Linksys Router WAP54G User Manual
Have a look at the manual Linksys Router WAP54G User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 11 Linksys manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
44Chapter 7: Configuring the Wireless-G Access Point The Wireless - Basic Wireless Settings Tab Wireless-G Access Point A new screen will be displayed while the Access Point is waiting for you to push the SecureEasySetup button on your wireless client. When the SecureEasySetup process is complete, the Basic Wireless Settings screen will appear, and the Current Encryption and Status information will be updated. Reset Security. If you already set up the network using the Access Point’s SecureEasySetup feature and you want to replace your current settings with new SecureEasySetup settings, click the Reset Security button. A new screen will appear. You will be asked to confirm that you want to reset your wireless security settings. Click the OK button to continue. The Access Point will generate a new network name (SSID) and set of keys. To configure your wireless network using SecureEasySetup, return to the previous page of this User Guide and follow the instructions for the SecureEasySetup button. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information. NOTE:You can only add one SecureEasySetup device at a time. For additional devices, click the SecureEasySetup button on the Basic Wireless Settings screen and repeat the process. Figure 7-11: SecureEasySetup Completed Screen Figure 7-12: Confirm Reset Figure 7-10: Waiting for Completion of SecureEasySetup
45Chapter 7: Configuring the Wireless-G Access Point The Wireless - Wireless Security Tab Wireless-G Access Point The Wireless - Wireless Security Tab Change the Access Point’s wireless security settings on this screen. Wireless Security Security Mode. Select the security method you want to use, WPA-Personal, WPA2-Personal, WPA2-Mixed, WPA-Enterprise, RADIUS, or WEP. (WPA stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption. WPA2 is a stronger version of WPA. WEP stands for Wired Equivalent Privacy, while RADIUS stands for Remote Authentication Dial-In User Service.) Refer to the appropriate instructions below. For detailed instructions on configuring wireless security for the Access Point, turn to “Appendix B: Wireless Security.” To disable such security, select Disabled. WPA-Personal Encryption. WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm you want to use, TKIP or AES. Passphrase. Enter a Passphrase (also called a WPA Shared Key) of 8-32 characters. Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change the encryption keys. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information. WPA2-Personal Encryption. AES is automatically selected as the encryption method. Passphrase. Enter a Passphrase (also called a WPA Shared Key) of 8-32 characters. Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change the encryption keys. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.encryption: encoding data transmitted in a network. Figure 7-13: Wireless - Wireless Security (WPA-Personal) Screen Figure 7-14: Wireless Security - WPA2-Personal Screen
46Chapter 7: Configuring the Wireless-G Access Point The Wireless - Wireless Security Tab Wireless-G Access Point WPA2-Mixed Encryption. TKIP + AES is automatically selected so both methods can be used. Passphrase. Enter a Passphrase (also called a WPA Shared Key) of 8-32 characters. Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change the encryption keys. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information. WPA-Enterprise This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Access Point.) Encryption. WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys. Select the type of algorithm you want to use, TKIP or AES. RADIUS Server. Enter the RADIUS server’s IP address. RADIUS Port. Enter the port number used by the RADIUS server. Shared Secret. Enter the Shared Secret key used by the Access Point and RADIUS server. Key Renewal. Enter a Key Renewal timeout period, which instructs the Access Point how often it should change the encryption keys. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.Figure 7-16: Wireless Security - WPA-Enterprise Screen Figure 7-15: Wireless Security - WPA2-Mixed Screen radius: a protocol that uses an authentication server to control network access. server: any computer whose function in a network is to provide user access to files, printing, communications, and other services.
