Netgear orporated 06100027 802.11g Prosafe Wireless Access Point User Manual Manual
Netgear Incorporated 802.11g Prosafe Wireless Access Point Manual
Manual
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA BETA December 2005 Technical Support Please register to obtain technical support. Please retain your proof of purchase and warranty information. To register your product, get product support or obtain product information and product documentation, go to http://www.NETGEAR.com. If you do not have access to the World Wide Web, you may register your product by filling out the registration card and mailing it to NETGEAR customer service. You will find technical support information at: http://www.NETGEAR.com/ through the customer service area. If you want to contact technical support by telephone, see the support information card for the correct telephone number for your country. Š 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR is a registered trademark of NETGEAR, INC. Windows is a registered trademark of Microsoft Corporation. Other brand and product names are trademarks or registered trademarks of their respective holders. Information is subject to change without notice. All rights reserved. Statement of Conditions NOTE: In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein. NOTE: Modifications made to the product, unless expressly approved by Netgear, could void the userâs authority to operate the equipment. NETGEAR does not assume any liability that may occur due to such condition. FCC Statement. Declaration of Conformity We Netgear, 4500 Great America Parkway Santa Clara, CA 95054, USA Tel: +1 408 907 8000 declare under our sole responsibility that the product(s) WG302 (Model Designation) 802.11g ProSafe Wireless Access Point (Product Name) complies with Part 15 of FCC Rules. ii v0.1, December 2005 Declaration of Conformity Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. To assure continued compliance, any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. (Example - use only shielded interface cables when connecting to computer or peripheral devices). NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try and correct the interference by one or more of the following measures: ⢠Reorient or locate the receiving antenna. ⢠Increase the separation between the equipment and receiver. ⢠Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. ⢠Consult the dealer or an experienced radio/TV technician for help. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. Placement and Range Guidelines Indoors, computers can connect over 802.11 wireless networks at a maximum range of several hundred feet for 802.11b/ g devices. However, the operating distance or range of your wireless connection can vary significantly, based on the physical placement of the wireless access point. For best results, identify a location for your wireless access point according to these guidelines: ⢠Away from potential sources of interference, such as PCs, large metal surfaces, microwaves, and 2.4 GHz cordless phones. ⢠In an elevated location such as a high shelf that is near the center of the wireless coverage area for all mobile devices. Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the wireless access point. RF Exposure Warning for North America, and Australia Warning! To meet FCC and other national safety guidelines for RF exposure, the antennas for this device (see below) must be installed to ensure a minimum separation distance of 20cm (7.9 in.) from persons. Further, the antennas shall not be colocated with other antenna or radio transmitter. We declare that the product is limited in CH1~CH11 by specified firmware controlled in the USA. iii v0.1, December 2005 Antenna Statement for North America and Australia In addition to its own antenna, the WG302 device has been approved for use with the following detachable antennas and .antenna cables. Approved Antennas Antenna Gain and type Approved Antenna Cable Antenna Cable Length NETGEAR ANT24D18 14 dBi, directional outdoor/indoor NETGEAR ACC-1031401 thru 05 30 m NETGEAR ANT2409 8.5 dBi, omnidirectional outdoor/indoor NETGEAR ACC-1031401 thru 05 10 m NETGEAR ANT24O5 5 dBi, ceiling/wall indoor NETGEAR ACC-1031401 thru 05 NA a. WG302 maximum radiated power in North America and Australia: 19 dBm Ăą cable loss + antenna gain Please go to www.netgear.com/go/wg102_fcc for an updated list of wireless accessories approved to be used with the WAG302 in North America and Australia. Industry Canada Compliance Statement This Class B Digital apparatus meets all the requirements of the Canadian Interference Causing Equipment Regulations ICES 003. Cet appareil numerique de classe B respecte les exigences du reglement du Canada sur le materiel brouilleur NMB-003. The device is certified to the requirements of RSS-210 for 2.4 GHz spread spectrum devices. The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations. For further information, contact your local Industry Canada office. IC statement Operation is subject to the following two conditions: 1) This device may not cause interference and 2) This device must accept any interference, including interference that may cause undesired operation of the device. This device has been designed to operate with an antenna having a maximum gain of 4.59352 dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. iv v0.1, December 2005 viii v0.1, December 2005 Contents Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Chapter 1 About This Manual Audience, Scope, Conventions, and Formats ................................................................1-1 How to Use This Manual ................................................................................................1-2 How to Print this Manual .................................................................................................1-2 Chapter 2 Introduction About the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ........................2-1 Key Features ..................................................................................................................2-2 AutoCellâThe Self-Organizing Wireless Network ...................................................2-4 802.11g Standards-based Wireless Networking ......................................................2-4 Autosensing Ethernet Connections with Auto Uplink ...............................................2-5 Compatible and Related NETGEAR Products .........................................................2-5 System Requirements ....................................................................................................2-6 Whatâs In the Box? .........................................................................................................2-6 Hardware Description .....................................................................................................2-7 Front Panel ...............................................................................................................2-7 Rear Panel ...............................................................................................................2-8 Chapter 3 Basic Installation and Configuration Wireless Equipment Placement and Range Guidelines .................................................3-1 Cabling Requirements ..............................................................................................3-2 Default Factory Settings .................................................................................................3-2 Understanding WG302 Wireless Security Options .........................................................3-3 Installing the WG302 Wireless Access Point ..................................................................3-5 Logging in to the WG302 Using Its Default IP Address ..................................................3-9 ix v0.1, December 2005 Basic IP Settings ..........................................................................................................3-10 Wireless Settings .......................................................................................................... 3-11 Security Profiles ............................................................................................................3-13 Before You Change the SSID and WEP Settings ..................................................3-17 Setting up and Testing Basic Wireless Connectivity .....................................................3-18 Configuring the Radius Server Settings .......................................................................3-19 Configuring Network Authentication .............................................................................3-20 Entering WEP Data Encryption Keys ...........................................................................3-21 Restricting Wireless Access by MAC Address .............................................................3-21 Chapter 4 Management Remote Management .....................................................................................................4-1 Using the Secure Telnet Interface ..................................................................................4-2 How to Use the CLI via the Console Port .................................................................4-2 CLI Commands ........................................................................................................4-3 SNMP Remote Management ..........................................................................................4-3 Viewing the Activity Log ..................................................................................................4-4 Viewing General Information ..........................................................................................4-5 Viewing Statistics ............................................................................................................4-7 Viewing the Available Wireless Station List ....................................................................4-8 Upgrading the Wireless Access Point Firmware ............................................................4-9 Configuration File Management ...................................................................................4-10 Backing up and Restoring the Configuration ..........................................................4-10 Erasing the Configuration ....................................................................................... 4-11 Using the Reset Button to Restore Factory Default Settings ................................. 4-11 Changing the Administrator Password .........................................................................4-12 AutoCell Rogue AP Detection ......................................................................................4-13 AutoCell Rogue Station Detection ................................................................................4-14 Chapter 5 Advanced Configuration Understanding Advanced IP Settings for Wireless Clients .............................................5-1 Configuring Advanced Wireless LAN Settings ...............................................................5-3 AutoCell Overview ....................................................................................................5-3 AutoCell Configuration Options ................................................................................5-5 Auto RF Management ..............................................................................................5-5 v0.1, December 2005 Wi-Fi Multimedia (WMM) Setup ...............................................................................5-6 Hotspot Settings .......................................................................................................5-6 Configuring Wireless LAN Parameters ....................................................................5-7 Wireless Bridging and Repeating ...................................................................................5-8 Point-to-Point Bridge Configuration ........................................................................5-10 Multi-Point Bridge Configuration ............................................................................ 5-11 Repeater with Wireless Client Association .............................................................5-12 Configuring NAT ...........................................................................................................5-14 Configuring QoS Queues .............................................................................................5-14 Setting up Guest Access ..............................................................................................5-15 Chapter 6 Troubleshooting No lights are lit on the access point. ...............................................................................6-1 The Wireless LAN activity light does not light up. ...........................................................6-2 The LAN light is not lit. ....................................................................................................6-2 I cannot access the Internet or the LAN with a wireless capable computer. .................6-2 I cannot connect to the WG302 to configure it. ..............................................................6-3 When I enter a URL or IP address I get a timeout error. ................................................6-3 Using the Reset Button to Restore Factory Default Settings ..........................................6-4 Appendix A Specifications Appendix B Wireless Networking Basics Wireless Networking Overview .......................................................................................8-1 Infrastructure Mode ..................................................................................................8-1 Ad Hoc Mode (Peer-to-Peer Workgroup) .................................................................8-2 Network Name: Extended Service Set Identification (ESSID) .................................8-2 Authentication and WEP Data Encryption ......................................................................8-2 802.11 Authentication ...............................................................................................8-3 Open System Authentication ....................................................................................8-3 Shared Key Authentication .......................................................................................8-4 Overview of WEP Parameters .................................................................................8-5 Key Size ...................................................................................................................8-6 WEP Configuration Options .....................................................................................8-6 Wireless Channels ..........................................................................................................8-7 xi v0.1, December 2005 WPA and WPA2 Wireless Security .................................................................................8-8 How Does WPA Compare to WEP? .........................................................................8-9 How Does WPA Compare to WPA2 (IEEE 802.11i)? ...............................................8-9 What are the Key Features of WPA and WPA2 Security? .......................................8-9 Is WPA/WPA2 Perfect? ..........................................................................................8-15 Product Support for WPA/WPA2 ............................................................................8-15 Appendix C Command Line Reference Configurable CLI and Web UI Settings Comparison ......................................................9-1 Quick View of Commands and How to Get Help ............................................................9-3 Commands and Syntax ............................................................................................9-3 Getting Help on Commands at the CLI ....................................................................9-6 Keyboard Shortcuts and Tab Completion Help ...............................................................9-8 CLI Command Sets ........................................................................................................9-9 xii v0.1, December 2005 Chapter 1 About This Manual This chapter describes the intended audience, scope, conventions, and formats of this manual. Audience, Scope, Conventions, and Formats This reference manual assumes that the reader has basic to intermediate computer and Internet skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial information is provided on the NETGEAR website. This guide uses the following typographical conventions: Table 1-1. Typographical Conventions italics Emphasis, books, CDs, URL names bold User input fixed Screen text, file and server names, extensions, commands, IP addresses This guide uses the following formats to highlight special messages: Note: This format is used to highlight information of importance or special interest. Tip: This format is used to highlight a procedure that will save time or resources. Warning: Ignoring this type of note may result in a malfunction or damage to the equipment. About This Manual 1-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 This manual is written for the WG302 Wireless Access Point according to these specifications: Table 1-2. Manual Scope Product Version NETGEAR ProSafe 802.11g Wireless Access Point WG302 Manual Publication Date December 2005 Note: Product updates are available on the NETGEAR, Inc. Web site at http://kbserver.netgear.com/products/WG302.asp. How to Use This Manual The HTML version of this manual includes the following: ⢠Buttons, at a time and , for browsing forwards or backwards through the manual one page ⢠button that displays the table of contents and an button. Double-click on a link in the table of contents or index to navigate directly to where the topic is described in the manual. ⢠model. ⢠Links to PDF versions of the full manual and individual chapters. button to access the full NETGEAR, Inc. online knowledge base for the product How to Print this Manual To print this manual you can choose one of the following several options, according to your needs. ⢠Printing a Page in the HTML View. Each page in the HTML version of the manual is dedicated to a major topic. Use the Print button on the browser toolbar to print the page contents. ⢠Printing a Chapter. Use the PDF of This Chapter link at the top left of any page. 1-2 About This Manual v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 â Click the PDF of This Chapter link at the top right of any page in the chapter you want to print. The PDF version of the chapter you were viewing opens in a browser window. â Your computer must have the free Adobe Acrobat reader installed in order to view and print PDF files. The Acrobat reader is available on the Adobe Web site at http://www.adobe.com. â Click the print icon in the upper left of the window. Tip: If your printer supports printing two pages on a single sheet of paper, you can save paper and printer ink by selecting this feature. ⢠Printing the Full Manual. Use the Complete PDF Manual link at the top left of any page. â Click the Complete PDF Manual link at the top left of any page in the manual. The PDF version of the complete manual opens in a browser window. â Click the print icon in the upper left of the window. Tip: If your printer supports printing two pages on a single sheet of paper, you can save paper and printer ink by selecting this feature. About This Manual 1-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 1-4 About This Manual v0.1, December 2005 Chapter 2 Introduction This chapter introduces the NETGEAR ProSafe 802.11g Wireless Access Point WG302. Minimal prerequisites for installation are presented in âSystem Requirementsâ on page 2-6. About the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The NETGEAR ProSafe 802.11g Wireless Access Point WG302 is the basic building block of a wireless LAN infrastructure. It provides connectivity between Ethernet wired networks and radio-equipped wireless notebook systems, desktop systems, print servers, and other devices. The WG302 provides wireless connectivity to multiple wireless network devices within a fixed range or area of coverage, interacting with a wireless network interface card (NIC) via an antenna.Typically, an individual in-building access point provides a maximum connectivity area with about a 300 foot radius. The NETGEAR ProSafe 802.11g Wireless Access Point WG302 can support a small group of users in a range of several hundred feet. Most access points are rated between 30-70 users simultaneously. The NETGEAR ProSafe 802.11g Wireless Access Point WG302 acts as a bridge between the wired LAN and wireless clients. Connecting multiple WG302 Wireless Access Points via a wired Ethernet backbone can further lengthen the wireless network coverage. As a mobile computing device moves out of the range of one access point, it moves into the range of another. As a result, wireless clients can freely roam from one access point to another and still maintain seamless connection to the network. The auto-sensing capability of the WG302 Wireless Access Point allows packet transmission at up to 108 Mbps, or at reduced speeds to compensate for distance or electromagnetic interference. Introduction 2-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Key Features The WG302 Wireless Access Point is easy-to-use and provides solid wireless and networking support. Supported Standards and Conventions The following standards and conventions are supported: ⢠Standards Compliant. The Wireless Access Point complies with IEEE 802.11g standards for Wireless LANs. ⢠WEP support. Support for WEP is included. 