ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Support
Thank you for selecting NETGEAR products.
After installing your device, locate the serial number on the label of your product and use it to register your product
at https://my.netgear.com. You must register your product before you can use NETGEAR telephone support.
NETGEAR recommends registering your product through the NETGEAR website. For product updates and web
support, visit http://support.netgear.com.
Phone (US & Canada only): 1-888-NETGEAR.
Phone (Other Countries): Check the list of phone numbers at
This chapter introduces the NETGEAR® ProSAFE® Dual Band Wireless-N Access Point with
RFID Support, WNDAP380R, and describes some of the key features. The chapter includes the
following sections:
•About the ProSAFE Dual Band Wireless-N Access Point with RFID Support,
WNDAP380R
•What Is in the Box?
•System Requirements
•Key Features and Standards
•Hardware Description
Note: For more information about the topics covered in this manual, visit
the support website at http://support.netgear.com.
1
Note: Firmware updates with new features and bug fixes are made
available from time to time at downloadcenter.netgear.com. Some
products can regularly check the site and download new firmware,
or you can check for and download new firmware manually
features or behavior of your product do not match what is described
in this guide, you might need to update your firmware.
6
. If the
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
About the ProSAFE Dual Band Wireless-N Access
Point with RFID Support, WNDAP380R
The ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R, going
forward in this manual referred to as the wireless access point, is a powerful building block of
a wireless LAN infrastructure. It provides concurrent 2.4 GHz 802.11b/g/n and
5 GHz 802.1 1a/n connectivity between wired Ethernet networks and radio-equipped wireless
notebook systems, desktop systems, print servers, and other devices. Support for two
transmit radio chains and two receive radio chains, also referred to as 2x2 multiple input,
multiple output (MIMO), can increase wireless throughput considerably
The wireless access point provides wireless connectivity to multiple wireless network devices
within a fixed range or area of coverage, including multiple radio-frequency identification
(RFID) tags and devices.
maximum connectivity area with about a 500-foot radius. The wireless access point can
support a maximum of 128 clients (64 for the 2.4 GHz radio and 64 for the 5 GHz radio) in a
range of several hundred feet. The throughput is shared between all clients. To meet the
required coverage, throughput, and quality of your wireless network, install a suf
number of wireless access points.
T
ypically, an individual in-building wireless access point provides a
.
ficient
The wireless access point acts as a bridge between the wired LAN and wireless clients.
Connecting multiple wireless access points through a wired Ethernet backbone can further
increase the wireless network coverage. As a mobile computing device moves out of the
range of one wireless access point, it moves into the range of another
clients can freely roam from one wireless access point to another and still maintain a
seamless connection to the network.
The autosensing capability of the wireless access point allows packet transmission at up to
300 Mbps, or at reduced speeds to compensate for distance or electromagnetic interference.
. As a result, wireless
What Is in the Box?
The product package contains the following items:
•ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
•Straight through Category 5 Ethernet cable
•Power adapter and cord (12V
•Wall-mount kit
•Installation guide
If any parts are missing or damaged, contact your reseller or customer support in your area.
, 1A)
V
isit the NETGEAR website at http://support.netgear.com/general/contact/default.aspx for
the telephone number of customer support in your area. Keep the installation guide, along
with the original packing materials. If you need to return the wireless access point for repair
use the packing materials to repack the wireless access point.
Introduction
7
,
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
System Requirements
Before installing the wireless access point, make sure that your system meets these
requirements:
•A 10/100/1000 Mbps local area network device such as a hub or switch.
•The Category 5 UTP straight-through Ethernet cable with RJ-45 connector included in the
package, or one like it.
•A 100–120V
•A computer with the TCP/IP protocol installed and a web browser for configuration, such
as Microsoft Internet Explorer 8.0 or later
•If you use radio-frequency identification (RFID) tags and devices, a computer that
functions as an RFID server.
, 50–60 Hz
AC power source.
, or Mozilla Firefox 18.0 or later.
Key Features and Standards
This section includes the following subsections:
•Supported Standards and Conventions
•Key Features
•802.11b/g/n and 802.11a/n Standards–Based Wireless Networking
•Autosensing Ethernet Connections with Auto Uplink
The wireless access point is easy to use and provides solid wireless and networking support.
It also of
fers a wide range of security options.
Supported Standards and Conventions
The wireless access point supports the following standards and conventions:
•Standards compliance. The wireless access point complies with the IEEE 802.1
standards for wireless LANs and is Wi-Fi certified for 802.11n standard.
•WPA and WPA2. The wireless access point provides WPA and WPA2 enterprise-class
strong security with RADIUS and certificate authentication as well as dynamic encryption
key generation.
have the overhead of RADIUS servers but provides the strong security of WPA.
•Multiple BSSIDs.
access point is connected to a wired network and a set of wireless clients, it is called a
basic service set (BSS).
attached to the header of packets sent over a WLAN that differentiates one WLAN from
another when a mobile device tries to connect to the network.
The WPA-PSK and WPA2-PSK pre-shared key authentication does not
The wireless access point supports multiple BSSIDs. When a wireless
The basic service set identifier (BSSID) is a unique identifier
1a/b/g
The multiple BSSID feature allows you to configure up to 16 SSIDs (8 per radio) on your
wireless access point and assign dif
ferent configuration settings to each SSID.
Introduction
8
All the
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
configured SSIDs are active, and the network devices can connect to the wireless access
point by using any of these SSIDs.
•DHCP server and client. The DHCP server of the wireless access point can provide a
dynamic IP address to wireless clients. The wireless access point can also act as a client
and obtain an IP address from a DHCP server on the LAN.
•SNMP.
(SNMP) for Management Information Base (MIB) management.
•STP. The wireless access point supports Spanning Tree Protocol (STP).
•802.1Q VLAN
network even though they might actually be physically on dif
Virtual LANs (VLANs) are configured through software rather than hardware, which
makes them very flexible. VLANs are very useful for user and host management,
bandwidth allocation, and resource optimization.
The wireless access point supports Simple Network Management Protocol
. A network of computers can behave as if they are connected to the same
ferent segments of a LAN.
Key Features
The wireless access point provides solid functionality, including the following features:
•Dual band. The wireless access point can operate concurrently in the 2.4 GHz and
5 GHz bands.
•Multiple operating modes:
-W
ireless access point.
802.11b/g/n and 802.11a/n access point for clients.
-Point-to-point bridge. The wireless access point communicates with another access
point that functions in bridge mode.
association.
-Point-to-multipoint bridge. The wireless access point is the master for a group of
access points that function in bridge mode, that send all traf
do not communicate directly with each other. You can use this mode with or without
client association.
-Repeating the wireless signal.
access point for clients but functions only in point-to-multi
the wireless signal and send all traffic to a remote access point.
•WMM. Wi-Fi Multimedia (WMM) is a subset of the 802.11e standard. WMM allows
wireless traf
Time-dependent information, like video or audio, has a higher priority than normal traffic.
For WMM to function correctly, wireless clients also need to support WMM.
•QoS. Quality of Service (QoS) support lets you configure parameters that af
flowing from the wireless access point to the client station and traffic flowing from the
client station to the wireless access point.
•Hotspot support. Y
redirected to the URL you specify.
•Rogue AP detection
access to any part of the secured wireless and wired LAN.
fic to have a range of priorities, depending on the kind of data.
ou can allow all HTTP (TCP, port 80) requests to be captured and
. Rogue AP filtering ensures that unknown APs are not given
The wireless access point operates as a standard
You can use this mode with or without client
fic to the master, and that
The wireless access point does not function as an
point bridge mode to repeat
fect traf
fic
Introduction
9
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
•Access control. MAC address filtering can ensure that only trusted wireless clients can
use the wireless access point to gain access to the wireless and wired LAN.
•Security profiles. When using multiple BSSIDs, you can configure unique security
settings (encryption, SSID, and so on) for each BSSID.
•Hidden mode.
correct SSID can connect.
•Telnet and SSH command-line Interface. Using an application such as PuTTY
access the wireless access point over a Telnet or Secure Shell (SSH) connection and use
the command-line interface (CLI) to configure the wireless access point.
•Upgradeable firmware. Firmware is stored in flash memory.
using only your web browser, and you can upgrade it remotely. You can also use the
command-line interface.
•Configuration backup. Configuration settings can be backed up to a file and restored.
•Secure and economical operation.
economical operation.
•PoE support
end-span sources can supply power to the wireless access point over the Ethernet port.
The wireless access point can receive all required power on one Ethernet port from a
single PoE source.
•Autosensing Ethernet connection with
10/100/1000 Mbps IEEE 802.3 Ethernet networks.
•LED indicators. Power/Test,
identified.
•VLAN security profiles. Each security profile is automatically allocated a VLAN ID when
the security profile is modified.
The SSID is not broadcast, assuring that only clients configured with the
, you can
You can upgrade it easily,
Adjustable power output allows more secure or
. Using Power over Ethernet (PoE), any 802.3af-compliant midspan or
Auto Uplink™interface. Connects to
Active, LAN, and WLAN for each radio mode are easily
802.11b/g/n and 802.11a/n Standards–Based Wireless
Networking
The wireless access point provides a bridge between wired Ethernet LANs and 802.11b/g/nand 802.11a/n-compatible wireless LAN networks. It provides connectivity between wired
Ethernet networks and radio-equipped wireless notebook systems, desktop systems, print
servers, RFID tags, and other devices.
In addition, the wireless access point supports the following wireless features:
•Aggregation support
•Reduced InterFrame spacing support
•2 x 2 multiple input, multiple output (MIMO) support
•Distributed coordinated function (CSMA/CA, back-of
retransmission of unacknowledged frames)
•RTS/CTS handshake
•Beacon generation
Introduction
10
f procedure,
ACK procedure,
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
•Packet fragmentation and reassembly
•Auto or long preamble
•Roaming among wireless access points on the same subnet
Autosensing Ethernet Connections with Auto Uplink
The wireless access point can connect to a standard Ethernet network. The LAN interface is
autosensing and capable of full-duplex or half-duplex operation.
The wireless access point incorporates Auto Uplink technology. The Ethernet port
automatically senses whether the Ethernet cable plugged into the port should have a
“normal” connection such as to a computer or an “uplink” connection such as to a switch or
That port then configures itself correctly. This feature also eliminates any concerns
hub.
about crossover cables, as Auto Uplink accommodates either type of cable to make the right
connection.
Hardware Description
This section describes the top and rear hardware functions of the wireless access point.
•Top Panel
•Rear Panel
•Bottom Panel with Product Label
Top Panel
The LEDs of the wireless access point are described in the following figure and table:
1
Figure 1. Top panel with LEDs
23
Introduction
11
4
5
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Table 1. Top panel LEDs
ItemLEDDescription
1
2
3
42.4 GHzWLANOffWireless 802.11b/g/n (2.4 GHz) LAN is not ready, or
55 GHzWLANOffWireless 802.11n/a (5 GHz) LAN is not ready, or no
Power/Test Off Power is off.
On (green)Power is on.
Amber, then blinking
green
ActiveOffNo Ethernet traffic is detected, or no link is detected.
On or blinking (green) Ethernet traffic is detected.
LANOffNo link is detected on the LAN port.
Amber100 Mbps or 10 Mbps link is detected on the LAN port.
Green1000 Mbps link is detected on the LAN port.
On or blinking (green) Wireless 802.11b/g/n (2.4 GHz) LAN is ready, or
A self-test is running or software is being loaded.
During startup, the LED is first steady amber, then
goes off, and then blinks green before turning steady
green after about 45 seconds. If after one minute the
LED remains amber or continues to blink green, it
indicates a system fault.
no wireless activity is detected.
wireless activity is detected.
wireless activity is detected.
Rear Panel
Figure 2. Rear panel
On or blinking (green) Wireless 802.11n/a (5 GHz) LAN is ready, or wireless
activity is detected.
1
2
3
4
Introduction
12
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The rear panel components of the wireless access point, from left to right, are described in
the following list:
1. Factory default Reset button. Using a sharp object, press and hold this button for about
10 seconds to reset the wireless access point to factory defaults settings. All configuration
settings are lost, and the default password is restored. For more information, see Restore
the Wireless Access Point to the Factory Default Settings on page 70.
2. 10/100/1000BASE-T Gigabit Ethernet (RJ-45) port with Auto Uplink (Auto MDI-X) with
IEEE 802.3af Power over Ethernet (PoE) support for connection to a switch or router.
3. Cable security lock receptacle for an optional lock.
4. Power socket for a 12VDC, 1.5A power adapter
.
Bottom Panel with Product Label
The product label on the bottom of the wireless access point’s enclosure displays factory
default settings, regulatory compliance, and other information:
Figure 3. Product label on the bottom
Introduction
13
2. Installation and Basic
Configuration
This chapter describes how to install and configure the wireless access point for wireless
connectivity to your LAN. This basic configuration enables computers with 2.4 GHz 802.11b/g/n
and 5 GHz 802.1 1a/n wireless adapters to connect to the Internet or access printers and files on
your LAN. In planning your wireless network, consider the level of security required. Chapter 3,
Wireless Configuration and Security, describes how to set up wireless security for your network.
This chapter includes the following sections:
•What You Need Before You Begin
•Install and Configure the Wireless Access Point
•Test Basic Wireless Connectivity
•Mount the Wireless Access Point
2
14
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
What You Need Before You Begin
You need to consider the guidelines and requirements in the following sections before you
can set up your wireless access point.
See also System Requirements on page 8.
•Wireless Equipment Placement and Range Guidelines
•Ethernet Cabling Requirements
•LAN Configuration Requirements
•Hardware Requirements for Computers on Your LAN
•Requirements for Entering IP Addresses
Wireless Equipment Placement and Range Guidelines
The range of your wireless connection can vary significantly based on the location of the
wireless access point. The latency, data throughput performance, and power consumption of
wireless adapters also vary depending on your configuration choices.
Note: Failure to follow these guidelines can result in significant
performance degradation or inability to connect wirelessly to the
wireless access point. For complete performance specifications, see
Appendix A, Supplemental Information.
For best results, place your wireless access point according to the following general
guidelines:
•Near the center of the area in which the wireless devices will operate.
•In an elevated location such as a high shelf where the wirelessly connected devices have
line-of-sight access (even if through walls).
•Away from sources of interference, such as computers, microwaves ovens, and 2.4 GHz
cordless phones.
