background image

31

Chapter 6: Configuring the Dual-Band Wireless A + G Access Point
The Status Tab - Wireless

Dual-Band Wireless A + G Access Point

The Status Tab - Wireless

The 

Wireless

 screen on the Status Tab displays the status of your Wireless-A and/or Wireless-G networks.

Wireless-A Network

MAC Address

. This is the Access Point’s Wireless-A network MAC address.

Mode

. This displays the status of the Access Point’s Wireless-A networking mode.

Turbo Mode

. This displays the status of the Access Point’s Wireless-A networking turbo mode.

Network Name (SSID)

. This displays the wireless network name or SSID of your Wireless-A network.

Channel

. This displays the channel being used on your Wireless-A network.

Security

. The encryption method being used on your Wireless-A network is displayed here.

SSID Broadcast

. This displays the status of the Access Point’s SSID Broadcast feature.

Wireless-G Network

MAC Address

. This is the Access Point’s Wireless-G network MAC address.

Mode

. This displays the status of the Access Point’s Wireless-G networking mode.

Network Name (SSID)

. This displays the wireless network name or SSID of your Wireless-G network.

Channel

. This displays the channel being used on your Wireless-G network.

Security

. The encryption method being used on your Wireless-G network is displayed here.

SSID Broadcast

. This displays the status of the Access Point’s SSID Broadcast feature.

Summary of Contents for WAP55AG - Wireless A+G Access Point

Page 1: ...A Division of Cisco Systems Inc Model No Access Point WAP55AG User Guide WIRELESS Wireless A G Dual Band GHz 5 GHz 2 4802 11g 802 11a Dual Band ...

Page 2: ...when reading this guide In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning a...

Page 3: ...A G Access Point 9 Setup Wizard 9 Chapter 6 Configuring the Dual Band Wireless A G Access Point 17 Overview 17 Navigating the Utility 17 Accessing the Utility 19 The Setup Tab 19 The Wireless Tab 20 The Wireless Tab Basic Wireless Settings 20 The Wireless Tab Wireless Security 22 The Wireless Tab Wireless MAC Filter 24 The Wireless Tab Advanced Wireless Settings 25 The Administration Tab Password ...

Page 4: ... Precautions 36 Security Threats Facing Wireless Networks 36 Appendix C Upgrading Firmware 39 Appendix D Windows Help 40 Appendix E Glossary 41 Appendix F Specifications 45 Appendix G Warranty Information 46 Appendix H Regulatory Information 47 Appendix I Contact Information 49 ...

Page 5: ...igure 5 9 Wireless A Settings 12 Figure 5 10 Wireless A Security WEP 13 Figure 5 11 Wireless A Security PSK 13 Figure 5 12 Wireless G Settings 14 Figure 5 13 Wireless G Security WEP 14 Figure 5 14 Wireless G Security PSK 15 Figure 5 15 Confirm New Settings 15 Figure 5 16 Congratulations 16 Figure 6 1 Automatic Configuration DHCP 19 Figure 6 2 Static IP Address 19 Figure 6 3 Basic Wireless Settings...

Page 6: ...ireless A G Access Point Figure 6 11 Log 28 Figure 6 12 Factory Defaults 29 Figure 6 13 Firmware Upgrade 29 Figure 6 14 Status Local Network 30 Figure 6 15 Status Wireless Network 30 Figure C 1 Upgrade Firmware 39 ...

Page 7: ...which is why the network is called wired PCs equipped with wireless cards and adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wired Local Area Network The Access Point bridges wireless networks of both 802 11g and 802 11b standards and wired networks Use the ins...

Page 8: ...how to use the Web Based Utility to configure the settings on the Access Point and how to install the setup on the Access Point for the Linksys Wireless Guard Chapter 6 Configuring the Dual Band Wireless A G Access Point This chapter explains the use of the Access Point s Web based Utility Appendix A Troubleshooting This appendix describes some frequently asked questions regarding installation and...

Page 9: ...ormation This appendix supplies the Access Point s warranty information Appendix H Regulatory Information This appendix supplies the Access Point s regulatory information Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ...reless PC to a wired network and may double the effective wireless transmission range for two wireless adapter PCs Since an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your netw...