64-bit, 128-bit, and 152-bit keys are supported. ⢠Full WPA and WPA2 support. WPA and WPA2 enterprise class strong security with RADIUS and certificate authentication as well as dynamic encryption key generation. WPA-PSK and WPA2-PSK pre-shared key authentication without the overhead of RADIUS servers but with all of the strong security of WPA. ⢠Multiple BSSIDs. Support for multiple BSSIDs. When one AP is connected to a wired network and a set of wireless stations it is referred to as a Basic Service Set (BSS). The Basic Service Set Identifier (BSSID) is a 32-character unique identifier attached to the header of packets sent over a WLAN that differentiated one WLAN from another when a mobile device tries to connect to the network. ⢠DHCP Client and Server Support. DHCP provides a dynamic IP address to PCs and other devices upon request. The WG302 can obtain network information from a DHCP server on your network. The AP can also act as a DHCP server and provide network information for wireless clients. ⢠SNMP Support. Support for Simple Network Management Protocol (SNMP) Management Information Base (MIB) management. Key Features The WG302 provides solid functionality, including these features: ⢠Multiple Operating Modes â Wireless Access Point. Operates as a standard 802.11g. â Point-to-Point Bridge. In this mode, the WG302 only communicates with another bridge-mode wireless station. You must enter the MAC address (physical address) of the other bridge-mode wireless station in the field provided. You should use wireless security to protect this communication. 2-2 Introduction v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 â Point-to-Multi-Point Bridge. Select this only if this WG302 is the âMasterâ for a group of bridge-mode wireless stations. The other bridge-mode wireless stations must be set to Point-to-Point Bridge mode, using this WG302's MAC address. They then send all traffic to this âMaster,â rather than communicate directly with each other. You should use wireless security to protect this traffic. â Wireless Repeater. In this half-duplex mode, the WG302 only communicates with another repeater-mode wireless station. You must enter the MAC address of both adjacent repeater-mode wireless stations in the fields provided. You should use wireless security to protect this communication. ⢠AutoCell RF Management. AutoCell provides advanced automated RF management that improves performance and enhances security. ⢠Rogue Access Point Detection. For enhanced security, you can scan the wireless network to detect rogue access points. ⢠Hotspot Settings. You can allow all HTTP (TCP, port 80) requests to be captured and re-directed to the URL you specify. ⢠Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily, using only your Web browser, and can be upgraded remotely. ⢠Access Control. The Access Control MAC address filtering feature can ensure that only trusted wireless stations can use the WG302 to gain access to your LAN. ⢠Security Profiles. When using multiple BSSIDs, you can configure unique security settings (encryption, MAC filtering, etc.) for each BSSID. ⢠Simple Configuration. If the default settings are unsuitable, they are easy to change. ⢠Hidden Mode. The SSID is not broadcast, assuring only clients configured with the correct SSID can connect. ⢠Configuration Backup. Configuration settings can be backed up to a file and restored. ⢠Secure and Economical Operation. Adjustable power output allows more secure or economical operation. ⢠Power over Ethernet. Power can be supplied to the WG302 over the Ethernet port from any 802.3af compliant mid-span or end-span source such as the NETGEAR FSM7326P Managed Power over Ethernet Layer 3 managed switch. ⢠Autosensing Ethernet Connection with Auto Uplink Interface. Connects to 10/100 Mbps IEEE 802.3 Ethernet networks. ⢠LED Indicators. Power, test, LAN speed, LAN activity, and wireless activity are easily identified. Introduction 2-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Virtual APs. A single AP is segregated into multiple individual virtual APs simulating multiple APs in a single system. This segregation allows you to enforce different security mechanisms for different clients on the same AP. Virtual AP also provides better control over broadcast and multicast traffic for increased network performance. ⢠Wireless VLAN Support. Short for virtual LAN, a network of computers that behave as if they are connected to the same network even though they may actually be physically located on different segments of a LAN. VLANs are configured through software rather than hardware, which makes them extremely flexible. VLANs are very useful for user/host management, bandwidth allocation and resource optimization. ⢠World Mode. With world mode enabled, the Access Point provides radio channel settings for client devices that associate with the Access Point. A visitor from Europe using world mode on a client device can associate with an Access Point in North Carolina and automatically switch to the correct channel settings AutoCellâThe Self-Organizing Wireless Network AutoCellTM, an embedded control system for 802.11 WLANs. AutoCell increases available bandwidth and reduces WLAN installation and operating costs significantly. AutoCell is completely automatic: It is a continuous communication system that relies on a lightweight protocol to monitor changes on the wireless domain while keeping overhead very low. Among AutoCell's inherent advantages: ⢠Elimination of manual site surveys and channel maps ⢠Dynamic load balancing ⢠Plug-and-play-implementation ⢠Transparent fault recovery and failover Since AutoCell is completely self-organizing, it holds human intervention to a minimum. That reduces the people costs associated with deployment, management, and maintenanceâmaking 802.11 WLANs practical, efficient, and cost-effective. 802.11g Standards-based Wireless Networking The NETGEAR ProSafe 802.11g Wireless Access Point WG302 provides a bridge between Ethernet wired LANs and 802.11g compatible wireless LAN networks. It provides connectivity between Ethernet wired networks and radio-equipped wireless notebook systems, desktop systems, print servers, and other devices. 2-4 Introduction v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The WG302 also supports the following wireless features: ⢠Distributed coordinated function (CSMA/CA, Back off procedure, ACK procedure, retransmission of unacknowledged frames) ⢠RTS/CTS handshake ⢠Beacon generation ⢠Packet fragmentation and reassembly ⢠Short or long preamble ⢠Roaming among access points on the same subnet Autosensing Ethernet Connections with Auto Uplink The WG302 can connect to a standard Ethernet network. The LAN interface is autosensing and capable of full-duplex or half-duplex operation. The wireless access point uses Auto UplinkTM technology. The Ethernet port automatically senses whether the Ethernet cable plugged into the port should have a ânormalâ connection such as to a computer or an âuplinkâ connection such as to a switch or hub. That port will then configure itself correctly. This feature eliminates any concerns about crossover cables, as Auto Uplink will accommodate either type of cable to make the right connection. Wireless Multimedia (WMM) Support WMM is a subset of the 802.11e standard. WMM allows wireless traffic to have a range of priorities, depending on the kind of data. Time-dependent information, like video or audio, has a higher priority than normal traffic. For WMM to function correctly, Wireless clients must also support WMM. Compatible and Related NETGEAR Products For a list of compatible products from other manufacturers, see the Wireless Ethernet Compatibility Alliance Web site (WECA), see http://www.wi-fi.net). The following NETGEAR products work with the WG302 Wireless Access Point: ⢠WAG511 ProSafe 108 Mbps Dual Band PC Card ⢠WAG311 ProSafe 108 Mbps Dual Band PCI Card ⢠WG311T 802.11g 108 Mbps Wireless PCI Card ⢠WG511T 802.11g 108 Mbps Wireless CardBus Adapter ⢠WG511 802.11g 54 Mbps Wireless CardBus Adapter ⢠WG111 801.11g 54 Mbps Wireless Bridge Introduction 2-5 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 System Requirements Before installing the WG302, make sure you have the following equipment and that your system meets these requirements: ⢠A 10/100 Mbps Local Area Network device such as a hub or switch. ⢠The Category 5 UTP straight through Ethernet cable with RJ-45 connector included in the package, or one like it ⢠A 100-240 V, 50-60 HZ AC power source. ⢠A Web browser for configuration such as Microsoft Internet Explorer 6.0 or above, or Netscape Navigator 4.78 or above. ⢠At least one computer with the TCP/IP protocol installed. ⢠802.11g or 802.11b-compliant devices, such as the NETGEAR WG511 Wireless Adapter. Whatâs In the Box? The product package should contain the following items: ⢠NETGEAR ProSafe 802.11g Wireless Access Point WG302. ⢠Power adapter and cord. ⢠Straight through Category 5 Ethernet cable. ⢠Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302. ⢠Resource CD for the NETGEAR ProSafe 802.11g Wireless Access Point WG302. ⢠Support Registration card. Contact your reseller or customer support in your area if there are any missing or damaged parts. See the Support Information card for the telephone number of customer support in your area. You should keep the Support Information card, along with the original packing materials, and use the packing materials to repack the WG302 if you need to return it for repair. To qualify for product updates and product warranty registrations, we encourage you to register on the NETGEAR Web site at: http://www.NETGEAR.com. 2-6 Introduction v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Hardware Description This section describes the WG302 front and rear hardware functions. Front Panel Figure 2-1 Viewed from left to right, the WG302 has these status LEDs: PWR, TEST, LAN, and 802.11g WLAN. LED Description PWR Power Indicator TEST Off No power. If this LED does not come on with the power adapter and cord correctly installed, see Chapter 6, âTroubleshooting. On Power is on. Self Test Indicator Blink LAN Indicates self test, loading software, or system fault (if continues). Note: This LED may blink for a minute before going off. Ethernet link indicator Off No connection detected on the Ethernet link Amber On 10 Mbps Ethernet link detected Amber Blink Data is being transmitted or received on the 10 Mbps Ethernet link Green On 100 Mbps Fast Ethernet link detected. Green Blink Data is being transmitted or received on the 100 Mbps Ethernet link Introduction 2-7 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 LED Description 802.11g WLAN Wireless LAN Link Activity Indicator (2.4 MHz) Off No wireless link activity. Green Blink Wireless link activity. Rear Panel Figure 2-2 Viewed from left to right, the back of the WG302 provides the following: 1. Left and Right Detachable Antennas.The WG302 provides two detachable antennas. 2. Reset button. This restores the default factory settings. 3. Serial Console Port. Use the male DB-9 serial port for serial DTE connections. 4. RJ-45 Ethernet LAN/POE Port. Use the WG302 Ethernet RJ-45 port to connect to an Ethernet LAN through a device such as a hub, switch, router, or Power Over Ethernet (POE) switch. 5. Power socket. This connects to the WG302 power adapter. 2-8 Introduction v0.1, December 2005 Chapter 3 Basic Installation and Configuration This chapter describes how to set up your NETGEAR ProSafe 802.11g Wireless Access Point WG302 for wireless connectivity to your LAN. This basic configuration enables computers with 802.11b or 802.11g wireless adapters to do such things as connect to the Internet or access printers and files on your LAN.. Note: Indoors, computers can connect over 802.11g wireless networks at ranges of several hundred feet or more. This distance can allow for others outside your area to access your network. It is important to take appropriate steps to secure your network from unauthorized access. The WG302 Wireless Access Point provides highly effective security features which are covered in detail in Appendix B, âWireless Networking Basicsâ. Deploy the security features appropriate to your needs. You need to prepare the following three things before you can establish a connection through your wireless access point: ⢠A location for the WG302 that conforms to the Wireless Equipment Placement and Range Guidelines below. ⢠The wireless access point connected to your LAN through a device such as a hub, switch, router, or Cable/DSL gateway. ⢠One or more computers with properly configured 802.11b or 802.11g wireless adapters. Wireless Equipment Placement and Range Guidelines The range of your wireless connection can vary significantly based on the location of the wireless access point. The latency, data throughput performance, and notebook power consumption of wireless adapters also vary depending on your configuration choices. Note: Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to the WG302. For complete performance specifications, see Appendix A, âSpecifications. Basic Installation and Configuration 3-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 For best results, place your wireless access point: ⢠Near the center of the area in which your PCs operate. ⢠In an elevated location such as a high shelf where the wirelessly connected PCs have line-of-sight access (even if through walls). ⢠Away from sources of interference, such as PCs, microwaves, and 2.4 GHz cordless phones. ⢠Away from large metal surfaces. Putting the antenna in a vertical position provides best side-to-side coverage. Putting the antenna in a horizontal position provides best up-and-down coverage. If you use multiple access points, it is better if adjacent access points use different radio frequency Channels to reduce interference. The recommended Channel spacing between adjacent access points is five Channels (for example, use Channels 1 and 6, or 6 and 11). The time it takes to establish a wireless connection can vary depending on both your security settings and placement. Cabling Requirements The WG302 Wireless Access Point connects to your LAN via twisted-pair Category 5 Ethernet cable with RJ-45 connectors. Default Factory Settings When you first receive your WG302, the default factory settings are set as shown in the following table. You can restore these defaults with the Reset button on the rear panel â see âHardware Descriptionâ on page 2-7. Feature Factory Default Settings User Name (case sensitive) admin Password (case sensitive) password Operating Mode Access Point Access Point Name netgearxxxxxx where xxxxxx are the last six digits of the wireless access point's MAC address Built-in DHCP client DHCP client disabled, it uses the default IP address 3-2 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Feature Factory Default Settings IP Configuration IP Address: 192.168.1.128 Subnet Mask: 255.255.255.0 Gateway: 0.0.0.0 802.11g Network Name (SSID) NETGEAR-0 Broadcast Network Name (SSID) Enabled 802.11g Radio Frequency Channel Managed automatically by AutoCell (default), if AutoCell is disabled, channel 11 is the default Super-G Mode Disabled WEP/WPA Disabled MAC Access Control Disabled AutoCell RF Management AutoCell Enhanced RF Security AutoCell Rogue Device Detection Enabled Disabled Disabled Restricting connectivity based on MAC Access Disabled Control List Time Zone GMT Time Zone Adjust for Daylight Saving TIme Disabled SNMP Disabled VLAN (802.1Q) Disabled Load Balancing Disabled WMM Support Disabled Understanding WG302 Wireless Security Options Your wireless data transmissions can be received well beyond your walls by anyone with a compatible adapter. For this reason, use the security features of your wireless equipment. The WG302 Wireless Access Point provides highly effective security features which are covered in detail in this chapter. Deploy the security features appropriate to your needs. Basic Installation and Configuration 3-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 :LUHOHVV'DWD 6HFXULW\2SWLRQV WG302 5DQJH8SWR)RRW5DGLXV B 072 0RO3AFE 7IRELESS !CCESS 0OINT ,!. -/$%, 7IRELESS ,!. -% .O 3ECURITY %ASY BUT NO SECURITY -!# !CCESS ,IST .O DATA SECURITY 7%0 3ECURITY BUT VULNERABLE 70! OR 70! 03+ 6ERY STRONG SECURITY !UTO#ELL 2& @STEALTH MODE Figure 3-1 There are several ways you can enhance the security of your wireless network: ⢠Restrict Access Based on MAC address. You can restrict access to only trusted PCs so that unknown PCs cannot wirelessly connect to the WG302. MAC address filtering adds an obstacle against unwanted access to your network, but the data broadcast over the wireless link is fully exposed. ⢠Turn Off the Broadcast of the Wireless Network Name (SSID). If you disable broadcast of the SSID, only devices that have the correct SSID can connect. This nullifies the wireless network âdiscoveryâ feature of some products such as Windows XP, but the data is still fully exposed to a determined person using specialized test equipment like wireless sniffers. ⢠Use WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP Shared Key authentication and WEP data encryption will block all but the most determined eavesdropper. ⢠Use IEEE 802.1x. IEEE 802.1x is the standard for passing the Extensible Authentication Protocol (EAP) over an 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). This is a newer, more secure standard than Static WEP. ⢠Use WPA, WPA-PSK, WPA2, or WPA2-PSK. Wi-Fi Protected Access (WPA and WPA2) data encryption provides data security. The very strong authentication along with dynamic per frame rekeying of WPA make it virtually impossible to compromise. Because this is a new standard, wireless device driver and software availability may be limited. 3-4 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Use AutoCell Enhanced RF Security âStealth Mode.â In addition to standard encryption and security mechanisms such as WEP and WPA, the WG302 AutoCell feature provides self-organizing micro cells for an additional level of privacy for enterprises. In this mode, AutoCell shrinks the size of coverage to the minimum to reach clients but also shrinks the size of the beacons that access points use to announce their presence. This mode makes an enterprise wireless LAN nearly invisible to users outside an office building. AutoCell clients such as the NETGEAR WAG511 are highly-recommended for Enhanced RF Security. Installing the WG302 Wireless Access Point Before you install the WG302 Wireless Access Point, make sure that your Ethernet network is up and working. You will be connecting the access point to the Ethernet network. Then computers with 802.11b or 802.11g wireless adapters will be able to communicate with the Ethernet network. In order for this to work correctly, verify that you have met all of the system requirements, shown in âSystem Requirementsâ on page 2-6. 1. Set up the WG302 Wireless Access Point. Tip: Before mounting the WG302 in a high location, first set up and test the WG302 to verify wireless network connectivity. a. Prepare a computer with an Ethernet adapter. If this computer is already part of your network, record its TCP/IP configuration settings. b. Configure the computer with a static IP address of 192.168.0.210 and 255.255.255.0 for the Subnet Mask. c. Connect an Ethernet cable from the WG302 to the computer. d. Turn on your computer, connect the power adapter to the WG302 and verify the following: â The PWR power light goes on. â The LAN light of the wireless access point is lit when connected to a powered on computer. 2. Configure LAN and wireless access. a. Use your Web browser to connect to the WG302. â Enter 192.168.1.128 in the address field of your browser. Basic Installation and Configuration 3-5 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 â When prompted, enter admin for the user name, and password for the password, both in lower case letters. The Web browser displays the WG302 main menu and General page, as shown below. Click to view documentation Click to log out. After five minutes with no activity, you are logged out automatically. Figure 3-2 3-6 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 b. Click the Basic Settings link to view the Basic Settings menu. c. Configure the settings for your network and click Apply. Figure 3-3 d. Click Wireless Settings in the Setup section of the main menu to view the Wireless Settings menu. Figure 3-4 e. Enter the wireless settings. See the online help or âWireless Settingsâ on page 3-11 for full instructions. Note: In the USA, the Region is preset according to regulatory requirements and cannot be changed. In other areas, you can and must set the Region. It may not be legal to operate the wireless access point in a region other than one of those identified in this field. Basic Installation and Configuration 3-7 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Now that you have finished the setup, you are ready to deploy the WG302 in your network. If needed, you can now reconfigure the computer you used for this process back to its original TCP/IP settings. 3. Deploy the WG302 Wireless Access Point a. Disconnect the WG302 and put it where you will deploy it. The best location is elevated, such as wall mounted, or on the top of a cubicle, at the center of your wireless coverage area, and within line of sight of all the mobile devices. b. Lift the antenna on either side to be vertical. Note: Consult the antenna positioning and wireless mode configuration information in the Advanced Configuration chapter of this manual. c. Connect an Ethernet cable from your WG302 Wireless Access Point to a LAN port on your router, switch, or hub. Note: By default, the WG302 is set with the DHCP client disabled. If your network uses dynamic IP addresses, you must change this setting. d. Connect the power adapter to the wireless access point, and plug the power adapter in to a power outlet. The PWR, LAN, and WLAN lights should light up. 4. Verify wireless connectivity Using a computer with an 802.11b or 802.11g wireless adapter with the correct wireless settings needed to connect to the WG302 (SSID, WEP/WPA, MAC ACL, etc.), verify connectivity by using a browser such as Mozilla Firefox, Netscape, or Internet Explorer to browse the Internet, or check for file and printer access on your network. Note: If you are unable to connect, see Chapter 6, âTroubleshooting 3-8 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Logging in to the WG302 Using Its Default IP Address The default IP address of your access point is 192.168.1.128. The WG302 is set, by default, for the DHCP client to be disabled. Note: The computer that you use to connect to the WG302 should be configured with an IP address that starts with 192.168.1.x and a Subnet Mask of 255.255.255.0. 1. Open a Web browser such as Internet Explorer, Netscape Navigator, or Mozilla Firefox. 2. Connect to the WG302 by entering its default address of http://192.168.1.128 into your browser. Figure 3-5 3. A login window like the one shown below opens: Figure 3-6 4. Log in by using the default user name of admin and default password of password. Once you have entered your access point name, the Web browser finds the WG302 Wireless Access Point and displays the main menu as shown in Figure 3-2 on page 3-6. Basic Installation and Configuration 3-9 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Basic IP Settings To configure the basic settings of your wireless access point, click Basic Settings in the Setup section of the WG302 main menu. The Basic Settings menu appears, as shown in Figure 3-7. Figure 3-7 The Basic Settings default values described in the following list work for most users and situations. ⢠Access Point Name. This unique name is the access point NetBIOS name. The default Access Point Name is on the bottom label of the WG302. You can modify the default name with a unique name up to 15 characters long. The default is netgearxxxxxx, where xxxxxxx represents the last six digits of the WG302 MAC address. ⢠DHCP Client: By default, Dynamic Host Configuration Protocol (DHCP) client is disabled. After installation (âInstalling the WG302 Wireless Access Pointâ on page 3-5), you can enable DHCP to let the wireless access point get its TCP/IP configuration from the DHCP server on your network. The wireless access point gets the IP address, subnet mask and the default gateway settings automatically from the DHCP server if DHCP is enabled. ⢠IP Address. The default IP address is 192.168.1.128. To change it, enter an unused IP address from the address range used on your LAN (factory default: 192.168.1.128); or enable DHCP. 3-10 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠IP Subnet Mask. Enter the subnet mask value used on your LAN (factory default: 255.255.255.0). ⢠Default Gateway. Enter the IP address of the Gateway for your LAN. For more complex networks, enter the address of the router for the network segment to which the wireless access point is connected (factory default: 0.0.0.0). ⢠DNS Server. Enter the IP address of the DNS (Domain Name Server) you wish to use (factory default: 0.0.0.0. ⢠Enable 802.1Q VLAN. Check the box Enable 802.1Q VLAN to enable the WG302 to process VLAN membership information. ⢠Time Zone. Select the Time Zone to match your location. If your location uses daylight saving, check the box Adjust for Daylight Saving Time. ⢠The Current Time, as used on the wireless access point, is displayed. Note: You must have an Internet connection to get the current time. Wireless Settings To configure the wireless settings, click Wireless Settings in the Setup section of the WG302 main menu. The Wireless Settings menu appears, as shown in Figure 3-8. Figure 3-8 Basic Installation and Configuration 3-11 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The Wireless Settings menu options are discussed below. Note: Channel selection and power management are automatically adjusted by the AutoCell Auto RF Management option. The Auto RF Management option is enabled by default. ⢠Country/Region. This is the region where the WG302 can be used. It may not be legal to operate the wireless features of the wireless access point in a region other than one of those identified in this field. For products sold in the United States, the default country domain is preset. Also, the channel is set to 11. For products sold outside the United States, unless a country domain is selected, the channel cannot be changed. ⢠Turn Radio On. On by default, you can also turn off the radio to disable access through this device. This can be helpful for configuration, network tuning, or troubleshooting activities. ⢠Operating Mode. Select the desired wireless operating mode. The options are: ⢠â Auto (802.11g/802.11b): Both 802.11g and 802.11b wireless stations can be used. This is the default. â 802.11g Only: Only 802.11g wireless stations can be used. â 802.11b Only: All 802.11b wireless stations can be used. 802.11g wireless stations can still be used if they can operate in 802.11b mode. Channel. This sets which operating frequency is used. You should not need to change the channel unless you notice interference problems, or if you are setting up the WG302 near another access point.The wireless channel range is 1 to 11 for USA and Canada and 1 to 13 for Europe and Australia. The default is channel 11. Note: AutoCell automatically adjusts the channel selection when the Auto RF Management option is used. The AutoCell Auto RF Management option is enabled by default. â Access points use a fixed channel. You can select the channel to provide the least interference and best performance. In the USA and Canada, 11 channels are available. â If you use multiple access points, it is better if adjacent access points use different channels to reduce interference. The recommended channel spacing between adjacent access points is five channels (for example, use channels 1 and 6, or 6 and 11). 3-12 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 â In âInfrastructureâ mode, wireless stations normally scan all channels, looking for an access point. If more than one access point can be used, the one with the strongest signal is used. This can only happen when the access points use the same SSID. See http://documentation.netgear.com/reference/enu/wireless/index.htm for more information on wireless channels. ⢠Data Rate. Shows the available transmit data rate of the wireless network. The default is Best. ⢠Output Power. Set the transmit signal strength of the access point (AP). The options are full, half, quarter, eighth, and min. Decrease the transmit power if two or more APs are close together and use the same channel frequency. The default is Full. Security Profiles Security profiles let you configure unique security settings for each SSID. The WG302 supports up to eight SSIDs. The Security Profile Settings menu is shown to the right. Selected Security Profile To edit a security profile, select it from the list, and click Edit. The Security Profile Configuration page opens for that profile. Figure 3-9 The settings for Security Profile Configuration are explained below. ⢠Security Profile Name. Use a name that makes it easy to recognize the profile, and to tell profiles apart. Basic Installation and Configuration 3-13 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Wireless Network Name (SSID). The SSID is also known as the wireless network name. The SSID separates network traffic from different wireless networks. To connect any wireless device to a wireless network, you need to use the SSID. The WG302 default SSID is: NETGEAR-0 for the first profile, NETGEAR-1 for the second, and so on. You can enter a value of up to 32 alphanumeric characters. Some concepts regarding the SSID are explained below: â Using the same SSID is essential. Devices with different SSIDs cannot communicate with each other. However, some access points allow connections from wireless stations that have their SSID set to âanyâ or whose SSID is blank (null). â A Basic Service Set (BSS) is a group of wireless stations and a single access point, all using the same SSID. â An Extended Service Set (ESS) is a group of wireless stations and multiple access points, all using the same ID (ESSID). â Different access points within an ESS can use different channels. To reduce interference, adjacent access points should use different channels. â Roaming is the ability of wireless stations to connect wirelessly when they physically move from one ESS to another. The wireless station automatically changes to the access point with the least interference or best performance. Note: The AutoCell Auto RF Management option enhances the roaming, interference, and channel selection of an extended wireless network. ⢠Broadcast Wireless Network Name (SSID). This field lets you turn off the SSID broadcast. If you do so, then only stations that know the SSID can connect. Disabling the SSID broadcast somewhat hampers the wireless network âdiscoveryâ feature of some products. The default is to enable SSID broadcast. Note: Broadcast Wireless Network Name (SSID) is turned off if you enable the AutoCell Enhanced RF Security option (disabled by default). Network Authentication The WG302 Wireless Access Point is set by default as an open system with no authentication. When setting up Network Authentication, bear in mind the following: 3-14 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠If you are using Access Point mode, then all options are available. In other modes such as Repeater or Bridge, some options may be unavailable. ⢠Not all wireless adapters support WPA or WPA2. Windows XP and Windows 2000 with Service Pack 3 do include the client software that supports WPA. However, client software is required on the client. Consult the product documentation for your wireless adapter and WPA or WPA2 client software for instructions on configuring WPA2 settings. You can configure the WG302 to use the types of network authentication shown in the table below. Network Authentication Types Open System Can be used with WEP encryption, or no encryption. Shared Key WEP must be used. At least one shared key must be entered. Legacy 802.1x You must configure the Radius Server Settings to use this option. WPA-PSK You must use TKIP encryption, and enter the WPA passphrase (Network key). WPA with Radius You must configure the Radius Server Settings to use this option. WPA2-PSK WPA2 is a later version of WPA. Only select this if all clients support WPA2. If selected, you must use AES encryption, and enter the WPA passphrase (Network key). WPA-PSK and WPA2-PSK This selection allows clients to use either WPA (with TKIP) or WPA2 (with AES). If selected, encryption must be TKIP + AES. The WPA passphrase (Network key) must also be entered. WPA2 with Radius WPA2 is a later version of WPA. Only select this if all clients support WPA2. If selected, you must use AES encryption, and configure the Radius Server Settings Screen. WPA and WPA2 with This selection allows clients to use either WPA (with TKIP) or WPA2 Radius (with AES). If selected, encryption must be TKIP + AES, and you must also configure the Radius Server Settings Screen Data Encryption Select the data encryption that you want to use. The available options depend on the Network Authentication setting above (otherwise, the default is None). The Data Encryption settings are explained in the table below: Data Encryption Settings None No encryption is used. 64 bits WEP Standard WEP encryption, using 40/64 bit encryption. Basic Installation and Configuration 3-15 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Data Encryption Settings 128 bits WEP Standard WEP encryption, using 104/128 bit encryption. 152 bits WEP Proprietary mode that will only work with other wireless devices that support this mode. TKIP This is the standard encryption method used with WPA. AES This is the standard encryption method for WPA2. Some clients may support AES with WPA, but this is not supported by this Access Point. TKIP + AES This setting supports both WPA and WPA2. Broadcast packets use TKIP. For unicast (point-to-point) transmissions, WPA clients use TKIP, and WPA2 clients use AES. The Passphrases and Keys are explained below: ⢠Passphrase. To use the Passphrase to generate the WEP keys, enter a passphrase and click the Generate Keys button. You can also enter the keys directly. These keys must match the other wireless stations. ⢠Key 1, Key 2, Key 3, Key 4. If using WEP, select the key to be used as the default key. Data transmissions are always encrypted using the default key. The other keys can only be used to decrypt received data. ⢠WPA Passphrase (Network Key). If using WPA-PSK, enter the passphrase here. All wireless stations must use the same passphrase (network key). The network key must be from 8 to 63 characters in length. Wireless Client Security Separation If enabled, the associated wireless clients will not be able to communicate with each other. This feature is used for hotspots and other public access situations. The default is Disabled. 3-16 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Before You Change the SSID and WEP Settings For a new wireless network, print or copy this form and fill in the settings. For an existing wireless network, the person who set up or is responsible for the network can provide this information. Be sure to set the Regulatory Domain correctly as the first step. Store this information in a safe place. ⢠SSID: The Service Set Identification (SSID) identifies the wireless local area network. You may customize it by using up to 32 alphanumeric characters. Write your SSID on the line. SSID: ___________________________________ ⢠⢠Note: The SSID in the wireless access point is the SSID you configure in the wireless adapter card. All wireless nodes in the same network must be configured with the same SSID. Authentication Circle one: Open System or Shared Key. Choose âShared Keyâ for more security. Note: If you select shared key, the other devices in the network will not connect unless they are set to Shared Key and have the same keys in the same positions as those in the WG302. WEP Encryption Keys For all four 802.11b keys, choose the Key Size. Circle one: 64, 128, or 152 bits Key 1: ___________________________________ Key 2: ___________________________________ Key 3: ___________________________________ ⢠Key 4: ___________________________________ WPA-PSK (Pre-Shared Key)WPA2-PSK (Pre-Shared Key) Record the WPA-PSK key:Record the WPA2-PSK key: ⢠Key: ________________________________ Key: _______________________________ WPA RADIUS Settings For WPA, record the following settings for the primary and secondary RADIUS servers: Server Name/IP Address: Primary _________________ Secondary __________________ Port: ___________________________________ ⢠Shared Secret: ___________________________________ WPA2 RADIUS Settings For WPA2, record the following settings for the primary and secondary RADIUS servers: Server Name/IP Address: Primary _________________ Secondary __________________ Port: ___________________________________ Shared Secret: ___________________________________ Use the procedures described in the following sections to configure the WG302. Basic Installation and Configuration 3-17 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Setting up and Testing Basic Wireless Connectivity Follow the instructions below to set up and test basic wireless connectivity. After this is done, then you can set up wireless security settings appropriate to your needs. 1. Connect to the WG302. In the address field of your Web browser, enter the default LAN address of http://192.168.1.128. Log in with the user name of admin and default password of password, or using the LAN address and password that you set up. 2. Click the Wireless Settings link in the main menu of the WG302. The default SSID is NETGEAR-0. Note: The SSID of any wireless access adapters must match the SSID you configure in the NETGEAR ProSafe 802.11g Wireless Access Point WG302. If they do not match, you will not get a wireless connection to the WG302. 3. Select the Country/Region in which the wireless interface will operate. 4. For now, do not make other changes 5. Click Apply to save your changes. Note: If you are configuring the WG302 from a wireless computer and you change the SSID, channel, or security settings, you will lose your wireless connection when you click Apply. You must then change the wireless settings of your computer to match the new settings. 6. Configure and test your PCs for wireless connectivity. Set up the wireless adapters of your PCs so that they all have the same SSID and channel that you configured in the WG302. Check that they have a wireless link and are able to obtain an IP address by DHCP from the WG302. Now that your PCs can connect to the WG302, you can configure the wireless security. 3-18 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Configuring the Radius Server Settings Use the following steps to view or change the Radius Server Settings. 1. Connect to the WG302. In the address field of your Web browser, enter the default LAN address of http://192.168.1.128. Log in with the user name of admin and default password of password, or log in by using the LAN address and password that you configured. 2. In the Security menu, click Radius Server Settings. 3. Enter the settings, and click Apply. The Radius Server Settings are explained below: ⢠Authentication/Access Control Radius Server Configuration. This configuration is required for authentication using Radius. IP Address, Port No. and Shared Secret is required for communication with Radius Server. A Secondary Radius Server can be configured which is used on failure on Primary Radius Server ⢠IP Address. The IP address of the Radius Server. The default is 0.0.0.0. Figure 3-10 ⢠Port Number. Port number of the Radius Server. The default is 1812. ⢠Shared Secret. This is shared between the Wireless Access Point and the Radius Server while authenticating the supplicant. ⢠Re-authentication Time. The time interval in seconds after which the supplicant will be authenticated again with the Radius Server. The default is 3600 seconds. ⢠Global-key Re-Key Time. Select this option to enable Re-keying of Global Key. The Global Key Re-Key can be done based on time interval in seconds or number of packets exchanged using the global key. The default is 3600 seconds. Basic Installation and Configuration 3-19 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Update if any station disassociates. Select this option to refresh global key when any stations disassociated with wireless Access Point. ⢠Accounting Radius Server Configuration. This configuration is required for accounting using Radius Server. IP Address, Port Number and Shared Secret is required for communication with Radius Server. A Secondary Radius Server can be configured which is used on failure on Primary Radius Server. ⢠IP Address. The IP address of the Radius Server. The default is 0.0.0.0. ⢠Port Number. Port number of the Radius Server. The default is 1813. ⢠Shared Secret. This is shared between the Wireless Access Point and the Radius Server while authenticating the supplicant. Configuring Network Authentication Use the following steps to configure network authentication. 1. Connect to the WG302. In the address field of your Web browser, enter the default LAN address of http://192.168.1.128. Log in with the user name of admin and default password of password, or log in by using the LAN address and password that you configured. 2. If you are using Radius Server Settings, set them up first, as described in âConfiguring the Radius Server Settingsâ on page 3-19. 3. Set the Network Authentication that you want to use. a. On the Security menu, click Security Profiles Settings. b. Select the profile that you want. c. Click Edit to view the Security Profiles Configuration menu. d. Choose the type of Network Authentication that you want from the list. Figure 3-11 3-20 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Note: You can use WEP with Open System or Shared Key. Choose the encryption strength, and then enter the Keys as explained in âEntering WEP Data Encryption Keysâ on page 3-21 e. Click Apply to save your settings. Note: If you use a wireless computer to configure WEP settings, you will be disconnected when you click Apply. Reconfigure your wireless adapter to match the new settings or access the wireless access point from a wired computer to make any further changes. Entering WEP Data Encryption Keys You can manually or automatically program the four data encryption keys. These values must be identical on all PCs and Access Points in your network. ⢠Automatic: Enter a word or group of printable characters in the Passphrase box and click the Generate button. The four key boxes are automatically populated with key values. ⢠Manual: Enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F). Select which of the four keys is the default. See http://documentation.netgear.com/reference/enu/wireless/index.htm for a full explanation of each of these options, as defined by the IEEE 802.11 wireless communication standard. Restricting Wireless Access by MAC Address To restrict access based on MAC addresses, follow these steps: 1. Connect to the WG302. In the address field of your Web browser, enter the default LAN address of http://192.168.1.128. Log in with the user name of admin and default password of password, or log in by using the LAN address and password that you configured. Basic Installation and Configuration 3-21 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Note: When configuring the WG302 from a wireless computer whose MAC address is not in the access control list, if you select Turn Access Control On, you will lose your wireless connection when you click Apply. You must then access the wireless access point from a wired computer or from a wireless computer which is on the access control list to make any further changes. 2. From the Security menu, click the Access Control link to display the Access Control List (ACL) menu shown below. Figure 3-12 3. Select the Turn Access Control On check box. 4. Choose to use the local MAC address database stored on the access point, or use the RADIUS MAC address database stored on a RADIUS server. ⢠If you choose the RADIUS MAC Address Database, you must configure the RADIUS Server Settings first. ⢠If you choose Local MAC Address Database, either select from the list of available wireless cards the WG302 has found in your area, or enter the MAC address and device name for a device you plan to use. 3-22 Basic Installation and Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 You can usually find the MAC address printed on the wireless adapter. Click Add to add the wireless device to the access list. Repeat these steps for each additional device you want to add to the list. 5. Be sure to click Apply to save your wireless access control list settings. Now, only devices on the MAC ACL will be allowed to wirelessly connect to the WG302. Basic Installation and Configuration 3-23 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 3-24 Basic Installation and Configuration v0.1, December 2005 Chapter 4 Management This chapter describes how to use the management features of your NETGEAR ProSafe 802.11g Wireless Access Point WG302. To get to these features, connect to the WG302 as described in âLogging in to the WG302 Using Its Default IP Addressâ on page 3-9. Remote Management Access the Remote Management screen by clicking Remote Management under Management on the main menu. Figure 4-1 Enter the Remote Management information. ⢠Remote Console, Secure Shell (SSH): If set to Enable, the Wireless Access Point will only allow remote access via Secure Shell and Secure Telnet. The default is Enable. ⢠SNMP: Enable SNMP to allow the SNMP network management software, such as HP OpenView, to manage the wireless access point via SNMPv1/v2 protocol. Management 4-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Public Community Name: The community string to allow the SNMP manager to read the wireless access point's MIB objects. The default is public. ⢠Private Community Name: The community string to allow the SNMP manager to read and write the wireless access point's MIB objects. The default is private. ⢠IP address to Receive Traps: The IP address of the SNMP manager to receive traps sent from the wireless access point. The default is 0.0.0.0. Using the Secure Telnet Interface The WG302 includes a secure Telnet command line interface (CLI). You can access the CLI from a secure Telnet client over the Ethernet port or over the serial console port. Note: You must use a secure Telnet client such as Absolute Telnet. Also, when you configure the client, use the SSH1, 3DES option. If you use the Telnet client to connect over the Ethernet port, use the IP address of the WG302 as the host name. How to Use the CLI via the Console Port 1. Using the null-modem cable, connect a VT100/ANSI terminal or a workstation to the port labeled Console. If you attached a PC, Apple Macintosh, or UNIX workstation, start a secure terminal-emulation program. 2. Configure the terminal-emulation program to use the following settings: ⢠Baud rate: 9600 bps ⢠Data bits: 8 ⢠Parity: none ⢠Stop bit: 1 ⢠Flow control: none These settings appear below the connector on the back panel. 4-2 Management v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 3. Press the return key, and the screen below should appear. Figure 4-2 The login name is admin and password is the default password. After successful login, the screen should show the (Access Point Name)> prompt. In this example, the prompt is netgear74F35E. Enter help to display the CLI command help. CLI Commands The CLI commands are listed in Appendix C, âCommand Line Reference.â SNMP Remote Management Enable SNMP to allow SNMP network management software such as HP OpenView to manage the wireless access point via the SNMPv1/v2 protocol. 1. Click Enable to use the SNMP remote management feature. 2. Fill in the fields according to the requirements of your location. ⢠Public Community Name. (Default: public) The community string to allow the SNMP manager to read the MIB objects of the WG302. ⢠Private Community Name. (Default: private) The community string to allow the SNMP manager to read and write the MIB objects of the WG302. ⢠Manager IP address. Enter the IP address of the SNMP manager. If this is set to 255.255.255.255, any SNMP manager is allowed. Management 4-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠IP address to Receive Traps. Enter the IP address of the SNMP manager to receive traps sent from the wireless Access Point. If you don't want Traps to be sent, leave this at the default value of 0.0.0.0 3. Be sure to click Apply to save your changes. Viewing the Activity Log From the WG302 main menu, under the Information heading, click Activity Log. Figure 4-3 You can use a SysLog server to view the Activity Log. If you have a SysLog server on your LAN, then enable the SysLog. If enabled, you must enter the IP address of your SysLog server and the port number that your SysLog server uses. ⢠SysLog Server IP address: The access point sends all the SysLog to the specified IP address if SysLog option is enabled. Default: 0.0.0.0 4-4 Management v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Port: The port number configured in the SysLog server on your LAN. The default is 514 The Activity Log Window displays the Access Point system activity. You can click Refresh to update the display. To save the log contents into a file on your PC, click Save As and save the file to a disk drive. Viewing General Information The General information is a summary of the WG302 configuration settings. From the WG302 main menu, click General to view the screen shown below. Figure 4-4 Management 4-5 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Table 4-1. General Information Fields Field Description Access Point Information Access Point Name (NetBIOS name) The name of the access point, which you can configure. Country/Region The domain or region for which the wireless access point is licensed for use. It may not be legal to operate this wireless access point in a region other than one of those identified in this field. Firmware Version The version of the firmware currently installed. Access Point Mode The operating mode of the WG302: Access Point, Point-to-point bridge, Multi-point bridge or Repeater. VLAN (802.1Q) Indicates if VLAN support is enabled. The default is disabled. Management VLAN ID Displays the VLAN ID. Current IP Settings IP Address The IP address of the wireless access point. Subnet Mask The subnet mask for the wireless access point. Default Gateway The default gateway for the wireless access point communication. DHCP Client If the DHCP Client is enabled, the current IP address was obtained from a DHCP server on your network. Disabled indicates a static IP configuration. MAC Address The Media Access Control address (MAC address) of the wireless access pointâs Ethernet port. Current Wireless Settings Channel/Frequency The channel the wireless port uses. The default channel setting is 11. For the frequencies used on each channel, see http://documentation.netgear.com/reference/enu/wireless/index.htm. Security Profiles For each Security Profile, the following information is displayed: Profile name, SSID, security option, VLAN ID, and enabled/disabled. 4-6 Management v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Viewing Statistics The Statistics screen provides LAN and WLAN statistics. From the WG302 main menu, click Statistics under the Information heading to view the screen shown in Figure 4-5. Figure 4-5 Management 4-7 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Viewing the Available Wireless Station List The Available Wireless Station List contains a table of all IP devices associated with the wireless access point for the Wired Network Name (SSID). From the WG302 main menu, under the Information heading, click Available Wireless Station List to view the list. The fields in the list are explained below. Figure 4-6 Table 4-2. Available Wireless Station List Field Description Wired Ethernet Received/Transmitted Packets The number of packets sent since the WG302 was restarted. Bytes The number of bytes sent since the WG302 was restarted. For Each Wireless Security Profile Received/Transmitted Unicast Packets The Unicast packets sent since the WG302 was restarted. Broadcast Packets The Broadcast packets sent since the WG302 was restarted. Multicast Packets The Multicast packets sent since the WG302 was restarted. Total Packets The Wireless packets sent since the WG302 was restarted. Total Bytes The Wireless bytes sent since the WG302 was restarted. Refresh button Click the Refresh button to update the statistics on this screen. For each device, the table shows the Station ID, MAC address, IP Address, and Status (whether the device is allowed to communicate with the wireless access point or not). 4-8 Management v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Note that if the wireless access point is rebooted, the table data is lost until the wireless access point rediscovers the devices. To force the wireless access point to look for associated devices, click the Refresh button. Note: A wireless network can include multiple wireless access points that use the same network name (SSID). This extends the reach of the wireless network. Users can roam from one access point to another, providing seamless network connectivity. If this is the case, only the stations associated with this access point are shown in the Available Station List. Upgrading the Wireless Access Point Firmware Warning: When uploading firmware to the WG302 Wireless Access Point, do not interrupt the Web browser by closing the window, clicking a link, or loading a new page. If the browser is interrupted, the upload may fail, corrupt the firmware, and render the WG302 completely inoperable You cannot upgrade the firmware from a computer that is connected to the WG302 with a wireless link. You must use a computer that is connected to the WG302 with an Ethernet cable. The WG302 Wireless Access Point firmware is stored in FLASH memory and can be upgraded as new firmware is released by NETGEAR. You can download the upgrade files from the NETGEAR Web site. If the upgrade file is compressed (.ZIP file), you must first extract the image (.IMG) file before you send it to the wireless access point. The upgrade file can be sent using your browser. Note: The Web browser used to upload new firmware into the WG302 must support HTTP uploads, such as Microsoft Internet Explorer 6.0 or above, or Netscape Navigator 4.78 or above. Use the following steps to upgrade the firmware: 1. Download the file from NETGEAR, save it to your hard disk, and unzip it. 2. If you want to save your configuration settings, see âBacking up and Restoring the Configurationâ on page 4-10. 