background image

User’s Guide for the WG602 v3 54 Mbps Wireless Access Point

C-16

Network, Routing, Firewall, and Cabling Basics

202-10060-01, September 2004

Summary of Contents for WG602 V3

Page 1: ...202 10060 01 September 2004 202 10060 01 September 2004 NETGEAR Inc 4500 Great America Parkway Santa Clara CA 95054 USA Phone 1 888 NETGEAR User s Guide for the WG602 v3 54 Mbps Wireless Access Point...

Page 2: ...echnical support by telephone see the support information card for the correct telephone number for your country 2004 by NETGEAR Inc All rights reserved Trademarks NETGEAR is a registered trademark of...

Page 3: ...evision reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate th...

Page 4: ...02 v3 meets all the requirements of the Canadian Interference Causing Equipment Regulations Cet appareil numerique del la classe B respect les exigences du Regalement sur le material broilleur du Cana...

Page 5: ...e Approximation of the Laws of the Member States relating to Electromagnetic Compatibility 89 336 EEC Low voltage Directive 73 23 EEC and the Amendment Directive 93 68 EEC the procedures given in Euro...

Page 6: ...202 10060 01 September 2004 6...

Page 7: ...What s In the Box 2 4 Hardware Description 2 5 WG602 v3 Wireless Access Point Front Panel 2 5 WG602 v3 Wireless Access Point Rear Panel 2 6 Power Socket 2 6 Reset and Restore to Factory Defaults Butt...

Page 8: ...o Reboot or Restore Factory Defaults 4 5 Changing the Administrator Password 4 6 Chapter 5 Advanced Configuration Understanding Advanced Wireless Settings 5 1 Configuring Wireless Distribution System...

Page 9: ...PA Compare to IEEE 802 11i B 10 What are the Key Features of WPA Security B 10 WPA Authentication Enterprise level User Authentication via 802 1x EAP and RADIUS B 12 WPA Data Encryption Key Management...

Page 10: ...etworking C 1 Configuring Windows 98 and Me for TCP IP Networking C 2 Installing or Verifying Windows Networking Components C 2 Enabling DHCP to Automatically Configure TCP IP Settings C 3 DHCP Config...

Page 11: ...Contents vii 202 10060 01 September 2004 L D 6 M D 6 N D 7 P D 8 Q D 9 R D 9 S D 9 T D 10 U D 10 W D 10 Index...

Page 12: ...202 10060 01 September 2004 viii Contents...

Page 13: ...anual uses the following typographical conventions This manual uses the following formats to highlight special messages This manual is written according to these specifications Table 1 Typographical c...

Page 14: ...top to navigate print pages and more The Show in Contents button locates the current topic in the Contents tab The Previous Next buttons display the previous or next topic The PDF button links to a PD...

Page 15: ...link at the top right of any page Click PDF of This Chapter link at the top right of any page in the chapter you want to print A new browser window opens showing the PDF version of the chapter you wer...

Page 16: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 1 4 About This Manual 202 10060 01 September 2004...

Page 17: ...54 Mbps Wireless Access Point WG602 v3 can support a small group of users in a range of several hundred feet Most access points are rated for up to 32 users simultaneously The auto sensing capability...

Page 18: ...tings are unsuitable they are easy to change Hidden Mode The SSID is not broadcast assuring only clients configured with the correct SSID can connect Autosensing Ethernet Connection with Auto Uplink I...

Page 19: ...from other manufacturers see the Wireless Ethernet Compatibility Alliance Web site WECA see http www wi fi net The following NETGEAR products work with the WG602 v3 Access Point WAB501 a b Dual Band...

Page 20: ...the WG602 v3 54 Mbps Wireless Access Point 202 10060 01 this manual Windows TCP IP and Networking Tutorials Animated Install Assistant Soft copy of the 54 Mbps Wireless Access Point WG602 v3 Quick Ins...

Page 21: ...r No power If this LED does not come on with the power adapter and cord correctly installed see Chapter 6 Troubleshooting Power is on Ethernet Ethernet LAN Link Activity Indicator Off Green On Indicat...

Page 22: ...defaults button located between the Ethernet RJ 45 connector and the power socket resets the WG602 v3 when pushed once or restores to the factory default settings when pushed and held for 10 seconds...

Page 23: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point Introduction 2 7 202 10060 01 September 2004...

Page 24: ...less adapters Observing Placement and Range Guidelines The operating distance or range of your wireless connection can vary significantly based on the physical placement of the wireless access point T...

Page 25: ...example use Channels 1 and 6 or 6 and 11 The time it takes to establish a wireless connection can vary depending on both your security settings and placement Default Factory Settings When you first r...

Page 26: ...roadcast over the wireless link is fully exposed Turn Off the Broadcast of the Wireless Network Name SSID If you disable broadcast of the SSID only devices that have the correct SSID can connect This...

Page 27: ...ith computers on the Ethernet network In order for this to work correctly verify that you have met all of the system requirements shown on page 2 3 1 SET UP THE WG602 V3 ACCESS POINT Tip Before mounti...

Page 28: ...a static IP configuration If WG602 v3 has already been installed or it is connected to a network where there as a DHCP server as commonly found in home routers you can the NetBIOS login described in...

Page 29: ...ses you will need to change this setting d Connect the power adapter to the wireless access point and plug the power adapter in to a power outlet The power LAN and wireless lights and should light up...

Page 30: ...age 3 9 or the procedure described in Set up the WG602 v3 Access Point on page 3 4 which uses a static IP configuration Note The computer you are using to connect to the WG602 v3 should be configured...

Page 31: ...display the WG602 v3 settings home page When the wireless access point is connected to the Internet click the Knowledge Base or the Documentation link under the Web Support menu to view support inform...

Page 32: ...and last 6 digits of the access point s MAC address on the label on the bottom of the unit It is formatted like NETGEAR123456 with no spaces or delimiters Note If the computer you are using to connect...

Page 33: ...our changes The IP Address Source The wireless access point is shipped preconfigured to use a private IP address on the LAN side and to act as a DHCP client If the wireless access point does not find...

Page 34: ...ere there is more than one wireless network different wireless network names provide a means for separating the traffic Any device you want to participate in a particular wireless network needs to use...

Page 35: ...da 11 channels are available If using multiple access points it is better if adjacent access points use different channels to reduce interference The recommended channel spacing between adjacent acces...

Page 36: ...e Encryption Strength 64 or 128 bit data encryption Manually enter the key values or enter a word or group of printable characters in the Passphrase box Manually entered keys are case sensitive but pa...

Page 37: ...as well and are configured with the correct key WEP Encryption key size Choose one 64 bit or 128 bit Again the encryption key size must be the same for the wireless adapters and the wireless access p...

Page 38: ...thentication Type is set to Any by default Change the Authentication Type to Shared Key to use WEP data encryption 3 For the Encryption Strength select 64 or 128 bit encryption 4 You can manually or a...

Page 39: ...on standard 5 Click Apply to save your settings How to Configure WPA PSK Wireless Security Note Not all wireless adapters support WPA Furthermore client software is also required Windows XP and Window...

Page 40: ...in menu click Access Control to display the Wireless Access page shown below 2 Select the type of Access Control Note If you use a wireless PC to configure WPA settings you will be disconnected when y...

Page 41: ...into the MAC Address box To do this configure each wireless PC to obtain a wireless link to the WG602 v3 The PC should then appear in the Station List page 4 Click Add to add the wireless device to t...

Page 42: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 3 19 Basic Installation and Configuration 202 10060 01 September 2004...

Page 43: ...can be found under the Management heading in the main menu of the browser interface Viewing General Information The Information summarizes of the current WG602 v3 configuration settings From the main...

Page 44: ...ters apply to the Local WG602 v3 wireless access point IP Address The IP address of the wireless access point Subnet Mask The subnet mask for the wireless access point Default Gateway The default gate...

Page 45: ...ble data is lost until the wireless access point rediscovers the devices To force the wireless access point to look for associated devices click the Refresh button Note A wireless network can include...

Page 46: ...can be sent using your browser Note The Web browser used to upload new firmware into the WG602 v3 must support HTTP uploads such as Microsoft Internet Explorer 5 0 or above or Netscape Navigator 4 78...

Page 47: ...el on the bottom of the unit for example NETGEAR123456 On the Restore Factory Default Settings screen select Yes then click Apply to restore the factory default settings Using the Reset Button to Rebo...

Page 48: ...Change this password to a more secure password You cannot change the administrator login name From the main menu of the browser interface under the Management heading click Change Password to bring up...

Page 49: ...mechanism the transmitting station sends out the actual packet as soon as it has waited for the silence period With the CSMA CA transmission mechanism the transmitting station sends out an RTS packet...

Page 50: ...works Examples of wireless bridging configurations are Point to point Multi point These features are discussed below How to Configure Wireless Bridge Links To configure wireless bridge links follow th...

Page 51: ...th the MAC address of AP1 and deploy it on LAN Segment 2 Use the same security and channel settings as AP1 If you check the Enable Wireless Client Association checkbox wireless clients will also be ab...

Page 52: ...Point to Point Bridge mode with the Remote MAC Address of AP2 2 Verify the following parameters for all access points Verify that the LAN network configuration the WG602 v3 Access Points are configure...

Page 53: ...AC access control list security is enabled on the APs verify that the MAC access control lists on each AP are complete and accurate 3 Verify connectivity across the LANs If you check the Enable Wirele...

Page 54: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 5 6 Advanced Configuration 202 10060 01 September 2004...

Page 55: ...nnot remember the wireless access point s configuration password Go to Changing the Administrator Password on page 4 6 Troubleshooting If you have trouble setting up your WG602 v3 check the tips below...

Page 56: ...f I cannot configure the wireless access point from a browser Check these items The WG602 v3 is properly installed LAN connections are OK and it is powered on Check that the LAN port LED is amber or g...

Page 57: ...that your PCs TCP IP settings are correct If using a Fixed Static IP Address check the Subnet Mask Default Gateway DNS and IP Addresses If the PCs are configured correctly but still not working ensure...

Page 58: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 6 4 Troubleshooting 202 10060 01 September 2004...

Page 59: ...DSSS for 802 11b and Orthogonal Frequency Division Multiplexing OFDM for 802 11g Wireless Security WEP and WPA PSK Maximum Computers Per Wireless Network Limited by the amount of wireless network traf...

Page 60: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point A 2 Specifications 202 10060 01 September 2004...

Page 61: ...e http www wi fi net an industry standard group promoting interoperability among 802 11 devices The 802 11 standard offers two methods for configuring a wireless network ad hoc and infrastructure Infr...

Page 62: ...an ad hoc wireless network with no access points the Basic Service Set Identification BSSID is used In an infrastructure wireless network that includes an access point the ESSID is used but may still...

Page 63: ...le wireless channels in the United States It is recommended that you start using channel 1 and grow to use channel 6 and 11 when necessary as these three channels do not overlap Table B 1 802 11b Radi...

Page 64: ...es several services that govern how two 802 11 devices communicate The following events must occur before an 802 11 Station can communicate with an Ethernet network through an access point such as the...

Page 65: ...The following steps occur when two devices use Open System Authentication 1 The station sends an authentication request to the access point 2 The access point authenticates the station 3 The station a...

Page 66: ...nge text If the decrypted text matches the original challenge text then the access point and the station share the same WEP Key and the access point authenticates the station 5 The station connects to...

Page 67: ...n configured for 40 bit encryption 802 11 products typically support up to four WEP Keys Each 40 bit WEP Key is expressed as 5 sets of two hexadecimal digits 0 9 and A F For example 12 34 56 78 90 is...

Page 68: ...WEP for Authentication and Encryption A transmitting 802 11 device encrypts the data portion of every packet it sends using a configured WEP Key The receiving 802 11 device decrypts the data using the...

Page 69: ...EAP Support for 802 1x authentication is required in WPA In the 802 11 standard 802 1x authentication was optional For details on EAP specifically refer to IETF s RFC 2284 With 802 11 WEP all access p...

Page 70: ...al Key Integrity Protocol TKIP Michael message integrity code MIC AES Support Support for a Mixture of WPA and WEP Wireless Clients These features are discussed below WPA addresses most of the known W...

Page 71: ...hose stations successfully authenticated The supplicant in the station uses the authentication and cipher suite information contained in the information elements to decide which authentication method...

Page 72: ...he EAP type such as Transport Layer Security EAP TLS or EAP Tunneled Transport Layer Security EAP TTLS defines how the authentication takes place Note For environments with a Remote Authentication Dia...

Page 73: ...be Responses AP to station and Association Requests station to AP also contain WPA information elements 1 Initial 802 1x communications begin with an unauthenticated supplicant i e client device attem...

Page 74: ...cify any EAP type without needing to upgrade an 802 1x compliant access point As a result you can update the EAP authentication type to such devices as token cards Smart Cards Kerberos one time passwo...

Page 75: ...in the encrypted payload and update the encrypted ICV without being detected by the receiver With WPA a method known as Michael specifies a new algorithm that calculates an 8 byte message integrity co...

Page 76: ...TGEAR Inc wireless Wi Fi certified products will support the WPA standard NETGEAR Inc wireless products that had their Wi Fi certification approved before August 2003 will have one year to add WPA so...

Page 77: ...WPA information element and respond with a specific security configuration The WPA two phase authentication Open system then 802 1x EAP or preshared key TKIP Michael AES optional To upgrade your wire...

Page 78: ...mber 2004 Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA authentication and preshared key and the new WPA encryption algorithms TKIP an...

Page 79: ...the Internet can be very expensive Because of this expense Internet access is usually provided by a slower speed wide area network WAN link such as a cable or DSL modem In order to make the best use...

Page 80: ...al points For example the following binary address 11000011 00100010 00001100 00000111 is normally written as 195 34 12 7 The latter version is easier to remember and easier to enter into your compute...

Page 81: ...can have up to 65 354 hosts on a network A Class B address uses a 16 bit network number and a 16 bit node number Class B addresses are in this range 128 1 x x to 191 254 x x Class C Class C addresses...

Page 82: ...Class A B and C addresses are 255 0 0 0 255 255 0 0 and 255 255 255 0 respectively For example the address 192 168 170 237 is a Class C IP address whose network portion is the upper 24 bits When comb...

Page 83: ...tion to extending the number of addresses available subnet addressing provides other benefits Subnet addressing allows a network manager to construct an address scheme for the network by using differe...

Page 84: ...subnets 4 bits the new subnet mask becomes 255 255 255 240 The following table displays several common netmask values in both the dotted decimal and the masklength formats Configure all hosts on a LA...

Page 85: ...r situation do not create an arbitrary IP address always follow the guidelines explained here For more information about address assignment refer to RFC 1597 Address Allocation for Private Internets a...

Page 86: ...RFC 1631 The IP Network Address Translator NAT IP Configuration by DHCP When an IP based local area network is installed each PC must be configured with an IP address If the PCs need to access the In...

Page 87: ...sses a domain name system DNS server maps descriptive names of network resources to IP addresses When a PC accesses a resource by its descriptive name it first contacts a DNS server to obtain the IP a...

Page 88: ...th this IP address responds to the ARP request All other stations discard the request The station with the correct IP address responds with its own MAC address directly to the sending device The recei...

Page 89: ...r the firewall to analyze groups of network connection states Using Stateful Packet Inspection an incoming packet is intercepted at the network layer and then analyzed for state related information as...

Page 90: ...ration Category 5 Only 0 5 inch 1 5 cm of untwist in the wire pair is allowed at any termination point A twisted pair Ethernet network operating at 10 Mbits second 10BASE T will often tolerate low qua...

Page 91: ...device Computers and workstation adapter cards are usually media dependent interface ports called MDI or uplink ports Most repeaters and switch ports are configured as media dependent interfaces with...

Page 92: ...referred to as Media Dependant Interface Crossover MDI X When connecting a PC to a PC or a hub port to another hub port the transmit pair must be exchanged with the receive pair This exchange is done...

Page 93: ...AL Ethernet port will automatically sense whether the Ethernet cable plugged into the port should have a normal connection e g connecting to a PC or an uplink connection e g connecting to a router swi...

Page 94: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point C 16 Network Routing Firewall and Cabling Basics 202 10060 01 September 2004...

Page 95: ...your network must have TCP IP installed and selected as its networking protocol If a Network Interface Card NIC is already installed in your PC then TCP IP is probably already installed as well Most o...

Page 96: ...talling or Verifying Windows Networking Components To install or verify the necessary components for IP networking 1 On the Windows taskbar click the Start button point to Settings and then click Cont...

Page 97: ...Select Client and then click Add c Select Microsoft d Select File and Print Sharing for Microsoft Networks and then click OK 3 Restart your PC for the changes to take effect Enabling DHCP to Automatic...

Page 98: ...er over it and right click your mouse button If the icon is not on the desktop Click Start on the task bar located at the bottom left of the window Choose Settings and then Control Panel Locate the Ne...

Page 99: ...boxes in the LAN Internet Configuration screen and click Next 6 Proceed to the end of the Wizard Verifying TCP IP Properties for Windows 98 or Me After your PC is configured and has rebooted you can c...

Page 100: ...reparation process you may need to install and configure TCP IP on each networked PC Before starting locate your Windows CD you may need to insert it during the TCP IP installation process Installing...

Page 101: ...will walk you through the configuration process for each of these versions of Windows In Windows XP and 2000 systems locate your Network Neighborhood icon Select Control Panel from the Windows XP Sta...

Page 102: ...Connection Status window This box displays the connection status duration speed and activity statistics Administrator logon access rights are needed to use this window Click the Properties button to v...

Page 103: ...the steps below to configure TCP IP with DHCP for Windows 2000 Verify that Obtain an IP address automatically radio button is selected and that the Obtain DNS server address automatically radio button...

Page 104: ...Components checked are used by this connection Client for Microsoft Networks and Internet Protocol TCP IP Click OK With Internet Protocol TCP IP selected click Properties to open the Internet Protocol...

Page 105: ...Start button and then click Run The Run window opens 2 Type cmd and then click OK A command window opens 3 Type ipconfig all Your IP Configuration information will be listed and should match the valu...

Page 106: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point D 12 Preparing Your PCs for Network Access 202 10060 01 September 2004...

Page 107: ...asswords certificates and public key authentication For details on EAP specifically refer to IETF s RFC 2284 802 11a IEEE specification for wireless networking at 54 Mbps operating in unlicensed radio...

Page 108: ...or where services are not required ADSL Short for asymmetric digital subscriber line a technology that allows data to be sent over existing copper telephone lines at data rates of from 1 5 to 9 Mbps w...

Page 109: ...domain name it asks another one and so on until the correct IP address is returned Domain Name A descriptive name for an address or group of addresses on the Internet Domain names are of the form of a...

Page 110: ...ts multiple authentication methods EAP an extension to PPP supports such authentication methods as token cards Kerberos one time passwords certificates public key authentication and smart cards In wir...

Page 111: ...mputer to another on the Internet Each computer known as a host on the Internet has at least one IP address that uniquely identifies it among all other computers on the Internet When you send or recei...

Page 112: ...ted area such as one floor of a building A LAN typically connects multiple personal computers and shared network devices such as storage and printers Although many technologies exist to implement a LA...

Page 113: ...g is referred to as Media Dependant Interface Crossover MDI X MTU The size in bytes of the largest packet that can be sent or received N NAT See Network Address Translation NetBIOS Network Basic Input...

Page 114: ...l PPP A protocol allowing a computer using TCP IP to connect directly to the Internet PPP A protocol allowing a computer using TCP IP to connect directly to the Internet PPPoA PPPoA PPP over ATM is a...

Page 115: ...enter your user name and password before gaining access to a network This information is passed to a RADIUS server which checks that the information is correct and then authorizes access Though not a...

Page 116: ...ich must be reached through a gateway or router T TCP IP The main internetworking protocols used in the Internet The Internet Protocol IP used in conjunction with the Transfer Control Protocol TCP for...

Page 117: ...me for the 802 11b wireless networking standard given by the Wireless Ethernet Compatibility Alliance WECA see http www wi fi net an industry standards group promoting interoperability among 802 11b d...

Page 118: ...User s Guide for the WG602 v3 54 Mbps Wireless Access Point 12 Glossary 202 10060 01 September 2004...

Page 119: ...attack B 11 DHCP B 8 domain name server DNS B 9 DoS attack B 11 E ESSID B 2 Ethernet 2 2 2 3 Ethernet cable B 11 F factory settings restoring 4 5 G General 4 2 I IANA contacting B 2 IETF B 1 Web site...

Page 120: ...g B 7 RIP B 9 router concepts B 1 S Shared Key authentication B 4 SSID 3 11 4 2 B 2 SSID Broadcast 3 11 stateful packet inspection B 11 Station List 4 3 subnet addressing B 4 subnet mask B 5 T TCP IP...

Reviews: