User's Manual
Table Of Contents
- Trademarks
- Statement of Conditions
- Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
- Canadian Department of Communications Compliance Statement
- CE Declaration of Conformity
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Basic Installation and Configuration
- Observing Placement and Range Guidelines
- Default Factory Settings
- Understanding WG602 v2 Wireless Security Options
- Installing the 54 Mbps Wireless Access Point WG602 v2
- Two Ways to Log In to the WG602 v2
- Using the Basic IP Settings Options
- Understanding the Basic Wireless Settings
- Understanding Wireless Security Options
- How to Configure WEP Wireless Security
- How to Configure WPA-PSK Wireless Security
- How to Restrict Wireless Access by MAC Address
- Chapter 4 Management
- Chapter 5 Advanced Configuration
- Chapter 6 Troubleshooting
- Troubleshooting
- No lights are lit on the access point.
- The Ethernet LAN light is not lit.
- The Wireless LAN activity light is not lit.
- I cannot configure the wireless access point from a browser.
- I cannot access the Internet or the LAN with a wireless capable computer.
- When I enter a URL or IP address I get a timeout error.
- Using the Reset Button to Restore Factory Default Settings
- Troubleshooting
- Appendix A Specifications
- Appendix B Wireless Networking Basics
- Appendix C Network, Routing, Firewall, and Cabling Basics
- Appendix D Preparing Your PCs for Network Access
- Glossary
- Index
User’s Guide for the WG602 54 Mbps Wireless Access Point
8 Glossary
Network Address Translation
Sometimes referred to as Transparent Proxying, IP Address Overloading, or IP Masquerading. Involves use
of a device called a Network Address Translator, which assigns a contrived, or logical, IP address and port
number to each node on an organization's internal network and passes packets using these assigned
addresses.
NIC
Network Interface Card. An adapter in a computer which provides connectivity to a network.
P
packet
A block of information sent over a network. A packet typically contains a source and destination network
address, some protocol and length information, a block of data, and a checksum.
Point-to-Point Protocol
PPP. A protocol allowing a computer using TCP/IP to connect directly to the Internet.
PPP
A protocol allowing a computer using TCP/IP to connect directly to the Internet.
PPPoA
PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on
connection by simulating a dial-up connection.
PPPoE
PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on
connection by simulating a dial-up connection.
PPP over ATM
PPPoA. PPP over ATM is a protocol for connecting remote hosts to the Internet over an always-on
connection by simulating a dial-up connection.
PPP over Ethernet
PPPoE. PPP over Ethernet is a protocol for connecting remote hosts to the Internet over an always-on
connection by simulating a dial-up connection.
PPTP
Point-to-Point Tunneling Protocol. A method for establishing a virtual private network (VPN) by embedding
Microsoft’s network protocol into Internet packets.










