User's Manual
Table Of Contents
- Trademarks
- Statement of Conditions
- Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
- Canadian Department of Communications Compliance Statement
- CE Declaration of Conformity
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Basic Installation and Configuration
- Observing Placement and Range Guidelines
- Default Factory Settings
- Understanding WG602 v2 Wireless Security Options
- Installing the 54 Mbps Wireless Access Point WG602 v2
- Two Ways to Log In to the WG602 v2
- Using the Basic IP Settings Options
- Understanding the Basic Wireless Settings
- Understanding Wireless Security Options
- How to Configure WEP Wireless Security
- How to Configure WPA-PSK Wireless Security
- How to Restrict Wireless Access by MAC Address
- Chapter 4 Management
- Chapter 5 Advanced Configuration
- Chapter 6 Troubleshooting
- Troubleshooting
- No lights are lit on the access point.
- The Ethernet LAN light is not lit.
- The Wireless LAN activity light is not lit.
- I cannot configure the wireless access point from a browser.
- I cannot access the Internet or the LAN with a wireless capable computer.
- When I enter a URL or IP address I get a timeout error.
- Using the Reset Button to Restore Factory Default Settings
- Troubleshooting
- Appendix A Specifications
- Appendix B Wireless Networking Basics
- Appendix C Network, Routing, Firewall, and Cabling Basics
- Appendix D Preparing Your PCs for Network Access
- Glossary
- Index
Contents v
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Wireless Channels .................................................................................................. B-2
WEP Wireless Security .................................................................................................. B-4
WEP Authentication ................................................................................................ B-4
WEP Open System Authentication ......................................................................... B-5
WEP Shared Key Authentication ............................................................................ B-6
Key Size and Configuration .............................................................................. B-7
How to Use WEP Parameters ................................................................................. B-8
WPA Wireless Security .................................................................................................. B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to IEEE 802.11i? ........................................................ B-10
What are the Key Features of WPA Security? ...................................................... B-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. B-12
WPA DAta Encryption Key Management ........................................................ B-14
Is WPA Perfect? .................................................................................................... B-16
Product Support for WPA ...................................................................................... B-16
Supporting a Mixture of WPA and WEP Wireless Clients ............................... B-16
Changes to Wireless Access Points ............................................................... B-16
Changes to Wireless Network Adapters ......................................................... B-17
Changes to Wireless Client Programs ............................................................ B-18
Appendix C
Network, Routing, Firewall, and Cabling Basics
Basic Router Concepts .................................................................................................. B-1
What is a Router? ................................................................................................... B-2
IP Addresses and the Internet ....................................................................................... B-2
Netmask .................................................................................................................. B-4
Subnet Addressing .................................................................................................. B-4
Private IP Addresses ............................................................................................... B-7
Single IP Address Operation Using NAT ................................................................. B-7
IP Configuration by DHCP ...................................................................................... B-8










