background image

A Division of Cisco Systems, Inc.

®

Model No.

Access Point with

Wireless-

G

WAP54GP

User Guide

WIRELESS

GHz

2.4

802.11g

Power Over Ethernet

Summary of Contents for WAP54GP - Wireless-G Access Point

Page 1: ...A Division of Cisco Systems Inc Model No Access Point with Wireless G WAP54GP User Guide WIRELESS GHz 2 4802 11g Power Over Ethernet ...

Page 2: ...there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage your property or the Access Point word defin...

Page 3: ...ions 9 Chapter 5 Configuring the Wireless G Access Point with Power Over Ethernet 10 Overview 10 Navigating the Utility 10 Accessing the Utility 12 The Setup Tab 12 The Wireless Basic Wireless Settings Tab 14 The Wireless Wireless Security Tab 16 The Wireless Wireless Network Access Tab 20 The Wireless Advanced Wireless Settings Tab 21 The AP Mode Tab 23 The Administration Management Tab 26 The Ad...

Page 4: ...equently Asked Questions 36 Appendix B Wireless Security 40 Security Precautions 40 Security Threats Facing Wireless Networks 40 Appendix C Upgrading Firmware 43 Appendix D Windows Help 44 Appendix E Glossary 45 Appendix F Specifications 52 Appendix G Warranty Information 54 Appendix H Regulatory Information 55 Appendix I Contact Information 61 ...

Page 5: ...WPA Enterprise Screen 17 Figure 5 7 Wireless Security RADIUS Screen 18 Figure 5 8 Wireless Security WEP Screen 19 Figure 5 9 Wireless Wireless Network Access Screen 20 Figure 5 10 Select MAC Address Screen 20 Figure 5 11 Wireless Advanced Wireless Settings Screen 21 Figure 5 12 AP Mode Screen 23 Figure 5 13 Wireless Repeater Diagram 24 Figure 5 14 Site Survey Screen 24 Figure 5 15 Wireless Bridge ...

Page 6: ...eless G Access Point with Power Over Ethernet Figure 5 23 Status Local Network Screen 32 Figure 5 24 Status Wireless Screen 33 Figure 5 25 Status System Performance Screen 34 Figure C 1 Firmware Upgrade 43 ...

Page 7: ...is called wired PCs equipped with wireless cards and adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wired Local Area Network The Access Point bridges wireless networks of both 802 11g and 802 11b standards and wired networks Use the instructions in this Guide t...

Page 8: ...t with Power Over Ethernet This chapter explains how to use the Access Point s Web based Utility for advanced configuration Appendix A Troubleshooting This appendix describes some frequently asked questions regarding installation and use of the Access Point Appendix B Wireless Security This appendix explains the risks of wireless networking and some solutions to reduce the risks Appendix C Upgradi...

Page 9: ...duction What s in this User Guide Wireless G Access Point with Power Over Ethernet Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ...ility of a wireless PC to a wired network and may double the effective wireless transmission range for two wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC wit...

Page 11: ... to enjoy USB connectivity These wireless products can also communicate with a 802 11g or 802 11b Wireless PrintServer To link your wired network with your wireless network connect the Access Point s Ethernet network port to any switch or router If you want to use Power Over Ethernet POE then connect the Access Point to any switch or router that complies with the POE standard 802 3af or you can us...

Page 12: ...ights up when the Access Point is powered on Ethernet Green The Ethernet LED lights up when the Access Point is successfully connected to a device through the Ethernet network port If the LED is flashing the Access Point is actively sending to or receiving data from one of the devices over the Ethernet network port Wireless G Green The Wireless G LED lights up when the Access Point is successfully...

Page 13: ... factory defaults Either press the Reset button for approximately ten seconds or restore the defaults using the Access Point s Web based Utility Power Port The Power port connects to the Access Point s power adapter This port will not be used if you are using Power Over Ethernet Figure 3 2 Back Panel port the connection point on a computer or networking device used for plugging in cables or adapte...

Page 14: ... proceed to the following section Placement Options If you are not using POE then connect the included power adapter to the Access Point s Power port Then plug the power adapter into an electrical outlet The LEDs on the front panel will light up as soon as the Access Point s powers on Proceed to the following section Placement Options Figure 4 1 Connect the Ethernet Network Cable Figure 4 2 Connec...

Page 15: ... complete proceed to Chapter 5 Configuring the Wireless G Access Point with Power Over Ethernet for directions on how to configure the Access Point Wall Mount Option 1 On one of the Access Point s side panels are four rubber feet Remove four adjacent feet to expose the wall mount slots you want to use The distance between two adjacent slots is 145 mm 5 7 inches 2 Determine where you want to mount ...