Page 11: ... 802 11b adapters such at the PC Cards for your laptop computers PCI Card for your desktop PC and USB Adapters for when you want to enjoy USB connectivity These wireless products can also communicate with a 802 11g or 802 11b wireless PrintServer When you wish to connect your wired network with your wireless network the Access Point s network port can be used to connect to any of Linksys s switche...

Page 12: ...tory defaults Either press the Reset Button for approximately ten seconds or restore the defaults from the Administration tab in the Access Point s Web Based Utility With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more information about products that work with the Access Point Important Resetting the Access Point wil...

Page 13: ...ghts up when the Access Point is powered on Wireless A WLAN Green When the WLAN LED is blinking the Wireless A network is operating Wireless G WLAN Green When the WLAN LED is blinking the Wireless G network is operating Ethernet Green The Ethernet LED serves two purposes If the LED is continuously lit the Access Point is successfully connected to a device through the Ethernet port If the LED is fl...

Page 14: ...your wired Network 4 Connect the AC Power Adapter to the Access Point s Power port and to an electrical outlet Only use the power adapter supplied with the Access Point Use of a different adapter may result in product damage Now that the hardware installation is complete proceed to Chapter 5 Setting Up the Dual Band Wireless A G Access Point for directions on how to set up the Access Point tcp ip ...

Page 15: ...y by clicking the Start button selecting Run and typing d setup exe where D is your PC s CD ROM drive Click the Click Here to Start button to continue this Setup Wizard Clicking the User Guide button opened this User Guide To exit this Setup Wizard click the Exit button 3 The next screen shows how to start connecting the Access Point Optimally you should perform this setup through a PC on your wir...

Page 16: ...rical outlet Only use the power adapter supplied with the Access Point Use of a different adapter can cause product damage Click the Next button to continue or the Back button to return to a previous screen 6 The Access Point s LEDs should be lit If not re check the connections Click the Next button to continue or Exit to exit the Setup Wizard Figure 5 4 Connect to the Power Figure 5 3 Connect to ...

Page 17: ... more than one displayed select the Access Point by clicking on it and click the Next button to continue the Back button to return to a previous screen or Exit to exit the Setup Wizard 8 You will be asked to sign onto the Access Point you ve selected Enter the Password you ve assigned If none has been assigned enter the default password admin Then click the Enter button This password can be change...

Page 18: ...t which the network broadcasts its wireless signal and select the security Then click the Next button to continue or Back to return to the previous page SSID The SSID is the unique name shared among all points in a wireless network The SSID must be identical for all points in the wireless network It is case sensitive and must not exceed 32 characters which may be any keyboard character Make sure t...

Page 19: ...tters A through F and the numbers 0 through 9 and should be 10 characters in length for 64 bit encryption 26 characters in length for 128 bit encryption or 32 characters for 152 bit encryption PSK Pre Shared Key you have two encryption options TKIP and AES with dynamic encryption keys Select the type of algorithm TKIP or AES Enter a Passphrase of 8 32 characters Then click the Next button to conti...

Page 20: ...ast When wireless clients survey the local area for wireless networks to associate with they will detect the SSID broadcast by the Access Point To broadcast the Access Point s SSID keep the default setting Enabled If you do not want to broadcast the Access Point s SSID then select Disabled Security Two wireless security methods are available WEP Wired Equivalent Privacy and PSK Pre Shared Key whic...

Page 21: ... the Next button to continue or Back to return to the previous page For more information on wireless security refer to Appendix B Wireless Security 14 The Confirm New Settings screen will appear to allow you to check your settings If you want to change a setting click the Back button until you find the correct screen If your settings are correct click the Save button If you want to cancel the inst...

Page 22: ...iguration performed with the Setup Wizard is complete To configure any other Access Points in your network you can run this Setup Wizard again Click the Exit button to exit the Setup Wizard For more advanced configuration you can go to Chapter 6 Configuring the Dual Band Wireless A G Access Point Figure 5 16 Congratulations ...

Page 23: ...twork setup most users only have to use the following screens of the Utility Setup On the Network Setup screen you can configure your basic network settings Wireless on the Basic Wireless screen you can configure the wireless settings Administration Click the Administration tab and then select the Password screen The Access Point s default password is admin To secure the Access Point change the Pa...

