4500 Great America Parkway
Santa Clara, CA 95054 USA
BETA
December 2005
Technical Support
Please register to obtain technical support. Please retain your proof of purchase and warranty
information.
To register your product, get product support or obtain product information and product
documentation, go to http://www.NETGEAR.com. If you do not have access to the World Wide
Web, you may register your product by filling out the registration card and mailing it to
NETGEAR customer service.
You will find technical support information at:
http://www.NETGEAR.com/
through the customer service area. If you want to contact technical
support by telephone, see the support information card for the correct telephone number for your
country.
NETGEAR is a registered trademark of NETGEAR, INC. Windows is a registered trademark of Microsoft Corporation.
Other brand and product names are trademarks or registered trademarks of their respective holders. Information is
subject to change without notice. All rights reserved.
Statement of Conditions
NOTE: In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the
right to make changes to the products described in this document without notice. NETGEAR does not assume
any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
NOTE: Modifications made to the product, unless expressly approved by Netgear, could void the user’s authority to
operate the equipment. NETGEAR does not assume any liability that may occur due to such condition.
FCC Statement.
Declaration of Conformity
We Netgear,
4500 Great America Parkway
Santa Clara, CA 95054, USA
Te l: +1 408 907 8000
declare under our sole responsibility that the product(s)
WG302 (Model Designation)
802.11g Pr oSafe Wireless Access Point (Product Name)
complies with Part 15 of FCC Rules.
ii
v0.1, December 2005
Declaration of Conformity
Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this
device must accept any interference received, including interference that may cause undesired operation.
To assure continued compliance, any changes or modifications not expressly approved by the party responsible for
compliance could void the user's authority to operate this equipment. (Example - use only shielded interface cables
when connecting to computer or peripheral devices).
NOTE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and
used in accordance with the instructions, may cause harmful inte rfe renc e to radio communications.
However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause
harmful interference to radio or television reception, which can be determined by turning the equipment off and on, th e
user is encouraged to try and correct the interference by one or more of the following measures:
•Reorient or locate the receiving antenna.
•Increase the separation between the equipment and receiver.
•Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
•Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and (2) this device must accept any interference received, including
interference that may cause undesired operation.
FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could
void the user's authority to operate this equipment.
Placement and Range Guidelines
Indoors, computers can connect over 802.11 wireless networks at a maximum range of several hundred feet for 802.11b/
g devices. However, the operating distance or range of your wireless connection can vary significantly, based on the
physical placement of the wireless access point.
For best results, identify a location for your wireless access point according to these guidelines:
•Away from potential sources of interference, such as PCs, large metal surfaces, microwaves, and 2.4 GHz cordless
phones.
•In an elevated location such as a high shelf that is near the center of the wireless coverage area for all mobile
devices.
Failure to follow these guidelines can result in significant performance degradation or inability to wirelessly connect to
the wireless access point.
RF Exposure Warning for North America, and Australia
Warning! To meet FCC and other national safety guidelines for RF exposure, the antennas for this device (see below)
must be installed to ensure a minimum separation distance of 20cm (7.9 in.) from persons. Further, the antennas shall not
be colocated with other antenna or radio transmitter.
We declare that the product is limited in CH1~CH11 by specified firmware controlled in the USA.
v0.1, December 2005
iii
Antenna Statement for North America and Australia
In addition to its own antenna, the WG302 device has been approved for use with the following detachable antennas and
.
antenna cables.
Approved
Antennas
NETGEAR
ANT24D18
NETGEAR
ANT2409
NETGEAR
ANT24O5
a. WG302 maximum radiated power in North America and Australia: 19 dBm ñ cable loss + antenna gain
Please go to
the WAG302 in North America and Australia.
www.netgear.com/go/wg102_fcc for an updated list of wireless accessories approved to be used with
Antenna Gain and
type
14 dBi
, directional
outdoor/indoo
8.5 dBi,
irectional
omnid
outdoor/indoo
5 dBi, ceiling/wall
indoor
r
r
Approved Antenna
Ca
ble
NETGEAR ACC-10314-
hru 05
01 t
NETGEAR ACC-10314-
hru 05
01 t
NETGEAR ACC-1031401 t
hru 05
Antenna Cable
Length
30 m
10 m
NA
Industry Canada Compliance Statement
This Class B Digital apparatus meets all the requirements of the Canadian Interference Causing Equipment Regulations
ICES 003.
