Quick Reference Guide
Table Of Contents
- ProSafe Wireless-N Access Point WNAP210 Reference Manual
- Contents
- Chapter 1 Introduction
- Chapter 2 Installation and Configuration
- Wireless Equipment Placement and Range Guidelines
- Understanding WNAP210 Wireless Security Options
- Installing the WNAP210 Wireless Access Point
- Deploying the Access Point
- Mounting the Access Point Using the Wall Mount Kit (Optional)
- Setting Basic IP Options
- Wireless Settings
- Setting Up and Testing Basic Wireless Connectivity
- Understanding Security Profiles
- Chapter 3 Management
- Remote Management
- Remote Console
- Upgrading the Wireless Access Point Software
- Managing the Configuration File
- Restoring the WNAP210 to the Factory Default Settings
- Changing the Administrator Password
- Enabling the Syslog Server
- Using Activity Log Information
- Viewing General Summary Information
- Viewing Network Traffic Statistics
- Viewing Available Wireless Station Statistics
- Enabling Rogue AP Detection
- Viewing and Saving AP Lists
- Chapter 4 Advanced Configuration
- Chapter 5 Troubleshooting and Debugging
- No lights are lit on the wireless access point.
- The Wireless LAN LED does not light up.
- The Ethernet LAN LED is not lit.
- I cannot access the Internet or the LAN with a wireless- capable computer.
- I cannot connect to the WNAP210 to configure it.
- When I enter a URL or IP address, I get a time-out error.
- Using the Restore Factory Settings Button to Restore Default Settings
- Appendix A Default Settings and Technical Specifications
- Appendix B Related Documents
- Appendix C Command Line Reference
- Index

ProSafe Wireless-N Access Point WNAP210 Reference Manual
Introduction 1-3
v1.0 March 2009
Key Features
The WNAP210 Access Point provides solid functionality, including the following features:
• Multiple operating modes:
– Wireless Access Point. Operates as a standard 802.11b/g/n access point.
– Point-to-Point Bridge. In this mode, the access point communicates only with another
bridge-mode wireless station or access point. Network authentication should be used to
protect this communication.
– Point-to-Multi-Point Bridge. Select this only if this access point is the “master” for a
group of bridge-mode wireless stations. The other bridge-mode wireless stations send all
traffic to this master, and do not communicate directly with each other. Network
authentication should be used to protect this traffic.
– Wireless Repeater. In this mode, the access point does not function as an access point. It
communicates only with Repeater mode, Point-to-Point Bridge mode, and Point-to-Multi-
point-bridge-mode wireless stations. Network authentication should be used to protect this
communication.
• Hotspot settings. You can allow all HTTP (TCP, port 80) requests to be captured and
redirected to the URL you specify.
• Upgradeable firmware. Firmware is stored in a flash memory, you can upgrade it easily,
using only your Web browser, and you can upgrade it remotely. You can also use the
command-line interface.
• Rogue AP detection. The Rogue AP filtering feature ensures that unknown APs are not given
access to any part of the LAN.
• Access Control. The Access Control MAC address filtering feature can ensure that only
trusted wireless stations can use the access point to gain access to your LAN.
• Security profiles. When using multiple BSSIDs, you can configure unique security settings
(encryption, SSID, and so on) for each BSSID.
• Hidden mode. The SSID is not broadcast, assuring only clients configured with the correct
SSID can connect.
• Configuration backup. Configuration settings can be backed up to a file and restored.
• Secure and economical operation. Adjustable power output allows more secure or
economical operation.
• Power over Ethernet. Power can be supplied to the access point over the Ethernet port from
any 802.3af-compliant mid-span or end-span source.