Page 24: ... settings In most cases these settings do not need to be changed Administration Password The Password screen allows you to change the Access Point s password Log The Access Point can keep logs of wireless activity Factory Defaults This screen allows you to restore the Access Point s configuration to its factory default settings Firmware Upgrade This screen allows you to upgrade the Access Point s ...

Page 25: ...es a static IP address IP Address This IP address must be unique to your network The default IP address is 192 168 1 246 Leave the default IP address unless you know your network s IP address is different Subnet Mask The Access Point s Subnet Mask must be the same as your Ethernet network Leave the default Subnet Mask unless you know your network s subnet mask is different Default Gateway This IP ...

Page 26: ...ay be any keyboard character Make sure this setting is the same for all points in your wireless network Channel Select the appropriate channel from the list provided to correspond with your network settings All devices in your wireless network must broadcast on the same channel in order to communicate If you want the Router to automatically scan for a clear channel then select Auto DFS SSID Broadc...

Page 27: ...sitive and must not exceed 32 characters which may be any keyboard character Make sure this setting is the same for all points in your wireless network Channel Select the appropriate channel from the list provided to correspond with your network settings between 1 and 11 All points in your wireless network must use the same channel in order to function correctly SSID Broadcast When wireless client...

Page 28: ...ncryption method which is not as secure as Pre Shared Key To use WEP select a Default Transmit Key choose which Key to use and a level of WEP encryption 40 64 bits 128 bits or 152 bits Then either generate a WEP key automatically using the Passphrase or enter the WEP key manually Pre Shared Key Pre Shared Key gives you two encryption methods TKIP and AES with dynamic encryption keys Select the typ...

Page 29: ...DIUS server s IP Address and port number along with a key shared between the Access Point and the server Last enter a Key Renewal Timeout which instructs the Access Point how often it should change the encryption keys Change these settings as described here and click the Save Settings button to apply your changes or Cancel Changes to cancel your changes Help information is shown on the right hand ...

Page 30: ...ess Client List Click the Wireless Client List button to display a list of network users by MAC Address From the To Sort by drop down menu you can sort the table by Client Name Interface IP Address MAC Address or Status If you want to add any of the wireless clients to the Wireless MAC Filter List then click the Save to Wireless Client List checkbox and then click the Save Settings button Click th...

Page 31: ...Quarter Eighth or Min from the drop down menu The default is Full Default Frame Burst Mode Enabling this option should provide your network with greater performance depending on the manufacturer of your wireless products If you are not sure how to use this option keep the default Enabled Default Beacon Interval The default value is 100 The Beacon Interval value indicates the frequency interval of ...

Page 32: ...ecify the Access Point s rate of data transmission configure the Transmission Rate setting Transmission Rate The rate of data transmission should be set depending on the speed of your wireless network You can select from a range of transmission speeds or you can select Auto Default to have the Access Point automatically use the fastest possible data rate and enable the Auto Fallback feature Auto F...

Page 33: ... the Fragmentation Threshold Setting the Fragmentation Threshold too low may result in poor network performance Only minor reduction of the default value is recommended In most cases it should remain at its default value of 2346 RTS Threshold Should you encounter inconsistent data flow only minor reduction of the default value 2347 is recommended If a network packet is smaller than the preset RTS ...

Page 34: ...itional information click More The Administration Tab Log The Access Point can keep logs of wireless activity To disable the Log function keep the default setting Disabled To monitor wireless activity select Enabled Logviewer IP Address For a permanent record of the Access Point s wireless activities Logviewer software must be used This software can be downloaded from the Linksys website www links...

Page 35: ...e Firmware Upgrade Before upgrading the firmware download the Access Point s firmware upgrade file from the Linksys website www linksys com Then extract the file Please select a file to upgrade In the field provided enter the name of the extracted firmware upgrade file or click the Browse button to find this file Start to Upgrade After you have selected the appropriate file click this button and f...

Page 36: ...s Point s current firmware Local Network MAC Address This is the Access Point s Ethernet MAC Address Configuration Type This displays the Access Point s network configuration type AP s IP Address This shows the Access Point s IP Address Subnet Mask This shows the Access Point s Subnet Mask Default Gateway This shows the Access Point s Default Gateway Figure 6 14 Status Local Network Figure 6 15 St...