•Away from large metal surfaces or water.
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement. WEP connections can take slightly longer to establish. Also, WEP
encryption can consume more battery power on a notebook computer
Note: Before you position and mount the wireless access point at its
permanent position, first configure the wireless access point and test
the computers on your LAN for wireless connectivity as explained in
this chapter.
.
Installation and Basic Configuration
15
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Ethernet Cabling Requirements
The wireless access point connects to your LAN using twisted-pair Category 5 Ethernet cable
with RJ-45 connectors.
LAN Configuration Requirements
For the initial configuration of your wireless access point, you need to connect a computer to
the wireless access point.
Hardware Requirements for Computers on Your LAN
To connect to the wireless access point on your network, each computer needs to have an
802.11b/g/n or 802.11a/n wireless adapter installed.
Requirements for Entering IP Addresses
The fourth octet of an IP address needs to be between 0 and 255 (both inclusive). This
requirement applies to any IP address that you enter on a screen of the web management
interface.
Install and Configure the Wireless Access Point
Install and configure your wireless access point in the order of the following sections:
1. Connect the Wireless Access Point to a Computer
2. Log In to the Wireless Access Point
3. Configure Basic General System Settings and Time Settings
4. Configure the IP Settings
5. Configure the Optional DHCP Server
6. Configure the Basic Wireless Settings
Before installing the wireless access point, make sure that your Ethernet network functions.
After you have connected the wireless access point to the Ethernet network, computers with
802.1
1b/g/n and 802.1
network.
For this to work correctly, verify that you have met all the system requirements, shown in
System Requirements on page 8.
1a/n wireless adapters are able to communicate with the Ethernet
Installation and Basic Configuration
16
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Connect the Wireless Access Point to a Computer
Tip: Before you place the wireless access point in an elevated position that is
difficult to reach, first set up and test the wireless access point to verify
wireless network connectivity.
To set up the wireless access point:
1. Unpack the box and verify the contents.
2. Prepare a computer with an Ethernet adapter
network, record its TCP/IP configuration settings. Configure the computer with a static IP
address of 192.168.0.210 and 255.255.255.0 as the subnet mask.
3. Connect an Ethernet cable to the Ethernet port (A)
4. Securely insert the other end of the Ethernet cable into the wireless access point’s Ethernet
port (B).
. If this computer is already part of your
of the computer.
A
B
5. Turn on your computer.
6. Connect the power adapter to the wireless access point.
Tip: The wireless access point supports Power over Ethernet (PoE) with
power redundancy. Both Ethernet ports can provide power. If you have a
switch that provides PoE, you do not need to use the power adapter to
power the wireless access point. Using PoE can be especially
convenient when the wireless access point is installed in a high location
far away from a power outlet.
erify the following:
7. V
Power/T est LED. The Power/Test LED blinks when the wireless access point is
first turned on. (To be exact, during startup, the LED is first steady amber, then
goes off, and then blinks green.) After about 45 seconds, the LED should stay lit
(steady green). If after one minute the Power/Test LED is not lit or is still blinking,
check the connections and see if the power outlet is controlled by a wall switch
that is turned off.
Installation and Basic Configuration
17
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Active LED. The Active LED is lit or blinks green when there is Ethernet traffic.
LAN LED. The LAN LED indicates the LAN speed for the LAN port: green for
1000 Mbps and amber for 100 Mbps or 10 Mbps. If the LAN LED is not lit, make
sure that the Ethernet cable is securely attached at both ends.
2.4 GHz
WLAN LED. The 2.4 GHz WLAN LED is lit or blinks green when the wireless
LAN (WLAN) is ready.
5 GHz
WLAN LED. The 5 GHz WLAN LED is lit or blinks green when the WLAN is
ready.
Log In to the Wireless Access Point
The default IP address of your wireless access point is 192.168.0.100. By default, the DHCP
client on the wireless access point is disabled so you can log in using the default IP address.
To log in to the wireless access point:
1. Open a web browser such as Microsoft Internet Explorer 8.0 or later, or Mozilla
Firefox 18.0 or later.
2. Connect to the wireless access point by entering its default address of 192.168.0.100
your browser (use http and not https).
The Login screen displays:
into
3. Enter the default user name of admin and the default password of password.
4. Click Login.
The web browser displays the basic General system settings screen under the
Configuration tab of the main menu:
Installation and Basic Configuration
18
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Web Management Interface
The navigation tabs across the top of the web management interface provide access to all
the configuration functions of the wireless access point and remain constant. The menu items
in the blue bar change according to the navigation tab that is selected.
Figure 4. Navigation tabs and menu items
The bottom right corner on all screens that allow you to make configuration changes show
the Apply and Cancel buttons.
Figure 5. Buttons
These buttons have the following functions:
•Cancel. Cancels all configuration changes that you made on the screen.
•Apply. Saves and applies all configuration changes that you made on the screen.
The following buttons can be displayed:
•Edit. Lets you edit the existing configuration.
•Save or Save As. Lets you save the information that is displayed onscreen to a file.
•Details. Provides more details for the information that is displayed in the table onscreen.
•Proceed. Confirms the action.
•Send. Sends a test command.
•Refresh. Refreshes the information that is displayed onscreen.
•Clear. Clears the information that is displayed onscreen.
Installation and Basic Configuration
19
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Configure Basic General System Settings and Time Settings
After you have successfully logged in to the wireless access point, the basic General system
settings screen displays.
To configure basic system settings:
1. Select Configuration > System >
Basic > General.
The basic General system settings screen displays:
2. Configure the settings as explained in the following table:
SettingDescription
Access Point NameThis unique name is the wireless access point NetBIOS name. The name is printed
on the rear label of the wireless access point. The default is netgearxxxxxx, in which
xxxxxx
represents the last six digits of the wireless access point MAC address. You
can replace the default name with a unique name up to 15 characters long. The
access point name can be retrieved through SNMP.
Country / RegionFrom the Country / Region drop-down menu, select the country where the wireless
access point is installed.
Note: It might not be legal to operate this wireless access point in a region other than
one of the regions that you can select from the drop-down menu.
3. Click Apply .
To configure time settings:
1. Select Configuration > System >
The Time screen displays:
Installation and Basic Configuration
Basic > Time.
20
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Configure the settings as explained in the following table:
Setting Description
Time ZoneSelect the time zone to match your location.
Current TimeThis is a nonconfigurable field that displays the current date and time.
NTP ClientEnable the Network Time Protocol (NTP) client to synchronize the time of the
wireless access point with an NTP server
selected.
Use Custom NTP ServerSelect this check box if you want to use a custom NTP server.
Note: You need to have an Internet connection to use an NTP server that is
not on your local network.
Hostname /
IP Address
Enter the host name or IP address of the custom NTP server
The default NTP server depends on the selected time zone.
For example, for China the default is time-e.netgear
Note: If you use a host name, make sure that you have
configured a DNS server. For more information, see the next
section.
. By default the Enable radio button is
3. Click Apply .
Configure the IP Settings
.
.com.
WARNING:
If you enable the DHCP client, the IP address of the wireless
access point changes when you click Apply, causing you to lose
your connection to the wireless access point. You then need to
use the new IP address to reconnect to the wireless access point.
Installation and Basic Configuration
21
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Tip: If you enable the DHCP client on the wireless access point, you can
discover the new IP address of the wireless access point by accessing
the DHCP server on your LAN, or by using a network IP address scanner
application.
To configure the IP settings:
1. Select Configuration > IP > IP Settings.
The IP Settings screen displays:
2. Configure the IP settings as explained in the following table:
Setting Description
DHCP ClientBy default, the Dynamic Host Configuration Protocol (DHCP) client is disabled. If
you have a DHCP server on your LAN and you select the Enable radio button,
the wireless access point receives its IP address, subnet mask, and default
gateway settings automatically from the DHCP server on your network when you
connect the wireless access point to your LAN.
IP AddressEnter the IP address of your wireless access point. The default IP address is
192.168.0.100.
address range used on your LAN, or enable DHCP the server
IP Subnet MaskEnter the network number portion of an IP address. Unless you are
implementing subnetting, enter 255.255.0.0 as the subnet mask.
Default GatewayEnter the IP address of the ISP gateway to which the wireless access point
connects.
To change the address, enter an unused IP address from the
.
Installation and Basic Configuration
22
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Setting Description
Primary DNS Server
Secondary DNS Server
Network Integrity Check
Enter the IP addresses of the primary and secondary DNS servers.
A DNS server is a host on the Internet that translates Internet names (such as
www.netgear.com) to numeric IP addresses.
address of one or two DNS servers to your wireless access point during login. If
the ISP does not transfer addresses, you need to obtain them from the ISP and
enter them manually in these fields.
Select this check box to validate that the upstream link is active before allowing
wireless associations. Ensure that the default gateway is configured.
Typically your ISP transfers the IP
3. Click Apply .
Configure the Optional DHCP Server
The wireless access point provides a built-in DHCP server for wireless clients only , which can
be especially useful in small networks. By default, the DHCP server is disabled. When the
DHCP server is enabled, the wireless access point provides preconfigured TCP/IP
configurations to all connected wireless clients.
To configure DHCP server settings:
1. Select Configuration > IP > DHCP Server Settings.
The DHCP Server Settings screen displays:
Installation and Basic Configuration
23
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Configure the settings as explained in the following table:
Setting Description
Select the Enable radio button to enable the DHCP server . Use the default settings or specify the pool of IP
addresses to be assigned by setting the starting IP address and ending IP address. These addresses
should be part of the same IP address subnet as the wireless access point’
DHCP Server VLAN IDEnter the VLAN ID for the DHCP server. The VLAN ID range is from 1 to 4094.
The default VLAN is 1.
Starting IP AddressEnter the first address in the range of IP addresses to be assigned to DHCP
clients.
Ending IP AddressEnter the last address in the range of IP addresses to be assigned to DHCP
clients. The default address is 192.168.1.50.
Subnet MaskEnter the subnet mask to be used by DHCP clients. The default mask is
255.255.255.0.
The default address is 192.168.1.02.
s LAN IP address.
Gateway IP
Primary DNS Address Enter the IP address of the primary Domain Name System (DNS) server
Secondary DNS Address Enter the IP address of the secondary DNS server available to DHCP clients.
Primary WINS ServerEnter the IP address of the primary WINS server for the network, if there is any.
Secondary WINS Server Enter the IP address of the secondary WINS server for the network, if there is
LeaseEnter the period that the DHCP server grants to DHCP clients to use the
AddressEnter the IP address of the default routing gateway to be used by DHCP clients.
The default address is 192.168.0.1.
available to DHCP clients.
any
.
assigned IP addresses. The default time is one day
.
3. Click Apply .
Configure the Basic Wireless Settings
For proper compliance and compatibility between similar products in your coverage area, you
need to configure the 802.1 1b/g/n and 802.1 1a/n wireless adapter settings correctly, including
the operating channel and country. You also need to configure the basic wireless network
settings for wireless devices to connect to your network. For other wireless features,
including wireless security, see Chapter 3, Wireless Configuration and Security.
Installation and Basic Configuration
24
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
WARNING:
If you configure the wireless access point from a wireless
computer and you change the wireless access point’s SSID,
channel, or wireless security settings, you lose your wireless
connection when you click Apply. You then need to change the
wireless settings of your computer to match the wireless access
point’s new settings.
Operating Frequency (Channel) Guidelines
You do not need to change the operating frequency (channel) unless you notice interference
problems or you place the wireless access point near another wireless access point. If you do
change the operating frequency, observe the following guidelines:
•Wireless access points use a fixed channel. You can select a channel that provides the
least interference and best performance. In the United States and Canada, 1
are available.
•If you are using multiple wireless access points, it is better if adjacent wireless access
points use different radio frequency channels to reduce interference. The recommended
channel spacing between adjacent wireless access points is five channels (for example,
use Channels 1 and 6, or 6 and 1
1, or 1 and 11).
1 channels
•In infrastructure mode (which is the default mode for the wireless access point), wireless
clients normally scan all channels, looking for a wireless access point. If more than one
wireless access point can be used, the one with the strongest signal is used.
This is
possible only if the wireless access points use the same SSID.
Configure 802.11b/bg/ng Wireless Settings
The basic Wireless Settings screen lets you configure the 802.11b, 802.11bg, or 802.11ng
wireless mode, the SSID, and other wireless settings.
Note: The radio wave icon () displays next to the enabled wireless
mode (b, bg, or ng).
1ng settings.
Installation and Basic Configuration
25
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Select one of the following 2.4GHz Band radio buttons:
•11b. Both 802.11n- and 802.1
1g-compliant devices can connect to the access point
because they are backward compatible.
•
11bg. 802.11n-compliant devices can connect to the access point because they are
backward compatible.
•11ng. This is the default setting. 802.11b-compliant devices cannot connect to the
access point. If you keep the default setting, go to Step 5
.
When you change the wireless mode, the Turn Radio On check box is automatically
cleared, and all fields, buttons, and drop-down menus onscreen are masked out.
3. Turn on the radio by selecting the Turn Radio On check box.
A pop-up screen displays.
Note: Under normal conditions, you want the radio to be turned on. Turning off
the radio disables access through the wireless access point, which can be
helpful for configuration, network tuning, or troubleshooting activities.
4. Click OK to confirm the change of wireless mode.
The change does not take effect until you click the Apply button after you have completed
the wireless configuration.
Installation and Basic Configuration
26
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
5. Specify the remaining wireless settings as explained the following table:
SettingDescriptions
Wireless Network Name
(SSID)
Wireless On-Off StatusThis field is not configurable. It shows the status of the wireless scheduler. For
Broadcast Wireless
Network Name (SSID)
Channel / FrequencyFrom the drop-down menu, select the channel you wish to use for your wireless
Enter a 32-character (maximum) service set identifier (SSID); the characters are
case-sensitive. The default is
device needs to match the wireless access point’s SSID for the wireless device
to communicate with the wireless access point. If the SSIDs do not match, you
do not get a wireless connection to the wireless access point.
more information, see Schedule the Wireless Radios to Be Turned Off on
page 60.
Select the Ye
SSID, allowing wireless clients that have a null (blank) SSID to adopt the
wireless access point’s SSID.
from being broadcast, select the No radio button.
LAN.
The wireless channels and frequencies depend on the country and
wireless mode. The default setting is
It should not be necessary to change the wireless channel unless you
Note:
experience interference (indicated by lost connections or slow data transfers). If
this happens, you might want to experiment with different channels to see which
is the best. For more information, see Operating Frequency (Channel)
Guidelines on page 25.
Note: For more information about available channels and frequencies, see
Technical Specifications on page 125.
s radio button to enable the wireless access point to broadcast its
NETGEAR_1 1ng. The SSID assigned to a wireless
Yes is the default setting. To prevent the SSID
Auto.
MCS Index / Data Rate
11ng mode only
Note: For most
networks, the default
settings work fine.
Output PowerFrom the drop-down menu, select the transmission power of the wireless access
From the drop-down menu, select a Modulation and Coding Scheme (MCS)
index and transmit data rate for the wireless network.
For a list of all options that you can select, see Factory Default Settings
page 127.
Channel WidthFrom the drop-down menu, select a channel width. The
options are Dynamic 20/40 MHz, 20 MHz, and 40 MHz.
default is 20 MHz. A wider channel improves the
performance, but some legacy devices can operate only in
either 20 MHz or 40 MHz.
Guard IntervalFrom the drop-down menu, select the guard interval to
protect transmissions from interference.
or you can select Long - 800 ns. Some legacy devices can
operate only with a long guard interval.
point: Full, Half, Quarter
Note: Increasing the power improves performance, but if two or more wireless
access points are operating in the same area and on the same channel,
interference can occur.
Note: Make sure that you comply with the regulatory requirements for total radio
frequency (RF) output power in your country.
, Eighth, Minimum. The default is Full.
The default setting is Best.
on
The
The default is Auto,
Installation and Basic Configuration
27
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
6. Click Apply .
The selected wireless mode is now enabled.
Note: For information about how to configure advanced wireless settings,
see Configure Advanced Wireless Settings on page 82.
Configure 802.11a/na Wireless Settings
If you click the 802.11a/na tab on the basic Wireless Settings screen, you can configure the
802.11a or 802.11na wireless mode, the SSID, and other wireless settings.
The basic Wireless Settings screen displays the 802.1
1na settings.
Note: The radio wave icon () displays next to the selected radio mode
(a or na).
Installation and Basic Configuration
28
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
3. Select one of the following 5GHz Band radio buttons:
•11a. 802.1
1n-compliant devices can connect to the access point because they are
backward compatible.
•11na.
This is the default setting. If you keep the default setting, go to Step 6.
When you change the wireless mode, the Turn Radio On check box is automatically
cleared, and all fields, buttons, and drop-down menus onscreen are masked out.
4. Turn on the radio by selecting the T
urn Radio On check box.
A pop-up screen displays.
Note: Under normal conditions, you want the radio to be turned on. Turning off
the radio disables access through the wireless access point, which can be
helpful for configuration, network tuning, or troubleshooting activities.
5. Click OK to confirm the change of wireless mode.
The change does not take effect until you click the Apply button after you have completed
the wireless configuration.
6. Specify the remaining wireless settings as explained the following table:
SettingDescriptions
Wireless Network Name
(SSID)
Wireless On-Off StatusThis field is not configurable. It shows the status of the wireless scheduler. For
Enter a 32-character (maximum) service set identifier (SSID); the characters are
case-sensitive. The default
device needs to match the wireless access point’s SSID for the wireless device
to communicate with the wireless access point. If the SSIDs do not match, you
do not get a wireless connection to the wireless access point.
more information, see Schedule the Wireless Radios to Be Turned Off on
page 60.
is NETGEAR_11na. The SSID assigned to a wireless
Broadcast Wireless
Network Name (SSID)
Channel / FrequencyFrom the drop-down menu, select the channel you wish to use on your wireless
Select the Ye
SSID, allowing wireless clients that have a null (blank) SSID to adopt the
wireless access point’
from being broadcast, select the No radio button.
LAN.
The wireless channels and frequencies depend on the country and
wireless mode.
Note: It should not be necessary to change the wireless channel unless you
experience interference (indicated by lost connections or slow data transfers). If
this happens, you might want to experiment with different channels to see which
is the best. For more information, see Operating Frequency (Channel)
Guidelines on page 25.
Note: For more information about available channels and frequencies, see
Technical Specifications on page 125.
Installation and Basic Configuration
s radio button to enable the wireless access point to broadcast its
s SSID. Yes is the default setting. To prevent the SSID
The default setting is Auto.
29
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescriptions
MCS Index / Data Rate
11na mode only
Note: For most
networks, the default
settings work fine.
Output PowerFrom the drop-down menu, select the transmission power of the wireless access
From the drop-down menu, select a Modulation and Coding Scheme (MCS)
index and transmit data rate for the wireless network.
For a list of all options that you can select, see Factory Default Settings on
page 127.
Channel WidthFrom the drop-down menu, select a channel width. The
options are Dynamic 20/40 MHz, 20 MHz, and 40 MHz.
default is Dynamic 20/40 MHz.
performance, but some legacy devices can operate only in
either 20 MHz or 40 MHz.
Guard IntervalFrom the drop-down menu, select the guard interval to
protect transmissions from interference.
or you can select Long - 800 ns. Some legacy devices can
operate only with a long guard interval.
point: Full, Half, Quarter
Note: Increasing the power improves performance, but if two or more wireless
access points are operating in the same area and on the same channel,
interference can occur.
Note: Make sure that you comply with the regulatory requirements for total radio
frequency (RF) output power in your country.
, Eighth, Minimum.
The default is Full.
The default setting is Best.
A wider channel improves the
The default is
7. Click Apply .
The
Auto,
The selected wireless mode is now enabled.
Note: For information about how to configure advanced wireless settings,
see Configure Advanced Wireless Settings on page 82.
Test Basic Wireless Connectivity
After you have configured the wireless access point as explained in the previous sections,
test the computers on your LAN for wireless connectivity before you position and mount the
wireless access point at its permanent position.
To test for wireless connectivity:
1. Configure the 802.11b/g/n and 802.1
they all have the same SSID and channel that you have configured on the wireless
access point.
2. Verify that your computers have a wireless link to the wireless access point. If you have
enabled the DHCP server on the wireless access point, verify that
to obtain an IP address through DHCP from the wireless access point.
1a/n wireless adapters of your computers so that
your computers are able
Installation and Basic Configuration
30
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
3. Verify network connectivity by using a browser such as Internet Explorer 6.0 or later or
Mozilla Firefox 1.5 or later to browse the Internet, or check for file and printer access on your
network.
Note: If you have trouble connecting to the wireless access point, see
Chapter 7, Troubleshooting.
NETGEAR recommends that you complete the following tasks before you deploy the
wireless access point in your network:
•Configure wireless security and other wireless features as described in Chapter 3,
Wireless Configuration and Security.
•Configure any additional features that you might need as described in Chapter 4,
Management, and Chapter 5, Advanced Configuration.
After you have completed the configuration of the wireless access point, you can reconfigure
the computer that you used for this process back to its original TCP/IP settings.
Mount the Wireless Access Point
This section describes the different options to mount the wireless access point.
•Ceiling Installation
•Wall Installation
•Desk Installation
Note: NETGEAR recommends that you review the information in Wireless
Equipment Placement and Range Guidelines on page 15 and
configure and test the wireless access point before you mount the
wireless access point at its permanent position.
Ceiling Installation
The best location for ceiling installation is at the center of your wireless coverage area, and
within line of sight of all mobile devices. Make sure the top (the dome side) of the wireless
access point is directed toward the users and not the ceiling.
Installation and Basic Configuration
31
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Figure 6. Best location for ceiling installation
Note: Do not place the wireless access point in a false ceiling space facing
up.
To install the wireless access point using the ceiling installation kit:
1. Verify the package contents of the ceiling installation kit.
Mounting plate
Clamp with screws
Installation and Basic Configuration
32
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Detach the mounting plate from the wireless access point.
3. Attach the clamp to the ceiling rail.
4. Attach the mounting plate to the clamp.
Installation and Basic Configuration
33
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
5. Connect the cables to the wireless access point.
6. Attach the wireless access point to the mounting plate.
7. Attach the cover to the wireless access point.
Installation and Basic Configuration
34
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Wall Installation
The best location for wall installation is at the center of your wireless coverage area, and
within line of sight of all mobile devices. Make sure the top (the dome side) of the wireless
access point is directed toward the users and not the wall.
Figure 7. Best location for wall installation
To install the wireless access point using the wall installation kit:
1. Verify the package contents of the wall installation kit.
Mounting plate
Screws and
wall supports
Installation and Basic Configuration
35
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Detach the mounting plate from the wireless access point.
3. Attach the mounting plate to the wall.
Installation and Basic Configuration
36
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
4. Connect the cables to the wireless access point.
5. Attach the wireless access point to the mounting plate.
Installation and Basic Configuration
37
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
6. Attach the cover to the wireless access point.
Desk Installation
To install the wireless access point on a desk:
Attach the rubber feet to the holes in the bottom of the wireless access point.
Rubber feet
Installation and Basic Configuration
38
3. Wireless Configuration and
Security
This chapter describes how to configure the wireless features of the wireless access point. The
chapter includes the following sections:
•Before You Configure Wireless Security
•Wireless Data Security Options
•Security Profiles
•Configure RADIUS Server Settings
•Restrict Wireless Access by MAC Address
•Schedule the Wireless Radios to Be Turned Off
•Configure Basic Wireless Quality of Service
3
39
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Before You Configure Wireless Security
Before you set up wireless security and additional wireless features that are described in this
chapter, connect the wireless access point, get the Internet connection working, set the
country or region correctly, and configure the 802.11b, 11bg, or 11ng wireless settings and
the 802.11a or 11na wireless settings as described in Chapter 2, Installation and Basic
Configuration.
The wireless access point functions with an Ethernet LAN connection. Make sure that you
have verified wireless connectivity before you set up wireless security and additional wireless
features.
WARNING:
If you are configuring the wireless access point from a wireless
computer and you change the wireless access point’s SSID,
channel, or wireless security settings, you lose your wireless
connection when you click Apply. You then need to change the
wireless settings of your computer to match the wireless access
point’s new settings.
Wireless Data Security Options
Indoors, computers can connect over 802.11n wireless networks at a maximum range of
300 feet. Typically, a wireless access point inside a building works best with devices within a
100-foot radius. Such distances can allow for others outside your immediate area to access
your network.
Unlike wired network data, your wireless data transmissions can extend beyond your walls
and can be received by anyone with a compatible adapter. For this reason, use the security
features of your wireless equipment. The wireless access point provides highly ef
security features that are covered in detail in this chapter. Deploy the security features
appropriate to your needs.
Wireless data security options
Range: Up to 300 feet radius
1. No security: Easy but no security at all
2. MAC access list: No data security
3. WEP: Secure but vulnerable
4. WPA or WPA-PSK: Strong security
5. WPA2 or WPA2-PSK: Very strong
fective
Figure 8. Wireless data security options
Wireless Configuration and Security
40
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
There are many ways in which you can enhance the security of your wireless network:
•Use multiple BSSIDs combined with VLANs. Y
ou can configure combinations of
VLANS and BSSIDs (security profiles) with stronger or less restrictive access security
according to your requirements. For example, visitors could be given wireless Internet
access but be excluded from any access to your internal network.
For information about how to configure BSSIDs, see Configure and Enable Security
Profiles on page 46.
•Restrict access based by MAC address. Y
ou can allow only trusted devices to connect
so that unknown devices cannot wirelessly connect to the wireless access point.
Restricting access by MAC address adds an obstacle against unwanted access to your
network, but the data broadcast over the wireless link is fully exposed.
For information about how to restrict access by MAC address, see Restrict Wireless
Access by MAC Address on page 57.
•Turn off the broadcast of the wireless network name (SSID). If you disable broadcast
of the SSID, only devices that have the correct SSID can connect.
This nullifies the
wireless network discovery feature of some products, such as Windows XP, but the data
is still exposed.
For information about how to turn off broadcast of the SSID, see Configure and Enable
Security Profiles on page 46.
•WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
shared key authentication and WEP data encryption block all but the most determined
eavesdropper
. This data encryption mode has been superseded by WPA-PSK and
WPA2-PSK.
For information about how to configure WEP, see the following sections:
-Configure and Enable Security Profiles on page 46
-Configure an Open System with WEP or Shared Key with WEP on page 51
•Legacy 802.1X. Legacy 802.1X uses RADIUS-based 802.1x authentication but no data
encryption.
For information about how to configure Legacy 802.1X, see the following sections:
-Configure and Enable Security Profiles on page 46
-Configure Legacy 802.1X on page 52
•WP
A and WPA-PSK (TKIP). Wi-Fi Protected Access (WPA) data encryption provides
strong data security with
Temporal Key Integrity Protocol (TKIP) encryption. The very
strong authentication along with dynamic per-frame rekeying of WPA makes it virtually
impossible to compromise.
WPA uses RADIUS-based 802.1x authentication; for more information, see the following
sections:
-Configure and Enable Security Profiles on page 46
-Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 53
Wireless Configuration and Security
41
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
WPA-PSK uses a pre-shared key (PSK) for authentication; for more information, see the
following sections:
-Configure and Enable Security Profiles on page 46
-Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 54
•WP
A2 and WP A2-PSK (AES). Wi-Fi Protected Access version 2 (WP
provides strong data security with Advanced Encryption Standard (AES) encryption. The
very strong authentication along with dynamic per-frame rekeying of WPA2 makes it
virtually impossible to compromise.
WP A2 uses RADIUS-based 802.1x authentication; for more information, see the following
sections:
-Configure and Enable Security Profiles on page 46
-Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 53
WP A2-PSK uses a pre-shared key (PSK) for authentication; for more information, see the
following sections:
A2) data encryption
-Configure and Enable Security Profiles on page 46
-Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 54
•WP
A & WP A2 and WPA-PSK & WPA2-PSK mixed modes. These modes support data
encryption either with both WPA and WPA2 clients or with both WPA-PSK and
WPA2-PSK clients and provide the most reliable security.
WPA & WPA2 uses RADIUS-based 802.1x authentication; for more information, see the
following sections:
-Configure and Enable Security Profiles on page 46
-Configure WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
on page 53
WPA-PSK & WPA2-PSK uses a pre-shared key (PSK) for authentication; for more
information, see the following sections:
-Configure and Enable Security Profiles on page 46
-Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK on page 54
Security Profiles
This section describes the main components of security profiles and explains how to
configure and enable security profiles.
•Security Profile Concepts
•Write Down Your Wireless Network Settings
•Configure and Enable Security Profiles
Wireless Configuration and Security
42
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Security profiles let you configure unique security settings for each SSID on each radio of the
wireless access point. For each radio, the wireless access point supports up to eight security
profiles (BSSIDs) that you can configure on the individual Edit Wireless Network screens that
are accessible from the Edit Security Profile screen (see Configure and Enable Security
Profiles on page 46).
Security Profile Concepts
Security profiles include the following main components:
•Network authentication
The wireless access point is set by default as an open system with no authentication.
When you configure network authentication, bear in mind that not all wireless adapters
support WP A or WPA2. Consult the product documentation for your wireless adapter and
WPA or WPA2 client software for instructions about how to configure WPA or WPA2
settings.
For information about the types of network authentication that the wireless access point
supports, see Configure and Enable Security Profiles on page 46.
•Data encryption
The available data encryption options depend on the network authentication setting that
you select (the default is no encryption).
Configure and Enable Security Profiles on page 46
•Wireless client security separation
If this feature is enabled, the associated wireless clients (using the same SSID) are not
able to communicate with each other.
access situations. By default, wireless client separation is disabled. For more information,
see Configure and Enable Security Profiles on page 46.
•VLAN ID
If this feature is enabled and if the network devices (hubs and switches) on your LAN
support the VLAN (802.1Q) standard, the default VLAN ID for the wireless access point is
associated with each profile. The default VLAN ID needs to match the IDs that are used
by the other network devices. For more information, see
Profiles on page 46.
Some concepts and guidelines regarding the SSID are explained in the following list:
•A basic service set (BSS) consists of a group of wireless clients and a single wireless
access point that use the same security profile or service set identifier (BSSID). The
actual identifier in the BSSID is the MAC address of the wireless radio. (A wireless radio
can have multiple MAC addresses, one for each security profile.)
•An extended service set (ESS) consists of a group of wireless clients and multiple
wireless access points that use the same identifier (ESSID).
•Dif
•Roaming is the ability of wireless clients to connect wirelessly when they physically move
ferent wireless access points within an ESS can use different channels. To reduce
interference, adjacent wireless access points should use dif
from one BSS to another one within the same ESS. The wireless client automatically
changes to the wireless access point with the least interference or best performance.
The data encryption settings are explained in
.
This feature is useful for hotspots and other public
Configure and Enable Security
ferent channels.
Wireless Configuration and Security
43
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Write Down Your Wireless Network Settings
For a new wireless network, print or copy the following two forms and fill in the settings. For
an existing wireless network, the network administrator can provide this information.
Form for 802.11b/bg/ng Modes
Print the form and store the security information in a safe place:
•SSID: The service set identifier (SSID) identifies the wireless local area network. Y
customize it by using up to 32 alphanumeric characters. Write your SSID on the line.
SSID: ___________________________________
The SSID in the wireless access point is the SSID you configure on the wireless adapter
card. All wireless nodes in the same network need to be configured with the same SSID.
•WEP key size and authentication
Choose the key size by circling one: 64, 128, or 152 bits.
Choose the authentication type by circling one: open system or shared key.
Passphrase: ___________________________________
Note: If you select shared key, the other devices in the network cannot connect unless
they are set to shared key and have the same keys in the same positions as those in the
wireless access point.
•WPA-PSK (pre-shared key) and WPA2-PSK
Record the WP
WPA-PSK passphrase: ________________________________
Record the WPA2-PSK passphrase:
WPA2-PSK passphrase: ________________________________
A-PSK passphrase:
ou can
•WP
•WP
A RADIUS settings
For WP
Server name or IP address: Primary _______________ Secondary ________________
Port: ___________________________________
Shared secret: ___________________________________
For WP
Server name/IP address: Primary ________________ Secondary _________________
Port: ___________________________________
Shared secret: ___________________________________
A, record the following settings for the primary and secondary RADIUS servers:
A2 RADIUS settings
A2, record the following settings for the primary and secondary RADIUS servers:
Wireless Configuration and Security
44
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Form for 802.11a/an Modes
Print the form and store the security information in a safe place:
•SSID: The service set identifier (SSID) identifies the wireless local area network. Y
customize it by using up to 32 alphanumeric characters. Write your SSID on the line.
SSID: ___________________________________
The SSID in the wireless access point is the SSID you configure on the wireless adapter
card. All wireless nodes in the same network need to be configured with the same SSID.
•WEP key size and authentication
Choose the key size by circling one: 64, 128, or 152 bits.
Choose the authentication type by circling one: open system or shared key.
Passphrase: ___________________________________
Note: If you select shared key, the other devices in the network cannot connect unless
they are set to shared key and have the same keys in the same positions as those in the
wireless access point.
•WPA-PSK (pre-shared key) and WPA2-PSK
Record the WP
A-PSK passphrase:
WPA-PSK passphrase: ________________________________
Record the WPA2-PSK passphrase:
WPA2-PSK passphrase: ________________________________
ou can
•WP
A RADIUS settings
For WP
A, record the following settings for the primary and secondary RADIUS servers:
Server name or IP address: Primary _______________ Secondary ________________
Port: ___________________________________
Shared secret: ___________________________________
•WP
A2 RADIUS settings
For WP
A2, record the following settings for the primary and secondary RADIUS servers:
Server name/IP address: Primary ________________ Secondary _________________
Port: ___________________________________
Shared secret: ___________________________________
Wireless Configuration and Security
45
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Configure and Enable Security Profiles
To configure and enable a security profile, you need to enable the associated radio:
•For 802.11b/bg/ng modes, the 2.4 GHz radio needs to be enabled (see
Configure
802.11b/bg/ng Wireless Settings on page 25).
•For 802.11a/na modes, the 5
GHz radio needs to be enabled (see Configure 802.11a/na
Wireless Settings on page 28).
Both radios can function concurrently.
The wireless access point is set by default as an open system with no authentication. When
you configure network authentication, bear in mind the following:
•If you are using access point mode (which is the default mode if you did not enable
wireless bridging), all options are available. In other modes such as bridge mode, some
options might be unavailable.
•Not all wireless adapters support WPA or WP
A2. Consult the product documentation for
your wireless adapter and WPA or WPA2 client software for instructions about how to
configure WPA or WPA2 settings.
WARNING:
If you use a wireless computer to configure wireless security
settings, you are disconnected when you click Apply. Reconfigure
your wireless computer to match the new settings, or access the
wireless access point from a wired computer to make further
changes.
The Profile Settings screen for the 802.11b/bg/ng modes displays eight wireless security
profiles. (If the 2.4 GHz radio is disabled, the Enable column is masked out.)
Wireless Configuration and Security
46
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. (Optional) Click the 802.11a/na tab.
The Profile Settings screen for the 802.11a/na modes also shows eight wireless security
profiles. (If the 5 GHz radio is disabled, the Enable column is masked out.)
Wireless Configuration and Security
47
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The following table explains the fields of the Profile Settings screen:
Setting Description
Profile NameThe unique name of the wireless security profile that makes it easy to
recognize the profile.
SSIDThe wireless network name (SSID) for the wireless security profile.
SecurityThe configured wireless authentication method for the wireless security
profile.
VLANThe default VLAN ID that is associated with the wireless security profile.
EnableThe check box that lets you select the wireless security profile so you can
enable it by clicking Apply.
3. Select the radio button to the left of the wireless security profile that you want to configure,
and click Edit.
The Edit Security Profile screen opens for the selected wireless security profile (see the
following figure). The screen has two sections:
•Profile Definition (see Step 4)
•Authentication Settings (see Step 5)
Wireless Configuration and Security
48
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
4. Specify the settings of the Profile Definition section of the Edit Security Profile screen as
explained in the following table:
Setting Description
Profile NameEnter a unique name of the wireless security profile that makes it easy to
recognize the profile. The default names are NETGEAR, NETGEAR-1,
NETGEAR-2, and so on, through NETGEAR-7. Y
32 alphanumeric characters.
ou can enter a value of up to
Wireless Network Name
(SSID)
Broadcast Wireless
Network Name (SSID)
The wireless network name (SSID) for the wireless security profile. The default
names depend on the selected radio band:
•802.1
•802.1
Select the Ye
SSID, allowing wireless clients that have a null (blank) SSID to adopt the
wireless access point’s SSID.
from being broadcast, select the No radio button.
1b/bg/ng. The default names are NETGEAR_11ng,
NETGEAR_11ng-1, NETGEAR_1
NETGEAR_11ng-7 for the eighth profile.
1a/na. The default names are NETGEAR_11na, NETGEAR_11na-1,
NETGEAR_11na-2, and so on, through NETGEAR_1
profile.
s radio button to enable the wireless access point to broadcast its
1ng-2, and so on, through
1na-7 for the eighth
Yes is the default setting. To prevent the SSID
5. Specify the settings of the Authentication Settings section of the Edit Security Profile screen
as explained in the following table.
Setting Description
Network Authentication
and Data Encryption
Note: The data
encryption fields that
display onscreen
depend on your
selection from the
Network Authentication
drop-down menu.
Open SystemThis is the default setting. Use an open system without any
encryption or with WEP encryption.
See Configure an Open System with WEP or Shared Key
with WEP on page 51.
Shared KeyUse WEP encryption and enter at least one shared key.
See Configure an Open System with WEP or Shared Key
with WEP on page 51.
Legacy 802.1X Configure the RADIUS server settings. Encryption is not
supported.
See Configure Legacy 802.1X on page 52.
WPA with RadiusConfigure the RADIUS server settings and select TKIP or
TKIP +
AES encryption.
See Configure WP
and WPA & WPA2 with RADIUS on page 53.
WPA2 with Radius Configure the RADIUS server settings and select AES or
TKIP +
AES encryption.
See Configure WP
and WPA & WPA2 with RADIUS on page 53.
Note: Select this setting only if all clients support WPA2.
A with RADIUS, WPA2 with RADIUS,
A with RADIUS, WPA2 with RADIUS,
Wireless Configuration and Security
49
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Setting Description
Network Authentication
and Data Encryption
(continued)
WP A & WP A2 with
Radius
WPA-PSKEnter a WPA passphrase and select TKIP or TKIP + AES
WPA2-PSKEnter a WPA passphrase and select AES or TKIP + AES
WPA-PSK &
WP
A2-PSK
Configure the RADIUS server setting. TKIP + AES
encryption is the default encryption.
See Configure WPA with RADIUS, WPA2 with RADIUS,
and WPA & WPA2 with RADIUS on page 53.
Note: This setting allows clients to connect through either
WPA with TKIP or WPA2 with AES.
encryption.
See Configure WPA-PSK, WPA2-PSK, and WPA-PSK &
WPA2-PSK on page 54.
encryption.
See Configure WPA-PSK, WPA2-PSK, and WPA-PSK &
WPA2-PSK on page 54.
Note: Select this setting only if all clients support WPA2.
Enter a WP
default encryption.
See Configure WPA-PSK, WPA2-PSK, and WPA-PSK &
WPA2-PSK on page 54.
Note: This setting allows clients to connect through either
WPA with TKIP or WPA2 with AES.
A passphrase. TKIP + AES encryption is the
Wireless Client Security
Separation
Dynamic VLANFrom the drop-down menu, select how VLANs operate by making one of the
If you enable wireless client security separation by selecting Enable from the
drop-down menu, the associated wireless clients cannot communicate with
each other
feature is intended for hotspots and other public access situations.
following selections:
•Disable. Disables dynamic VLANs, and enables static VLANs.
•Optional
•Required. Enables dynamic VLANs. If a RADIUS server does not return a
For dynamic VLANs to operate (that is, the selection is Optional or Required),
the following is required:
•The hubs and switches on your LAN must support the VLAN (802.1Q)
•The authentication is set to any RADIUS type authentication: either the
. By default, Disable is selected from the drop-down menu.
default setting.
. Enables dynamic VLANs, but if a RADIUS server does not return
a VLAN ID, the wireless client is still allowed to connect to the wireless
access point.
VLAN ID, the wireless client is not authenticated and cannot connect to the
wireless access point.
standard.
network authentication in the wireless security profile or the remote MAC
address database authentication for the MAC Authentication feature can be
used.
This
This is the
Wireless Configuration and Security
50
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Setting Description
VLAN IDEnter the VLAN ID to be associated with this wireless security profile. The
default VLAN ID is 1. The VLAN ID needs to match the VLAN ID that is used by
the other devices in your network.
Access ControlAccess control functions only when static VLANs are enabled, that is, you select
Disable from the Dynamic VLAN drop-down menu.
The Access Control radio buttons let you enable or disable access control
through a RADIUS server for the wireless security the profile:
•Disable.
•Enable. Access control is enabled, and wireless clients are authenticated
through a RADIUS server. Either the network authentication in the wireless
security profile or the remote MAC address database authentication for the
MAC Authentication
Note: You can use access control even when you do not configure WPA with
RADIUS or WPA2 with RADIUS.
Access Control PolicyAccess control policy functions only when static VLANs are enabled, that is, you
select Disable from the Dynamic VLAN drop-down menu and you select the
Enable
The Access Control Policy radio buttons let you enable or disable the access
control policy for wireless clients:
•Disable
wireless client is still allowed to connect to the wireless access point.
the default setting.
•Enable. If a RADIUS server does not return a (static) VLAN ID, the wireless
client is not authenticated and cannot connect to the wireless access point.
Access control is disabled. This is the default setting.
feature must be enabled.
Access Control radio button.
. If a RADIUS server does not return a (static) VLAN ID, the
This is
6. Click Apply .
Configure an Open System with WEP or Shared Key with WEP
Whether you use an open system with WEP or shared key with WEP, configure the settings
that are explained in Table 2 on page 52.
•Open system with WEP
An open system can function without any encryption or with pre-shared WEP key
encryption without RADIUS authentication. The security level of static WEP is not very
strong.
When you select Open System from the Network Authentication drop-down menu and
any selection other than None from the Data Encryption drop-down menu, the screen
expands to display the WEP fields:
Figure 9. Open system with WEP
Wireless Configuration and Security
51
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
•Shared key with WEP
Shared key provides pre-shared WEP key encryption without RADIUS authentication.
The security level of static WEP is not very strong. When you select Shared Key from the
Network Authentication drop-down menu, the screen expands to display the WEP fields:
Figure 10. Shared key with WEP
Table 2. WEP encryption settings
SettingDescriptions
Data EncryptionSelect the encryption key size from the drop-down menu:
•64-bit WEP. Standard WEP encryption, using 40/64-bit encryption.
•128-bit WEP. Standard WEP encryption, using 104/128-bit encryption.
•152-bit WEP. Proprietary WEP encryption mode, using 128+24 bit encryption.
mode functions only with other wireless clients that support this mode.
This
PassphraseEnter a passphrase. The passphrase length needs to be between 8 and 63 characters
(inclusive). The secret passphrase allows you to generate the keys automatically by
clicking Generate Keys. The default passphrase is sharedsecret.
You can display the actual passphrase by selecting the Show Passphrase in Clear Text
Ye
s radio button.
Encryption KeyEither enter a key manually or allow the key to be automatically generated by clicking
Generate Keys.
For ASCII format, depending on the key size selected, the manually entered
•
encryption key needs to have a length of 5 (64-bit WEP), 13 (128-bit WEP), or
16 characters (152-bit WEP).
•For HEX format, depending on the key size selected, the manually entered or
automatically generated encryption key needs to have a length of 10 (64-bit WEP),
26 (128-bit WEP), or 32 (152-bit WEP) characters.
Note: wireless clients need to use the key to access the wireless access point.
Show Passphrase in
Clear T
ext
Select the Yes radio button to display the actual passphrase in the Passphrase field. The
default setting is No.
Configure Legacy 802.1X
To use legacy 802.1X security, you need to define RADIUS server settings. For information
about RADIUS servers, see Configure RADIUS Server Settings on page 55.
When you select Legacy 802.1X from the Network Authentication drop-down menu, the Data
Encryption drop-down menu is automatically set to None. To use legacy 802.1X security, you
need to define the RADIUS servers only.
Wireless Configuration and Security
52
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Figure 11. Legacy 802.1X
Configure WP A with RADIUS, WPA2 with RADIUS, and WP A & WPA2 with
RADIUS
WPA, WPA2, and WPA & WPA2 security requires RADIUS-based 802.1x authentication, so
you also need to define RADIUS server settings. For information about RADIUS servers, see
Configure RADIUS Server Settings on page 55.
The selections that are available from the Data Encryption drop-down menu depend on the
type of WP A authentication that you select from the Network Authentication drop-down menu
and are shown in the table that follows the figures.
•WPA with RADIUS
Figure 12. WPA with RADIUS
•WPA2 with RADIUS
Figure 13. WPA2 with RADIUS
•WPA & WPA2 with RADIUS
Figure 14. WPA & WPA2 with RADIUS
Table 3. Settings for WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
SettingDescriptions
TKIPTemporal Key Integrity Protocol (TKIP) is the standard encryption method used with WPA. You
can also use TKIP with WPA2.
Note:
TKIP provides only legacy (slower) rates of operation. If you want to use the 11n rates and
speed, NETGEAR recommends WPA2 authentication with AES encryption.
Wireless Configuration and Security
53
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Table 3. Settings for WPA with RADIUS, WPA2 with RADIUS, and WPA & WPA2 with RADIUS
SettingDescriptions
AESAdvanced Encryption Standard (AES) is the standard encryption method used with WPA2.
Note: Although some wireless clients might support AES with WPA, the WNDAP380R wireless
access point does not support WPA with AES.
TKIP + AESThe TKIP + AES encryption method is supported both for WPA and WPA2. Broadcast packets
use
TKIP. For unicast (point-to-point) transmissions, WP
use AES. For the WPA & WPA2 mixed mode, TKIP + AES is the only supported data encryption
method.
A clients use TKIP, and WPA2 clients
Configure WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
WPA-PSK, WPA-PSK, and WPA-PSK & WPA2-PSK authentication use a pre-shared key
(PSK, also called a passphrase or a network key) and do not require authentication from a
RADIUS server.
The selections that are available from the Data Encryption drop-down menu depend on the
type of WPA-PSK authentication that you select from the Network Authentication drop-down
menu and are shown in the table that follows the figures.
•WPA-PSK
Figure 15. WPA-PSK
•WPA2-PSK
Figure 16. WPA2-PSK
•WPA-PSK & WPA2-PSK
Figure 17. WPA-PSK & WPA2-PSK
Wireless Configuration and Security
54
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Table 4. Settings for WPA-PSK, WPA2-PSK, and WPA-PSK & WPA2-PSK
SettingDescriptions
Data EncryptionTKIPTemporal Key Integrity Protocol (TKIP) is the standard encryption method
used with WPA. Y
Note: TKIP provides only legacy (slower) rates of operation. If you want to
use the 11n rates and speed, NETGEAR recommends WPA2 authentication
with AES encryption.
AESAdvanced Encryption Standard (AES) is the standard encryption method used
with WPA2.
Note: Although some wireless clients might support AES with WPA, the
WNDAP380R wireless access point does not support WPA with AES.
ou can also use TKIP with WPA2.
TKIP + AES TKIP +
PassphraseEnter a passphrase. The passphrase length needs to be between 8 and 63 characters
Show Passphrase
in Clear Text
(inclusive).
You can display the actual passphrase by selecting the Show Passphrase in Clear
Ye
s radio button.
Select the Ye
default setting is No.
The default passphrase is sharedsecret.
s radio button to display the actual passphrase in the Passphrase field. The
AES supports both WPA and WPA2. Broadcast packets use TKIP. For
unicast (point-to-point) transmissions, WPA clients use TKIP
clients use AES.
For the WPA & WPA2 mixed mode, TKIP + AES is the only supported data
encryption method.
, and WPA2
Configure RADIUS Server Settings
For authentication, accounting, or both authentication and accounting using RADIUS, you
need to configure primary servers and optional secondary servers. These RADIUS server
settings can apply to all devices that are connected to the wireless access point.
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Specify the settings as explained in the following table:
SettingDescriptions
Radius Server Settings
Primary
Authentication Server
Secondary
Authentication Server
IP AddressEnter the IP address of the primary RADIUS server for
authentication.
PortEnter the number of the UDP port on the wireless access point
that is used to access the primary RADIUS server for
authentication.
Shared SecretEnter the shared key that is used between the wireless access
point and the primary RADIUS server during authentication.
IP AddressEnter the IP address of the secondary RADIUS server for
authentication.
primary RADIUS server is not available.
PortEnter the number of the UDP port on the wireless access point
that is used to access the secondary RADIUS server for
authentication.
Shared SecretEnter the shared key that is used between the wireless access
point and the secondary RADIUS server during authentication.
The default port number is 1812.
The secondary RADIUS server is used when the
The default port number is 1812.
Wireless Configuration and Security
56
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescriptions
Primary
Accounting Server
Secondary
Accounting Server
Authentication Settings
Reauthentication
T
ime (Seconds)
IP AddressEnter the IP address of the primary RADIUS server for
PortEnter the number of the UDP port on the wireless access point
Shared SecretEnter the shared key that is used between the wireless access
IP AddressEnter the IP address of the secondary RADIUS server for
PortEnter the number of the UDP port on the wireless access point
Shared SecretEnter the shared key that is used between the wireless access
The interval in seconds after which the supplicant is reauthenticated with the
RADIUS server.
reauthentication.
accounting.
that is used to access the primary RADIUS server for accounting.
The default port number is 1813.
point and the primary RADIUS server during the accounting
process.
accounting.
primary RADIUS server is not available.
that is used to access the secondary RADIUS server for
accounting.
point and the secondary RADIUS server during the accounting
process.
The default interval is 3600 seconds (one hour). Enter 0 to disable
The secondary RADIUS server is used when the
The default port number is 1813.
Update Global Key
Every (Seconds)
Select the check box to allow the global key update, and enter the interval in
seconds.
1800
The check box is selected by default, and the default interval is
seconds (30 minutes). Clear the check box to prevent the global key update.
3. Click Apply .
Restrict Wireless Access by MAC Address
For increased security, you can restrict access to a wireless network by allowing access to
only specific computers or wireless clients based on their MAC addresses. You can restrict
access to only trusted computers so that unknown computers cannot connect wirelessly to
the wireless access point. MAC address filtering adds an obstacle against unwanted access
to your network, but the data broadcast over the wireless link is fully exposed.
Note: For wireless adapters, you can usually find the MAC address printed
on the wireless adapter.
To restrict access based on MAC addresses:
1. Select Configuration > Security > Advanced > MAC
Authentication.
Wireless Configuration and Security
57
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The MAC Authentication screen displays. (The following figure shows some examples.)
2. (Optional) Click the 802.11a/na tab.
The MAC Authentication screen for the 802.11a/na modes displays.
3. Select the Turn Access Control
On check box.
The access control feature is enabled.
4. From the Select Access Control Database drop-down menu, select one of the following
database options:
•Local MAC
address database for access control.
Address Database.
The wireless access point uses the local MAC
This is the default setting.
•Remote MAC Address Database. The wireless access point uses the MAC address
database on an external RADIUS server on the LAN for access control. If you select
this database, you first need to configure the RADIUS server settings (see
Configure
RADIUS Server Settings on page 55).
5. Click Refresh.
The Available Wireless Stations table is refreshed. The wireless access point places the
MAC addresses of the attached wireless clients in this table.
6. Populate the Trusted Wireless Stations table with MAC addresses.
Wireless Configuration and Security
58
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Depending on your network configuration, use one of the following three methods:
•Select MAC addresses from the Available Wireless Stations table:
a. Select check boxes for individual MAC addresses.
b. (Optional) Select the check box in the heading to select all MAC addresses,
c. Click Move.
The MAC addresses are transferred from the
the Trusted Wireless Stations table.
•Enter MAC addresses manually:
a. Enter a MAC address directly in the
b. Click Add
.
•Import MAC addresses from a file:
a. Click Browse.
b. Navigate to the file with MAC addresses.
This file needs to be a simple text file with one MAC address per line.
c. Select the file, and click Open.
d. Use one of the following methods:
•Click the Replace radio button.
All MAC addresses that are in the Trusted Wireless Stations table are replaced
with the MAC addresses that are in the file.
•Click the Merge radio button.
The MAC addresses from the file are added to the MAC addresses that are in
the Trusted Wireless Stations table.
Available Wireless Stations table to
Trusted Wireless Stations table.
7. Click Apply .
Now, only devices in the Trusted Wireless Stations table are allowed to connect to the
wireless access point over a wireless connection.
WARNING:
When configuring the wireless access point from a wireless
computer whose MAC address is not on the access control list,
you lose your wireless connection when you click Apply. You then
need to access the wireless access point from a wired computer
or from a wireless computer that is on the access control list to
make any further changes.
To delete selected or all MAC address from the Trusted Wireless Stations table:
1. Select check boxes for individual MAC addresses.
2. (Optional) Select the check box in the heading to select all MAC addresses.
3. Click Delete
.
Wireless Configuration and Security
59
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Schedule the Wireless Radios to Be Turned Off
Scheduling the wireless radios to be turned off is a green feature that allows you to turn off
the wireless radios during scheduled vacations, office shutdowns, on evenings, or on
weekends.
2. Specify the settings as explained in the following table:
SettingDescription
Wireless on-offSelect the On radio button to enable the timer. By default, the Of f radio button is
selected.
Radio of
f scheduleSelect check boxes to specify the days when you want to schedule the radios to
be turned off. By default, Saturday and Sunday are selected.
Radio ON T
Radio OFF TimeEnter the time that you want the radios to be turned off. Use 24-hour time
imeEnter the time that you want the radios to be turned back on. Use 24-hour time
format.
format.
3. Click Apply .
Configure Basic Wireless Quality of Service
Wi-Fi Multimedia (WMM) is a subset of the 802.11e standard. WMM allows wireless traffic to
have a range of priorities, depending on the type of data. Time-dependent information, such
as video or audio, has a higher priority than normal traffic. For WMM to function correctly,
wireless clients also need to support WMM.
Wireless Configuration and Security
60
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
By enabling WMM, you allow Quality of Service (QoS) control for upstream traffic flowing
from a wireless client to the wireless access point and for downstream traffic flowing from the
wireless access point to a wireless client.
WMM defines the following four queues in decreasing order of priority:
•Voice. The highest priority queue with minimum delay, which makes it ideal for
applications like VoIP and streaming media.
•Video. The second highest priority queue with low delay is given to this queue. Video
applications are routed to this queue.
•Best Effort. The medium priority queue with medium delay is given to this queue. Most
standard IP applications use this queue.
•Background. Low priority queue with high throughput. Applications, such as FTP, that
are not time-sensitive but require high throughput can use this queue.
The WMM Powersave feature saves power for battery-powered equipment by increasing the
ef
ficiency and flexibility of data transmission.
Note: For information about how to configure advanced wireless QoS, that
is, to configure specific Enhanced Distributed Channel Access
(EDCA) settings, see Configure Advanced Quality of Service
The basic QoS Settings screen for the 802.11a/na modes displays.
Wireless Configuration and Security
61
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
3. Enable or disable the WMM features:
•Enable Wi-Fi Multimedia (WMM)
. To enable this feature, select the Enable radio
button.
By default, this feature is enabled. Select the Disable radio button to disable the
feature.
•WMM Powersave. T o enable this feature, select the Enable radio button, which is the
default setting.
By default, this feature is enabled. Select the Disable radio button to disable the
feature.
4. Click Apply.
Wireless Configuration and Security
62
4. Management
This chapter describes how to use the management of the wireless access point. The chapter
includes the following sections:
•Enable Remote Management
•Upgrade the Wireless Access Point Software
•Manage the Configuration File or Reset to Factory Defaults
•Change the Administrator Password
•Enable the Syslog Server
•Enable Rogue AP Detection and Monitor Access Points
4
63
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Enable Remote Management
This section describes the different options for remote management.
•SNMP Management
•Secure Shell and Telnet Management
Both Simple Network Management Protocol (SNMP) and the remote console Secure Shell
(SSH) are enabled by default, which allows for remote management of the wireless access
point from a client running SNMP management software, as well as from an SSH client.
Telnet console is disabled by default.
SNMP Management
The SNMP screen lets you configure the IP address of the SNMP manager, the community
names, and the trap information.
To set up an SNMP management interface:
The
1. Select Maintenance > Remote Management > SNMP.
The SNMP screen displays:
2. Specify the settings as explained in the following table:
SettingDescription
SNMPSelect the Enable radio button to allow the SNMP network management
software, such as HP OpenView, to manage the wireless access point
through SNMPv1/v2 protocol. By default, the Disable radio button is
selected.
Read-Only Community Name Enter the community string to allow the SNMP manager to read the
wireless access point’
default is public.
Management
s Management Information Base (MIB) objects. The
64
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescription
Read-Write Community Name Enter the community string to allow the SNMP manager to read and write
the wireless access point’s MIB objects. The default is private.
Trap Community NameEnter the community string to allow the SNMP manager to send traps. The
default is trap.
IP Address to Receive TrapsEnter the IP address of the SNMP manager to receive traps sent from the
wireless access point.
Trap Port
Enter the number of the SNMP manager port to receive traps sent from the
wireless access point. The default is 162.
3. Click Apply .
Secure Shell and Telnet Management
By default, Secure Shell (SSH) is enabled and Telnet is disabled.
•Secure Shell (SSH). To enable this feature, select the
Enable radio button, which is
the default setting. Select the Disable button to disable the feature.
•Telnet. T
o enable this feature, select the Enable radio button. Select the Disable
button to disable the feature, which is the default setting.
3. Click Apply .
To manage the wireless access point over an SSH or Telnet connection:
1. Start an SSH or Telnet session to the wireless access point using an application such as
PuTTY
, if such an encryption application is allowed by law in your country.
2. Enter the login name and password (admin and password are the defaults).
Management
65
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
After successful login, the > prompt displays, preceded by the name of the wireless
access point.
3. Enter the CLI commands that you want to use.
You can enter ? to display the available CLI commands. The CLI commands are also
listed in
Appendix B, Command-Line Reference.
Upgrade the Wireless Access Point Software
The software of the wireless access point is stored in flash memory and can be upgraded as
NETGEAR releases new software. You can download upgrade files from the NETGEAR
website. If the upgrade file is compressed (.zip file), you first need to extract the image (.rmt)
file before sending it to the wireless access point. You can send the upgrade file using your
browser. The following sections describe the two methods that are available to perform a
software upgrade:
•Web Browser Upgrade Procedure
•TFTP Server Upgrade Procedure
Note: The web browser that you use to upload new firmware into the
wireless access point needs to support HTTP uploads. Use a
browser such as Microsoft Internet Explorer 6.0 or later or Mozilla
1.5 or later.
Note: You cannot perform the software upgrade from a computer that is
connected to the wireless access point over a wireless link. You
need to use a computer that is connected to the wireless access
point over an Ethernet cable.
WARNING:
When uploading software to the wireless access point, do not
interrupt the web browser by closing the window, clicking a link,
or loading a new page. If the browser is interrupted, the upload
might fail, corrupt the software, and render the wireless access
point inoperable.
Management
66
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
IMPORTANT:
In some cases, such as a major upgrade, you might need to erase
the configuration and manually reconfigure your wireless access
point after upgrading it. To find out if you need to reconfigure the
wireless access point, see the release notes included with the
software.
Web Browser Upgrade Procedure
Upgrading firmware through a web browser is the most common upgrade method.
To use a web browser to upgrade the wireless access point firmware:
1. Download the new software file from the NETGEAR website and save it to your hard
disk.
2. If necessary
3. If available, read the release notes before upgrading the software.
TFTP server location. (You do not need to unzip the file.)
The Firmware Upgrade
TFTP screen displays:
5. Specify the following information:
•Firmware File Name. The name of the unzipped software file.
•TFTP Server IP. The IP address of your TFTP server.
6. Click Apply .
The upgrade process is initiated.
During the upgrade process, the wireless access point automatically restarts. The
upgrade process typically takes several minutes. When the
Test LED turns of
more seconds before doing anything with the wireless access point.
f, wait a few
7. Verify that the new software file has been installed by selecting Monitoring > System.
The System screen displays (see V
iew System Information on page 109). The firmware
version is shown in the Access Point Information section of the screen.
Management
68
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Manage the Configuration File or Reset to Factory
Defaults
The wireless access point settings are stored in the configuration file. You can save this file
(back it up) to a computer, restore it from a computer, or reset it to factory default settings.
•Save the Configuration
•Restore the Configuration
•Restore the Wireless Access Point to the Factory Default Settings
•Reboot the Wireless Access Point without Restoring the Default Configuration
Save the Configuration
NETGEAR recommends that you back up your configuration after you have made changes
to the configuration.
Your browser extracts the configuration file (the file name is config) from the wireless
access point and prompts you for a location on your computer to store the file.
3. Follow the instructions of your browser to save the file.
Management
69
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Restore the Configuration
IMPORTANT:
During the restoration process, do not try to go online, turn off the
wireless access point, shut down the computer, or do anything else
to the wireless access point until it finishes restarting!
To restore your settings from a saved configuration file:
3. Locate the backup configuration file (the file name is config).
4. Click Apply .
The restoration process is initiated. During the restoration process, the wireless access
point automatically restarts.
When the T
wireless access point.
est LED turns off, wait a few more seconds before doing anything with the
The restoration process typically takes about one minute.
Restore the Wireless Access Point to the Factory Default
Settings
You can restore the wireless access point to the factory default settings by two methods that
are described in the following sections:
•Use the Web Management Interface to Restore Factory Default Settings
•Use the Reset Button to Restore Factory Default Settings
Management
70
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Note: After you have restored the factory default settings on the wireless
access point:
All custom configurations are lost.
*
* The login password is
* The default LAN IP address is
* The DHCP client is disabled.
Access Point Name field is reset to the name printed on
* The
password.
192.168.0.100.
the label on the bottom of the unit.
Use the Web Management Interface to Restore Factory Default Settings
IMPORTANT:
During the restoration process, do not try to go online, turn off the
wireless access point, shut down the computer, or do anything else
to the wireless access point until it finishes restarting!
To restore the factory default settings using the web management interface:
1. Select Maintenance > Reset > Restore Defaults.
The Restore Defaults screen displays:
2. Select the Yes radio button.
By default, the No radio button is selected.
3. Click Proceed.
The wireless access point resets to the factory default settings.
During the restoration process, the wireless access point automatically restarts. The
restoration process typically takes about one minute. When the
Test LED turns of
f, wait a
few more seconds before doing anything with the wireless access point.
Management
71
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Use the Reset Button to Restore Factory Default Settings
To restore the factory default settings when you do not know the login user name, login
password, or IP address, you need to use the Reset button on the rear panel of the wireless
access point (see Figure 2 on page 12).
To restore the factory default settings using the Reset button:
1. Using a sharp object, press and hold the Reset button for about 10 seconds (until the Test
LED blinks rapidly) t
Note: Pressing the Reset button for less than 10 seconds simply causes
the wireless access point to reboot.
2. Release the Reset button.
During the restoration process, the wireless access point automatically restarts. The
restoration process typically takes about one minute. When the Test LED turns off, wait a
few more seconds before doing anything with the wireless access point.
o reset the wireless access point to factory defaults settings.
Reboot the Wireless Access Point without Restoring the
Default Configuration
If you do not have physical access to the wireless access point to switch it off and on again,
you can use the software to reboot the wireless access point.
To reboot the wireless access point:
1. Select Maintenance > Reset > Reboot AP.
The Reboot AP screen displays:
2. Select the Yes radio button.
By default, the No radio button is selected.
3. Click Apply .
Management
72
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The wireless access point reboots. The reboot process typically takes about one minute.
When the Test LED turns off, wait a few more seconds before doing anything with the
wireless access point.
Change the Administrator Password
The default password is password. NETGEAR recommends that you change this password
to a more secure password. You cannot change the administrator login name (admin).
The ideal password contains no dictionary words from any language and is a mixture of
letters (both uppercase and lowercase), numbers, and symbols. Your password can be up to
30 characters.
•Enter a new password twice, once in the New Password field and again in the Repeat
New Password field.
•Next to Restore Default Password, select the Yes radio button to restore the default
password. By default, the No radio button is selected.
3. Click Apply .
If you have restored the default password, the login password is password
configured a new password, write it down in a secure place.
. If you have
Enable the Syslog Server
If you have a syslog server on your LAN, the Syslog screen allows you to enable the syslog
option. If syslog is enabled, the wireless access point sends its syslog files to the syslog
server.
Management
73
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
To enable a syslog server:
1. Select Configuration > System > Advanced > Syslog.
The Syslog screen displays:
2. Specify the settings as explained in the following table:
SettingDescription
Enable SyslogSelect the check box to enable the syslog option. By default, the syslog option
is disabled.
Syslog Server IP AddressEnter the IP address of the syslog server to which the wireless access point
sends the syslog files.
Port NumberEnter the port number that is configured on the syslog server. The default port
number is 514.
3. Click Apply .
Enable Rogue AP Detection and Monitor Access Points
This section describes how to use the Rogue AP detection feature to provide more security in
your wireless network.
•Enable and Configure Rogue AP Detection
•View and Save Access Point Lists
Enable and Configure Rogue AP Detection
The wireless access point can detect rogue access points and prevent them from connecting
to the wireless access point. The wireless access point maintains a list of access points it
detects in the area. Initially all detected access points are displayed in the Unknown AP List.
You restrict communication to approved access points by adding them to the Known AP List
and enabling the rogue AP detection feature.
Management
74
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
If you enable rogue AP detection, the wireless access point continuously scans the wireless
network and collects information about all access points on its channel.
AP screen displays. The following figure shows examples in the Known AP
List and Unknown AP List.
2. (Optional) Click the 802.11a/na tab.
The Rogue AP screen lets you enable and configure rogue AP detection for the
802.11a/na modes.
3. Select the T
urn Rogue AP Detection On check box.
4. (Optional) Click Refresh.
The wireless access point detects unknown access points and populates the Unknown
AP List.
5. In the Unknown
AP List, select individual check boxes for access points.
6. (Optional) Select the check box in the column heading to select all access points.
7. Click Move.
Access points are transferred from the Unknown AP List to the Known
AP List.
8. Click Apply .
To remove APs from the Known AP List and return them to the Unknown AP List:
1. In the Known AP List, select individual check boxes for access points
2. (Optional) Select the check box in the column heading to select all access points.
3. Click Delete.
4. Click Refresh
.
Management
75
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The wireless access point detects the removed access points and repopulates the
Unknown AP List.
To import a file with a precompiled list of access points into the Known AP List:
1. Take one of the following actions:
•Select the Replace
radio button.
The imported list of access points replaces the existing Known AP List.
•Select the Merge radio button.
The imported list of access points is added to the existing Known AP List.
2. Click Browse.
3. Locate the file that contains the list of access points.
This file needs to be a simple text file with one MAC address per line.
4. Select the file, and click Open.
5. Click Apply .
The list of access points is uploaded to the Known AP List.
View and Save Access Point Lists
The wireless access point detects nearby APs and wireless clients and maintains them in a
list. You can use this list to prevent them from connecting to the wireless access point.
To view the Unknown AP List and save it to a file:
1. Select Monitoring > Rogue AP > Unknown AP List.
The Unknown
AP List screen displays:
2. (Optionally) Click Refresh.
Management
76
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The wireless access point detects the access points and populates the Unknown AP List
for the configured wireless modes.
The following table explains the fields of the Unknown AP List screen:
Setting Description
MAC AddressThe MAC address of the unknown AP.
SSIDThe SSID that the unknown AP is using.
PrivacyIndicates whether security is enabled (1 means enabled; 0 means
disabled).
ChannelThe channel that the unknown AP is using.
Rate The transmit data rate in Mbps of the unknown the AP.
Beacon Int.The interval for each beacon transmission in ms.
# of BeaconsThe number of beacons transmitted by the unknown AP that the wireless
access point has detected.
Last SeenThe time stamp that indicates the time when the most recent beacon was
detected.
3. Click Save.
Export the list of unknown APs to a file. A window opens so you can browse to the
location where you want to save the file. The default file name is macList.txt.
4. (Optionally) After you have reviewed the list, import the saved list into the Known AP List on
the Rogue
To view the Known AP Lists and save it to a file:
AP screen (see Enable and Configure Rogue AP Detection on page 74).
1. Select Monitoring > Rogue AP > Known AP List.
The Known
AP List screen displays:
2. (Optionally) Click Refresh.
Management
77
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The wireless access point detects the access points and populates the Known AP List for
the configured wireless modes.
The following table explains the fields of the Known AP List screen:
SettingDescription
MAC AddressThe MAC address of the known AP.
SSIDThe SSID that the known AP is using.
ChannelThe channel that the known AP is using.
3. Click Save.
Export the list of known APs to a file. A window opens so you can browse to the location
where you want to save the file. The default file name is macList.txt.
Management
78
5. Advanced Configuration
This chapter describes how to configure the advanced features of the wireless access point. The
chapter includes the following sections:
•Configure Spanning Tree Protocol and 802.1Q VLANs
•Configure Hotspot Settings
•Configure Advanced Wireless Settings
•Configure Advanced Quality of Service Settings
•Configure Wireless Bridging
•Configure RFID Settings
5
79
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Configure Spanning Tree Protocol and 802.1Q VLANs
Spanning Tree Protocol (STP) provides network traffic optimization in locations where
multiple wireless access points are active by preventing path redundancy. If you have more
than one active wireless access point at your location, NETGEAR recommends that you
enable STP.
The 802.1Q VLAN protocol on the wireless access point logically separates traffic on the
same physical network:
•Untagged VLAN. When the wireless access point sends frames that are associated with
the untagged VLAN from its Ethernet interface, those frames are untagged. When the
wireless access point receives untagged frames over its Ethernet interface, those frames
are assigned to the untagged VLAN.
Note: Use an untagged VLAN only if the hubs and switches on your LAN
support the 802.1Q VLAN protocol. Likewise, change the untagged
VLAN value only if the hubs and switches on your LAN support the
802.1Q VLAN protocol.
•Tagged VLAN. When you clear the Untagged VLAN check box, the wireless access point
tags all frames that are sent from its Ethernet interface. Only incoming frames that are
tagged with known VLAN IDs are accepted.
•Management VLAN
access point functions as a point-to-point or point-to-multipoint bridge (see
Wireless Bridging on page 88). The management VLAN is used for managing traffic
(Telnet, SNMP, and HTTP) to and from the wireless access point.
Frames belonging to the management VLAN are not given any 802.1Q header when they
are sent over the trunk. If a port is in a single VLAN, it can be untagged. However, if the
port is a member of multiple VLANs, it needs to be tagged.
WARNING:
Selecting the Untagged VLAN check box or changing the
untagged VLAN value causes loss of IP connectivity if the hubs
and switches on your LAN have not yet been configured with the
corresponding VLAN.
To configure STP and VLANs:
1. Select Configuration > System > Advanced > General
. The management VLAN can be active only when the wireless
Configure
.
The advanced General system settings screen displays:
Advanced Configuration
80
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
2. Specify the settings as explained in the following table:
Setting Description
Spanning Tree Protocol
Spanning Tree Protocol Select the Enable radio button to enable STP to prevent path redundancy. By
default, the Disable radio button is selected.
802.1Q VLAN
Untagged VLANSelect the Untagged VLAN check box to configure one VLAN as an untagged
VLAN. By default, the Untagged VLAN check box is selected.
Specify a VLAN ID. The default VLAN ID is 1.
Management VLANSpecify an ID for the VLAN from which the wireless access point can be
managed.
Note: If you configure the management VLAN ID as 0 (zero), the wireless access
point can be managed over any VLAN, and frames that belong to the
management VLAN are not tagged with an 802.1Q header when sent over the
trunk.
The default VLAN ID is 1.
3. Click Apply .
Configure Hotspot Settings
If the wireless access point functions as a public access point and you want it to capture and
redirect all HTTP requests (over TCP, port 80), set up a hotspot server to redirect the
requests to the specified URL and manage the clients. For example, you can redirect HTTP
requests to a web server for authentication, timing control, or advertising. A hotel might want
all wireless connections to go to its server to start a billing transaction.
Advanced Configuration
81
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Note: The redirection occurs only the first time that a wireless client opens
a web browser.
To set up a hotspot server:
1. Select Configuration > System > Advanced > Hotspot.
The Hotspot screen displays:
2. Select the Enable radio button to enable HTTP redirection.
By default, HTTP redirection is disabled.
3. In the Redirect URL field, enter the URL of the web server to which you wish to redirect
HTTP requests.
4. Click Apply .
All HTTP requests are now redirected to the specified URL.
Configure Advanced Wireless Settings
Use the advanced Wireless Settings screen to configure and enable various WLAN settings
for the 802.1 1b/bg/ng and 802.11a/na modes. Band steering is an advanced wireless feature
that reduces the client density in the 2.4 GHz band and increases the wireless network
capacity.
The default WLAN settings normally work well. However, you can use the advanced settings
to fine-tune the overall performance of the wireless access point for your specific
environment. If a radio is turned off, you cannot configure the advanced wireless settings.
Make sure that the radio is turned on.
Advanced Configuration
82
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The advanced Wireless Settings screen displays. The following figure shows the 11ng
settings, as indicated by the radio wave icon (
) that is displayed next to ng:
2. (Optional) Click the 802.11a/na tab.
The Wireless Settings screen lets you configure advanced wireless settings for the
802.11a/na modes.
3. Specify the settings as explained in the following table:
SettingDescription
RTS Threshold (0–2347)Enter the Request to Send (RTS) threshold. The default setting is
2347.
If the packet size is equal to or less than the RTS threshold, the
wireless access point uses the Carrier Sense Multiple
Collision Detection (CSMA/CD) mechanism, and the data frame is
transmitted immediately after the silence period.
If the packet size is larger than the RTS threshold, the wireless access
point uses the CSMA with Collision Avoidance (CSMA/CA)
mechanism. In this situation, the transmitting station sends an RTS
packet to the receiving station and waits for the receiving station to
return a Clear to Send (CTS) packet before sending the actual packet
data.
Access with
Advanced Configuration
83
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescription
Fragmentation Length (256–2346) Enter the maximum packet size that is used for the fragmentation of
data packets. Packets that are larger than the specified fragmentation
length are broken up into smaller packets before being transmitted.
The fragmentation length needs to be an even number
setting is 2346.
Beacon Interval (100–1000)Enter the interval between 100 ms and 1000 ms for each beacon
transmission, which allows the wireless access point to synchronize
the wireless network. The default setting is 100.
. The default
Aggregation Length (1024–65535)
Note:
This setting does not apply
to the 802.11b/bg modes or the
802.11a mode.
AMPDU
Note: This setting does not apply
to the 802.11b/bg modes or the
802.11a mode.
RIFS Transmission
Note: This setting does not apply
to the 802.11b/bg modes or the
802.11a mode.
DTIM Interval (1–255)Enter the delivery traf
Preamble Type
Note: This setting applies only to
the 802.11b and 802.11bg modes.
Enter the maximum length of aggregated MAC protocol data unit
(A-MPDU) packets. Larger aggregation lengths could lead to better
network performance.
higher throughput.
Select the Enable radio button to allow the aggregation of several MAC
frames into a single large frame to achieve higher throughput. Enabling
the aggregated MAC protocol data unit (A-MPDU) could lead to better
network performance. By default, the Enable radio button is selected.
Select the Enable radio button to allow transmission of successive
frames at dif
(RIFS) could lead to better network performance. By default, the
Disable radio button is selected.
referred to as the data beacon rate, which indicates the beacon
delivery traffic indication message period in multiples of beacon
intervals.
setting is 3.
Select one of the following radio buttons to specify the preamble type
for the 802.1
•Long.
•Auto.
This value needs to be between 1 and 255. The default
A long transmit preamble might provide a more reliable
connection or a slightly longer range.
gives better performance.
The Auto setting enables the wireless access point to handle
both long and short preambles.
The default setting is 65535.
ferent transmit powers. Enabling reduced interframe space
1b mode or 802.1
Aggregation is a mechanism used to achieve
fic indication message (DTIM) interval, also
1bg mode:
A short transmit preamble
The default setting is Auto.
802.11d
Note: This setting does not apply
to the 802.11a/na modes.
Client IsolationFrom the drop-down menu, select one of the following options:
Select this check box to enable support for additional regulatory
domains that are not in the current standard; support includes the
addition of a country information element to beacons, probe requests,
and probe responses.
•Enable
associated to different virtual access points (V
•Disable. Communication between wireless clients that are
associated to different VAPs is allowed. This is the default setting.
. Communication between wireless clients that are
This check box is selected by default.
APs) is blocked.
Advanced Configuration
84
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescription
Max. Wireless ClientsEnter the maximum number of wireless clients that can simultaneously
connect to the wireless access point at one time. The default setting is
128 clients.
4. Click Apply .
Configure Advanced Quality of Service Settings
For most networks, the default Quality of Service (QoS) queue settings work well. For
information about how to configure basic QoS, see Configure Basic Wireless Quality of
Service on page 60.
You can specify the settings on multiple queues for increased throughput and better
performance of differentiated wireless traf
audio, video, and streaming media, as well as traditional IP data.
The advanced QoS options on the wireless access point are as follows:
fic such as Voice over IP (VoIP), other types of
•AP EDCA parameters. Specify the access point (AP) Enhanced Distributed Channel
Access (EDCA) settings for different types of data transmitted from the wireless access
point to wireless clients.
•Station EDCA parameters. Specify the station EDCA parameters for different types of
data transmitted from the wireless clients to the wireless access point. If WMM is
disabled, you cannot configure the Station EDCA parameters. (For information about how
to enable WMM, see
Configure Basic Wireless Quality of Service on page 60.)
When you configure the EDCA settings, the wireless access point can leverage existing
information in the IP packet header that is related to the T
ype of Service (ToS). The wireless
access point examines the ToS field in the headers of all packets that it processes. Based on
the value in a packet’s ToS field, the wireless access point prioritizes the packet for
transmission by assigning it to one of the queues. A different type of data is associated with
each queue. You can configure how the wireless access point treats each queue.
The queues defined for different types of data transmitted from AP-to-station and
station-to-AP are:
•Data 0 (Best Effort). Medium priority queue, medium throughput and delay
. Most
traditional IP data is sent to this queue.
•Data 1 (Background)
. Lowest priority queue, high throughput. Bulk data that requires
maximum throughput and is not time-sensitive is sent to this queue (FTP data, for
example).
•Data 2 (Video)
. Highest priority queue, minimum delay. Time-sensitive video data is
The QoS Settings screen lets you configure advanced QoS for the 802.11a/na modes.
3. Specify the settings as explained in the following table:
SettingDescription
AP EDCA parameters
AIFS Enter the Arbitration Inter-Frame Spacing (AIFS) interval that specifies the wait time (in
milliseconds) between data frames. A higher AIFS value means a higher priority for a
queue. V
The default values are Data 0: 3; Data 1: 7; Data 2: 1; Data 3: 1.
cwMinEnter the minimum contention window (cwMin) value that specifies the upper limit (in
milliseconds) of a range from which the initial random back-of
Decreasing this value increases the priority of the queue. The value for cwMin needs to be
lower than the value for cwMax. V
1023.
The default values are Data 0: 15; Data 1: 15; Data 2: 7; Data 3: 3.
alid values for AIFS are 0 through 8.
f wait time is determined.
alid values are 0, 1, 3, 7, 15, 31, 63, 127, 255, 511, and
Advanced Configuration
86
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescription
cwMaxEnter the maximum contention window (cwMax) value that specifies the upper limit (in
milliseconds) for the doubling of the random back-off value. Decreasing this value
increases the priority of the queue. The value for cwMax needs to be higher than the value
for cwMin. Valid values are 0, 1, 3, 7, 15, 31, 63, 127, 255, 511, and 1023.
The default values are Data 0: 63; Data 1: 1023; Data 2: 15; Data 3: 7.
Max. BurstEnter the maximum burst value that specifies the maximum burst length (in microseconds)
allowed for packet bursts on the wireless network. A packet burst is a collection of multiple
frames transmitted without header information. Decreasing this value increases the priority
of the queue. V
8192, inclusive of 0 and 8192.
The default values are Data 0: 0; Data 1: 0; Data 2: 3008; Data 3: 1504.
Station EDCA parameters
AIFS Enter the Arbitration Inter-Frame Spacing (AIFS) interval that specifies the wait time (in
milliseconds) between data frames.
queue. Valid values for AIFS are 0 through 8.
The default values are Data 0: 3; Data 1: 7; Data 2: 2; Data 3: 2.
alid values for maximum burst length are all multiples of 32 between 0 and
A higher
AIFS value means a higher priority for a
cwMinEnter the minimum contention window (cwMin) value that specifies the upper limit (in
milliseconds) of a range from which the initial random back-of
Decreasing this value increases the priority of the queue.
lower than the value for cwMax. Valid values are 0, 1, 3, 7, 15, 31, 63, 127, 255, 511, and
1023.
The default values are Data 0: 15; Data 1: 15; Data 2: 7; Data 3: 3.
cwMax Enter the maximum contention window (cwMax) value that specifies the upper limit (in
milliseconds) for the doubling of the random back-of
increases the priority of the queue.
for cwMin. Valid values are 0, 1, 3, 7, 15, 31, 63, 127, 255, 511, and 1023.
The default values are Data 0: 1023; Data 1: 1023; Data 2: 15; Data 3: 7.
TXOP LimitEnter the transmission opportunity (TXOP) value that specifies the time interval (in
microseconds) in which a client station can initiate transmissions on the wireless medium
(WM). Decreasing this value increases the priority of the queue. Valid values for
Limit are all multiples of 32 between 0 and 8192, inclusive of 0 and 8192.
The default values are Data 0: 0; Data 1: 0; Data 2: 3008; Data 3: 1504.
The value for cwMax needs to be higher than the value
f value. Decreasing this value
f wait time is determined.
The value for cwMin needs to be
4. Click Apply.
TXOP
Advanced Configuration
87
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Configure Wireless Bridging
The wireless access point supports a wireless distributing system (WDS) that lets you build
large bridged wireless networks. You can select from the following wireless access point
modes:
•Wireless point-to-point bridge. In this mode, the wireless access point can
communicate with another access point that also functions in bridge mode.
this mode with or without client association. Whether or not you enable client association,
use WEP, WPA-PSK, or WPA2-PSK to secure the communication. For information about
how to configure this mode, see Configure a Point-to-Point Wireless Network on page 88.
•Wireless point-to-multipoint bridge. In this mode, the wireless access point is the
master for a group of up to four access points that function in bridge-mode.
point-to-multipoint bridge mode with or without client association.
The other access points in the group need to be set to point-to-point bridge mode, using
the MAC address of the master wireless access point. Rather than communicating
directly with each other, all other bridge-mode access points send their traf
master wireless access point. Whether or not you enable client association, use WEP,
WPA-PSK, or WPA2-PSK to secure the communication. For information about how to
configure this mode, see Configure a Point-to-Multipoint Wireless Network on page 93.
You can use
You can use
fic to the
•Repeating the wireless signal. In this mode, this wireless access point repeats the
wireless signal, does not support communication with wireless clients, and sends all
fic to a remote access point. In this mode, wireless clients cannot associate with the
traf
wireless access point. Use WEP
with the remote access point. For information about how to configure this mode, see
Configure the Wireless Access Point to Repeat the Wireless Signal Using
Point-to-Multipoint Bridge Mode on page 98.
For you to set up a wireless network in a WDS,
access points:
•All access points need to use the same SSID, wireless channel, and encryption mode.
•All access points need to be on the same LAN IP subnet. That is, all the access point LAN
IP addresses are in the same network.
•All LAN devices (wired and wireless computers) need to be configured to operate in the
same LAN network address range as the access points.
•The channel selection on the access points cannot be
Wireless Settings on page 24).
, WP A-PSK, or WPA2-PSK to secure the communication
the following conditions need to be met for all
Auto (see Configure the Basic
Configure a Point-to-Point Wireless Network
In point-to-point bridge mode, the wireless access point communicates with another
bridge-mode wireless station. Use wireless security to protect this communication. The
following figure shows an example in which two wireless access points (APs) function in
point-to-point bridge mode with client association:
Advanced Configuration
88
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Wireless client
AP1
AP2
Wireless client
Point-to-point
bridge mode
Router
Internet
LAN segment 1
Figure 18. Point-to-point wireless network
To configure a point-to-point wireless network with or without client association:
Point-to-point
bridge mode
Hub or switch
LAN segment 2
1. Configure the wireless access point (AP1 on LAN Segment 1 in the previous figure) as
a point-to-point bridge:
a. Select Configuration > W
ireless Bridge.
The Bridging screen displays (see the following figure).
b. (Optional) Click the 802.11a/na tab.
The Bridging screen lets you configure a point-to-point wireless network for the
802.11a/na modes.
c. Select the Enable W
ireless Bridging check box.
The Local MAC Address field is a nonconfigurable field that shows the MAC address
of the wireless access point.
d. Select the Wireless Point-to-Point Bridge radio button.
Advanced Configuration
89
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
e. Click Edit to configure the security profile settings.
The Edit Security Profile screen displays:
Advanced Configuration
90
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
f.Specify the settings as explained in the following table:
SettingDescription
Profile Definition
Profile NameEnter a profile name that is easy to remember. The default name is
NETGEAR-WDS-1.
Remote MAC AddressEnter the MAC address of the remote wireless access point (the MAC
Authentication Settings
address of
AP2 on LAN Segment 1 in
Figure 18 on page 89).
Network Authentication
and Data Encryption
From the Network Authentication drop-down menu, select Open System,
WP
Your selection determines the options that the Data Encryption drop-down
menu provides, and whether the WP
displays.
Open System Although you can use the bridge communication without
WPA-PSKTKIP (Temporal Key Integrity Protocol) is the standard
, or WPA2-PSK.
A-PSK
A Passphrase (Network Key) field
any authentication and encryption, NETGEAR recommends
that you use WEP if you do select an open system. From
the Data Encryption drop-down menu, select one of the
following:
•None
•64-bit WEP. Standard WEP encryption, using 40/64-bit
•128-bit WEP. Standard WEP encryption, using
•152-bit WEP. Proprietary WEP encryption mode, using
o configure WEP:
T
1. In the passphrase field, enter a passphrase.
2. Click Generate.
encryption method used with WP
selection possible from the Data Encryption drop-down
menu.
In the WPA Passphrase (Network Key) field, enter a
passphrase. The passphrase length needs to be between
8 and 63 characters (inclusive).
. No authentication and encryption.
encryption.
104/128-bit encryption.
128+24 bit encryption.
other access points that support this mode.
The key is generated and placed in the WEP Key field.
This mode functions only with
A-PSK and the only
Advanced Configuration
91
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescription
Network Authentication
and Data Encryption
(continued)
Link Test
The link test lets you validate the bridge configuration by testing whether an IP address behind the
remote access point is reachable.
IP AddressEnter an IP address that can be reached through the remote access point
Link Test Process Status After one minute or less, the link test returns one of the following results:
WPA2-PSKAES (Advanced Encryption Standard) is the standard
encryption method used with WPA2-PSK and the only
selection possible from the Data Encryption drop-down
menu.
In the WPA Passphrase (Network Key) field, enter a
passphrase. The passphrase length needs to be between
8 and 63 characters (inclusive).
Note:
If you want to use the 11n rates and speed,
NETGEAR recommends WPA2-PSK authentication with
AES encryption.
for which you are setting up a bridge configuration. Click Link T
•Success.
and the IP address behind the remote access point is reachable.
can click Apply to save the bridge configuration.
•Failure. The link cannot be established using the bridge configuration.
Either the remote access point is not configured correctly or the IP
address behind the remote access point is reachable.
The link can be established using the bridge configuration,
est
.
You
g. Click Apply.
The bridge configuration is saved. The Bridging screen displays again.
h. (Optional) Clear the Enable Wireless Client
Association check box to disable
wireless client association while the wireless access point functions as a
point-to-point bridge.
By default, the Enable Wireless Client Association check box is selected and wireless
client association is enabled.
i.If the correct profile name and security option are displayed in the table, select the
check box in the Enable column.
j.Click Apply.
The point-to-point bridge settings are saved.
2. Configure a second wireless access point (AP2) on LAN Segment 2 (see Figure 18 on
page 89) in point-to-point bridge mode.
AP1 needs to have AP2’ s MAC address in its Remote MAC Address field, and AP2 needs
to have
AP1’
s MAC address in its Remote MAC Address field.
Advanced Configuration
92
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
3. Verify the following settings for both wireless access points:
•Both APs are configured to operate in the same LAN network address range as the
LAN devices.
•If you use DHCP, both APs can obtain an IP address automatically (as a DHCP
client). For more information, see
Configure the IP Settings on page 21.
•Both APs use the same channel, authentication mode, and security settings.
4. Verify connectivity across the LANs.
A computer on any LAN segment should be able to connect to the Internet or share files
and printers with any other computers or servers connected to any of the two LAN
segments.
Configure a Point-to-Multipoint Wireless Network
In a point-to-multipoint bridge, the wireless access point is the master for a group of
bridge-mode wireless access points. All traffic is sent to the master rather than to the other
wireless access points. Use wireless security to protect this communication.
For each wireless access point that you want the master to be able to connect to, you need to
configure a security profile with a unique name and the MAC address of the wireless access
point. You can configure up to four such security profiles (NETGEAR-WDS-1,
NETGEAR-WDS-2, and so on).
The following figure shows an example in which
AP1 functions in point-to-multipoint bridge
mode and AP2 and AP3 function in point-to-point bridge mode:
Wireless client
Internet
LAN segment 2
Router
AP2
AP1
(master)
Point-to-point
bridge mode
Multipoint
bridge mode
Hub or switch
AP3
Point-to-point
bridge mode
Hub or switch
LAN segment 3
LAN segment 1
Figure 19. Point-to-multipoint wireless network
Advanced Configuration
93
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
To configure a point-to-multipoint wireless network with or without client association:
1. Configure the security profiles on the wireless access point (AP1 on LAN Segment 1 in
the previous figure):
a. Select Configuration > Wireless Bridge.
The Bridging screen displays (see the following figure).
b. (Optional) Click the 802.11a/na tab.
The Bridging screen lets you configure a point-to-point wireless network for the
802.11a/na modes.
c. Select the
Enable W
ireless Bridging check box.
The Local MAC Address field is a nonconfigurable field that shows the MAC address
of the wireless access point.
d. Select the Wireless Point to Multi-Point Bridge radio button.
The screen adjusts. The profile table shows four security profiles.
e. Select a security profile to edit by selecting the corresponding radio button to the left
of the profile.
f.Click Edit to configure the selected security profile settings.
The Edit Security Profile screen displays for the selected security profile. (The
following figure contains some examples.)
Advanced Configuration
94
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
g. Specify the settings as explained in the following table:
SettingDescription
Profile Definition
Profile NameEnter a profile name that is easy to remember. The default names for the four
security profiles are NETGEAR-WDS-1, NETGEAR-WDS-2,
NETGEAR-WDS-3, and NETGEAR-WDS-4.
Remote MAC AddressEnter the MAC address of the remote wireless access point (the MAC
Authentication Settings
Network Authentication
and Data Encryption
address of
From the Network Authentication drop-down menu, select Open System,
WP
Your selection determines the options that the Data Encryption drop-down
menu provides, and whether the WP
displays.
AP2 or AP 3 on LAN Segment 1 in
A-PSK, or
WPA2-PSK.
Figure 19 on page 93).
A Passphrase (Network Key) field
Advanced Configuration
95
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
SettingDescription
Network Authentication
and Data Encryption
(continued)
Open SystemAlthough you can use the bridge communication without any
authentication and encryption, NETGEAR recommends that
you use WEP if you do select an open system. From the
Data Encryption drop-down menu, select one of the
following:
•None. No authentication and encryption.
•64-bit WEP. Standard WEP encryption, using 40/64-bit
encryption.
•128-bit WEP. Standard WEP encryption, using
104/128-bit encryption.
•152-bit WEP. Proprietary WEP encryption mode, using
128+24 bit encryption.
other access points that support this mode.
T
o configure WEP:
1. In the passphrase field, enter a passphrase.
2. Click Generate.
The key is generated and placed in the WEP Key field.
WPA-PSKTKIP (Temporal Key Integrity Protocol) is the standard
encryption method used with WP
selection possible from the Data Encryption drop-down
menu.
In the WPA Passphrase (Network Key) field, enter a
passphrase. The passphrase length needs to be between
8 and 63 characters (inclusive).
This mode functions only with
A-PSK and the only
WP
A2-PSKAES (Advanced Encryption Standard) is the standard
encryption method used with WP
selection possible from the Data Encryption drop-down
menu.
In the WP
passphrase. The passphrase length needs to be between
8 and 63 characters (inclusive).
Note:
If you want to use the 11n rates and speed,
NETGEAR recommends WPA2-PSK authentication with
AES encryption.
Link Test
The link test lets you validate the bridge configuration by testing whether an IP address behind the
remote access point is reachable.
IP AddressEnter an IP address that can be reached through the remote access point for
which you are setting up a bridge configuration. Click Link T
Link T
est Process
Status
After one minute or less, the link test returns one of the following results:
•Success. The
the IP address behind the remote access point is reachable. You can
click Apply to save the bridge configuration.
•Failure. The link cannot be established using the bridge configuration.
Either the remote access point is not configured correctly or the IP
address behind the remote access point is reachable.
link
A Passphrase (Network Key) field, enter a
can be established using the bridge configuration, and
A2-PSK and the only
est.
Advanced Configuration
96
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
h. Click Apply.
The bridge configuration is saved. The Bridging screen displays again.
i.Repeat Step e through Step h for any other security profile that you want to edit.
For example, first configure security profile NETGEAR-WDS-1 with the MAC address
of
AP2, and then configure security profile NETGEAR-WDS-2 with the MAC address
of AP3 (see
Figure 19 on page 93).
2. Activate the wireless access point (AP1 on LAN Segment 1 in Figure 19 on page 93) as
a point-to-multipoint bridge (that is, as the master in the wireless network):
a. On the Bridging screen, select the Enable Wireless Bridging check box.
b. Select the
Wireless Point to Multi-Point Bridge radio button.
By default, the Enable Wireless Client
Association is selected. Keep the check box
selected to enable wireless client association.
Note: If you clear the Enable Wireless Client Association check box, the
wireless access point does not function in point-to-multipoint bridge
but in repeater mode.
c. If the correct profile names and security options are displayed in the table, select the
check boxes in the Enable column for all security profiles that you want to enable.
d. On the Bridging screen, click Apply.
The point-to-multipoint bridge settings are activated.
3. Configure AP2
LAN Segment 2 (see Figure 19 on page 93) in point-to-point bridge mode
on
with the remote MAC address of AP1.
4. Configure AP3 on
LAN Segment 3 (see Figure 19 on page 93) in point-to-point bridge mode
with the remote MAC address of AP1.
5. Verify the following:
•Only AP1 on LAN Segment 1 is configured in point-to-multipoint bridge mode, and all
others wireless access points are configured in point-to-point bridge mode.
•AP2 and AP3 (the point-to-point
APs) have AP1’ s MAC address in their Remote MAC
Address field.
•All APs are configured to operate in the same LAN network address range as the LAN
devices.
•If you use DHCP, all
APs can obtain an IP address automatically (as a DHCP client).
For more information, see Configure the IP Settings on page 21.
•All APs use the same channel, authentication mode, and security settings.
6. Verify connectivity across the LANs.
A computer on any LAN segment should be able to connect to the Internet or share files
and printers with any other computers or servers connected to any of the three LAN
segments.
Advanced Configuration
97
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
Note: You can extend this multipoint bridging configuration by adding more
wireless access points that are configured in point-to-point mode for
each additional LAN segment.
Configure the Wireless Access Point to Repeat the Wireless
Signal Using Point-to-Multipoint Bridge Mode
You can configure the wireless access point to repeat the wireless signal, without
communication with other wireless clients. All traffic is sent to the remote or downstream
wireless access point. You can configure up to four security profiles to enable the wireless
access point to repeat the wireless signal for four remote wireless access points. Each
security profile requires a unique name and needs to include the MAC address of the remote
wireless access point. You can configure up to four such security profiles
(NETGEAR-WDS-1, NETGEAR-WDS-2, and so on).
The following figure shows an example in which AP1, AP2, and AP3 repeat the wireless
signal in point-to-multipoint bridge mode.
one for
Figure 20. Repeating the wireless signal in point-to-multipoint bridge mode
AP3:
AP1
Multipoint
bridge mode
repeating only
Router
Internet
LAN segment 1
AP2 requires a security profile for AP1 and another
AP2
AP3
Multipoint
bridge mode
repeating only
Multipoint
bridge mode
repeating only
Hub or switch
LAN segment 2
To configure the wireless access point to repeat the wireless signal:
1. Configure the security profiles on the wireless access point (AP2 on LAN Segment 2 in
the previous figure):
a. Select Configuration > W
ireless Bridge.
Advanced Configuration
98
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
The Bridging screen displays (see the following figure).
b. (Optional) Click the 802.11a/na tab.
The Bridging screen lets you configure a point-to-point wireless network for the
802.11a/na modes.
c. Select the Enable W
ireless Bridging check box.
The Local MAC Address field is a nonconfigurable field that shows the MAC address
of the wireless access point.
d. Select the Wireless Point to Multi-Point Bridge radio button.
The screen adjusts. The profile table shows four security profiles.
e. Select a security profile to edit by selecting the corresponding radio button to the left
of the profile.
f.Edit to configure the selected security profile settings.
The Edit Security Profile screen displays for the selected security profile. (The
following figure contains some examples.)
Advanced Configuration
99
ProSAFE Dual Band Wireless-N Access Point with RFID Support, WNDAP380R
g. Specify the settings as explained in the following table:
SettingDescription
Profile Definition
Profile NameEnter a profile name that is easy to remember. The default names for the four
security profiles are NETGEAR-WDS-1, NETGEAR-WDS-2,
NETGEAR-WDS-3, and NETGEAR-WDS-4.
Remote MAC AddressEnter the MAC address of the remote wireless access point (the MAC
Authentication Settings
Network Authentication
and Data Encryption
address of
From the Network Authentication drop-down menu, select Open System,
WP
Your selection determines the options that the Data Encryption drop-down
menu provides, and whether the WP
displays.
AP1 or AP3 in
A-PSK, or
Figure 20 on page 98).
WPA2-PSK.
A Passphrase (Network Key) field
Advanced Configuration
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.