Warning ........................................................................................................................................................................................................................................................................................... iii
PART I
1.0Introduction I ................................................................................................................................................................................................................................................................... 1
1.1Summary of Features ..................................................................................................................................................................................................................................................... 1
5.1Security Features ............................................................................................................................................................................................................................................................. 3
5.2Integrity Features ............................................................................................................................................................................................................................................................ 3
5.2.3Spanning Tree (IEEE802.1d) ........................................................................................................................................................................................................................................... 4
5.3Network Load Distribution Features......................................................................................................................................................................................................................... 4
5.3.3WDS – Wireless Distribution System ........................................................................................................................................................................................................................4
5.4Network Administration Features .............................................................................................................................................................................................................................. 4
5.5Easy Support Features ................................................................................................................................................................................................................................................... 5
6.2Apartments or Condominiums ................................................................................................................................................................................................................................... 5
7.1PoE - Power over Ethernet ........................................................................................................................................................................................................................................... 7
7.4Diagnostic Support ......................................................................................................................................................................................................................................................... 8
8.1Introduction II .................................................................................................................................................................................................................................................................. 8
8.4Installation of the Client Manager ............................................................................................................................................................................................................................... 8
8.6Input Parameters Through the Client Manager .....................................................................................................................................................................................................10
8.7Input Parameters Through a Wired PC, Terminal Software ................................................................................................................................................................................. 10
8.8Input Parameters Through a Wired PC, Telnet Software ..................................................................................................................................................................................... 11
9.1Introduction III ............................................................................................................................................................................................................................................................... 12
9.2.1AirStation Name ........................................................................................................................................................................................................................................................... 12
9.2.2Connection type ........................................................................................................................................................................................................................................................... 12
9.2.5DNS Server .................................................................................................................................................................................................................................................................... 12
9.5.1Spanning Tree ................................................................................................................................................................................................................................................................. 14
9.5.4“Hello” Time .................................................................................................................................................................................................................................................................. 15
9.5.5Max Age ........................................................................................................................................................................................................................................................................... 15
9.5.6Aging Time ...................................................................................................................................................................................................................................................................... 15
9.7.2Basic Filter Information ............................................................................................................................................................................................................................................... 16
9.9.2List of the Wireless PCs .............................................................................................................................................................................................................................................. 17
9.9.3Authorized Wireless LAN PCs ..................................................................................................................................................................................................................................17
9.10.4 MAC Restrict .................................................................................................................................................................................................................................................................18
9.10.8 BSS (Basic Service Set) Basic Rate Set ..................................................................................................................................................................................................................... 19
9.10.9 DTIM Period .................................................................................................................................................................................................................................................................. 19
9.10.10 ANY Connection .......................................................................................................................................................................................................................................................... 19
9.11.1 Link Integrity .................................................................................................................................................................................................................................................................. 19
9.11.6 Status ............................................................................................................................................................................................................................................................................... 21
9.12Wireless Distribution System Settings .................................................................................................................................................................................................................... 21
10.1Introduction IV .............................................................................................................................................................................................................................................................. 21
10.2Parameters for the Diagnostic Operation .............................................................................................................................................................................................................. 21
10.2.1 Unit Information ........................................................................................................................................................................................................................................................... 21
10.2.2 Transfer Packet Information ....................................................................................................................................................................................................................................... 21
10.2.3 Wireless LAN PC Information .................................................................................................................................................................................................................................. 21
10.2.4 Log Information .............................................................................................................................................................................................................................................................21
10.2.5 Ping Test ........................................................................................................................................................................................................................................................................... 22
10.2.6 Return to Default Setting ............................................................................................................................................................................................................................................ 22
Appendix A ..................................................................................................................................................................................................................................................................................... 23
Appendix A - Intelligent Access Point (WLM2-G54) Specifications .................................................................................................................................................................................. 24
Appendix B - Troubleshooting .................................................................................................................................................................................................................................................... 25
B.1 LED Activity ............................................................................................................................................................................................................................................................................. 25
TABLE B.1 DIAG LED Activity Table ......................................................................................................................................................................................................................................... 25
B. 2 Other Problems ..................................................................................................................................................................................................................................................................... 25
This section explains the symbols, signs and terminology used in
this manual.
The following terminology is used in this manual to distinguish
between an Ethernet 10/100BASE-T LAN and a Wireless LAN
and should not be construed as generally accepted terminology
outside this context.
A PC with the BUFFALO Wireless client installed is called the
Wireless LAN PC.
Ethernet LAN: A LAN connected by cables
Wireless LAN: A LAN connected by radio signal
The PC used to change the AirStation access point settings:
The Setting PC.