3. From the main menu Management section, click the Upgrade Firmware link. 4. In the Upgrade Firmware menu, click the Browse button and browse to the location of the image (.IMG) upgrade file. Management 4-9 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 5. Click Upload. When the upload completes, your wireless access point automatically restarts. The upgrade process typically takes about one minute. In some cases, you may need to reconfigure the wireless access point after upgrading. Configuration File Management The WG302 Wireless Access Point settings are stored in the wireless access point in a configuration file. This file can be saved (backed up) to a computer, retrieved (restored) from a computer, or cleared to factory default settings. Click Backup/Restore Settings under the Management heading to go to the menu shown in Figure 4-7. Figure 4-7 The three options displayed are described in the following sections. Backing up and Restoring the Configuration To save your settings, click Backup. Your browser extracts the configuration file from the wireless access point and prompts you for a location on your computer to store the file. You can give the file a meaningful name at this time, such as WG302.cfg. 4-10 Management v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 To restore your settings from a saved configuration file, enter the full path to the file on your computer or click the Browse button to locate the file. When you have located it, click the Restore button to upload the file. After completing the upload, the WG302 reboots automatically. Erasing the Configuration You can erase the wireless access point configurations and return to the factory default settings. After you erase the configurations, the wireless access pointâs password will be password, the SSID will be NETGEAR, the DHCP client will be disabled, the default LAN IP address will be 192.168.1.128, and the access point name is reset to the name printed on the label on the bottom of the unit. Using the Reset Button to Restore Factory Default Settings If you do not know the login password or IP address, you can still restore the factory default configuration settings with the Reset button. This button is on the rear panel of the wireless access point (see âHardware Descriptionâ on page 2-7). The reset button has two functions: ⢠Reboot. When pressed and released, the Wireless Access Point reboots (restart). ⢠Reset to Factory Defaults. When pressed and held down, it clears all data and restores all settings to the factory default values. To clear all data and restore the factory default values: 1. Hold the Reset Button until the LEDs blink twice, usually more than five seconds. 2. Release the Reset Button. The factory default configuration has now been restored, and the WG302 is ready for use. Management 4-11 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Changing the Administrator Password The default password is password. NETGEAR recommends that you change this password to a more secure password. You cannot change the administrator login name. From the WG302 main menu, click Change Password to go to the menu shown below. To change the password, first enter the old password, and then enter the new password twice. Click Apply to save your change. Figure 4-8 4-12 Management v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 AutoCell Rogue AP Detection The AutoCell feature provides added security. It can detect rogue APs and wireless stations and exclude them from connecting to the WG302 Wireless Access Point. From the WG302 main menu, click Rogue AP Detection to view this menu. ⢠You can click Rescan to discover the APs. ⢠Click Authorize to add any AP to the Authorized AP List. Click Delete to remove an AP from the list. ⢠Optionally, you can export or import lists of authorized APs. Figure 4-9 Management 4-13 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 AutoCell Rogue Station Detection The AutoCell feature provides added security. It can detect rogue APs and wireless stations and exclude them from connecting to the WG302 Wireless Access Point. From the WG302 main menu, click Rogue Station Detection to view this menu. ⢠Click Rescan to discover the stations. ⢠Click Authorize to add any station to the Authorized Station List. Click Delete to remove an station from the list. ⢠Optionally, you can export or import lists of authorized stations. Figure 4-10 4-14 Management v0.1, December 2005 Chapter 5 Advanced Configuration This chapter describes how to configure the advanced features of your NETGEAR ProSafe 802.11g Wireless Access Point WG302. The following list describes the advanced features: ⢠IP Settings: Use the AP as a DHCP server for wireless clients. ⢠Wireless Settings: Set up AutoCell and configure advanced wireless LAN parameters. ⢠Access Point Settings: Enable wireless bridging and repeating. ⢠TBD: New features under the Advanced heading, like NAT and Load Balancing. You can find these features under the Advanced heading in the main menu. Understanding Advanced IP Settings for Wireless Clients If you want the AP to act as a DHCP server gateway for wireless clients, use this feature. The AP can accept both static and DHCP clients. Figure 5-1 Advanced Configuration 5-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The following list provides information about how to configure DHCP settings. ⢠Use AP as DHCP Server: You may turn on this option and the Access Point will function as a DHCP Server for Wireless Clients only. The Access Point will provide the pre-configured TCP/IP configurations for all wireless stations connected to this Access Point. There are two options available for managing the wireless clients: â Accept DHCP Enabled Wireless Clients Only: The Access Point can only provide the TCP/IP configurations to those wireless clients with the DHCP enabled. â Accept Both DHCP Enabled and Static IP Configured Wireless Clients: The Access Point will support wireless clients with the DHCP enabled and the static IP configured. If you use the AP as a DHCP server, you must configure the following TCP/IP configurations for using Access Point as a DHCP Server for Wireless Clients. ⢠Starting IP Address: Type the starting IP address can be assigned from the DHCP server on this Access Point. ⢠Ending IP Address: Type the Ending IP address can be assigned from the DHCP server on this Access Point ⢠Subnet Mask: The Access Point will assign the specified subnet mask to the connected wireless stations. ⢠Gateway Address: The Access Point will assign this IP address as the default gateway for any traffic beyond the local network. ⢠Primary DNS Server: The Access Point will assign this IP address as the primary Domain Name Server used by the connected wireless stations. ⢠Secondary DNS Server: The Access Point will assign this IP address as the secondary Domain Name Server used by the connected wireless stations. ⢠Primary WINS Server: The Access Point will assign this IP address as the primary WINS Server used by the connected wireless stations. ⢠Secondary WINS Server: The Access Point will assign this IP address as the secondary WINS Server used by the connected wireless stations. ⢠Lease: The lease time for the IP address assigned. The wireless client user is required to renew the IP address as soon as the lease is expired. 5-2 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Configuring Advanced Wireless LAN Settings This section describes the advanced wireless settings menu, which enables configuration of the following features: ⢠AutoCell RF management ⢠Wi-Fi multimedia (WMM) setup ⢠Hotspot settings ⢠Advanced wireless parameters AutoCell Overview AutoCell provides advanced RF wireless management features that improve performance and enhance security. Table 5-1. What does AutoCell do? Problem AutoCell Settings Erosion of privacy You can enable these two settings: ⢠Enhanced RF Security (Default: Disabled): Makes your Wi-Fi network nearly undetectable by neighbors and hackers. ⢠Rogue Device Detection (Default: Disabled): Blocks rogue wireless devices from connecting to your network. Diminishing performance from multiple APs installed in one area. The Auto RF Management feature (Default: Enabled) manages APs and clients load-balance traffic across underutilized APs. Complexity of installation With the Auto RF Management feature (Default: Enabled), the APs can be put in any convenient location and in any density. Increasing interference The Auto RF Management feature (Default: Enabled) lets clients and APs avoid interference from neighbors and other unexpected sources. AutoCellâs self-organizing micro cells provide an additional level of privacy for enterprises. AutoCell clients are highly-recommended for Enhanced RF Security. Advanced Configuration 5-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 AutoCell AP/Client Interaction AutoCellâs self-organizing micro cells provide performance benefits and an additional level of privacy for enterprises. ⢠Automatic Transmit Power Control. An AP with AutoCell enabled coordinates the RF transmit power level of AutoCell-enabled clients. This creates client micro-cells and reduces co-channel interference with other clients and APs on the same frequency. It also improves overall throughput and performance. ⢠Automatic Load-Balancing. An AutoCell-enabled client seeks out and associates with the lightest loaded AutoCell-enabled AP available. ⢠Rapid Roaming. An AutoCell-enabled client quickly distinguishes movement from RF anomalies such as arbitrary and momentary changes in the surrounding RF domain. When it detects true movement, the client immediately seeks the best available AP at the highest data rate possible instead of waiting for the data rate to decline. This feature does not require AutoCell-enabled APs.) Additional AutoCell View Management Options Figure 5-2 AutoCell View is a management tool that provides sophisticated views of your wireless network so that you can manage the wireless communications easily from a simple console. 5-4 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 AutoCell Configuration Options There are three AutoCell configuration setting choices: ⢠Auto RF Management: Enabled by default. ⢠Enhanced RF Security: Disabled by default. ⢠Rogue Device Detection: Disabled by default. These options are discussed below. Figure 5-3 Auto RF Management Note: Channel selection and power management is automatically adjusted by the AutoCell Auto RF Management option. The Auto RF Management option is enabled by default. In this mode, AutoCell APs and clients load-balance traffic across underutilized APs. This mode avoids interference from neighbors, clients, APs, and other unexpected sources. Enhanced RF Security Note: Broadcast Wireless Network Name (SSID) is automatically turned off when you select the AutoCell Enhanced RF Security option. In this mode, AutoCell shrinks the size of coverage to the minimum to reach clients but also shrinks the size of the beacons that access points use to announce their presence. This mode makes an enterprise wireless LAN nearly invisible to users outside an office building. Rogue Device Detection The AutoCell Rogue Device Detection feature lets you identify and block wireless devices that should never be given access to the wireless network. Advanced Configuration 5-5 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Wi-Fi Multimedia (WMM) Setup WMM is a subset of the 802.11e standard. WMM allows wireless traffic to have a range of priorities, depending on the kind of data. Time-dependent information, such as video or audio, will have a higher priority than normal traffic. For WMM to function correctly, wireless clients must also support WMM. WMM Support: Select Yes or No as required on the Advanced Wireless Settings menu. The default is No. Hotspot Settings If you want the access point (AP) to capture and redirect all HTTP (TCP, port 80) requests, use this feature. For example, a hotel might want all wireless connections to go to its server to start a billing transaction. Figure 5-4 Enter the URL of the Web server where you wish to redirect HTTP requests. 5-6 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Configuring Wireless LAN Parameters The default advanced wireless LAN parameter settings usually work well. If you want the AP to operate in Super-G mode, use this feature. Figure 5-5 Table 5-1 describes the advanced wireless parameters. Table 5-1. Advanced Wireless LAN Settings Fields Field Description Enable SuperG Mode Click Enable to enable SuperG Mode. RTS Threshold The packet size used to determine whether it should use the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) or the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism for packet transmission. Fragmentation Length This is the maximum packet size used for fragmentation. Packets larger than the size programmed in this field will be fragmented. The Fragment Threshold value must be larger than the RTS Threshold value. Beacon Interval Specifies the data beacon rate between 20 and 1004. DTIM Interval The Delivery Traffic Indication Message specifies the data beacon rate between 1 and 255. Preamble Type A long transmit preamble may provide a more reliable connection or slightly longer range. A short transmit preamble gives better performance. Long is the default Antenna Select the desired antenna for transmitting and receiving. Auto is the default. Advanced Configuration 5-7 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Wireless Bridging and Repeating The WG302 Wireless Access Point lets you build large bridged wireless networks. Note: All bridge mode options are not available when AutoCell Auto RF Management is enabled (the default setting). Examples of wireless bridged configurations are: ⢠Point-to-Point Bridge. The WG302 communicates with another bridge-mode wireless station. See âPoint-to-Point Bridge Configurationâ on page 5-10. ⢠Multi-Point Bridge. The WG102 is the âmasterâ for a group of bridge-mode wireless stations. Then all traffic is sent to this âmaster,â rather than to other access points. See âMulti-Point Bridge Configurationâ on page 5-11. 5-8 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Repeater with Wireless Client Association. Sends all traffic to the remote AP. See âRepeater with Wireless Client Associationâ on page 5-12. These configurations can be set up from the Advanced Access Point Settings menu, shown to the right. Figure 5-6 Advanced Configuration 5-9 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Point-to-Point Bridge Configuration In Point-to-Point Bridge mode, the WG302 communicates with another bridge-mode wireless station. In addition, you can enable client associations with this WG302. You must enter the MAC address of the other bridge-mode wireless station in the field provided. Use WEP to protect this communication. The figure below shows an example of Point-to-Point Bridge mode. Both APs are in Point-to-Point Bridge mode. AP 1 AP 2 Hub or Switch Router Internet 192.168.0.1 PCs PCs LAN Segment 2 LAN Segment 1 Figure 5-7 Follow the steps below to set up a Point-to-Point Bridge configuration. 1. Configure the WG302 (AP1) on LAN Segment 1 in Point-to-Point Bridge mode. 2. Configure the other access point (AP2) on LAN Segment 2 in Point-to-Point Bridge mode. AP 1 must have AP 2âs MAC address in its Remote MAC Address field and AP 2 must have AP 1âs MAC address in its Remote MAC Address field. 3. Configure and verify the following for both access points: ⢠Verify the LAN network configuration of the access points. Both must be configured to operate in the same LAN network address range as the LAN devices ⢠Both APs must use the same ESSID, Channel, authentication mode, if any, and security settings if security is in use. 4. Verify connectivity across the LAN 1 and LAN 2. A computer on either LAN segment should be able to connect to the Internet or share files and printers of any other PCs or servers connected to LAN Segment 1 or LAN Segment 2. 5-10 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Multi-Point Bridge Configuration Set up a Multi-Point Bridge only if this WG102 is the âmasterâ for a group of bridge-mode wireless stations. Then all traffic is sent to this âmaster,â rather than to the other access points. In addition, you can enable client associations with this WG302. ⢠You must enter the MAC addresses of the other access points in the fields provided. ⢠The other bridge-mode wireless stations must be set to Point-to-Point Bridge mode, using the MAC address of this WG102 as the Remote MAC Address. ⢠Use WEP to protect this traffic. The figure below shows an example of a Multi-Point Bridge mode configuration. Point-to-Multi-Point Bridge mode âMaster APâ AP 3 AP 1 Point-to-Point Bridge Mode AP 2 Router Hub or Switch Point-to-Point Bridge Mode Internet 192.168.0.1 PCs PCs LAN Segment 3 Hub or Switch LAN Segment 1 PCs LAN Segment 2 Figure 5-8 Follow the steps below to set up the Multi-Point Bridge configuration. 1. Configure the Operating Mode of the WG302 Wireless Access Points. ⢠Because it is in the central location, configure WG302 (AP 1) on LAN Segment 1 in Point-to-Multi-Point Bridge mode. The MAC addresses of AP2 and AP3 are required in AP1. ⢠Configure WG302 (AP 2) on LAN Segment 2 in Point-to-Point Bridge mode with the Remote MAC Address of AP1. Advanced Configuration 5-11 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Configure the WG302 (AP3) on LAN 3 in Point-to-Point Bridge mode with the Remote MAC Address of AP1. 2. Verify the following for all access points: ⢠The LAN network configuration of the WG302 Wireless Access Points are configured to operate in the same LAN network address range as the LAN devices ⢠Only one AP is configured in Point-to-Multi-Point Bridge mode, and all the others are in Point-to-Point Bridge mode. ⢠All APs must be on the same LAN. That is, all the APs LAN IP address must be in the same network. ⢠If using DHCP, all WG302 Wireless Access Points should be set to âObtain an IP address automatically (DHCP Client)â in the IP Address Source portion of the Basic IP Settings menu. ⢠All WG302 Wireless Access Points use the same SSID, Channel, authentication mode, if any, and encryption in use. ⢠All Point-to-Point APs must have AP2âs MAC address in its Remote AP MAC address field. 3. Verify connectivity across the LANs. ⢠A computer on any LAN segment should be able to connect to the Internet or share files and printers with any other PCs or servers connected to any of the three LAN segments. ⢠Wireless stations will not be able to connect to the WG302 Wireless Access Points in the illustration above. If you require wireless stations to access any LAN segment, you can use additional WG302 Wireless Access Points configured in Wireless Access Point mode to any LAN segment. Note: You can extend this multi-point bridging by adding additional WG302s configured in Point-to-Point mode for each additional LAN segment. Furthermore, you can extend the range of the wireless network with NETGEAR wireless antenna accessories. Repeater with Wireless Client Association In this mode, the WG302 Wireless Access Point sends all traffic to the remote AP. For repeater mode, you must enter the MAC address of the remote âparentâ access point. You can also enter the address of the âchildâ access point. Note that the following restrictions apply: ⢠You do not have the option of disabling client associations with this WG302. 