Page 16: ...ain tabs Setup Wireless AP Mode Administration and Status Additional screens will be available from most of the main tabs Setup Enter the settings for the Access Point and your Internet connection on this screen Wireless You will use the Wireless tabs to enter a variety of wireless settings for the Access Point Basic Wireless Settings Enter the network mode Virtual Local Area Network VLAN settings...

Page 17: ...ult settings Firmware Upgrade Upgrade the Access Point s firmware on this screen Language Upgrade On this screen change the language of the Access Point s Web based Utility Reboot Use this screen to reboot the Access Point Config Management You can back up the configuration file for the Access Point as well as save the backup configuration file to the Access Point Status You will be able to view s...

Page 18: ... screen that appears is the Setup screen This allows you to change the Access Point s general settings Setup Enter the Host and Device Names for the Access Point Host Name You may assign any Host Name to the Access Point Unique memorable names are helpful especially if you are employing multiple access points on the same network Device Name You may assign any Device Name to the Access Point Unique...

Page 19: ...ateway Enter the IP address of your network s gateway The gateway is the device that enables communication between your computers and the Internet In most cases your router acts as your gateway Primary and Secondary DNS Enter the IP address of your Domain Name System DNS server This information should be provided by your ISP You should enter at least one DNS address Change these settings as descri...

Page 20: ...atures Priority Select Enabled if you want to use the Access Point s capability to assign VLAN priorities Select Disabled if you want to disable the Access Point s capability to assign VLAN priorities Main SSID Enter settings for the Access Point s primary wireless network Virtual SSID1 7 You can enter settings for up to seven virtual wireless networks SSID Name The SSID is the unique name shared ...

Page 21: ...ess Point You may want to enable this function while configuring your network but make sure that you disable it when you are finished With this enabled someone could easily obtain the SSID information with site survey software and gain unauthorized access to your main network Click Enabled to broadcast the main SSID to all wireless devices in range Click Disabled to increase network security and b...

Page 22: ...reless security for the Access Point turn to Appendix B Wireless Security To disable such security select Disable WPA Personal Allow PCs with the same wireless network name SSID to see each other When enabled devices in the same wireless network will be able to access each other so they can transfer files through the network To deny access select Disabled Otherwise keep the default Enabled WPA Alg...

Page 23: ... Algorithms WPA offers you two encryption methods TKIP and AES with dynamic encryption keys Select the type of algorithm you want to use TKIP or AES RADIUS Server Port Enter the port number used by the RADIUS server Shared Secret Enter the Shared Secret key used by the Access Point and RADIUS server Key Renewal Timeout Enter a Key Renewal Timeout period which instructs the Access Point how often i...

Page 24: ...ort number used by the RADIUS server Shared Secret Enter the Shared Secret key used by the Access Point and RADIUS server Default Transmit Key Select a Default Transmit Key choose which Key to use WEP Encryption Select a level of WEP encryption 64 bits 10 hex digits or 128 bits 26 hex digits Passphrase To generate WEP keys using a Passphrase then enter the Passphrase and click the Generate key Key...

Page 25: ...h other so they can transfer files through the network To deny access select Disabled Otherwise keep the default Enabled Default Transmit Key Select a Default Transmit Key choose which Key to use WEP Encryption Select a level of WEP encryption 64 bits 10 hex digits or 128 bits 26 hex digits Passphrase To generate WEP keys using a Passphrase then enter the Passphrase and click the Generate key Key ...

Page 26: ... you want to control Select MAC Address from Networked Computers If you want to select a MAC address from a list click this button The MAC addresses for your computers will be automatically displayed Click the checkboxes of the MAC addresses you want to add to your access list Change these settings as described here and click Apply to apply your changes Click Refresh to retrieve the latest MAC add...

Page 27: ...ansmission Other options are 1 2Mbps for use with older wireless technology and All when you wish to have all rates advertised The Basic Data Rates are not the rates transmitted the rates transmitted can be configured through the TX Rate setting on the Wireless Basic Wireless Settings tab Beacon Interval This value indicates the frequency interval of the beacon A beacon is a packet broadcast by th...

Page 28: ... experience high packet error rates you can increase it again but it will likely decrease overall network performance Only minor modifications of this value are recommended Output Power You can adjust the output power of the Access Point to get the appropriate coverage for your wireless network Select the level you need for your environment If you are not sure which setting to choose then keep the...

Page 29: ...oints devices MAC Address The MAC address of the Access Point is displayed here Access Point The Mode is set to Access Point by default This connects your wireless PCs to a wired network In most cases no change is necessary If you want to let the Access Point s signal be repeated then click the checkbox next to Allow wireless signal to be repeated by a repeater Enter the MAC addresses of the repea...

Page 30: ...ber WAP54GP To configure a Wireless Repeater environment select Wireless Repeater and enter the MAC address of the remote access point in the MAC 1 field If you do not know the access point s MAC address click the Site Survey button Select the access point you want to use and click the Apply button Then click the Close button to return to the AP Mode screen If you do not see the access point you w...

Page 31: ... configure a Wireless Bridge environment select Wireless Bridge and enter the MAC addresses of the wireless bridges access points in the MAC 1 4 fields You will also need to set the remote wireless bridges access points to Wireless Bridge mode Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Click Help for more inf...

Page 32: ...ed Socket Layer to encrypt data transmitted for higher security To secure remote access of the Access Point s Web based Utility select Enabled Otherwise select Disabled SNMP SNMP is a popular network monitoring and management protocol It provides network administrators with the ability to monitor the status of the Access Point and receive notification of any critical events as they occur on the Ac...

Page 33: ...mputer that will receive trap messages or notices sent by the Access Point SNMP Trusted Host You can restrict access to the Access Point s SNMP information by IP address Enter the IP address in the field provided If this field is left blank then access is permitted from any IP address SNMP Trap Destination Enter the IP address of the remote host computer that will receive the trap messages Change ...

Page 34: ...used to capture information about network activity The Access Point supports this protocol and send its activity logs to an external server To enable Syslog select Enabled Otherwise select Disabled Syslog Server IP Address Enter the IP address of the Syslog server In addition to the standard event log the Access Point can send a detailed log to an external Syslog server The Access Point s Syslog c...

Page 35: ...ware Upgrade Tab On this screen you can upgrade the Access Point s firmware Do not upgrade the firmware unless you are experiencing problems with the Access Point or the new firmware has a feature you want to use Firmware Upgrade Before you upgrade the Access Point s firmware write down all of your custom settings After you upgrade its firmware you will have to re enter all of your configuration s...

Page 36: ... On the Language Upgrade screen enter the location of the language upgrade file in the field provided or click the Browse button to find the file 4 Click the Upgrade button and follow the on screen instructions Click Help for more information The Administration Reboot Tab On this screen you can reboot the Access Point Reboot This feature is useful when you need to remotely reboot the Access Point ...

Page 37: ...ement Use this screen to upload or download configuration files for the Access Point Download AP Config To save a backup configuration file on a computer click the Download AP Configuration File button and follow the on screen instructions Upload AP Config To upload a configuration file to the Access Point enter the location of the configuration file in the field provided or click the Browse butto...

Page 38: ...ftware Local MAC Address The MAC address of the Access Point s Local Area Network LAN interface is displayed here System Up Time This is the length of time the Access Point has been running Local Network IP Address This shows the Access Point s IP Address as it appears on your local network Subnet Mask This shows the Access Point s Subnet Mask Default Gateway Displayed here is the IP address of th...

Page 39: ... displayed here Channel The Access Point s Channel setting for wireless broadcast is shown here VLAN Trunk The status of the Access Point s VLAN feature is shown here Priority Setting The VLAN Priority Setting for the main SSID is shown here SSID Encryption Function The wireless security setting for the main SSID is displayed here SSID Priority The VLAN Priority setting for the main SSID is displa...

Page 40: ...is shows the number of packets received Packets Sent This shows the number of packets sent Bytes Received This shows the number of bytes received Bytes Sent This shows the number of bytes sent Error Packets Received This shows the number of error packets received Dropped Packets Received This shows the number of dropped packets received Wireless Name This indicates which wireless network SSID to w...

Page 41: ... bytes received for each wireless network Bytes Sent This shows the number of bytes sent for each wireless network Error Packets Received This shows the number of error packets received for each wireless network Dropped Packets Received This shows the number of dropped packets received for each wireless network To update the status information click the Refresh button Click Help for more informati...

Page 42: ...users of the wireless network Yes as long as the game supports multiple players over a LAN local area network Refer to the game s user guide for more information What is the IEEE 802 11b standard It is one of the IEEE standards for wireless networks The 802 11b standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 ...

Page 43: ...s Point of the dedicated coverage area To achieve true seamless connectivity the wireless LAN must incorporate a number of different functions Each node and Access Point for example must always acknowledge receipt of each message Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networki...

Page 44: ...s frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the ...

Page 45: ... exact range of your wireless network without testing Every obstacle placed between an Access Point and wireless PC will create signal loss Leaded glass metal concrete floors water and walls will inhibit the signal and reduce range Start with your Access Point and your wireless PC in the same room and move it away in small increments to determine the maximum range in your environment You may also ...

Page 46: ...erformance 7 Change the WEP encryption keys periodically To ensure network security steps one through five should be followed at least Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s...

Page 47: ...in MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level o...

Page 48: ...mber along with a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared ...