Cet appareil numeriqu
The d
evice is certified to the requirements of RSS-210 for 2.4 GHz spread spectrum devices. The use of this device in a
syste
m operating either partially or completely outdoors may require the user to obtain a license for the system according
to the Canadian r
e de classe B respecte les exigences du reglement du Canada sur le materiel brouilleur NMB-003.
egulations. For further information, contact your local Industry Canada office.
IC statement
Operation is subject to the following two conditions:
1) This device may not cause interference and
2) This device must accept any interference, including interference that may cause undesired operation of the device.
This device has been designed to operate with an antenna having a maximum gain of 4.59352 dBi. Antenna having a
higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms.
IMPORTANT NOTE:
IC Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must
follow the specific operating instructions for satisfying RF exposure compliance. This equipment should be installed and
operated with minimum distance 20cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
iv
v0.1, December 2005
viii
v0.1, December 2005
Contents
Reference Manual for the NETGEAR ProSafe 802.11g W ireless Access Point
WG302
Chapter 1
About This Manual
Audience, Scope, Conventions, and Formats ................................................................1-1
How to Use This Manual ................................................................................................1-2
How to Print this Manual .................................................................................................1-2
Chapter 2
Introduction
About the NETGEAR ProSafe 802.11g Wireless Access Point WG302 ........................2-1
Key Features ..................................................................................................................2-2
This chapter describes the intended audience, scope, conventions, and formats of this manual.
Audience, Scope, Conventions, and Formats
This reference manual assumes that the reader has basic to intermediate computer and Internet
skills. However, basic computer network, Internet, firewall, and VPN technologies tutorial
information is provided on the NETGEAR website.
This guide uses the following typographical conventions:
Table 1-1. T ypographical Conventions
italicsEmphasis, books, CDs, URL names
boldUser input
fixed
Screen text, file and server names, extensions, commands, IP addresses
This guide uses the following formats to highlight special messages:
Note: This format is used to highlight information of importance or special interest.
Tip: This format is used to highlight a procedure that will save time or resources.
Warning: Ignoring this type of note may result in a malfunction or damage to the
equipment.
About This Manual1-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
This manual is written for the WG302 Wireless Access Point according to these specifications:
Note: Product updates are available on the NETGEAR, Inc. Web site at
http://kbserver.netgear.com/products/WG302.asp.
How to Use This Manual
The HTML version of this manual includes the following:
•Buttons, and , for browsing forwards or backwards through the manual one page
at a time
•A button that displays the table of contents and an button. Double-click on a
link in the table of contents or index to navigate directly to where the topic is described in the
manual.
•A button to access the full NETGEAR, Inc. online knowledge base for the product
model.
•Links to PDF versions of the full manual and individual chapters.
How to Print this Manual
To print this manual you can choose one of the following several options, according to your needs.
•Printing a Page in the HTML View.
Each page in the HTML version of the manual is dedicated to a major topic. Use the Print
button on the browser toolbar to print the page contents.
•Printing a Chapter.
Use the PDF of This Chapter link at the top left of any page.
1-2About This Manual
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
— Click the PDF of This Chapter link at the top right of any page in the chapter you want to
print. The PDF version of the chapter you were viewing opens in a bro wser window.
— Your computer must have the free Adobe Acrobat reader installed in order to view and
print PDF files. The Acrobat reader is available on the Adobe Web site at
http://www.adobe.com.
— Click the print icon in the upper left of the window.
Tip: If your printer supports printing two pages on a single sheet of paper, you can
save paper and printer ink by selecting this feature.
•Printing the Full Manual.
Use the Complete PDF Manua l link at the top left of any page.
— Click the Complete PDF Manual link at the top left of any page in the manual. The PDF
version of the complete manual opens in a browser window.
— Click the print icon in the upper left of the window.
Tip: If your printer supports printing two pages on a single sheet of paper, you can
save paper and printer ink by selecting this feature.
About This Manual1-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
1-4About This Manual
v0.1, December 2005
Chapter 2
Introduction
This chapter introduces the NETGEAR ProSafe 802.11g Wireless Access Point WG302. Minimal
prerequisites for installation are presented in “System Requirements” on page 2-6.
About the NETGEAR ProSafe 802.1 1g Wireless Access Point
WG302
The NETGEAR ProSafe 802.11g Wireless Access Point WG302 is the basic building block of a
wireless LAN infrastructure. It provides connectivity between Ethernet wired networks and
radio-equipped wireless notebook systems, desktop systems, print servers, and other devices.
The WG302 provides wireless connectivity to multiple wireless network devices within a fixed
range or area of coverage, interacting with a wireless network interface card (NIC) via an
antenna.Typically, an individual in-building access point provides a maximum connectivity area
with about a 300 foot radius. The NETGEAR ProSafe 802.11g W ireless Access Point WG302 can
support a small group of users in a range of several hundred feet. Most access points are rated
between 30-70 users simultaneously.
The NETGEAR ProSafe 802.11g Wireless Access Point WG302 acts as a bridge between the
wired LAN and wireless clients. Connecting multiple WG302 Wireless Access Points via a wired
Ethernet backbone can further lengthen the wireless network coverage. As a mobile computing
device moves out of the range of one access point, it moves into the range of another. As a result,
wireless clients can freely roam from one access point to another and still maintain seamless
connection to the network.
The auto-sensing capability of the WG302 Wireless Access Point allows packet transmission at up
to 108 Mbps, or at reduced speeds to compensate for distance or electromagnetic interference.
Introduction2-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Key Features
The WG302 Wireless Access Point is easy-to-use and provides solid wireless and networking
support.
Supported Standards and Conventions
The following standards and conventions are supported:
•Standards Compliant. The Wireless Access Point complies with IEEE 802.11g standards for
Wireless LANs.
•WEP support. Support for WEP is included. 64-bit, 128-bit, and 152-bit keys are supported.
•Full WPA and WPA2 support. WPA and WPA2 enterprise class strong security with
RADIUS and certificate authentication as well as dynamic encryption key generation.
WPA-PSK and WPA2-PSK pre-shared key authentication without the overhead of RADIUS
servers but with all of the strong security of WPA.
•Multiple BSSIDs. Support for multiple BSSIDs. When one AP is connected to a wired
network and a set of wireless stations it is referred to as a Basic Service Set (BSS). The Basic
Service Set Identifier (BSSID) is a 32-character unique identifier attached to the header of
packets sent over a WLAN that differentiated one WLAN from another when a mobile device
tries to connect to the network.
•DHCP Client and Server Support. DHCP provides a dynamic IP address to PCs and other
devices upon request. The WG302 can obtain network information from a DHCP server on
your network. The AP can also act as a DHCP server and provide network information for
wireless clients.
•SNMP Support. Support for Simple Network Management Protocol (SNMP) Management
Information Base (MIB) management.
Key Features
The WG302 provides solid functionality, including these features:
•Multiple Operating Modes
–Wireless Access Point. Operates as a standard 802.11g.
–Point-to-Point Bridge. In this mode, the WG302 only communicates with another
bridge-mode wireless station. You must enter the MAC address (physical address) of the
other bridge-mode wireless station in the field provided. You should use wireless security
to protect this communication.
2-2Introduction
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
–Point-to-Multi-Point Bridge. Select this only if this WG302 is the “Master” for a group
of bridge-mode wireless stations. The other bridge-mode wireless stations must be set to
Point-to-Point Bridge mode, using this WG302's MAC address. They then send all traffic
to this “Master,” rather than communicate directly with each other. You should use
wireless security to protect this traffic.
–Wireless Repeater. In this half-duplex mode, the WG302 only communicates with
another repeater-mode wireless station. You must enter the MAC address of both adjacent
repeater-mode wireless stations in the fields provided. You should use wireless security to
protect this communication.
•AutoCell RF Management. AutoCell provides advanced automated RF management that
improves performance and enhances security.
•Rogue Access PointDetection. For enhanced security, you can scan the wireless network to
detect rogue access points.
•Hotspot Settings. You can allow all HTTP (TCP, port 80) requests to be captured and
re-directed to the URL you specify.
•Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily,
using only your Web browser, and can be upgraded remotely.
•Access Control. The Access Control MAC address filtering feature can ensure that only
trusted wireless stations can use the WG302 to gain access to your LAN.
•Security Profiles. When using multiple BSSIDs, you can configure unique security settings
(encryption, MAC filtering, etc.) for each BSSID.
•Simple Configuration. If the default settings are unsuitable, they are easy to change.
•Hidden Mode. The SSID is not broadcast, assuring only clients configured with the correct
SSID can connect.
•Configuration Backup. Configuration settings can be backed up to a file and restored.
•Secure and Economical Operation. Adjustable power output allows more secure or
economical operation.
•Power over Ethernet. Power can be supplied to the WG302 over the Ethernet port from any
802.3af compliant mid-span or end-span source such as the NETGEAR FSM7326P Managed
Power over Ethernet Layer 3 managed switch.
•Autosensing Ethernet Connection with Auto Uplink Interface. Connects to 10/100 Mbps
IEEE 802.3 Ethernet networks.
•LED Indicators. Power, test, LAN speed, LAN activity, and wireless activity are easily
identified.
Introduction2-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Virtual APs. A single AP is segregated into multiple individual virtual APs simulating
multiple APs in a single system. This segregation allows you to enforce different security
mechanisms for different clients on the same AP. Virtual AP also provides better control over
broadcast and multicast traffic for increased network performance.
•Wireless VLAN Support. Short for virtual LAN, a network of computers that behave as if
they are connected to the same network even though they may actually be physically located
on different segments of a LAN. VLANs are configured through software rather than
hardware, which makes them extremely flexible. VLANs are very useful for user/host
management, bandwidth allocation and resource optimization.
•World Mode. With world mode enabled, the Access Point provides radio channel settings for
client devices that associate with the Access Point. A visitor from Europe using world mode
on a client device can associate with an Access Point in North Carolina and automatically
switch to the correct channel settings
AutoCell—The Self-Organizing Wireless Network
AutoCellTM, an embedded control system for 802.11 WLANs. AutoCell increases available
bandwidth and reduces WLAN installation and operating costs significantly.
AutoCell is completely automatic: It is a continuous communication system that relies on a
lightweight protocol to monitor changes on the wireless domain while keeping overhead very low.
Among AutoCell's inherent advantages:
•Elimination of manual site surveys and channel maps
•Dynamic load balancing
•Plug-and-play-implementation
•Transparent fault recovery and failover
Since AutoCell is completely self-organizing, it holds human intervention to a minimum. That
reduces the people costs associated with deployment, management, and maintenance—making
802.11 WLANs practical, efficient, and cost-effective.
802.11g Standards-based Wireless Networking
The NETGEAR ProSafe 802.11g Wireless Access Point WG302 provides a bridge between
Ethernet wired LANs and 802.11g compatible wireless LAN networks. It provides connectivity
between Ethernet wired networks and radio-equipped wireless notebook systems, desktop
systems, print servers, and other devices.
2-4Introduction
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
The WG302 also supports the following wireless features:
•Distributed coordinated function (CSMA/CA, Back off procedure, ACK procedure,
retransmission of unacknowledged frames)
•RTS/CTS handshake
•Beacon generation
•Packet fragmentation and reassembly
•Short or long preamble
•Roaming among access points on the same subnet
Autosensing Ethernet Connections with Auto Uplink
The WG302 can connect to a standard Ethernet network. The LAN interface is autosensing and
capable of full-duplex or half-duplex operation.
The wireless access point uses Auto Uplink
whether the Ethernet cable plugged into the port should have a ‘normal’ connection such as to a
computer or an ‘uplink’ connection such as to a switch or hub. That port will then configure itself
correctly. This feature eliminates any concerns about crossover cables, as Auto Uplink will
accommodate either type of cable to make the right connection.
TM
technology. The Ethernet port automatically senses
Wireless Multimedia (WMM) Support
WMM is a subset of the 802.11e standard. WMM allows wireless traffic to have a range of
priorities, depending on the kind of data. Time-dependent information, like video or audio, has a
higher priority than normal traffic. For WMM to function correctly, Wireless clients must also
support WMM.
Compatible and Related NETGEAR Products
For a list of compatible products from other manufacturers, see the Wireless Ethernet
Compatibility Alliance Web site (WECA), see http://www.wi-fi.net).
The following NETGEAR products work with the WG302 Wireless Access Point:
•WAG511 ProSafe 108 Mbps Dual Band PC Card
•WAG311 ProSafe 108 Mbps Dual Band PCI Card
•WG311T 802.11g 108 Mbps Wireless PCI Card
•WG511T 802.11g 108 Mbps Wireless CardBus Adapter
•WG511 802.11g 54 Mbps Wireless CardBus Adapter
•WG111 801.11g 54 Mbps Wireless Bridge
Introduction2-5
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
System Requirements
Before installing the WG302, make sure you have the following equipment and that your system
meets these requirements:
•A 10/100 Mbps Local Area Network device such as a hub or switch.
•The Category 5 UTP straight through Ethernet cable with RJ-45 connector included in the
package, or one like it
•A 100-240 V, 50-60 HZ AC power source.
•A Web browser for configuration such as Microsoft Internet Explorer 6.0 or above, or
Netscape Navigator 4.78 or above.
•At least one computer with the TCP/IP protocol installed.
•802.11g or 802.11b-compliant devices, such as the NETGEAR WG511 Wireless Adapter.
What’s In the Box?
The product package should contain the following items:
•NETGEAR ProSafe 802.11g Wireless Access Point WG302.
•Power adapter and cord.
•Straight through Category 5 Ethernet cable.
• Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302.
•Resource CD for the NETGEAR ProSafe 802.11g Wireless Access Point WG302.
•Support Registration card.
Contact your reseller or customer support in your area if there are any missing or damaged parts.
See the Support Information card for the telephone number of customer support in your area. You
should keep the Support Information card, along with the original packing materials, and use the
packing materials to repack the WG302 if you need to return it for repair. To qualify for product
updates and product warranty registrations, we encourage you to register on the NETGEAR Web
site at: http://www.NETGEAR.com.
2-6Introduction
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Hardware Description
This section describes the WG302 front and rear hardware functions.
Front Panel
Figure 2-1
Viewed from left to right, the WG302 has these status LEDs: PWR, TEST, LAN, and 802.11g
WLAN.
LEDDescription
PWRPower Indicator
OffNo power. If this LED does not come on with the power adapter and
cord correctly installed, see Chapter 6, “Troubleshooting.
OnPower is on.
TESTSelf Test Indicator
BlinkIndicates self test, loading software, or system fault (if continues).
Note: This LED may blink for a minute before going off.
LAN Ethernet link indicator
OffNo connection detected on the Ethernet link
Amber On10 Mbps Ethernet link detected
Amber BlinkData is being transmitted or received on the 10 Mbps Ethernet link
Green On100 Mbps Fast Ethernet link detected.
Green BlinkData is being transmitted or received on the 100 Mbps Ethernet link
Introduction2-7
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
LEDDescription
802.11g WLAN Wireless LAN Link Activity Indicator (2.4 MHz)
OffNo wireless link activity.
Green BlinkWireless link activity.
Rear Panel
1
234
Figure 2-2
1
5
Viewed from left to right, the back of the WG302 provides the following:
1. Left and Right Detachable Antennas.The WG302 provides two detachable antennas.
2. Reset button. This restores the default factory settings.
3. Serial Console Port. Use the male DB-9 serial port for serial DTE connections.
4. RJ-45 Ethernet LAN/POE Port. Use the WG302 Ethernet RJ-45 port to connect to an Ethernet
LAN through a device such as a hub, switch, router, or Power Over Ethernet (POE) switch.
5. Power socket. This connects to the WG302 power adapter.
2-8Introduction
v0.1, December 2005
Chapter 3
Basic Installation and Configuration
This chapter describes how to set up your NETGEAR ProSafe 802.11g Wireless Access Point
WG302 for wireless connectivity to your LAN. This basic configuration enables computers with
802.11b or 802.1 1g wireless adapters to do such things as connect to the Internet or access printers
and files on your LAN..
Note: Indoors, computers can connect over 802.11g wireless networks at ranges of
several hundred feet or more. This distance can allow for others outside your area
to access your network. It is important to take appropriate steps to secure your
network from unauthorized access. The WG302 Wireless Access Point provides
highly effective security features which are covered in detail in Appendix B,
“Wireless Networking Basics”. Deploy the security features appropriate to your
needs.
You need to prepare the following three things before you can establish a connection through your
wireless access point:
•A location for the WG302 that conforms to the Wireless Equipment Placement and Range
Guidelines below.
•The wireless access point connected to your LAN through a device such as a hub, switch,
router, or Cable/DSL gateway.
•One or more computers with properly configured 802.11b or 802.11g wireless adapters.
Wireless Equipment Placement and Range Guidelines
The range of your wireless connection can vary significantly based on the location of the wireless
access point. The latency, data throughput performance, and notebook power consumption of
wireless adapters also vary depending on your configuration choices.
Note: Failure to follow these guidelines can result in significant performance degradation
or inability to wirelessly connect to the WG302. For complete performance
specifications, see Appendix A, “Specifications.
Basic Installation and Configuration3-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
For best results, place your wireless access point:
•Near the center of the area in which your PCs operate.
•In an elevated location such as a high shelf where the wirelessly connected PCs have
line-of-sight access (even if through walls).
•Away from sources of interference, such as PCs, microwaves, and 2.4 GHz cordless phones.
•Away from large metal surfaces.
Putting the antenna in a vertical position provides best side-to-side coverage. Putting the antenna
in a horizontal position provides best up-and-down coverage.
If you use multiple access points, it is better if adjacent access points use different radio frequency
Channels to reduce interference. The recommended Channel spacing between adjacent access
points is five Channels (for example, use Channels 1 and 6, or 6 and 11).
The time it takes to establish a wireless connection can vary depending on both your security
settings and placement.
Cabling Requirements
The WG302 Wireless Access Point connects to your LAN via twisted-pair Category 5 Ethernet
cable with RJ-45 connectors.
Default Factory Settings
When you first receive your WG302, the default factory settings are set as shown in the following
table. You can restore these defaults with the Reset button on the rear pa nel — see “Hardware
Description” on page 2-7.
FeatureFactory Default Settings
User Name (case sensitive)admin
Password (case sensitive)password
Operating ModeAccess Point
Access Point Namenetgearxxxxxx where xxxxxx are the last six digits of the
wireless access point's MAC address
Built-in DHCP clientDHCP client disabled, it uses the default IP address
3-2Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
FeatureFactory Default Settings
IP Configuration IP Address: 192.168.1.128
Subnet Mask: 255.255.255.0
Gateway: 0.0.0.0
802.11g Network Name (SSID)NETGEAR-0
Broadcast Network Name (SSID)Enabled
802.11g Radio Frequency ChannelManaged automatically by AutoCell (default), if AutoCell is
disabled, channel 11 is the default
Super-G ModeDisabled
WEP/WPADisabled
MAC Access ControlDisabled
AutoCell RF Management
Restricting connectivity based on MAC Access
Control List
Time ZoneGMT
Time Zone Adjust for Daylight Saving TImeDisabled
SNMPDisabled
VLAN (802.1Q)Disabled
Load BalancingDisabled
WMM SupportDisabled
Enabled
Disabled
Disabled
Disabled
Understanding WG302 Wireless Security Options
Your wireless data transmissions can be received well beyond your walls by anyone with a
compatible adapter. For this reason, use the security features of your wireless equipment. The
WG302 Wireless Access Point provides highly effective security features which are covered in
detail in this chapter. Deploy the security features appropriate to your needs.
Basic Installation and Configuration3-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
There are several ways you can enhance the security of your wireless network:
•Restrict Access Based on MAC address. You can restrict access to only trusted PCs so that
unknown PCs cannot wirelessly connect to the WG302. MAC address filtering adds an
obstacle against unwanted access to your network, but the data broadcast over the wireless link
is fully exposed.
•Turn Off the Broadcast of the Wireless Network Name (SSID). If you disable broadcast of
the SSID, only devices that have the correct SSID can connect. This nullifies the wireless
network ‘discovery’ feature of some products such as Windows XP, but the data is still fully
exposed to a determined person using specialized test equipment like wireless sniffers.
•Use WEP. Wired Equivalent Privacy (WEP) data encryption provides data security. WEP
Shared Key authentication and WEP data encryption will block all but the most determined
eavesdropper.
•Use IEEE 802.1x. IEEE 802.1x is the standard for passing the Extensible Authentication
Protocol (EAP) over an 802.11 wireless network using a protocol called EAP Encapsulation
Over LANs (EAPOL). This is a newer, more secure standard than Static WEP.
•Use WPA, WPA-PSK, WPA2, or WPA2-PSK. Wi-Fi Protected Access (WPA and WPA2)
data encryption provides data security . The very strong authentication along with dyn amic per
frame rekeying of WPA make it virtually impossible to compromise. Because this is a new
standard, wireless device driver and software availability may be limited.
3-4Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Use AutoCell Enhanced RF Security ‘Stealth Mode.’ In addition to standard encryption and
security mechanisms such as WEP and WP A, the WG302 AutoCell feature provides
self-organizing micro cells for an additional level of privacy for enterprises. In this mode,
AutoCell shrinks the size of coverage to the minimum to reach clients but also shrinks the size
of the beacons that access points use to announce their presence. This mode makes an
enterprise wireless LAN nearly invisible to users outside an office building. AutoCell clients
such as the NETGEAR WAG511 are highly-recommended for Enhanced RF Security.
Installing the WG302 Wireless Access Point
Before you install the WG302 Wireless Access Point, make sure that your Ethernet network is up
and working. You will be connecting the access point to the Ethernet network. Then computers
with 802.11b or 802.11g wireless adapters will be able to communicate with the Ethernet network.
In order for this to work correctly, verify that you have met all of the system requirements, shown
in “System Requirements” on page 2-6.
1. Set up the WG302 Wireless Access Point.
Tip: Before mounting the WG302 in a high location, first set up and test the WG302
to verify wireless network connectivity.
a. Prepare a computer with an Ethernet adapter. If this computer is already part of your
network, record its TCP/IP configuration settings.
b. Configure the computer with a static IP address of 192.168.0.210 and 255.255.255.0 for
the Subnet Mask.
c. Connect an Ethernet cable from the WG302 to the computer.
d. Turn on your computer, connect the power adapter to the WG302 and verify the following:
–The PWR power light goes on.
–The LAN light of the wireless access point is lit when connected to a powered on
computer.
2. Configure LAN and wireless access.
a. Use your Web browser to connect to the WG302.–Enter 192.168.1.128 in the address field of your browser.
Basic Installation and Configuration3-5
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
–When prompted, enter admin for the user name, and password for the password, both in
lower case letters.
The Web browser displays the WG302 main menu and General page, as shown below.
Click to view
documentation
Click to log out. After five
minutes with no activity,
you are logged out automatically.
Figure 3-2
3-6Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
b. Click the Basic Settings link to view the
Basic Settings menu.
c. Configure the settings for your network
and click Apply.
d. Click Wireless Settings in the Setup
section of the main menu to view the
Wireless Settings menu.
Figure 3-3
Figure 3-4
e. Enter the wireless settings. See the online help or “Wireless Settings” on page 3-11 for full
instructions.