For your safety be sure to read, understand and follow the
instructions below thoroughly before using the product. This
manual contains instructions concerning general operation of
the computer to which the product is connected in addition to
those concerning the product itself.
Please take note that our warranty will not cover any failures
and problems of the computer, any losses and failures of data,
or failures and problems of the product caused by misuse.
Signs
Strongly recommended: Follow the warning and caution
instructions issued by the PC and peripheral manufactures.
Prohibit: Do not attempt to disassemble or repair the WLML11G. This may result in fire or electric shock.
Strongly recommended: Install this product away from children.
Failure to do so may result in injury.
Prohibit: Do not handle the equipment with wet hands while it
is in operation. This may result in electric shock.
It is strongly recommended to touch a metal object such as a
door handle or metal window before touching the device in
order to prevent damage to the equipment due to static
electricity.
We strongly recommend to refer to the product manual
before and during usage of the PC and peripheral.
It is strongly recommended to remove dust from all connectors. Dust may result in failure in performance.
Do not Place this product in the following locations.
• Doing so may result in electric shock or fire, or may
adversely affect this product.
• Locations with strong magnetic fields or static electricity
(may result in failure)
• Locations prone to vibration (may result in injury or
damage)
• Locations that are not level (may result in injury or damage)
• Locations in direct sunlight (may result in failure or deformation)
• Locations close to fire, or subject to heating (may result in
failure or deformation)
• Locations with water leakage or current may result in failure
or electric shock
• Locations with excessive dust (may result in failure)
It is strongly recommended to not get caught on the cables
connected to this product. Doing so may result in personal
injury and/or damage this product.
Buffalo strongly recommends the users back up the contents of
the hard disk to other media such as floppy disks.
We recommend that dual backups before and after updating of
original data be created for important data. Data may be
damaged or lost in the following cases.
• When the device is used incorrectly
• When the device receives static electricity or electrical noise
• When the device breaks down or is repaired
• When the power is turned on immediately after the PC is
turned off
• When the device is damaged by natural disasters
Please note that BUFFALO TECHNOLOGY INC. shall not be
liable for any expenses incurred due to the damage or loss of
hard disk data that may arise in the above cases or in any other
case.
We also strongly recommend backing up the contents of the
hard disk before making any changes to your PC environment
such as installing software or installing or removing hardware.
Even if data is damaged or lost due to misuse or faults, backup
data can minimize the extent of such damage. Please note that
BUFFALO TECHNOLOGY INC. shall not be liable for any
expenses incurred due to the damage or loss of hard disk data.
iii
PART I
• Other network administrative functions
4.0 Product Views
1.0Introduction I
The WLM2-G54 protects customers’
investments over the long term. Buffalo’s new
WLAN product, WLM2-G54, is the
IEEE802.11g-based access point (AP). The
Buffalo solution offers simultaneous communication on both 11Mbps and 54Mbps bands
without annoying bottlenecks. High reliability,
manageability and standard Buffalo features
are integrated in the product and will assure
easy management and high quality signal
communication. The WLM2-G54’s ver satility
will allow indoor as well as outdoor (stationto-station) applications.
1.1Summary of Features
• Updated and extensive security (128-WEP,
802.1x/EAP, TKIP, RADIUS)
• Network integrity (fault tolerance, link
integrity, spanning tree)
• Network load distribution (load balancing,
repeater, WDS)
• Interoperable with IEEE802.11g Wi-Fi™‚
compliant equipment
• Roaming, best access point selection and
traffic filtering (IP and MAC address)
• ESS-ID "any" rejection option
• Configurable through web browser
• Command line setup by Telnet and/or a
serial console
• Downloadable firmware update
• Long range (diversity antenna) and even
longer range (with additional outdoor
antenna)
• Bridge to multiple networks, or AP-to-AP
communication
• Outdoor point-to-multipoint broadcasting
• Repeating function support
• Power over Ethernet, PoE, for convenient
power supply
• Auto MDI/X port for any CAT5 type
cables
2.0Package Contents
The AirStation™ WLM2-G54 package
consists of the following items. If any item is
missing, please contact the seller.
1. WLM2-G54 Access Point
2. AC adapter
3. Power cable
4. Mini-DIN 8 pin-Dsub 9 pin cross serial
cable
5. WLM2-G54 Manual
6. Air Navigator CD
7. Warranty and Registration card
3.0System Requirements
The system requires IP routing externally. The
TCP/IP protocol must be loaded on each PC
used in the system. Other requirements:
• One broadband Internet connection via an
existing LAN system.
• A router, a hub or a switching hub
• UTP network cable with RJ-45 connector
• Internet Explorer 4.0 or higher, or
Netscape Navigator 4.0 or higher
TOP VIEW
BACK VIEW
Insert the antenna here.
SIDE VIEW
1
5.0Features
The Buffalo AirStation Intelligent access point
provides the features necessary in today’s
business environment, with a high level of
reliability and security. Use of these features
along with VPN will allow the user to have
the highest security a WLAN can offer. For
minimum security measures Buffalo
recommends the use of 128bit WEP and
registering client MAC addresses in the
AirStation. Some of the noteworthy features
are shown below. Other features are listed
in Section 9.
5.1Security Features
The WLM2-G54 model provides three levels
of security: authentication, privacy and access
authorization. The first level consists of
checking and issuing the user’s authentication
by EAP and 802.1x, similar to the Windows
XP authentication process.
The second is encrypting user’s data with
WEP, TKIP or MIC encryption algorithms.
Finally, granting the data access privilege only
after the user’s authentication is offered by
exchanging a specific key under the 802.1x
method.
2
5.1.1 Authentication
The IEEE802.1x security method imposes
access port control at the access point level
for each user communication signal. The EAP
function in a client PC performs an authentication login to the authorization server, such
as RADIUS, through the WLM2-G54 access
point when the link is established and before
data transmission takes place.
EAP – Extensible Authentication Protocol is
a function in a client PC, which initiates the
authentication login to a network through an
AP such as the WLM2-G54. When the client
is approved and authenticated for a communication session, the client receives a unique
WEP key from a network security server such
as RADIUS.
802.1x – Known as .1x, this is the key
exchange standard used between a client and
an AP for the user’s authentication process.
Configuration for a large network is much
easier since individual WEP settings are no
longer required for each client. In addition,
access management is performed easily in the
RADIUS server environment, making this
feature valuable for network administration.
5.1.2 Privacy
Several encryption algorithms can be used to
mix with the data for protecting privacy. WEP
is the encryption method adopted in the
current WLAN industry. Because WEP was
found to be vulnerable, WEP will be replaced
with a more powerful Advanced Encr yption
System (AES) in the future so that even
higher levels of security will be available.
Meanwhile, use of TKIP and MIC can be an
alternative to AES.
WEP – Wired Equivalent Privacy is a security
method for wireless networking using the
RC4 encryption algorithm. WEP consists of
two elements: an Initialization Vector (IV) of
24 bits that describes the packet header
information, and current data of 40 or 104
bits. For example, a 128bit WEP key means a
24bit IV plus a 104bit data encryption and
they are encrypted separately.
TKIP – Temporal Key Integrity Protocol is an
advanced encryption method using the RC4
algorithm. Instead of using the sequential IV, a
random IV will be used, and the IV key
definition will be updated regularly at a preset
time interval.
MIC – Message Integrity Check is an
encryption method used to prevent a hacker
from changing the data content. An
encryption algorithm and bit checksum at
both the sender and receiver ends are used
to check for alteration of the packet content.
5.1.3 Access Authorization
When the client is approved and authenticated for a communication session, the client
receives a unique WEP key from the security
server, such as a RADIUS server, under the
802.1x/EAP authorization specification. A
new WEP key is issued for each connection,
thus improving security, and the WEP key is
updated regularly at a preset time interval.
Another method to screen out unauthorized
users is MAC address filtering.
ESS-ID – Extended Service Set Identification
is a type of unique identifier applied to both
the AP and the wireless client, as well as each
information packet. It allows APs to
recognize each wireless client and its traffic.
This option, however, does not provide
sufficient security for today’s wireless
networking environment. If the ESS-ID is set
to "any" or "null", anybody can connect to the
AP. Also, Windows XP automatically displays
the ESS-ID of the AP when a client receives a
"beacon." This is because APs transmit their
ESS-ID periodically and these transmissions
can be easily intercepted.
MAC Address – Media Access Control
address is a hardware address that uniquely
identifies network hardware such as a
wireless NIC or an AP. It is easy to access a
network with a stolen wireless NIC.
Although it is used as the top level filtering, it
is not secure enough, because MAC
addresses can be duplicated by nonregistered users.
5.1.4 IBSS Security
IBSS – Independent Basic Service Set
security is used for ad hoc communications
like the point-to-point protocol (PPP)
method. WEP and MAC address filtering can
be used at this point.
5.2Integrity Features
5.2.1 Improved Fault Tolerance
A company’s Intranet is an important
corporate communication backbone, so the
WLM2-G54 AP offers features for network
stability, which is achieved through the
system’s redundant switching function,
activated automatically in the event of faults.
The auto system redundancy provides the
network reliability necessary for mission
critical applications.
5.2.2 Link Integrity
When multiple access points use the same
frequency for roaming, they tend to interfere
with each other. The WLM2-G54 AP
automatically switches all PCs under the same
wireless ESS-ID to another available access
point if the current access point becomes
disconnected form the network, thus
preserving the connection and throughput.
3
5.2.3 Spanning Tree (IEEE802.1d)
Network looping often results in repeated
packet transmission, which causes overloads
and interruption of communications. The
Spanning Tree in a network loop disconnects
one of the links, rerouting the traffic in the
5.3Network Load Distribution
Features
5.3.1 Load Balancing
This feature enables automatic selection of an
available access point with the least load
among multiple APs. It allows easy roaming,
and the network stability can be increased
significantly through even distribution of the
traffic load.
5.3.2 Repeater
The WLM2-G54 AP can act as a repeater to
other APs. This feature provides a solution for
clients operating in the "dead zone," where
signal does not reach. Combination of this
function and add-on antennas can offer
extended range.
5.3.3 WDS – Wireless Distribution System
WDS is used to create access-point to
access-point communications when a CAT5
cable cannot be used or is unavailable. Similar
to repeating, it is primarily used to extend the
reach of the WLAN. Displaying the name of
the available AirStation while roaming is also
possible.
event of failure, avoiding packet sending
repetition and increasing network stability.
4
5.4Network Administration Features
5.4.1 SNMP – Simple Network Manage-
ment Protocol
The WLM2-G54 AP supports SNMP. Each
unit acts as an SNMP agent so that the
network connection status and configuration
information may be accessed remotely
through the SNMP manager, which enables
centralized traffic and fault monitoring.
5.4.2 Syslog
This feature allows sending a copy of the
system log to the Syslog server automatically.
The log contains information on the operating
status of each device, which enables real-time
monitoring of operational data, fault data, user
login data and other such information.
Although the WLM2-G54 model supports
the Syslog server as a par t of its administrative utilities, it is possible to use additional offthe-shelf Syslog server software.
5.5Easy Support Features
Buffalo periodically releases new firmware
updates for AirStation products. The firmware
is easily uploaded to the AirStation from a
PC. Look for new firmware releases on our
website.
6.0Network Solutions
Some basic application scenarios are
described in this section. In each scenario
specific features of WLM2-G54 are highlighted.
6.1Typical Office Situations
Buffalo’s total wireless solution can provide
network connections to distant factories and
branch offices efficiently and economically.
Remote setups and remote administration
functions allow easy detection and quick
troubleshooting of network problems. The
solution works even when multiple access
points are used simultaneously. Buffalo offers
the most economical wireless building-tobuilding communication solution available.
Figure 5.4 Network Administration Features
6.2Apartments or Condominiums
Newer apartments require an Internet-ready
solution. Providing separate Internet access
to each room can be very expensive, not to
mention the high costs of initial installation.
Buffalo’s wireless solution benefits both the
landlord and the tenants. Internet access (by
a single DSL or CATV line) to the apartment
building can be shared by multiple PCs (or
rooms) anywhere in the building, a unique
feature of wireless systems. Additionally, the
Figure 5.1 Typical Office Situations
5
Figure 6.2 Apartments and Condominiums
system can be set with authenticated security
so that only the authorized tenants can access
the network. Buffalo’s wireless solution can
be used as an optional fee-based service.
6.3Schools
Sometimes it is necessary for students to
have personal Internet connections for
schoolwork. Wireless LANs make the
network connection flexible within a school
campus. The broadband availability area can
be expanded using Buffalo’s wireless buildingto-building solution. This solution uses an
outdoor antenna for each building instead of
installing CAT5 cable between buildings.
Accessing the network and Internet anywhere
and anytime on campus is a part of Buffalo’s
total support of educational technology.
6.4Hospitals
Medical test results and diagnostics for each
patient in the hospital database should be
updated in real time. The wireless solution
used to connect to the hospital network can
be crucial for saving patients’ lives. For
example, the newest diagnostic data is
updated to a hand-held wireless device at the
patient’s bedside so that the appropriate
prescription is prepared on time. Similarly,
surgical data can be transmitted to a central
database in real time for crosschecking the
operating procedures. In these cases, there is
no need for network cables. The security of
wireless communication is well enhanced by
MAC address filtering (port security) so that
only authorized personnel can access the
hospital network.
Figure 6.3 Schools
6
6.5Factories
In this scenario, a wireless LAN is seen in a
manufacturing line in a factory. A variety of
control machines and robots are connected
to the central server and operated wirelessly.
Using Buffalo’s wireless networking system,
the manufacturing data is sent to the factory
server immediately so that the center can
efficiently respond to decisions and com-
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.