User's Manual
Table Of Contents
- ProSafe Dual Band Wireless-N Access Point WNDAP360
- Contents
- 1. Introduction
- 2. Installation and Basic Configuration
- 3. Wireless Configuration and Security
- 4. Management
- 5. Advanced Configuration
- 6. Troubleshooting
- Basic Functioning
- You Cannot Access the Internet or the LAN from a Wireless-Capable Computer
- You Cannot Configure the Wireless Access Point from a Browser
- When You Enter a URL or IP Address a Time-Out Error Occurs
- Troubleshooting a TCP/IP Network Using the Ping Utility
- Problems with Date and Time
- Use the Packet Capture Tool
- A. Supplemental Information
- B. Command-Line Reference
- C. Notification of Compliance
- Index
Introduction
9
ProSafe Dual Band Wireless-N Access Point WNDAP360
Key Features
The ProSafe Dual Band Wireless-N Access Point WNDAP360 provides solid functionality,
including the following features:
• Dual Band
Conc
urrent. The wireless access point can operate in both the 2.4 GHz band
and the 5 GHz band concurrently.
The choice of bands is reflected in the protocol standard supported, as well as the
a
d
ministration screens that are displayed.
• Mul
tiple operating modes:
- Wireless access point. Op
erates as a standard 802.11b/g/n or 802.11a/n wireless
access point.
- Point-to-point bridge. In this
mode, the wireless access point communicates only
with another bridge-mode wireless station or wireless access point. Network
authentication should be used to protect this communication.
- Point-to-multipoint bridge. Sele
ct thi
s only if this wireless access point is the master
for a group of bridge-mode wireless stations. The other bridge-mode wireless stations
send all traffic to this master, and do not communicate directly with each other.
Network authentication should be used to protect this traffic.
- Repeating the wireless signal. In
this mode, the wireless access point does not
function as an access point for clients but functions only in point-to-multipoint bridge
mode to repeat the wireless signal and send all traffic to a remote access point.
Network authentication should be used to protect this communication.
• Hotspot settings.
You can allow all HTTP (TCP, port 80) requests to be captured and
redirected to the URL you specify.
• Upgradeable firmware. Firmware is store
d in a flash memory. You can upgrade it easily,
using only your Web browser, and you can upgrade it remotely. You can also use the
command-line interface.
• Rogue AP detection. The Rogue
AP filtering feature ensures that unknown APs are not
given access to any part of the LAN.
• Access control. The Access Co
ntrol MAC address filtering feature can ensure that only
trusted wireless stations can use the wireless access point to gain access to your LAN.
• Security profiles. Whe
n using multiple BSSIDs, you can configure unique security
settings (encryption, SSID, and so on) for each BSSID.
• Hidden mode. The
SSID is not broadcast, assuring only clients configured with the
correct SSID can connect.
• Secure Telne
t command-line Interface. The secure Telnet command-line interface
(CLI) enables direct secure access over the serial port and easy scripting of configuration
of multiple wireless access points across an extensive network via the Ethernet interface.
A Secure Shell (SSH) client is required.
• Configuration backup. Config
uration settings can be backed up to a file and restored.
• Secure and econo
mical operation. Adjustable power output allows more secure or
economical operation.