5-12 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠You cannot configure a sequence of parent/child APs. You are limited to only one parent/child AP pair. The figure below shows an example of a Repeater Mode configuration. AP 1 Parent AP in Repeater Mode Wireless PC Associated with AP 1 Wireless PC Associated with AP 2 AP 2 Router Child AP in Repeater Mode Internet 192.168.0.1 PCs Wireless PC Associated with AP 2 Figure 5-9 To set up a repeater with wireless client association, follow the steps below: 1. Configure the Operating Mode of the WG302 Wireless Access Points. ⢠Configure AP 1 on LAN Segment 1 as the Parent in Repeater mode with the its own MAC address in the Parent AP MAC Address field, and the MAC Address of the âdownstreamâ AP (AP 2) in the Child AP MAC Address field. ⢠Configure AP 2 in the Child Repeater mode with its MAC addresses as in the Child AP MAC Address field and the MAC address of the âupstreamâ AP (AP 1) in the Parent MAC Address field. 2. Verify the following for all access points: ⢠The LAN network configuration of the WG302 Wireless Access Points are configured to operate in the same LAN network address range as the LAN devices ⢠All APs must be on the same LAN. That is, all the APs LAN IP address must be in the same network. ⢠If using DHCP, all WG302 Wireless Access Points should be set to âObtain an IP address automatically (DHCP Client)â in the IP Address Source portion of the Basic IP Settings menu. Advanced Configuration 5-13 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠All WG302 Wireless Access Points use the same SSID, Channel, authentication mode, if any, and encryption in use. 3. Verify connectivity across the LANs. A computer on any LAN segment should be able to connect to the Internet or share files and printers with any other PCs or servers connected to any of the three WLAN segments. Note: You can extend this repeating by adding up to two more WG302s configured in repeater mode. However, since repeaters communicate in half-duplex mode, the bandwidth decreases as you add repeaters to the network. Also, you can extend the range of the wireless network with NETGEAR wireless antenna accessories. Configuring NAT TBD Configuring QoS Queues Configuring Quality of Service (QoS) on the WG302 Wireless Access Point consists of setting parameters on existing queues for different types of wireless traffic, and effectively specifying minimum and maximum wait times (via Contention Windows) for transmission. The settings described here apply to data transmission behavior on the access point only, not to that of the client stations. Note: For the Guest interface, QoS queue settings apply to the access point load as a whole (both BSSes together). On a two-radio access point these settings apply to both radios but the traffic for each radio is queued independently. (The exception to this is guest traffic as noted below.) Internal and Guest network traffic is always queued together within each radio. This is the case on both one-radio and two-radio APs. 5-14 Advanced Configuration v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 QoS on the access point leverages existing information in the IP packet header related to Type of Service (ToS). The access point examines the ToS field in the headers of all packets that pass through the AP. Based on the value in a packetâs ToS field, the AP prioritizes the packet for transmission by assigning it to one of the queues. A different type of data is associated with each queue. You can configure parameters that determine how each queue is treated when it is sent by the access point. Setting up Guest Access Out-of-the-box Guest Interface features allow you to configure the WG302 Wireless Access Point for controlled guest access to an isolated network. You can configure the same access point to broadcast and function as two different wireless networks: a secure âInternalâ LAN and a public âGuestâ network. Guest clients can access the guest network without a username or password. When guests log in, they see a guest Welcome screen (also known as a captive portal). You can define unique parameters for guest connectivity and isolate guest clients from other more sensitive areas of the network. No security is provided on the guest network; only plain-text security mode is allowed. Simultaneously, you can configure a secure internal network (using the same access point as your guest interface) that provides full access to protected information behind a firewall and requires secure login or certificates for access. Advanced Configuration 5-15 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 5-16 Advanced Configuration v0.1, December 2005 Chapter 6 Troubleshooting This chapter provides information about troubleshooting your NETGEAR ProSafe 802.11g Wireless Access Point WG302. After each problem description, instructions are given to help you diagnose and solve the problem. For the common problems listed, go to the section indicated. ⢠Is the WG302 on? ⢠Have I connected the wireless access point correctly? Go toâInstalling the WG302 Wireless Access Pointâ on page 3-5. ⢠I cannot remember the wireless access pointâs configuration password. Go to âChanging the Administrator Passwordâ on page 4-12. If you have trouble setting up your WG302, check the tips below. No lights are lit on the access point. It takes a few seconds for the power indicator to light up. Wait a minute and check the power light status on the access point. If the access point has no power. ⢠Make sure the power cord is connected to the access point. ⢠Make sure the power adapter is connected to a functioning power outlet. If it is in a power strip, make sure the power strip is turned on. If it is plugged directly into the wall, verify that it is not a switched outlet. ⢠Make sure you are using the correct NETGEAR power adapter supplied with your access point. Troubleshooting 6-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The Wireless LAN activity light does not light up. The access pointâs antennae are not working. ⢠If the Wireless LAN activity light stays off, disconnect the adapter from its power source and then plug it in again. ⢠Make sure the antennas are tightly connected to the WG302. ⢠Contact NETGEAR technical support if the Wireless LAN activity light remains off. The LAN light is not lit. There is a hardware connection problem. Check these items: ⢠Make sure the cable connectors are securely plugged in at the access point and the network device (hub, switch, or router). A switch, hub, or router must be installed between the access point and the Ethernet LAN or broadband modem. ⢠Make sure the connected device is turned on. ⢠Be sure the correct cable is used. Use a standard Category 5 Ethernet patch cable. If the network device has Auto Uplink⢠(MDI/MDIX) ports, you can use either a crossover cable or a normal patch cable. I cannot access the Internet or the LAN with a wireless capable computer. There is a configuration problem. Check these items: ⢠You may not have restarted the computer with the wireless adapter to have TCP/IP changes take effect. Restart the computer. ⢠The computer with the wireless adapter may not have the correct TCP/IP settings to communicate with the network. Restart the computer and check that TCP/IP is set up properly for that network. The usual setting for Windows the Network Properties is set to âObtain an IP address automatically.â ⢠The access pointâs default values may not work with your network. Check the access point default configuration against the configuration of other devices in your network. 6-2 Troubleshooting v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 I cannot connect to the WG302 to configure it. Check these items: ⢠The WG302 is properly installed, LAN connections are OK, and it is powered on. Check that the LAN port LED is on (amber indicating a 10 Mbps Ethernet connection or green indicating a 100 Mbps Ethernet connection) to verify that the Ethernet connection is OK. ⢠The default configuration of the WG302 is for a static IP address of 192.168.1.128 and a Mask of 255.255.255.0 with DHCP disabled. Make sure your network configuration settings are correct. ⢠If you are using the NetBIOS name of the WG302 to connect, ensure that your computer and the WG302 are on the same network segment or that there is a WINS server on your network. ⢠If your computer is set to âObtain an IP Address automaticallyâ (DHCP client), restart it. ⢠If your computer uses a Fixed (Static) IP address, ensure that it is using an IP Address in the range of the WG302. The WG302 default IP Address is 192.168.1.128 and the default Subnet Mask is 255.255.255.0. When I enter a URL or IP address I get a timeout error. A number of things could be causing this. Try the following troubleshooting steps. ⢠Check whether other PCs work. If they do, ensure that your PCs TCP/IP settings are correct. If using a Fixed (Static) IP Address, check the Subnet Mask, Default Gateway, DNS, and IP Addresses. ⢠If the PCs are configured correctly, but still not working, ensure that the WG302 is connected and turned on. Connect to it and check its settings. If you cannot connect to it, check the LAN and power connections. ⢠If the WG302 is configured correctly, check your Internet connection (DSL/Cable modem etc.) to make sure that it is working correctly. ⢠Try again. Troubleshooting 6-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Using the Reset Button to Restore Factory Default Settings The Reset button (see âRear Panelâ on page 2-8) has two functions: ⢠Reboot. When pressed and released quickly, the WG302 will reboot (restart). ⢠Reset to Factory Defaults. This button can also be used to clear ALL data and restore ALL settings to the factory default values. To clear all data and restore the factory default values: 1. Power off the WG302 and power it back on. 2. Use something with a small point, such as a pen, to press the Reset button in and hold it in for at least 5 seconds. 3. Release the Reset button. The factory default configuration has now been restored, and the WG302 is ready for use. 6-4 Troubleshooting v0.1, December 2005 Appendix A Specifications Parameter NETGEAR ProSafe 802.11g Wireless Access Point WG302 Network Management Web-based configuration and status monitoring Maximum Clients Limited by the amount of wireless network traffic generated by each node; typically 30 to 70 nodes. Status LEDs Power/Ethernet LAN/Wireless LAN/Test Power Adapter 12V DC, 1 A Electromagnetic Compliance FCC Part 15 Class B and Class E Environmental Specifications Operating temperature: 0 to 50° C Operating humidity: 5-95%, non-condensing Data Encoding: 802.11b: 1 and 2 Mbps, Direct Sequence Spread Spectrum (DSSS) 802.11b: 5.5 and 11 Mbps, Complementary Code Keying (CCK) 802.11g: All rates, Orthogonal Frequency Division Multiplexing (OFDM) Maximum Computers Per Wireless Network: Limited by the amount of wireless network traffic generated by each node. Typically 30-70 nodes. 802.11b and g Radio Data Rate 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54, and 108 Mbps (Auto-rate capable) 802.11b and g Operating Frequencies 2.412 ~ 2.462 GHz (US) 2.412 ~ 2.484 GHz (Japan) 2.412 ~ 2.472 GHz (Europe ETSI) 802.11g Encryption 40-bits (also called 64-bits), 128- and 152-bits WEP data encryption Antenna: Please refer to page iv Specifications A-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 A-2 Specifications v0.1, December 2005 Appendix B Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The WG302 Wireless Access Point conforms to the Institute of Electrical and Electronics Engineers (IEEE) 802.11b and 802.11g standards for wireless LANs (WLANs). On an 802.11b or g wireless link, data is encoded using direct-sequence spread-spectrum (DSSS) technology and is transmitted in the unlicensed radio spectrum at 2.5GHz. The maximum data rate for the 802.11b wireless link is 11 Mbps, but it will automatically back down from 11 Mbps to 5.5, 2, and 1 Mbps when the radio signal is weak or when interference is detected. The 802.11g auto rate sensing rates are 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. The 802.11 standard is also called Wireless Ethernet or Wi-Fi by the Wireless Ethernet Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standard group promoting interoperability among 802.11 devices. The 802.11 standard offers two methods for configuring a wireless network - ad hoc and infrastructure. Infrastructure Mode With a wireless Access Point, you can operate the wireless LAN in the infrastructure mode. This mode provides wireless connectivity to multiple wireless network devices within a fixed range or area of coverage, interacting with wireless nodes via an antenna. In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access Points via a wired Ethernet backbone can further extend the wireless network coverage. As a mobile computing device moves out of the range of one access point, it moves into the range of another. As a result, wireless clients can freely roam from one Access Point domain to another and still maintain seamless network connection. Wireless Networking Basics B-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed points to the network - each node can generally communicate with any other node. There is no Access Point involved in this configuration. This mode enables you to quickly set up a small wireless workgroup and allows workgroup members to exchange data or share printers as supported by Microsoft networking in the various Windows operating systems. Some vendors also refer to ad hoc networking as peer-to-peer group networking. In this configuration, network packets are directly sent and received by the intended transmitting and receiving stations. As long as the stations are within range of one another, this is the easiest and least expensive way to set up a wireless network. Network Name: Extended Service Set Identification (ESSID) The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification (SSID). In an ad hoc wireless network with no access points, the Basic Service Set Identification (BSSID) is used. In an infrastructure wireless network that includes an access point, the ESSID is used, but may still be referred to as SSID. An SSID is a thirty-two character (maximum) alphanumeric key identifying the name of the wireless local area network. Some vendors refer to the SSID as network name. For the wireless devices in a network to communicate with each other, all devices must be configured with the same SSID. The ESSID is usually broadcast in the air from an access point. The wireless station sometimes can be configured with the ESSID ANY. This means the wireless station will try to associate with whichever access point has the stronger radio frequency (RF) signal, providing that both the access point and wireless station use Open System authentication. Authentication and WEP Data Encryption The absence of a physical connection between nodes makes the wireless links vulnerable to eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11 standard has defined these two types of authentication methods: ⢠Open System. With Open System authentication, a wireless computer can join any network and receive any messages that are not encrypted. ⢠Shared Key. With Shared Key authentication, only those PCs that possess the correct authentication key can join the network. By default, IEEE 802.11 wireless devices operate in an Open System network. B-2 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured to operate in Shared Key authentication mode. 802.11 Authentication The 802.11 standard defines several services that govern how two 802.11 devices communicate. The following events must occur before an 802.11 Station can communicate with an Ethernet network through an access point, such as the one built in to the WG302: 1. Turn on the wireless station. 2. The station listens for messages from any access points that are in range. 3. The station finds a message from an access point that has a matching SSID. 4. The station sends an authentication request to the access point. 5. The access point authenticates the station. 6. The station sends an association request to the access point. 7. The access point associates with the station. 8. The station can now communicate with the Ethernet network through the access point. An access point must authenticate a station before the station can associate with the access point or communicate with the network. The IEEE 802.11 standard defines two types of authentication: Open System and Shared Key. ⢠Open System Authentication allows any device to join the network, assuming that the device SSID matches the access point SSID. Alternatively, the device can use the âANYâ SSID option to associate with any available Access Point within range, regardless of its SSID. ⢠Shared Key Authentication requires that the station and the access point have the same WEP Key to authenticate. These two authentication procedures are described below. Open System Authentication The following steps occur when two devices use Open System Authentication: 1. The station sends an authentication request to the access point. 2. The access point authenticates the station. 3. The station associates with the access point and joins the network. Wireless Networking Basics B-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 This process is illustrated below. 802.11b Authentication Open System Steps 1) Authentication request sent to AP Access Point 2) AP authenticates Internet Client attempting to connect 100 Mbps 3) Client connects to network Servers 10 Mbps Cable or DSL Modem PCs Figure 6-1 Shared Key Authentication The following steps occur when two devices use Shared Key Authentication: 1. The station sends an authentication request to the access point. 2. The access point sends challenge text to the station. 3. The station uses its configured 64-bit or 128-bit default key to encrypt the challenge text, and sends the encrypted text to the access point. 4. The access point decrypts the encrypted text using its configured WEP Key that corresponds to the stationâs default key. The access point compares the decrypted text with the original challenge text. If the decrypted text matches the original challenge text, then the access point and the station share the same WEP Key and the access point authenticates the station. 5. The station connects to the network. If the decrypted text does not match the original challenge text (the access point and station do not share the same WEP Key), then the access point will refuse to authenticate the station and the station will be unable to communicate with either the 802.11 network or Ethernet network. B-4 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 This process is illustrated below. 