User's Manual
Table Of Contents
- ProSafe Wireless-N Access Point WNAP320
- Contents
- 1. Introduction
- 2. Installation and Configuration
- Wireless Equipment Placement and Range Guidelines
- Understanding WNAP320 Wireless Security Options
- Installing theWireless Access Point
- Deploying the ProSafe Wireless Access Point
- Mounting the ProSafe Wireless Access Point Using the Wall Mount Kit (Optional)
- Setting Basic IP Options
- Configuring Wireless Settings
- Setting Up and Testing Basic Wireless Connectivity
- Understanding Security Profiles
- 3. Management
- Remote Management
- Remote Console
- Upgrading the Wireless Access Point Software
- Configuration File Management
- Restoring the WNAP320 to the Factory Default Settings
- Changing the Administrator Password
- Enabling the Syslog Server
- Using Activity Log Information
- Viewing General Summary Information
- Viewing Network Traffic Statistics
- Viewing Available Wireless Station Statistics
- Enabling Rogue AP Detection
- Viewing and Saving AP Lists
- 4. Advanced Configuration
- 5. Troubleshooting and Debugging
- No lights are lit on the product family.
- No lights are lit on the access point.
- The Wireless LAN LED does not light up.
- The Wireless LAN activity light does not light up.
- The Ethernet LAN LED is not lit.
- I cannot access the Internet or the LAN with a wireless-capable computer.
- I cannot connect to the WNAP320 to configure it.
- When I enter a URL or IP address, I get a time-out error.
- Using the Restore Factory Settings Button to Restore Default Settings
- A.
- A. Supplemental Information
- C. Compliance Notification
Chapter 2. Installation and Configuration | 17
ProSafe Wireless-N Access Point WNAP320 Reference Manual
Understanding WNAP320 Wireless Security Options
Anyone wih a compatible wireless adapter can recieve your wireless data transmissions well
beyond your walls. For this reason, use the security features of your wireless equipment. The
access point provides highly effective security features, which are covered in detail in this
chapter. Deploy the security features appropriate to your needs.
Figure 1.
There are several ways you can enhance the security of your wireless network:
• Restrict access based on MAC address. You can restrict access to only trusted PCs so
that unknown PCs cannot wirelessly connect to the access point. MAC address filtering
adds an obstacle against unwanted access to your network, but the data broadcast over
the wireless link is fully exposed.
• Turn off the broadcast of the wireless network name (SSID). If you disable broadcast
of the SSID, only devices that have the correct SSID can connect. This nullifies the
wireless network “discovery” feature of some products such as Windows XP, but the data
is still fully exposed to a determined snoop using specialized test equipment like wireless
sniffers.
• Use WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
open authentication and WEP data encryption will block all but the most determined
eavesdropper.
• Use WPA or WPA-PSK, WPA2, or WPA2-PSK. Wi-Fi Protected Access (WPA) data
encryption provides data security. The very strong authentication along with dynamic per
frame rekeying of WPA make it virtually impossible to compromise. Because this is a new
standard, wireless device driver and software availability might be limited.
Note: WEP and TKIP provide only legacy (slower) rates of operation.
AES encryption is recommended in order to use the 11n rates and
speed. See Table 1 on page 36.










