) Select which of the four keys will be active. Please refer to “Overview of WEP Parameters” on page D-5 for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. Click Apply to save your settings. Wireless Configuration 4-11 M-10153-01 Case 2:12-cv-08333-ODW-JC Document 59-2 Filed 03/04/13 Page 41 of 41 Page ID #:1093 Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 4-12 Wireless Configuration M-10153-01