User's Manual

Table Of Contents
User’s Guide for the WG602 54 Mbps Wireless Access Point
Introduction 2-3
Client Access Point. The WG602 v2 acts as a client access point (CAP) for a remote
GAP. If selected, you must enter the MAC address (physical address) of the remote GAP.
Repeater Access Point. The WG602 v2 acts as a repeater only, and sends all traffic to the
remote AP. If selected, you must enter the MAC address (physical address) of the remote
AP.
Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily,
using only your Web browser, and can be upgraded remotely.
Access Control. The Access Control MAC Address filtering feature can ensure that only
trusted wireless stations can use the WG602 v2 to gain access to your LAN.
Simple Configuration. If the default settings are unsuitable, they are easy to change.
Hidden Mode. The SSID is not broadcast, assuring only clients configured with the correct
SSID can connect.
Configuration Backup. Configuration settings can be backed up to a file and restored.
Supports Diversity. Dual removable external antennas support diversity.
Secure and Economical Operation. Adjustable power output allows more secure or
economical operation.
Automatic Date and Time Updates. Date and time can be automatically updated from
Internet time servers.
Autosensing Ethernet Connection with
Auto Uplink Interface. Connects to 10/100 Mbps
IEEE 802.3 Ethernet networks.
LED Indicators. Power and wireless activity are easily identified.
802.11g Standards-based Wireless Networking
The 54 Mbps Wireless Access Point WG602 v2 provides a bridge between Ethernet wired LANs
and 802.11g compatible wireless LAN networks. It provides connectivity between Ethernet wired
networks and radio-equipped wireless notebook systems, desktop systems, print servers, and other
devices. Additionally, the WG602 v2 supports the following wireless features:
Distributed coordinated function (CSMA/CA, Back off procedure, ACK procedure,
retransmission of unacknowledged frames)
RTS/CTS handshake
Beacon generation
Packet fragmentation and reassembly
Authentication Algorithms (Open System, Shared Key)