Page 49: ...firmware upgrade file from the Linksys website www linksys com 2 Extract the firmware upgrade file on your computer 3 Open the Access Point s Web based Utility 4 Click the Administration tab 5 Click the Upgrade Firmware tab 6 On the Firmware Upgrade screen enter the location of the firmware upgrade file in the field provided or click the Browse button to find the file 7 Click the Upgrade button an...

Page 50: ...structions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing s...

Page 51: ...t the use of an access point AES Advanced Encryption Standard A security method that uses symmetric 128 bit block data encryption Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval Data transmitted on your wireless network that keeps the network synchronize...

Page 52: ...rea network DHCP Dynamic Host Configuration Protocol A networking protocol that allows administrators to assign temporary IP addresses to network computers by leasing an IP address to a user for a limited amount of time instead of assigning permanent IP addresses DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the Internet DNS Domain Name Ser...

Page 53: ...otects the resources of a network from users from other networks Firmware The programming code that runs a networking device Fragmentation Breaking a packet into smaller units when transmitting over a network medium that cannot support the original size of the packet FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to...

Page 54: ...ng Sending data to a group of destinations at once NAT Network Address Translation NAT technology translates IP addresses of a local area network to a different IP address for the Internet Network A series of computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on t...

Page 55: ...ication Dial In User Service A protocol that uses an authentication server to control network access RJ 45 Registered Jack 45 An Ethernet connector that holds up to eight wires Roaming The ability to take a wireless device from one access point s range to another without losing the connection Router A networking device that connects multiple networks together RTS Request To Send A networking metho...

Page 56: ...wledgement from the recipient of data sent TCP IP Transmission Control Protocol Internet Protocol A set of instructions PCs use to communicate over a network Telnet A user command and TCP IP protocol used for accessing remote PCs TFTP Trivial File Transfer Protocol A version of the TCP IP FTP protocol that has no directory or password capability Throughput The amount of data moved successfully fro...

Page 57: ...od of encrypting network data transmitted on a wireless network for greater security WINIPCFG A Windows 98 and Me utility that displays the IP address for a particular networking device WLAN Wireless Local Area Network A group of computers and associated devices that communicate with each other wirelessly WPA Wi Fi Protected Access a wireless security protocol using TKIP Temporal Key Integrity Pro...

Page 58: ...er Buttons Reset Cabling Type UTP CAT 5 LEDs Power Ethernet Wireless G Transmit Power 802 11g 14dBm Normal Temp 802 11b 18dBm Normal Temp Security Features WEP WPA RADIUS WEP Key Bits 64 128 Dimensions 1 26 x 7 83 x 6 89 W x H x D 32 mm x 199 mm x 175 mm Unit Weight 1 01 lbs 0 46 kg Power 12V 1A IEEE802 3af Compliant PoE Certifications FCC CE Operating Temp 4º 140º F 20º 60º C Storage Temp 4º 140º...

Page 59: ...53 Appendix F Specifications Wireless G Access Point with Power Over Ethernet Operating Humidity 5 to 95 Non Condensing Storage Humidity 5 to 95 Non Condensing ...

Page 60: ...PRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except ...

Page 61: ...f this equipment does cause harmful interference to radio or television reception which is found by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult...

Page 62: ...oint with Power Over Ethernet Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Conformity with Regard to the EU Directive 1995 5 EC R TTE Directive ...

Page 63: ...s B and Wireless G products the following CE mark notified body number where applicable and class 2 identifier are added to the equipment Check the CE label on the product to find out which notified body was involved during the assessment or or NOTE The full Declaration of Conformity can be found either on the CD or a separate document included with this product If you need any other technical doc...

Page 64: ...f any outdoor wireless link having a range exceeding 300 meters Please check http www bipt be for more details Draadloze verbindingen voor buitengebruik en met een reikwijdte van meer dan 300 meter dienen aangemeld te worden bij het Belgisch Instituut voor postdiensten en telecommunicatie BIPT Zie http www bipt be voor meer gegevens Les liaisons sans fil pour une utilisation en extérieur d une dis...

Page 65: ...uct and installed remotely from the device by using extension cables For these applications Linksys offers an R SMA extension cable AC9SMA and an R TNC extension cable AC9TNC Both of these cables are 9 meters long and have a cable loss attenuation of 5 dB To compensate for the attenuation Linksys also offers higher gain antennas the HGA7S with R SMA connector and HGA7T with R TNC connector These a...

Page 66: ...is running Windows Millennium or 98 then refer to Windows Help for instructions on how to access the advanced settings of a network adapter Wireless Access Points Routers or Other Wireless Products If you have a wireless access point router or other wireless product use its Web based Utility to configure its power output setting refer to the product s documentation for more information Technical D...

Page 67: ...about networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization d...

Reviews: