Home > Linksys > Router > Linksys Router WAP54G User Manual

Linksys Router WAP54G User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Linksys Router WAP54G User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Linksys manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							44Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Basic Wireless Settings Tab
    Wireless-G Access Point
    A new screen will be displayed while the Access Point is waiting for you to push the SecureEasySetup button on 
    your wireless client.
    When the SecureEasySetup process is complete, the Basic Wireless Settings screen will appear, and the Current 
    Encryption and Status information will be updated.
    Reset Security. If you already set up the network using the Access Point’s SecureEasySetup feature and you 
    want to replace your current settings with new SecureEasySetup settings, click the Reset Security button. A 
    new screen will appear. You will be asked to confirm that you want to reset your wireless security settings. Click 
    the OK button to continue.
    The Access Point will generate a new network name (SSID) and set of keys. To configure your wireless network 
    using SecureEasySetup, return to the previous page of this User Guide and follow the instructions for the 
    SecureEasySetup button.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.
    NOTE:You can only add one SecureEasySetup device at a time. For additional devices, click 
    the SecureEasySetup button on the Basic Wireless Settings screen and repeat the process.
    Figure 7-11: SecureEasySetup Completed Screen
    Figure 7-12: Confirm Reset
    Figure 7-10: Waiting for Completion of SecureEasySetup 
    						
    							45Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Wireless Security Tab
    Wireless-G Access Point
    The Wireless - Wireless Security Tab
    Change the Access Point’s wireless security settings on this screen.
    Wireless Security
    Security Mode. Select the security method you want to use, WPA-Personal, WPA2-Personal, WPA2-Mixed, 
    WPA-Enterprise, RADIUS, or WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger 
    than WEP encryption. WPA2 is a stronger version of WPA. WEP stands for Wired Equivalent Privacy, while RADIUS 
    stands for Remote Authentication Dial-In User Service.) Refer to the appropriate instructions below. For detailed 
    instructions on configuring wireless security for the Access Point, turn to “Appendix B: Wireless Security.” To 
    disable such security, select Disabled.
    WPA-Personal
    Encryption. WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the 
    type of algorithm you want to use, TKIP or AES.
    Passphrase. Enter a Passphrase (also called a WPA Shared Key) of 8-32 characters. 
    Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change 
    the encryption keys.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.
    WPA2-Personal
    Encryption. AES is automatically selected as the encryption method.
    Passphrase. Enter a Passphrase (also called a WPA Shared Key) of 8-32 characters. 
    Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change 
    the encryption keys.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.encryption: encoding data transmitted in a network.
    Figure 7-13: Wireless - Wireless Security 
    (WPA-Personal) Screen
    Figure 7-14: Wireless Security - WPA2-Personal Screen 
    						
    							46Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Wireless Security Tab
    Wireless-G Access Point
    WPA2-Mixed
    Encryption. TKIP + AES is automatically selected so both methods can be used.
    Passphrase. Enter a Passphrase (also called a WPA Shared Key) of 8-32 characters. 
    Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change 
    the encryption keys.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.
    WPA-Enterprise
    This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS 
    server is connected to the Access Point.)
    Encryption. WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the 
    type of algorithm you want to use, TKIP or AES.
    RADIUS Server. Enter the RADIUS server’s IP address.
    RADIUS Port. Enter the port number used by the RADIUS server.
    Shared Secret. Enter the Shared Secret key used by the Access Point and RADIUS server.
    Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change 
    the encryption keys.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.Figure 7-16: Wireless Security - WPA-Enterprise Screen
    Figure 7-15: Wireless Security - WPA2-Mixed Screen
    radius: a protocol that uses an authentication server to 
    control network access.
    server: any computer whose function in a network is to 
    provide user access to files, printing, communications, and 
    other services. 
    						
    							47Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Wireless Security Tab
    Wireless-G Access Point
    RADIUS
    This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS 
    server is connected to the Access Point.)
    RADIUS Server. Enter the RADIUS server’s IP address.
    RADIUS Port. Enter the port number used by the RADIUS server.
    Shared Secret. Enter the Shared Secret key used by the Access Point and RADIUS server.
    Encryption. Select a level of WEP encryption, 40/64 bits (10 hex digits) or 128 bits (26 hex digits).
    Passphrase. To generate WEP keys using a Passphrase, enter the Passphrase and click the Generate key.
    Key 1-4. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of 
    the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit 
    encryption or 26 characters in length for 128-bit encryption.
    TX Key. Select which Key to use for data transmissions.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.
    WEP
    Encryption. Select a level of WEP encryption, 40/64 bits (10 hex digits) or 128 bits (26 hex digits).
    Passphrase. To generate WEP keys using a Passphrase, enter the Passphrase and click the Generate key.
    Key 1-4. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of 
    the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit 
    encryption or 26 characters in length for 128-bit encryption.
    TX Key. Select which Key to use for data transmissions.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.Figure 7-17: Wireless Security - RADIUS Screen
    Figure 7-18: Wireless Security - WEP Screen 
    						
    							48Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Wireless MAC Filter Tab
    Wireless-G Access Point
    The Wireless - Wireless MAC Filter Tab
    This screen allows you to permit or block wireless access for computers with specific MAC addresses.
    Wireless MAC Filter
    Access Restriction
    If you want to control access to your wireless network, select Enable. If you do not wish to filter users by MAC 
    address, select Disable.
    To deny access, click Prevent PCs listed below from accessing the wireless network. To permit access, click 
    Permit PCs listed below to access the wireless network.
    MAC 01-25. Enter the MAC addresses of the computers whose access you want to control. If you want to list 
    more than 25 MAC addresses, then select MAC Addresses 26~50 from the drop-down menu.
    Click Clear to delete the MAC addresses you have entered.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.Figure 7-19: Wireless - Wireless MAC Filter Screen
    mac address: the unique address that a manufacturer 
    assigns to each networking device. 
    						
    							49Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Advanced Wireless Settings Tab
    Wireless-G Access Point
    The Wireless - Advanced Wireless Settings Tab
    This screen allows you to configure the advanced settings for the Access Point. In most cases, these settings do 
    not need to be changed.
    Advanced Wireless
    You can change the data transmission and output power settings for the Access Point.
    Authentication Type. Select the authentication method you want the Access Point to use, Shared Key or Open 
    System (Default). Shared Key is when both the sender and the recipient share a WEP key for authentication. 
    Open System is when the sender and the recipient do not share a WEP key for authentication. All devices on your 
    network must use the same authentication type. In most cases, keep the default, Open System (Default).
    Basic Rates. This setting is not actually one rate of transmission but a series of rates that are advertised to the 
    other wireless devices in your network, so they know at which rates the Access Point can transmit. At the Default 
    setting, the Access Point will advertise that it will automatically select the best rate for transmission. Other 
    options are 1-2Mbps, for use with older wireless technology, and All, when you wish to have all rates advertised. 
    The Basic Data Rates are not the rates transmitted; the rates transmitted can be configured through the 
    Transmission Rates setting on this screen.
    Transmission Rates. The range is from 1 to 54Mbps. The rate of data transmission should be set depending on 
    the speed of your wireless network. You can select from a range of transmission speeds, or you can keep the 
    default setting, Auto (Default), to have the Access Point automatically use the fastest possible data rate and 
    enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between the 
    Access Point and a wireless client.
    Transmission Power. You can adjust the output power of the Access Point to get the appropriate coverage for 
    your wireless network. Select the level you need for your environment. If you are not sure which setting to 
    choose, then keep the default setting, Full (Default).
    CTS Protection Mode. The CTS (Clear-To-Send) Protection Mode function boosts the Access Point’s ability to 
    catch all Wireless-G transmissions but will severely decrease performance. Select Enable if you want to 
    permanently enable this feature, or keep the default, Disable, if you want to permanently disable this feature. In 
    most cases, CTS Protection Mode should remain disabled, unless the Wireless-G products are experiencing 
    severe problems trying to transmit to the Access Point in an environment with heavy 802.11b traffic.
    Frame Burst Mode. Enabling this option should reduce overhead and enhance your network performance, 
    depending on the manufacturer of your wireless products. If you are not sure how to use this option, keep the 
    default, Disabled.Figure 7-20: Wireless - Advanced Wireless 
    Settings Screen
    cts (clear-to-send): a signal sent by a wireless device, 
    signifying that it is ready to receive data. 
    						
    							50Chapter 7: Configuring the Wireless-G Access Point
    The Wireless - Advanced Wireless Settings Tab
    Wireless-G Access Point
    Antenna Selection. This selection is for choosing which antenna transmits data, left or right. If you are not sure 
    which antenna to use, keep the default, Diversity, to increase reception.
    Beacon Interval.  This value indicates the frequency interval of the beacon. A beacon is a packet broadcast by 
    the Access Point to keep the network synchronized. A beacon includes the wireless networks service area, the 
    Access Point address, the Broadcast destination addresses, a time stamp, Delivery Traffic Indicator Maps, and 
    the Traffic Indicator Message (TIM).
    DTIM Interval. This value indicates how often the Access Point sends out a Delivery Traffic Indication Message 
    (DTIM). Lower settings result in more efficient networking, while preventing your PC from dropping into power-
    saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power, but interferes with 
    wireless transmissions.
    Fragmentation Threshold.  This specifies the maximum size a data packet can be before splitting and creating 
    a new packet. It should remain at its default setting of 2346. A smaller setting means smaller packets, which will 
    create more packets for each transmission. If you have decreased this value and experience high packet error 
    rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications 
    of this value are recommended.
    RTS Threshold.  This setting determines how large a packet can be before the Access Point coordinates 
    transmission and reception to ensure efficient communication. This value should remain at its default setting of 
    2347. Should you encounter inconsistent data flow, only minor modifications are recommended.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.fragmentation: breaking a packet into smaller units 
    when transmitting over a network. dtim (delivery traffic indication message): a message 
    included in data packets that can increase wireless 
    efficiency. beacon internal: data transmitted on your wireless network 
    that keeps the network synchronized.packet: a unit of data sent over a network.
    rts (request to send): a networking method of coordinating 
    large packets through the RTS Threshold setting. 
    						
    							51Chapter 7: Configuring the Wireless-G Access Point
    The Administration - Management Tab
    Wireless-G Access Point
    The Administration - Management Tab
    On this screen you can configure the password as well as back up or restore the Access Point’s configuration file.
    Management
    You should change the password that controls access to the Access Point’s Web-based Utility.
    AP’s Password
    Password. Create a Password for the Access Point’s Web-based Utility.
    Re-enter to Confirm. To confirm the new Password, enter it again in this field.
    Backup and Restore
    On this screen you can create a backup configuration file or save a configuration file to the Access Point.
    Backup Settings. To save a backup configuration file on a computer, click the Backup Settings button and 
    follow the on-screen instructions.
    Restore Settings. To upload a configuration file to the Access Point, click the Restore Settings button and 
    follow the on-screen instructions.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.Figure 7-21: Administration - Management Screen 
    						
    							52Chapter 7: Configuring the Wireless-G Access Point
    The Administration - SNMP Tab
    Wireless-G Access Point
    The Administration - SNMP Tab
    SNMP is a popular network monitoring and management protocol. It provides network administrators with the 
    ability to monitor the status of the Access Point and receive notification of any critical events as they occur on the 
    Access Point.
    SNMP V1/V2c
    To enable the SNMP support feature, select Enable. Otherwise, select Disable.
    Contact. Enter the name of the contact person, such as a network administrator, for the Access Point.
    Device Name. Enter the name you wish to give to the Access Point.
    Location. Enter the location of the Access Point.
    SNMP Community
    You can have up to two passwords. Then select the level of access you want to assign to each password.
    (public.) Enter the first password that allows access to the Access Point’s SNMP information. The default is 
    public. Then select the level of access you want to assign, Read-Only or Read/Write.
    (private.) Enter the second password that allows access to the Access Point’s SNMP information. The default is 
    private. Then select the level of access you want to assign, Read-Only or Read/Write.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.Figure 7-22: Administration - SNMP Screen 
    						
    							53Chapter 7: Configuring the Wireless-G Access Point
    The Administration - Log Tab
    Wireless-G Access Point
    The Administration - Log Tab
    On this screen you can configure the log settings.
    Management
    You can have logs that keep track of the Access Point’s activities.
    Log
    To enable the Log support feature, select Enabled. Otherwise, select Disabled.
    Logviewer IP Address. If you have chosen to monitor the Access Point’s traffic, then you can designate a PC that 
    will receive permanent log files periodically. In the field provided, enter the IP address of this PC. To view these 
    permanent logs, you must use Logviewer software, which can be downloaded free of charge from 
    www.linksys.com.
    View Log. To see a temporary log of the Access Point’s most recent activities, click this button.
    On the View Log screen, click the First Page button to see the first page of log entries. Click the Last Page button 
    to see the last page of log entries. Click the Previous Page button to see the previous page of log entries, and 
    click the Next Page button to see the next page of log entries. To delete all log entries, click the Clear Log 
    button. To update the log with the most recent activities, click the Refresh button.
    Change these settings as described here and click Save Settings to apply your changes, or click Cancel 
    Changes to cancel your changes. Click Help for more information.Figure 7-24: View Log Screen
    Figure 7-23: Administration - Log Screen 
    						
    All Linksys manuals Comments (0)

    Related Manuals for Linksys Router WAP54G User Manual