Page 37: ...D of your Wireless A network Channel This displays the channel being used on your Wireless A network Security The encryption method being used on your Wireless A network is displayed here SSID Broadcast This displays the status of the Access Point s SSID Broadcast feature Wireless G Network MAC Address This is the Access Point s Wireless G network MAC address Mode This displays the status of the A...

Page 38: ...ication s user guide to determine if it supports operation over a network Can I play multiplayer games with other users of the wireless network Yes as long as the game supports multiple players over a LAN local area network Refer to the game s user guide for more information What IEEE 802 11b features are supported The product supports the following IEEE 802 11 functions CSMA CA plus Acknowledge p...

Page 39: ...ackbone As the user moves on the end node s RF transmitter regularly checks the system to determine whether it is in touch with the original Access Point or whether it should seek a new one When a node no longer receives acknowledgment from its original Access Point it undertakes a new search Upon finding a new Access Point it then re registers and the communication process continues What is ISM b...

Page 40: ...software side the WLAN series offers the encryption function WEP to enhance security and access control Users can set it up depending upon their needs Can Linksys Wireless products support file and printer sharing Linksys Wireless products perform the same function as LAN products Therefore Linksys Wireless products can work with Netware Windows NT 2000 or other LAN operating systems to support pr...

Page 41: ...sing 802 11a on channels 52 56 60 and 64 than on the lower channels Lastly check the Advanced tab of the Web Based Utility and make sure that FULL is selected in the Transmission Rate field Does the Access Point function as a firewall No The Access Point is only a bridge from wired Ethernet to wireless clients I have excellent signal strength but I cannot see my network WEP is probably enabled on ...

Page 42: ...nce 7 Change the WEP encryption keys periodically To ensure network security steps one through five should be followed at least Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s inform...

Page 43: ... Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can be maximized 1 Use the highest level of encr...

Page 44: ... along with a key shared between the device and the server Last enter a Group Key Renewal period which instructs the device how often it should change the encryption keys RADIUS WEP used in coordination with a RADIUS server This should only be used when a RADIUS server is connected to the Access Point or other device First enter the RADIUS server s IP Address and port number along with a key share...

Page 45: ... firmware download the Access Point s firmware upgrade file from the Linksys website www linksys com Then extract the file 2 In the Please select a file to upgrade field provided enter the name of the extracted firmware upgrade file or click the Browse button to find this file 3 After you have selected the appropriate file click the Start to Upgrade button and follow the on screen instructions Fig...

Page 46: ... or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared reso...

Page 47: ...mission capacity of a given device or network Beacon Interval Data transmitted on your wireless network that keeps the network synchronized Bit A binary digit Browser An application program that provides a way to look at and interact with all the information on the World Wide Web CSMA CA Carrier Sense Multiple Access Collision Avoidance A method of data transfer that is used to prevent data collis...

Page 48: ...ications protocols Hardware The physical aspect of computers telecommunications and other information technology devices IEEE The Institute of Electrical and Electronics Engineers An independent institute that develops networking standards Infrastructure A wireless network that is bridged to a wired network via an access point IP Internet Protocol A protocol used to send data over a network IP Add...

Page 49: ...oring and control protocol Software Instructions for the computer A series of instructions that performs a particular task is called a program SOHO Small Office Home Office Market segment of professionals who work at home or in small offices Spread Spectrum Wideband radio frequency technique used for more reliable and secure data transmission SSID Service Set IDentifier Your wireless network s nam...

Page 50: ...Topology The physical layout of a network Upgrade To replace existing software or firmware with a newer version WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WPA Wi Fi Protected Access a wireless security protocol using TKIP Temporal Key Integrity Protocol encryption which can be used in conjunction with a RADIUS server ...

Page 51: ...tter LEDs Power Ethernet Wireless A WLAN Wireless G WLAN Security features MAC address filtering WEP Encryption WEP key bits 64 128 152 bit Power External 5V DC Dimensions 7 32 x 1 89 x 6 89 L x W x H 186 mm x 48 mm x 175 mm Unit Weight 13 05 oz 0 37 kg Certifications FCC Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage Temp 20ºC to 70ºC 4ºF to 158ºF Operating Humidity 10 to 85 Non Condensing Stor...

Page 52: ...ATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Link...

Page 53: ...r relocate the receiving antenna Increase the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operat...

Page 54: ...tions essentielles et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licenc...

Page 55: ...etworking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization departme...

Reviews: