Buffalo Technology AirStation Pro Intelligent WLM2-G54 User Manual

Size:
2.18 Mb
Download

WLM2-G54

Users Guide

Warning

...........................................................................................................................................................................................................................................................................................

iii

PART I

 

 

1.0

Introduction I ...................................................................................................................................................................................................................................................................

1

1.1

Summary of Features .....................................................................................................................................................................................................................................................

1

2.0

Package Contents ...........................................................................................................................................................................................................................................................

1

3.0

System Requirements ....................................................................................................................................................................................................................................................

1

4.0

Product Views ..................................................................................................................................................................................................................................................................

1

5.0

Features .............................................................................................................................................................................................................................................................................

3

5.1

Security Features .............................................................................................................................................................................................................................................................

3

5.1.1

Authentication .................................................................................................................................................................................................................................................................

3

5.1.2

Privacy ...............................................................................................................................................................................................................................................................................

3

5.1.3

Access Authorization .....................................................................................................................................................................................................................................................

3

5.1.4

IBSS Security ....................................................................................................................................................................................................................................................................

3

5.2

Integrity Features ............................................................................................................................................................................................................................................................

3

5.2.1

Improved Fault Tolerance ..............................................................................................................................................................................................................................................

3

5.2.2

Link Integrity ....................................................................................................................................................................................................................................................................

3

5.2.3

Spanning Tree (IEEE802.1d) ...........................................................................................................................................................................................................................................

4

5.3

Network Load Distribution Features .........................................................................................................................................................................................................................

4

5.3.1

Load Balancing .................................................................................................................................................................................................................................................................

4

5.3.2

Repeater ............................................................................................................................................................................................................................................................................

4

5.3.3

WDS – Wireless Distribution System ........................................................................................................................................................................................................................

4

5.4

Network Administration Features ..............................................................................................................................................................................................................................

4

5.4.1

SNMP – Simple Network Management Protocol ....................................................................................................................................................................................................

4

5.4.2

Syslog .................................................................................................................................................................................................................................................................................

4

5.5

Easy Support Features ...................................................................................................................................................................................................................................................

5

6.0

Network Solutions .........................................................................................................................................................................................................................................................

5

6.1

Typical Office Situations ................................................................................................................................................................................................................................................

5

6.2

Apartments or Condominiums ...................................................................................................................................................................................................................................

5

6.3

Schools ..............................................................................................................................................................................................................................................................................

7

6.4

Hospitals ...........................................................................................................................................................................................................................................................................

7

6.5

Factories ............................................................................................................................................................................................................................................................................

7

6.6

Area Intranets ..................................................................................................................................................................................................................................................................

7

7.0

Support Functions ..........................................................................................................................................................................................................................................................

7

7.1

PoE - Power over Ethernet ...........................................................................................................................................................................................................................................

7

7.2

Environmental Resistance .............................................................................................................................................................................................................................................

8

7.3

Upgradeable Firmware ..................................................................................................................................................................................................................................................

8

7.4

Diagnostic Support .........................................................................................................................................................................................................................................................

8

PART II

 

 

8.0

Client Configuration ......................................................................................................................................................................................................................................................

8

8.1

Introduction II ..................................................................................................................................................................................................................................................................

8

8.2

Setup Preparation ...........................................................................................................................................................................................................................................................

8

8.3

Setup Overview ...............................................................................................................................................................................................................................................................

8

8.4

Installation of the Client Manager ...............................................................................................................................................................................................................................

8

8.5

Setup Screen ....................................................................................................................................................................................................................................................................

9

8.6

Input Parameters Through the Client Manager .....................................................................................................................................................................................................

10

8.7

Input Parameters Through a Wired PC,Terminal Software .................................................................................................................................................................................

10

8.8

Input Parameters Through a Wired PC,Telnet Software .....................................................................................................................................................................................

11

PART III

 

 

9.0

Detailed Configurations ..............................................................................................................................................................................................................................................

12

9.1

Introduction III ...............................................................................................................................................................................................................................................................

12

9.2

Basic Settings ..................................................................................................................................................................................................................................................................

12

9.2.1

AirStation Name ...........................................................................................................................................................................................................................................................

12

9.2.2

Connection type ...........................................................................................................................................................................................................................................................

12

9.2.3

IP Address .......................................................................................................................................................................................................................................................................

12

9.2.4

Default Gateway ............................................................................................................................................................................................................................................................

12

9.2.5

DNS Server ....................................................................................................................................................................................................................................................................

12

9.3

Time Settings .................................................................................................................................................................................................................................................................

13

9.4

Management ...................................................................................................................................................................................................................................................................

13

9.4.1

Host Setup ......................................................................................................................................................................................................................................................................

13

i

9.4.2

Syslog Setup ...................................................................................................................................................................................................................................................................

13

9.4.3

Moved to Network Setup section ............................................................................................................................................................................................................................

14

9.5

Bridge ...............................................................................................................................................................................................................................................................................

14

9.5.1

Spanning Tree .................................................................................................................................................................................................................................................................

14

9.5.2

Bridge Priority ...............................................................................................................................................................................................................................................................

14

9.5.3

Forward Delay ...............................................................................................................................................................................................................................................................

14

9.5.4

“Hello” Time ..................................................................................................................................................................................................................................................................

15

9.5.5

Max Age ...........................................................................................................................................................................................................................................................................

15

9.5.6

Aging Time ......................................................................................................................................................................................................................................................................

15

9.5.7

Port Priority ...................................................................................................................................................................................................................................................................

15

9.5.8

Path Cost ........................................................................................................................................................................................................................................................................

15

9.6

Routing ............................................................................................................................................................................................................................................................................

15

9.6.1

RIP Reception ................................................................................................................................................................................................................................................................

15

9.6.2

Add Routing Table Entry ..............................................................................................................................................................................................................................................

15

9.6.3

Routing Table Entries ....................................................................................................................................................................................................................................................

16

9.7

Basic Filter ......................................................................................................................................................................................................................................................................

16

9.7.1

Filter Settings .................................................................................................................................................................................................................................................................

16

9.7.2

Basic Filter Information ...............................................................................................................................................................................................................................................

16

9.8

RADIUS ...........................................................................................................................................................................................................................................................................

16

9.9.1

Manual Setting ................................................................................................................................................................................................................................................................

16

9.9.2

List of the Wireless PCs ..............................................................................................................................................................................................................................................

17

9.9.3

Authorized Wireless LAN PCs ..................................................................................................................................................................................................................................

17

9.10

Wireless ..........................................................................................................................................................................................................................................................................

17

9.10.1

Add Peer AirStation (MAC Address) ........................................................................................................................................................................................................................

17

9.10.2

ESS-ID ..............................................................................................................................................................................................................................................................................

18

9.10.3

DS Channel (Wireless Channel Set) ........................................................................................................................................................................................................................

18

9.10.4

MAC Restrict .................................................................................................................................................................................................................................................................

18

9.10.5

EAP ...................................................................................................................................................................................................................................................................................

18

9.10.6

Privacy, WEP ..................................................................................................................................................................................................................................................................

19

9.10.7

PS - Privacy Separator ..................................................................................................................................................................................................................................................

19

9.10.8

BSS (Basic Service Set) Basic Rate Set .....................................................................................................................................................................................................................

19

9.10.9

DTIM Period ..................................................................................................................................................................................................................................................................

19

9.10.10

ANY Connection ..........................................................................................................................................................................................................................................................

19

9.11

Link Integrity Settings ..................................................................................................................................................................................................................................................

19

9.11.1

Link Integrity ..................................................................................................................................................................................................................................................................

19

9.11.2

Destination Host ...........................................................................................................................................................................................................................................................

19

9.11.3

Interval of Checking Connection ..............................................................................................................................................................................................................................

21

9.11.4

Retry Count ...................................................................................................................................................................................................................................................................

21

9.11.5

Apply Device ..................................................................................................................................................................................................................................................................

21

9.11.6

Status ...............................................................................................................................................................................................................................................................................

21

9.12

Wireless Distribution System Settings ....................................................................................................................................................................................................................

21

PART IV

 

 

10.0

Diagnostics .....................................................................................................................................................................................................................................................................

21

10.1

Introduction IV ..............................................................................................................................................................................................................................................................

21

10.2

Parameters for the Diagnostic Operation ..............................................................................................................................................................................................................

21

10.2.1

Unit Information ...........................................................................................................................................................................................................................................................

21

10.2.2

Transfer Packet Information .......................................................................................................................................................................................................................................

21

10.2.3

Wireless LAN PC Information ..................................................................................................................................................................................................................................

21

10.2.4

Log Information .............................................................................................................................................................................................................................................................

21

10.2.5

Ping Test ...........................................................................................................................................................................................................................................................................

22

10.2.6

Return to Default Setting ............................................................................................................................................................................................................................................

22

Appendix A .....................................................................................................................................................................................................................................................................................

23

Appendix A - Intelligent Access Point (WLM2-G54)Specifications ..................................................................................................................................................................................

24

Appendix B - Troubleshooting ....................................................................................................................................................................................................................................................

25

B.1 LED Activity .............................................................................................................................................................................................................................................................................

25

TABLE B.1 DIAG LED Activity Table .........................................................................................................................................................................................................................................

25

B. 2 Other Problems .....................................................................................................................................................................................................................................................................

25

Glossary

..........................................................................................................................................................................................................................................................................................

25

Buffalo Technology Technical Support .......................................................................................................................................................................................................................................

31

Web

..........................................................................................................................................................................................................................................................................................

31

ii

Warning

This section explains the symbols, signs and terminology used in this manual.

The following terminology is used in this manual to distinguish between an Ethernet 10/100BASE-TLAN and a Wireless LAN and should not be construed as generally accepted terminology outside this context.

A PC with the BUFFALO Wireless client installed is called the Wireless LAN PC.

Ethernet LAN: A LAN connected by cables Wireless LAN: A LAN connected by radio signal

The PC used to change the AirStation access point settings: The Setting PC.

For your safety be sure to read, understand and follow the instructions below thoroughly before using the product. This manual contains instructions concerning general operation of the computer to which the product is connected in addition to those concerning the product itself.

Please take note that our warranty will not cover any failures and problems of the computer, any losses and failures of data, or failures and problems of the product caused by misuse.

Signs

Strongly recommended: Follow the warning and caution instructions issued by the PC and peripheral manufactures.

Prohibit: Do not attempt to disassemble or repair the WLML11G. This may result in fire or electric shock.

Strongly recommended: Install this product away from children. Failure to do so may result in injury.

Prohibit: Do not handle the equipment with wet hands while it is in operation.This may result in electric shock.

It is strongly recommended to touch a metal object such as a door handle or metal window before touching the device in order to prevent damage to the equipment due to static electricity.

We strongly recommend to refer to the product manual before and during usage of the PC and peripheral.

It is strongly recommended to remove dust from all connectors. Dust may result in failure in performance.

Do not Place this product in the following locations.

Doing so may result in electric shock or fire, or may adversely affect this product.

Locations with strong magnetic fields or static electricity (may result in failure)

Locations prone to vibration (may result in injury or damage)

Locations that are not level (may result in injury or damage)

Locations in direct sunlight (may result in failure or deformation)

Locations close to fire, or subject to heating (may result in failure or deformation)

Locations with water leakage or current may result in failure or electric shock

Locations with excessive dust (may result in failure)

It is strongly recommended to not get caught on the cables connected to this product. Doing so may result in personal injury and/or damage this product.

Buffalo strongly recommends the users back up the contents of the hard disk to other media such as floppy disks.

We recommend that dual backups before and after updating of original data be created for important data. Data may be damaged or lost in the following cases.

When the device is used incorrectly

When the device receives static electricity or electrical noise

When the device breaks down or is repaired

When the power is turned on immediately after the PC is turned off

When the device is damaged by natural disasters

Please note that BUFFALO TECHNOLOGY INC. shall not be liable for any expenses incurred due to the damage or loss of hard disk data that may arise in the above cases or in any other case.

We also strongly recommend backing up the contents of the hard disk before making any changes to your PC environment such as installing software or installing or removing hardware. Even if data is damaged or lost due to misuse or faults, backup data can minimize the extent of such damage. Please note that BUFFALO TECHNOLOGY INC. shall not be liable for any expenses incurred due to the damage or loss of hard disk data.

iii

PART I

1.0Introduction I

The WLM2-G54protects customers’ investments over the long term. Buffalo’s new WLAN product,WLM2-G54,is theIEEE802.11g-basedaccess point (AP). The Buffalo solution offers simultaneous communication on both 11Mbps and 54Mbps bands without annoying bottlenecks. High reliability, manageability and standard Buffalo features are integrated in the product and will assure easy management and high quality signal communication.TheWLM2-G54’sversatility will allow indoor as well as outdoor (station-to-station)applications.

1.1Summary of Features

Updated and extensive security (128-WEP,802.1x/EAP, TKIP, RADIUS)

Network integrity (fault tolerance, link integrity, spanning tree)

Network load distribution (load balancing, repeater, WDS)

Interoperable with IEEE802.11g Wi-Fi™‚compliant equipment

Roaming, best access point selection and traffic filtering (IP and MAC address)

ESS-ID"any" rejection option

Configurable through web browser

Command line setup by Telnet and/or a serial console

Downloadable firmware update

Long range (diversity antenna) and even longer range (with additional outdoor antenna)

Bridge to multiple networks, or AP-to-APcommunication

Outdoor point-to-multipointbroadcasting

Repeating function support

Power over Ethernet, PoE, for convenient power supply

Auto MDI/X port for any CAT5 type cables

• Other network administrative functions

2.0Package Contents

The AirStation™ WLM2-G54package consists of the following items. If any item is missing, please contact the seller.

1.WLM2-G54Access Point

2.AC adapter

3.Power cable

4.Mini-DIN8pin-Dsub9 pin cross serial cable

5. WLM2-G54Manual

6. Air Navigator CD

7. Warranty and Registration card

3.0System Requirements

The system requires IP routing externally. The TCP/IP protocol must be loaded on each PC used in the system. Other requirements:

One broadband Internet connection via an existing LAN system.

A router, a hub or a switching hub

UTP network cable with RJ-45connector

Internet Explorer 4.0 or higher, or Netscape Navigator 4.0 or higher

4.0 Product Views

TOP VIEW

BACK VIEW

Insert the antenna here.

SIDE VIEW

1

5.0Features

The Buffalo AirStation Intelligent access point provides the features necessary in today’s business environment, with a high level of reliability and security. Use of these features along with VPN will allow the user to have the highest security a WLAN can offer. For minimum security measures Buffalo recommends the use of 128bit WEP and registering client MAC addresses in the AirStation. Some of the noteworthy features are shown below. Other features are listed in Section 9.

5.1Security Features

The WLM2-G54model provides three levels of security: authentication, privacy and access authorization. The first level consists of checking and issuing the user’s authentication by EAP and 802.1x, similar to the Windows XP authentication process.

The second is encrypting user’s data with WEP, TKIP or MIC encryption algorithms. Finally, granting the data access privilege only after the user’s authentication is offered by exchanging a specific key under the 802.1x method.

5.1.1 Authentication

The IEEE802.1x security method imposes access port control at the access point level for each user communication signal. The EAP function in a client PC performs an authentication login to the authorization server, such as RADIUS, through the WLM2-G54access point when the link is established and before data transmission takes place.

EAP – Extensible Authentication Protocol is a function in a client PC, which initiates the authentication login to a network through an AP such as theWLM2-G54.When the client is approved and authenticated for a communication session, the client receives a unique WEP key from a network security server such as RADIUS.

802.1x – Known as .1x, this is the key exchange standard used between a client and an AP for the user’s authentication process. Configuration for a large network is much easier since individual WEP settings are no longer required for each client. In addition, access management is performed easily in the RADIUS server environment, making this feature valuable for network administration.

5.1.2 Privacy

Several encryption algorithms can be used to mix with the data for protecting privacy. WEP is the encryption method adopted in the current WLAN industry. Because WEP was found to be vulnerable,WEP will be replaced with a more powerful Advanced Encryption System (AES) in the future so that even higher levels of security will be available. Meanwhile, use of TKIP and MIC can be an alternative to AES.

WEP – Wired Equivalent Privacy is a security method for wireless networking using the RC4 encryption algorithm. WEP consists of two elements: an Initialization Vector (IV) of 24 bits that describes the packet header information, and current data of 40 or 104 bits. For example, a 128bit WEP key means a 24bit IV plus a 104bit data encryption and they are encrypted separately.

2

TKIP – Temporal Key Integrity Protocol is an advanced encryption method using the RC4 algorithm. Instead of using the sequential IV, a random IV will be used, and the IV key definition will be updated regularly at a preset time interval.

MIC – Message Integrity Check is an encryption method used to prevent a hacker from changing the data content. An encryption algorithm and bit checksum at both the sender and receiver ends are used to check for alteration of the packet content.

5.1.3 Access Authorization

When the client is approved and authenticated for a communication session, the client receives a unique WEP key from the security server, such as a RADIUS server, under the 802.1x/EAP authorization specification. A new WEP key is issued for each connection, thus improving security, and the WEP key is updated regularly at a preset time interval. Another method to screen out unauthorized users is MAC address filtering.

ESS-ID – Extended Service Set Identification is a type of unique identifier applied to both the AP and the wireless client, as well as each information packet. It allows APs to recognize each wireless client and its traffic. This option, however, does not provide sufficient security for today’s wireless networking environment. If theESS-IDis set to "any" or "null", anybody can connect to the AP. Also,Windows XP automatically displays theESS-IDof the AP when a client receives a "beacon." This is because APs transmit theirESS-IDperiodically and these transmissions can be easily intercepted.

MAC Address – Media Access Control address is a hardware address that uniquely identifies network hardware such as a wireless NIC or an AP. It is easy to access a network with a stolen wireless NIC. Although it is used as the top level filtering, it is not secure enough, because MAC addresses can be duplicated by nonregistered users.

5.1.4 IBSS Security

IBSS – Independent Basic Service Set security is used for ad hoc communications like thepoint-to-pointprotocol (PPP) method. WEP and MAC address filtering can be used at this point.

5.2Integrity Features

5.2.1 Improved Fault Tolerance

A company’s Intranet is an important corporate communication backbone, so the WLM2-G54AP offers features for network stability, which is achieved through the system’s redundant switching function, activated automatically in the event of faults. The auto system redundancy provides the network reliability necessary for mission critical applications.

5.2.2 Link Integrity

When multiple access points use the same frequency for roaming, they tend to interfere with each other. The WLM2-G54AP automatically switches all PCs under the same wirelessESS-IDto another available access point if the current access point becomes disconnected form the network, thus preserving the connection and throughput.

3

5.2.3 Spanning Tree (IEEE802.1d)

Network looping often results in repeated packet transmission, which causes overloads and interruption of communications.The Spanning Tree in a network loop disconnects one of the links, rerouting the traffic in the

event of failure, avoiding packet sending repetition and increasing network stability.

5.3 Network Load Distribution

Features

5.3.1 Load Balancing

This feature enables automatic selection of an available access point with the least load among multiple APs. It allows easy roaming, and the network stability can be increased significantly through even distribution of the traffic load.

5.3.2 Repeater

The WLM2-G54AP can act as a repeater to other APs. This feature provides a solution for clients operating in the "dead zone," where signal does not reach. Combination of this function andadd-onantennas can offer extended range.

5.3.3 WDS – Wireless Distribution System

WDS is used to create access-pointtoaccess-pointcommunications when a CAT5 cable cannot be used or is unavailable. Similar to repeating, it is primarily used to extend the reach of the WLAN. Displaying the name of the available AirStation while roaming is also possible.

5.4 Network Administration Features

5.4.1 SNMP – Simple Network Management Protocol

The WLM2-G54AP supports SNMP. Each unit acts as an SNMP agent so that the network connection status and configuration information may be accessed remotely through the SNMP manager, which enables centralized traffic and fault monitoring.

5.4.2 Syslog

This feature allows sending a copy of the system log to the Syslog server automatically. The log contains information on the operating status of each device, which enables real-timemonitoring of operational data, fault data, user login data and other such information. Although theWLM2-G54model supports

4

the Syslog server as a part of its administrative utilities, it is possible to use additional off- the-shelfSyslog server software.

5.5Easy Support Features

Buffalo periodically releases new firmware updates for AirStation products.The firmware is easily uploaded to the AirStation from a PC. Look for new firmware releases on our website.

6.0Network Solutions

Some basic application scenarios are described in this section. In each scenario

specific features of WLM2-G54are highFigure 5.4 Network Administration Features lighted.

6.1Typical Office Situations

Buffalo’s total wireless solution can provide network connections to distant factories and branch offices efficiently and economically. Remote setups and remote administration functions allow easy detection and quick troubleshooting of network problems. The solution works even when multiple access points are used simultaneously. Buffalo offers the most economical wireless building-to-building communication solution available.

6.2Apartments or Condominiums

Newer apartments require an Internet-readysolution. Providing separate Internet access to each room can be very expensive, not to mention the high costs of initial installation. Buffalo’s wireless solution benefits both the landlord and the tenants. Internet access (by a single DSL or CATV line) to the apartment building can be shared by multiple PCs (or rooms) anywhere in the building, a unique feature of wireless systems. Additionally, the

Figure 5.1 Typical Office Situations

5