802.11b Authentication Shared Key Steps 1) Authentication request sent to AP Access Point 2) AP sends challenge text Client attempting to connect 3) Client encrypts challenge text and sends it back to AP 4) AP decrypts, and if correct, authenticates client Internet 100 Mbps Servers 10 Mbps Cable or DSL Modem PCs Figure 6-2 Overview of WEP Parameters Before enabling WEP on an 802.11 network, you must first consider what type of encryption you require and the key size you want to use. Typically, there are three WEP Encryption options available for 802.11 products: 1. Do Not Use WEP: The 802.11 network does not encrypt data. For authentication purposes, the network uses Open System Authentication. 2. Use WEP for Encryption: A transmitting 802.11 device encrypts the data portion of every packet it sends using a configured WEP Key. The receiving device decrypts the data using the same WEP Key. For authentication purposes, the network uses Open System Authentication. 3. Use WEP for Authentication and Encryption: A transmitting 802.11 device encrypts the data portion of every packet it sends using a configured WEP Key. The receiving device decrypts the data using the same WEP Key. For authentication purposes, the wireless network uses Shared Key Authentication. Note: Some 802.11 access points also support Use WEP for Authentication Only (Shared Key Authentication without data encryption). Wireless Networking Basics B-5 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Key Size The IEEE 802.11 standard supports two types of WEP encryption: 40-bit and 128-bit. The 64-bit WEP data encryption method allows for a five-character (40-bit) input. Additionally, 24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. The 24 factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt all data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits wide. The 128-bit WEP data encryption method consists of 104 user-configurable bits. Similar to the forty-bit WEP data encryption method, the remaining 24 bits are factory set and not user configurable. Some vendors allow passphrases to be entered instead of the cryptic hexadecimal characters to ease encryption key entry. 128-bit encryption is stronger than 40-bit encryption, but 128-bit encryption may not be available outside of the United States due to U.S. export regulations. When configured for 40-bit encryption, 802.11 products typically support up to four WEP Keys. Each 40-bit WEP Key is expressed as 5 sets of two hexadecimal digits (0-9 and A-F). For example, â12 34 56 78 90â is a 40-bit WEP Key. When configured for 128-bit encryption, 802.11 products typically support four WEP Keys but some manufacturers support only one 128-bit key. The 128-bit WEP Key is expressed as 13 sets of two hexadecimal digits (0-9 and A-F). For example, â12 34 56 78 90 AB CD EF 12 34 56 78 90â is a 128-bit WEP Key. Table 8-1: Encryption Key Sizes Encryption Key Size # of Hexadecimal Digits Example of Hexadecimal Key Content 64-bit (24+40) 10 4C72F08AE1 128-bit (24+104) 26 4C72F08AE19D57A3FF6B260037 Note: Typically, 802.11 access points can store up to four 128-bit WEP Keys but some 802.11 client adapters can only store one. Therefore, make sure that your 802.11 access and client adaptersâ configurations match. WEP Configuration Options The WEP settings must match on all 802.11 devices that are within the same wireless network as identified by the SSID. In general, if your mobile clients will roam between access points, then all of the 802.11 access points and all of the 802.11 client adapters on the network must have the same WEP settings. B-6 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Note: Whatever keys you enter for an AP, you must also enter the same keys for the client adapter in the same order. In other words, WEP key 1 on the AP must match WEP key 1 on the client adapter, WEP key 2 on the AP must match WEP key 2 on the client adapter, and so on. Note: The AP and the client adapters can have different default WEP Keys as long as the keys are in the same order. In other words, the AP can use WEP key 2 as its default key to transmit while a client adapter can use WEP key 3 as its default key to transmit. The two devices will communicate as long as the APâs WEP key 2 is the same as the clientâs WEP key 2 and the APâs WEP key 3 is the same as the clientâs WEP key 3. Wireless Channels This section discusses the wireless frequencies the 802.11b/g networks use. IEEE 802.11b/g wireless nodes communicate with each other by using radio frequency signals in the ISM (Industrial, Scientific, and Medical) band between 2.4 GHz and 2.5 GHz. Neighboring channels are 5 MHz apart. However, due to spread spectrum effect of the signals, a node sending signals using a particular channel utilizes frequency spectrum 12.5 MHz above and below the center channel frequency. As a result, two separate wireless networks using neighboring channels (for example, channel 1 and channel 2) in the same general vicinity interfere with each other. Applying two channels that allow the maximum channel separation decreases the amount of channel cross-talk and provides a noticeable performance increase over networks with minimal channel separation. Table 8-2 lists the radio frequency channels the 802.11b/g networks use. Table 8-2. 802.11b/g Radio Frequency Channels Channel Center Frequency Frequency Spread 2412 MHz 2399.5 MHz - 2424.5 MHz 2417 MHz 2404.5 MHz - 2429.5 MHz 2422 MHz 2409.5 MHz - 2434.5 MHz 2427 MHz 2414.5 MHz - 2439.5 MHz 2432 MHz 2419.5 MHz - 2444.5 MHz 2437 MHz 2424.5 MHz - 2449.5 MHz 2442 MHz 2429.5 MHz - 2454.5 MHz 2447 MHz 2434.5 MHz - 2459.5 MHz 2452 MHz 2439.5 MHz - 2464.5 MHz Wireless Networking Basics B-7 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Table 8-2. 802.11b/g Radio Frequency Channels Channel Center Frequency Frequency Spread 10 2457 MHz 2444.5 MHz - 2469.5 MHz 11 2462 MHz 2449.5 MHz - 2474.5 MHz 12 2467 MHz 2454.5 MHz - 2479.5 MHz 13 2472 MHz 2459.5 MHz - 2484.5 MHz Note: The available channels supported by the wireless products in various countries are different. For example, Channels 1 to 11 are supported in the U.S. and Canada, and Channels 1 to 13 are supported in Europe and Australia. The preferred channel separation between the channels in neighboring wireless networks is 25 MHz (5 channels). This means that you can apply up to three different channels within your wireless network. There are only 11 usable wireless channels in the United States. It is recommended that you start using channel 1 and grow to use channel 6, and 11 when necessary, as these three channels do not overlap. WPA and WPA2 Wireless Security Wi-Fi Protected Access (WPA and WPA2) is a specification of standards-based, interoperable security enhancements that increase the level of data protection and access control for existing and future wireless LAN systems. The IEEE introduced the WEP as an optional security measure to secure 802.11b (Wi-Fi) WLANs, but inherent weaknesses in the standard soon became obvious. In response to this situation, the Wi-Fi Alliance announced a new security architecture in October 2002 that remedies the shortcomings of WEP. This standard, formerly known as Safe Secure Network (SSN), is designed to work with existing 802.11 products and offers forward compatibility with 802.11i, the new wireless security architecture that has been defined by the IEEE. WPA and WPA2 offer the following benefits: ⢠Enhanced data privacy ⢠Robust key management ⢠Data origin authentication ⢠Data integrity protection B-8 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The Wi-Fi Alliance is now performing interoperability certification testing on Wi-Fi Protected Access products. Starting August of 2003, all new Wi-Fi certified products have to support WPA. NETGEAR is implementing WPA and WPA2 on client and access point products. The 802.11i standard was ratified in 2004. How Does WPA Compare to WEP? WEP is a data encryption method and is not intended as a user authentication mechanism. WPA user authentication is implemented using 802.1x and the Extensible Authentication Protocol (EAP). Support for 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x authentication was optional. For details on EAP specifically, refer to IETF RFC 2284. With 802.11 WEP, all access points and client wireless adapters on a particular wireless LAN must use the same encryption key. A major problem with the 802.11 standard is that the keys are cumbersome to change. If you do not update the WEP keys often, an unauthorized person with a sniffing tool can monitor your network for less than a day and decode the encrypted messages. Products based on the 802.11 standard alone offer system administrators no effective method to update the keys. For 802.11, WEP encryption is optional. For WPA, encryption using Temporal Key Integrity Protocol (TKIP) is required. TKIP replaces WEP with a new encryption algorithm that is stronger than the WEP algorithm, but that uses the calculation facilities present on existing wireless devices to perform encryption operations. TKIP provides important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. Through these enhancements, TKIP addresses all of known WEP vulnerabilities. How Does WPA Compare to WPA2 (IEEE 802.11i)? WPA is forward compatible with the WPA2 security specification. WPA is a subset of WPA2 and used certain pieces of the early 802.11i draft, such as 802.1x and TKIP. The main pieces of WPA2 that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized 802.11 VoIP phones), as well as enhanced encryption protocols, such as AES-CCMP. These features were either not yet ready for market or required hardware upgrades to implement. What are the Key Features of WPA and WPA2 Security? The following security features are included in the WPA and WPA2 standard: ⢠WPA and WPA2 Authentication ⢠WPA and WPA2 Encryption Key Management â Temporal Key Integrity Protocol (TKIP) Wireless Networking Basics B-9 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠â Michael message integrity code (MIC) â AES support (WPA2, requires hardware support) Support for a mixture of WPA, WPA2, and WEP wireless clients to allow a migration strategy, but mixing WEP and WPA/WPA2 is discouraged These features are discussed below. WPA/WPA2 addresses most of the known WEP vulnerabilities and is primarily intended for wireless infrastructure networks as found in the enterprise. This infrastructure includes stations, access points, and authentication servers (typically RADIUS servers). The RADIUS server holds (or has access to) user credentials (for example, user names and passwords) and authenticates wireless users before they gain access to the network. The strength of WPA/WPA2 comes from an integrated sequence of operations that encompass 802.1X/EAP authentication and sophisticated key management and encryption techniques. Its major operations include: ⢠Network security capability determination. This occurs at the 802.11 level and is communicated through WPA information elements in Beacon, Probe Response, and (Re) Association Requests. Information in these elements includes the authentication method (802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). The primary information conveyed in the Beacon frames is the authentication method and the cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared key is an authentication method that uses a statically configured pass phrase on both the stations and the access point. This obviates the need for an authentication server, which in many home and small office environments will not be available nor desirable. Possible cipher suites include: WEP, TKIP, and AES (Advanced Encryption Standard). We talk more about TKIP and AES when addressing data privacy below. ⢠Authentication. EAP over 802.1X is used for authentication. Mutual authentication is gained by choosing an EAP type supporting this feature and is required by WPA. 802.1X port access control prevents full access to the network until authentication completes. 802.1X EAPOL-Key packets are used by WPA to distribute per-session keys to those stations successfully authenticated. The supplicant in the station uses the authentication and cipher suite information contained in the information elements to decide which authentication method and cipher suite to use. For example, if the access point is using the pre-shared key method then the supplicant need not authenticate using full-blown 802.1X. Rather, the supplicant must simply prove to the access point that it is in possession of the pre-shared key. If the supplicant detects that the service set does not contain a WPA information element then it knows it must use pre-WPA 802.1X authentication and key management in order to access the network. B-10 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠Key management. WPA/WPA2 features a robust key generation/management system that integrates the authentication and data privacy functions. Keys are generated after successful authentication and through a subsequent 4-way handshake between the station and Access Point (AP). ⢠Data Privacy (Encryption). Temporal Key Integrity Protocol (TKIP) is used to wrap WEP in sophisticated cryptographic and security techniques to overcome most of its weaknesses. ⢠Data integrity. TKIP includes a message integrity code (MIC) at the end of each plaintext message to ensure messages are not being spoofed. WPA/WPA2 Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Wired Network with Optional 802.1x Port Based Network Access Control Wireless LAN WPA/WPA2 enabled wireless client with âsupplicantâ WPA/WPA2 enabled Access Point using pre-shared key or 802.1x TCP/IP Ports Closed Until Authenticated TCP/IP Ports Opened After Authenticated RADIUS Server Login Authentication Certificate Authority (for example Win Server, VeriSign) Figure 8-3 IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a protected network, as well as providing a vehicle for dynamically varying data encryption keys via EAP from a RADIUS server, for example. This framework enables using a central authentication server, which employs mutual authentication so that a rogue wireless user does not join the network. Wireless Networking Basics B-11 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 It is important to note that 802.1x does not provide the actual authentication mechanisms. When using 802.1x, the EAP type, such as Transport Layer Security (EAP-TLS), or EAP Tunneled Transport Layer Security (EAP-TTLS), defines how the authentication takes place. Note: For environments with a Remote Authentication Dial-In User Service (RADIUS) infrastructure, WPA supports Extensible Authentication Protocol (EAP). For environments without a RADIUS infrastructure, WPA supports the use of a pre-shared key. Together, these technologies provide a framework for strong user authentication. Windows XP implements 802.1x natively, and several NETGEAR switch and wireless access point products support 802.1x. Client with a WPA/ WPA2-enabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse) For example, a WPA/WPA2-enabled AP For example, a RADIUS server Figure 8-4 B-12 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The AP sends Beacon Frames with WPA/WPA2 information element to the stations in the service set. Information elements include the required authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and Association Requests (station to AP) also contain WPA information elements. 1. Initial 802.1x communications begin with an unauthenticated supplicant (client device) attempting to connect with an authenticator (802.11 access point). The client sends an EAP-start message. This begins a series of message exchanges to authenticate the client. 2. The access point replies with an EAP-request identity message. 3. The client sends an EAP-response packet containing the identity to the authentication server. The access point responds by enabling a port for passing only EAP packets from the client to an authentication server located on the wired side of the access point. The access point blocks all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the client's identity using an authentication server (for example, RADIUS). 4. The authentication server uses a specific authentication algorithm to verify the client's identity. This could be through the use of digital certificates or some other EAP authentication type. 5. The authentication server will either send an accept or reject message to the access point. 6. The access point sends an EAP-success packet (or reject packet) to the client. 7. If the authentication server accepts the client, then the access point will transition the client's port to an authorized state and forward additional traffic. The important part to know at this point is that the software supporting the specific EAP type resides on the authentication server and within the operating system or application âsupplicantâ software on the client devices. The access point acts as a âpass throughâ for 802.1x messages, which means that you can specify any EAP type without needing to upgrade an 802.1x-compliant access point. As a result, you can update the EAP authentication type to such devices as token cards (Smart Cards), Kerberos, one-time passwords, certificates, and public key authentication, or as newer types become available and your requirements for security change. WPA/WPA2 Data Encryption Key Management With 802.1x, the rekeying of unicast encryption keys is optional. Additionally, 802.11 and 802.1x provide no mechanism to change the global encryption key used for multicast and broadcast traffic. With WPA/WPA2, rekeying of both unicast and global encryption keys is required. For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for every frame, and the change is synchronized between the wireless client and the wireless access point (AP). For the global encryption key, WPA includes a facility (the Information Element) for the wireless AP to advertise the changed key to the connected wireless clients. Wireless Networking Basics B-13 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 If configured to implement dynamic key exchange, the 802.1x authentication server can return session keys to the access point along with the accept message. The access point uses the session keys to build, sign and encrypt an EAP key message that is sent to the client immediately after sending the success message. The client can then use contents of the key message to define applicable encryption keys. In typical 802.1x implementations, the client can automatically change encryption keys as often as necessary to minimize the possibility of eavesdroppers having enough time to crack the key in current use. Temporal Key Integrity Protocol (TKIP). WPA uses TKIP to provide important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the following: ⢠The verification of the security configuration after the encryption keys are determined. ⢠The synchronized changing of the unicast encryption key for each frame. ⢠The determination of a unique starting unicast encryption key for each preshared key authentication. Michael. With 802.11 and WEP, data integrity is provided by a 32-bit integrity check value (ICV) that is appended to the 802.11 payload and encrypted with WEP. Although the ICV is encrypted, you can use cryptanalysis to change bits in the encrypted payload and update the encrypted ICV without being detected by the receiver. With WPA, a method known as Michael specifies a new algorithm that calculates an 8-byte message integrity check (MIC) using the calculation facilities available on existing wireless devices. The MIC is placed between the data portion of the IEEE 802.11 frame and the 4-byte ICV. The MIC field is encrypted together with the frame data and the ICV. Michael also provides replay protection. A new frame counter in the IEEE 802.11 frame is used to prevent replay attacks. AES Support for WPA2. One of the encryption methods supported by WPA2 is the advanced encryption standard (AES), although AES support will not be required initially for Wi-Fi certification. This is viewed as the optimal choice for security conscience organizations, but the problem with AES is that it requires a fundamental redesign of the NIC hardware in both the station and the access point. TKIP is a pragmatic compromise that allows organizations to deploy better security while AES capable equipment is being designed, manufactured, and incrementally deployed. B-14 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Is WPA/WPA2 Perfect? WPA/WPA2 is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the message integrity code (MIC) within 60 seconds of each other, then the network is under an active attack, and as a result, the access point employs counter measures, which include disassociating each station using the access point. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More than anything else, this may just prove that no single security tactic is completely invulnerable. WPA/WPA2 is a definite step forward in WLAN security over WEP and has to be thought of as a single part of an end-to-end network security strategy. Product Support for WPA/WPA2 Starting in August, 2003, NETGEAR, Inc. wireless Wi-Fi certified products will support the WPA standard. NETGEAR, Inc. wireless products that had their Wi-Fi certification approved before August, 2003 will have one year to add WPA so as to maintain their Wi-Fi certification. WPA/WPA2 requires software changes to the following: ⢠Wireless access points ⢠Wireless network adapters ⢠Wireless client programs Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged To support the gradual transition of WEP-based wireless networks to WPA/WPA2, a wireless AP can support both WEP and WPA/WPA2 clients at the same time. During the association, the wireless AP determines which clients use WEP and which clients use WPA/WPA2. The disadvantage to supporting a mixture of WEP and WPA/WPA2 clients is that the global encryption key is not dynamic. This is because WEP-based clients cannot support it. All other benefits to the WPA clients, such as integrity, are maintained. However, a mixed mode supporting WPA/WPA2 and non-WPA/WPA2 clients would offer network security that is no better than that obtained with a non-WPA/WPA2 network, and thus this mode of operation is discouraged. Changes to Wireless Access Points Wireless access points must have their firmware updated to support the following: Wireless Networking Basics B-15 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ⢠⢠⢠⢠⢠The new WPA/WPA2 information element To advertise their support of WPA/WPA2, wireless APs send the beacon frame with a new 802.11 WPA/WPA2 information element that contains the wireless AP's security configuration (encryption algorithms and wireless security configuration information). The WPA/WPA2 two-phase authentication Open system, then 802.1x (EAP with RADIUS or preshared key). TKIP Michael AES (WPA2) To upgrade your wireless access points to support WPA/WPA2, obtain a WPA/WPA2 firmware update from your wireless AP vendor and upload it to your wireless AP. Changes to Wireless Network Adapters Wireless networking software in the adapter, and possibly in the OS or client application, must be updated to support the following: ⢠The new WPA/WPA2 information element Wireless clients must be able to process the WPA/WPA2 information element and respond with a specific security configuration. ⢠The WPA/WPA2 two-phase authentication Open system, then 802.1x supplicant (EAP or preshared key). ⢠TKIP ⢠Michael ⢠AES (WPA2) To upgrade your wireless network adapters to support WPA/WPA2, obtain a WPA/WPA2 update from your wireless network adapter vendor and update the wireless network adapter driver. For Windows wireless clients, you must obtain an updated network adapter driver that supports WPA. For wireless network adapter drivers that are compatible with Windows XP (Service Pack 1) and Windows Server 2003, the updated network adapter driver must be able to pass the adapter's WPA capabilities and security configuration to the Wireless Zero Configuration service. Microsoft has worked with many wireless vendors to embed the WPA driver update in the wireless adapter driver. So, to update your Microsoft Windows wireless client, all you have to do is obtain the new WPA/WPA2-compatible driver and install the driver. B-16 Wireless Networking Basics v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA/WPA2 authentication (and preshared key) and the new WPA/WPA2 encryption algorithms (TKIP and AES). To obtain the Microsoft WPA client program, visit the Microsoft Web site. Note: The Microsoft WPA2 client is still in beta. Wireless Networking Basics B-17 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 B-18 Wireless Networking Basics v0.1, December 2005 Appendix C Command Line Reference In addition to the Web based user interface, the NETGEAR ProSafe 802.11g Wireless Access Point WG302 includes a command line interface (CLI) for administering the access point. The CLI lets you view and modify status and configuration information. The following topics provide an introduction to the class structure upon which the CLI is based, CLI commands, and examples of using the CLI to get or set configuration information on an access point or cluster of APs: ⢠âConfigurable CLI and Web UI Settings Comparisonâ ⢠âQuick View of Commands and How to Get Helpâ ⢠âKeyboard Shortcuts and Tab Completion Helpâ Configurable CLI and Web UI Settings Comparison The command line interface (CLI) and the Web user interface (UI) to the WG302 Wireless Access Point are designed to suit the preferences and requirements for different types of users or scenarios. Most administrators will probably use both UIs in different contexts. Some features (such as Clustering) can only be configured from the Web UI and, conversely, some details and more complex configurations are only available through the CLI. The CLI is particularly useful in that it provides an interface to which you can write programmatic scripts for AP configurations. Also, the CLI can be made available through a serial port, so it can be used even if the network connection is not functioning. Finally, the CLI may be less resource-intensive than a Web interface. Command Line Reference C-1 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 The following table shows a feature-by-feature comparison of which settings can be configured through the CLI or the Web UI, and which are configurable with either. Table 8-1. Feature or Setting Configurable from CLI Configurable from Web UI Basic Settings ⢠Getting/changing Administrator Password ⢠Getting/changing AP name and location Viewing information like MAC, IP address, and Firmware version yes yes User Accounts yes yes User Database Backup and Restore You cannot backup or restore a user database from the CLI. yes Sessions The CLI does not provide yes session monitoring information. Use the Web UI to view client sessions. Channel Management You cannot configure Channel Management from the CLI. . yes Status yes yes Ethernet (Wired) Interface yes yes Wireless Interface yes yes Security yes yes Set Up Guest Access yes yes Enable/Configure Guest Login Welcome Page yes Configuring Multiple BSSIDs on Virtual Wireless Networks yes yes Radio Settings yes yes MAC Filtering yes yes Load Balancing yes yes Quality of Service yes yes Wireless Distribution System yes yes Time Protocol yes yes C-2 Command Line Reference v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Table 8-1. Configurable from Web UI Feature or Setting Configurable from CLI Reboot the AP yes Reset the AP to Factory Defaults yes Upgrade the Firmware You cannot upgrade the yes firmware from the CLI. Please use the Web UI to configure this feature. Backup and Restore You cannot backup or restore an AP configuration from the CLI. yes yes Quick View of Commands and How to Get Help This section describes the commands, command syntax, and how to get help on commands at the CLI Warning: Settings updated from the CLI (with get, set, add, and remove commands) will not be saved to the startup configuration unless you explicitly save them by issuing the save-running command. Commands and Syntax The CLI for the WG302 Wireless Access Point provides the following commands for manipulating objects.. Note: named_class is a class of an object from the configuration whose instances are individually named. Named classes have two types: unique-named and group-named. All the instances of a unique named class must be assigned unique names. In a group named class, instances that have the same name form a group. instance is a name of an instance of class. Note: Property values cannot contain spaces unless the value is in quotes. Command Line Reference C-3 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 get The âgetâ command allows you to get the property values of existing instances of a class. Classes can be ânamedâ or âunnamedâ. The command syntax is: get unnamed-class [property... | detail] get named-class [instance | all [property... | name | detail]] The rest of the command line is optional. If provided, it is either a list of one or more properties, or the keyword detail. An example of using the âgetâ command on an unnamed class with a single instance is: get log (There is only one log on the AP. This command returns information on the log file.) An example of using the âgetâ command on an unnamed class with multiple instances is: get log-entry (There are multiple log entries but they are not named. This command returns all log entries.) An example of using the âgetâ command on a named class with multiple instances is: get bss wlan0bssInternal (There are multiple bssâs and they are named. This command returns information on the BSS named âwlan0bssInternalâ.) An example of using the âgetâ command on a named class to get all instances: get radius-user all name get radius-user all Note: âwlan0bssInternalâ is the name of the basic service set (BSS) on the internal network (wlan0 interface). C-4 Command Line Reference v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 set The âsetâ command allows you to set the property values of existing instances of a class. set unnamed-class [with qualifier-property qualifier-value... to] property value... The first argument is an unnamed class in the configuration. After this is an optional qualifier that restricts the set to only some instances. For singleton classes (with only one instance) no qualifier is needed. If there is a qualifier, it starts with the keyword with, then has a sequence of one or more qualifier-property qualifier-value pairs, and ends with the keyword to. If these are included, then only instances whose present value of qualifier-property is qualifier-value will be set. The qualifier-value arguments cannot contain spaces. Therefore, you cannot select instances whose desired qualifier-value has a space in it. The rest of the command line contains property-value pairs. set named-class instance | all [with qualifier-property qualifier-value... to] property value... The first argument is either a named class in the configuration. The next argument is either the name of the instance to set, or the keyword all, which indicates that all instances should be set. Classes with multiple instances can be set consecutively in the same command line as shown in Example 4 below. The qualifier-value arguments cannot contain spaces. Here are some examples. (Bold text indicates class names, property names or keywords; the unbold text are values to which the properties are being set.) 1. set interface wlan0 ssid âVicky's APâ 2. set radio all beacon-interval 200 3. set tx-queue wlan0 with queue data0 to aifs 3 4. set tx-queue wlan0 with queue data0 to aifs 7 cwmin 15 cwmax 1024 burst 0 5. set bridge-port br0 with interface eth0 to path-cost 200 add The âaddâ command allows you to add a new instance or group of instances of a class. add unique-named-class instance [property value...] add group-named-class instance [property value...] add anonymous-class [property value...] For example: add radius-user wally Note: If youâre adding an instance to a unique-named class, you must assign the instance a name not already in use by any other instance of that class. If you add instances to group-named classes, you can form groups by creating instances and assigning them identical names. All instances of a group-named class that have the same name form a group of instances. Command Line Reference C-5 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 remove The âremoveâ command allows you to remove an existing instance of a class. remove unnamed-class [property value...] remove named-class instance | all [property value...] For example: remove radius-user wally The CLI also includes the following commands for maintenance tasks: save-running The save-running command saves the running configuration as the startup configuration. reboot The reboot command restarts the access point (a âsoftâ reboot). factory-reset The factory-reset command resets the AP to factory defaults and reboots. Getting Help on Commands at the CLI Help on commands can be requested at the command line interface (CLI) by using the TAB key. This is a quick way to see all valid completions for a class. Hitting TAB once will attempt to complete the current command. If multiple completions exist, a beep will sound and no results will be displayed. Enter TAB again to display all available completions. Example 1: At a blank command line, hit TAB twice to get a list of all commands. NETGEAR-AP# add factory-reset get reboot remove save-running set Add an instance to the running configuration Reset the system to factory defaults Get property values of the running configuration Reboot the system Remove instances in the running configuration Save the running configuration Set property values of the running configuration Type âgetâ(including a space after get) to see a list of all property options for the get command. Example 2: NETGEAR-AP# get association Associated station basic-rate Basic rates of radios bridge-port Bridge ports of bridge interfaces bss Basic Service Set of radios C-6 Command Line Reference v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 config Configuration settings detected-ap Detected access point dhcp-client DHCP client settings dot11 IEEE 802.11 (all radios) host Internet host settings interface Network interface ip-route IP route entry log Log settings log-entry Log entry mac-acl MAC address access list item ntp Network Time Protocol client portal Guest captive portal radio Radio radius-user RADIUS user serial Serial access to the command line interface snmp SNMP (Simple Network Management Protocol) ssh SSH access to the command line interface static-ip-route supported-rate Supported rates of radios system System settings telnet Telnet access to the command line interface traphost Destination host for SNMP traps tx-queue Transmission queue parameters wme-queue Transmission queue parameters for stations Type get system v TAB. This results in completion with the only matching property, get system version. Press ENTER to display the output results of the command. Example 3: Command Line Reference C-7 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Keyboard Shortcuts and Tab Completion Help The CLI provides keyboard shortcuts to help you navigate the command line and build valid commands, along with âtab completionâ hints on available commands that match what you have typed so far. Table 8-2.describes the keyboard shortcuts available from the CLI. Table 8-2. Keyboard Shortcuts Keyboard Shortcut Action on CLI Ctrl-a Home Move cursor to the beginning of the current line Ctrl-e End Move cursor to the end of the current line Ctrl-b Left Arrow key Move cursor back on the current line, one character at a time Ctrl-f Right Arrow Key Move the cursor forward on the current line, one character at a time Ctrl-c Start over at a blank command prompt (abandons the input on the current line) Ctrl-h Remove one character on the current line. Ctrl-W Remove the last word in the current command. (Clears one word at a time from the current command line, always starting with the last word on the line.) Ctrl-k Remove characters starting from cursor location to end of the current line. (Clears the current line from the cursor forward.) Ctrl-U Remove all characters before the cursor. (Clears the current line from the cursor back to the CLI prompt.) Ctrl-l Clear screen but keep current CLI prompt and input in place. Ctrl-p Up Arrow key Display previous command in history. (Ctrl-p and Ctrl-n let you cycle through a history of all executed commands like Up and Down arrow keys typically do. Up/Down arrow keys also work for this.) Ctrl-n Down Arrow key Display next command in history. (Ctrl-p and Ctrl-n let you cycle through a history of all executed commands like Up and Down arrow keys typically do. Up/Down arrow keys also work for this.) Ctrl-d Exit the CLI. (At a blank command prompt, typing Ctrl-d closes the CLI.) (Typing Ctrl-d within command text also removes characters, one at a time, at cursor location like Ctrl-h.) C-8 Command Line Reference v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 CLI Command Sets This section lists the CLI commands available from the WG302 Wireless Access Point command line. TBD Command Line Reference C-9 v0.1, December 2005 Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 C-10 Command Line Reference v0.1, December 2005
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Extract, Print high-res Tagged PDF : No Page Mode : UseOutlines XMP Toolkit : 3.1-702 About : uuid:b9990ff1-41ac-4b8d-9e81-f4740343fe00 Producer : Acrobat Distiller 7.0.5 (Windows) Creator Tool : FrameMaker 7.0 Modify Date : 2006:04:12 09:29-07:00 Create Date : 2005:12:02 12:00:28Z Metadata Date : 2006:04:12 09:29-07:00 Document ID : uuid:bb30f04c-e43c-4864-99e2-c064a03ab661 Instance ID : uuid:91d41f30-a571-44c6-bb58-9d6f2190b9a3 Format : application/pdf Title : Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302 Creator : LVL7 Has XFA : No Page Count : 112 Page Layout : SinglePage Author : LVL7EXIF Metadata provided by EXIF.tools