47Chapter 7: Configuring the Wireless-G Access Point The Wireless - Wireless Security Tab Wireless-G Access Point RADIUS This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Access Point.) RADIUS Server. Enter the RADIUS server’s IP address. RADIUS Port. Enter the port number used by the RADIUS server. Shared Secret. Enter the Shared Secret key used by the Access Point and RADIUS server. Encryption. Select a level of WEP encryption, 40/64 bits (10 hex digits) or 128 bits (26 hex digits). Passphrase. To generate WEP keys using a Passphrase, enter the Passphrase and click the Generate key. Key 1-4. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit encryption or 26 characters in length for 128-bit encryption. TX Key. Select which Key to use for data transmissions. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information. WEP Encryption. Select a level of WEP encryption, 40/64 bits (10 hex digits) or 128 bits (26 hex digits). Passphrase. To generate WEP keys using a Passphrase, enter the Passphrase and click the Generate key. Key 1-4. If you want to manually enter WEP keys, then complete the fields provided. Each WEP key can consist of the letters “A” through “F” and the numbers “0” through “9”. It should be 10 characters in length for 64-bit encryption or 26 characters in length for 128-bit encryption. TX Key. Select which Key to use for data transmissions. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.Figure 7-17: Wireless Security - RADIUS Screen Figure 7-18: Wireless Security - WEP Screen
48Chapter 7: Configuring the Wireless-G Access Point The Wireless - Wireless MAC Filter Tab Wireless-G Access Point The Wireless - Wireless MAC Filter Tab This screen allows you to permit or block wireless access for computers with specific MAC addresses. Wireless MAC Filter Access Restriction If you want to control access to your wireless network, select Enable. If you do not wish to filter users by MAC address, select Disable. To deny access, click Prevent PCs listed below from accessing the wireless network. To permit access, click Permit PCs listed below to access the wireless network. MAC 01-25. Enter the MAC addresses of the computers whose access you want to control. If you want to list more than 25 MAC addresses, then select MAC Addresses 26~50 from the drop-down menu. Click Clear to delete the MAC addresses you have entered. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.Figure 7-19: Wireless - Wireless MAC Filter Screen mac address: the unique address that a manufacturer assigns to each networking device.
49Chapter 7: Configuring the Wireless-G Access Point The Wireless - Advanced Wireless Settings Tab Wireless-G Access Point The Wireless - Advanced Wireless Settings Tab This screen allows you to configure the advanced settings for the Access Point. In most cases, these settings do not need to be changed. Advanced Wireless You can change the data transmission and output power settings for the Access Point. Authentication Type. Select the authentication method you want the Access Point to use, Shared Key or Open System (Default). Shared Key is when both the sender and the recipient share a WEP key for authentication. Open System is when the sender and the recipient do not share a WEP key for authentication. All devices on your network must use the same authentication type. In most cases, keep the default, Open System (Default). Basic Rates. This setting is not actually one rate of transmission but a series of rates that are advertised to the other wireless devices in your network, so they know at which rates the Access Point can transmit. At the Default setting, the Access Point will advertise that it will automatically select the best rate for transmission. Other options are 1-2Mbps, for use with older wireless technology, and All, when you wish to have all rates advertised. The Basic Data Rates are not the rates transmitted; the rates transmitted can be configured through the Transmission Rates setting on this screen. Transmission Rates. The range is from 1 to 54Mbps. The rate of data transmission should be set depending on the speed of your wireless network. You can select from a range of transmission speeds, or you can keep the default setting, Auto (Default), to have the Access Point automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between the Access Point and a wireless client. Transmission Power. You can adjust the output power of the Access Point to get the appropriate coverage for your wireless network. Select the level you need for your environment. If you are not sure which setting to choose, then keep the default setting, Full (Default). CTS Protection Mode. The CTS (Clear-To-Send) Protection Mode function boosts the Access Point’s ability to catch all Wireless-G transmissions but will severely decrease performance. Select Enable if you want to permanently enable this feature, or keep the default, Disable, if you want to permanently disable this feature. In most cases, CTS Protection Mode should remain disabled, unless the Wireless-G products are experiencing severe problems trying to transmit to the Access Point in an environment with heavy 802.11b traffic. Frame Burst Mode. Enabling this option should reduce overhead and enhance your network performance, depending on the manufacturer of your wireless products. If you are not sure how to use this option, keep the default, Disabled.Figure 7-20: Wireless - Advanced Wireless Settings Screen cts (clear-to-send): a signal sent by a wireless device, signifying that it is ready to receive data.
50Chapter 7: Configuring the Wireless-G Access Point The Wireless - Advanced Wireless Settings Tab Wireless-G Access Point Antenna Selection. This selection is for choosing which antenna transmits data, left or right. If you are not sure which antenna to use, keep the default, Diversity, to increase reception. Beacon Interval. This value indicates the frequency interval of the beacon. A beacon is a packet broadcast by the Access Point to keep the network synchronized. A beacon includes the wireless networks service area, the Access Point address, the Broadcast destination addresses, a time stamp, Delivery Traffic Indicator Maps, and the Traffic Indicator Message (TIM). DTIM Interval. This value indicates how often the Access Point sends out a Delivery Traffic Indication Message (DTIM). Lower settings result in more efficient networking, while preventing your PC from dropping into power- saving sleep mode. Higher settings allow your PC to enter sleep mode, thus saving power, but interferes with wireless transmissions. Fragmentation Threshold. This specifies the maximum size a data packet can be before splitting and creating a new packet. It should remain at its default setting of 2346. A smaller setting means smaller packets, which will create more packets for each transmission. If you have decreased this value and experience high packet error rates, you can increase it again, but it will likely decrease overall network performance. Only minor modifications of this value are recommended. RTS Threshold. This setting determines how large a packet can be before the Access Point coordinates transmission and reception to ensure efficient communication. This value should remain at its default setting of 2347. Should you encounter inconsistent data flow, only minor modifications are recommended. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.fragmentation: breaking a packet into smaller units when transmitting over a network. dtim (delivery traffic indication message): a message included in data packets that can increase wireless efficiency. beacon internal: data transmitted on your wireless network that keeps the network synchronized.packet: a unit of data sent over a network. rts (request to send): a networking method of coordinating large packets through the RTS Threshold setting.
51Chapter 7: Configuring the Wireless-G Access Point The Administration - Management Tab Wireless-G Access Point The Administration - Management Tab On this screen you can configure the password as well as back up or restore the Access Point’s configuration file. Management You should change the password that controls access to the Access Point’s Web-based Utility. AP’s Password Password. Create a Password for the Access Point’s Web-based Utility. Re-enter to Confirm. To confirm the new Password, enter it again in this field. Backup and Restore On this screen you can create a backup configuration file or save a configuration file to the Access Point. Backup Settings. To save a backup configuration file on a computer, click the Backup Settings button and follow the on-screen instructions. Restore Settings. To upload a configuration file to the Access Point, click the Restore Settings button and follow the on-screen instructions. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.Figure 7-21: Administration - Management Screen
52Chapter 7: Configuring the Wireless-G Access Point The Administration - SNMP Tab Wireless-G Access Point The Administration - SNMP Tab SNMP is a popular network monitoring and management protocol. It provides network administrators with the ability to monitor the status of the Access Point and receive notification of any critical events as they occur on the Access Point. SNMP V1/V2c To enable the SNMP support feature, select Enable. Otherwise, select Disable. Contact. Enter the name of the contact person, such as a network administrator, for the Access Point. Device Name. Enter the name you wish to give to the Access Point. Location. Enter the location of the Access Point. SNMP Community You can have up to two passwords. Then select the level of access you want to assign to each password. (public.) Enter the first password that allows access to the Access Point’s SNMP information. The default is public. Then select the level of access you want to assign, Read-Only or Read/Write. (private.) Enter the second password that allows access to the Access Point’s SNMP information. The default is private. Then select the level of access you want to assign, Read-Only or Read/Write. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.Figure 7-22: Administration - SNMP Screen
53Chapter 7: Configuring the Wireless-G Access Point The Administration - Log Tab Wireless-G Access Point The Administration - Log Tab On this screen you can configure the log settings. Management You can have logs that keep track of the Access Point’s activities. Log To enable the Log support feature, select Enabled. Otherwise, select Disabled. Logviewer IP Address. If you have chosen to monitor the Access Point’s traffic, then you can designate a PC that will receive permanent log files periodically. In the field provided, enter the IP address of this PC. To view these permanent logs, you must use Logviewer software, which can be downloaded free of charge from www.linksys.com. View Log. To see a temporary log of the Access Point’s most recent activities, click this button. On the View Log screen, click the First Page button to see the first page of log entries. Click the Last Page button to see the last page of log entries. Click the Previous Page button to see the previous page of log entries, and click the Next Page button to see the next page of log entries. To delete all log entries, click the Clear Log button. To update the log with the most recent activities, click the Refresh button. Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.Figure 7-24: View Log Screen Figure 7-23: Administration - Log Screen