Note: In the USA, the Region is preset according to regulatory requirements and
cannot be changed. In other areas, you can and must set the Region. It may
not be legal to operate the wireless access point in a region other than one
of those identified in this field.
Basic Installation and Configuration3-7
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Now that you have finished the setup, you are ready to deploy the WG302 in your n e twork. If
needed, you can now reconfigure the computer you used for this process back to its original
TCP/IP settings.
3. Deploy the WG302 Wireless Access Point
a. Disconnect the WG302 and put it where you will deploy it. The best location is elevated,
such as wall mounted, or on the top of a cubicle, at the center of your wireless coverage
area, and within line of sight of all the mobile devices.
b. Lift the antenna on either side to be vertical.
Note: Consult the antenna positioning and wireless mode configuration
information in the Advanced Configuration chapter of this manual.
c. Connect an Ethernet cable from your WG302 Wireless Access Point to a LAN port on
your router, switch, or hub.
Note: By default, the WG302 is set with the DHCP client disabled. If your
network uses dynamic IP addresses, you must change this setting.
d. Connect the power adapter to the wireless access point, and plug the power adapter in to a
power outlet. The PWR, LAN, and WLAN lights should light up.
4. Verify wireless connectivity
Using a computer with an 802.11b or 802.11g wireless adapter with the correct wireless
settings needed to connect to the WG302 (SSID, WEP/WPA, MAC ACL, etc.), verify
connectivity by using a browser such as Mozilla Firefox, Netscape, or Internet Explorer to
browse the Internet, or check for file and printer access on your network.
Note: If you are unable to connect, see Chapter 6, “Troubleshooting
3-8Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Logging in to the WG302 Using Its Default IP Address
The default IP address of your access point is 192.168.1.128. The WG302 is set, by default, for the
DHCP client to be disabled.
Note: The computer that you use to connect to the WG302 should be configured with an
IP address that starts with 192.168.1.x and a Subnet Mask of 255.255.255.0.
1. Open a Web browser such as Internet Explorer, Netscape Navigator, or Mozilla Firefox.
2. Connect to the WG302 by entering its default address of http://192.168.1.128 into your
browser.
Figure 3-5
3. A login window like the one shown below opens:
Figure 3-6
4. Log in by using the default user name of admin and default password of password.
Once you have entered your access point name, the Web browser finds the WG302 Wireless
Access Point and displays the main menu as shown in Figure 3-2 on page 3-6.
Basic Installation and Configuration3-9
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Basic IP Settings
To configure the basic settings of your wireless access point, click Basic Settings in the Setup
section of the WG302 main menu. The Basic Settings menu appears, as shown in Figure 3-7.
Figure 3-7
The Basic Settings default values described in the following list work for most users and
situations.
•Access Point Name. This unique name is the access point NetBIOS name. The default Access
Point Name is on the bottom label of the WG302. You can modify the default name with a
unique name up to 15 characters long. The default is netgearxxxxxx, where xxxxxxx
represents the last six digits of the WG302 MAC address.
•DHCP Client: By default, Dynamic Host Configuration Protocol (DHCP) client is disabled.
After installation (“Installing the WG302 Wireless Access Point” on page 3-5), you can enable
DHCP to let the wireless access point get its TCP/IP configuration from the DHCP server on
your network. The wireless access point gets the IP address, subnet mask and the default
gateway settings automatically from the DHCP server if DHCP is enabled.
•IP Address. The default IP address is 192.168.1.128. T o change it, enter an unused IP address
from the address range used on your LAN (factory default: 192.168.1.128); or enable DHCP.
3-10Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•IP Subnet Mask. Enter the subnet mask value used on your LAN (factory default:
255.255.255.0).
•Default Gateway. Enter the IP address of the Gateway for your LAN. For more complex
networks, enter the address of the router for the network segment to which the wireless access
point is connected (factory default: 0.0.0.0).
•DNS Server. Enter the IP address of the DNS (Domain Name Server) you wish to use (factory
default: 0.0.0.0.
•Enable 802.1Q VLAN. Check the box Enable 802.1Q VLAN to enable the WG302 to process
VLAN membership information.
•Time Zone. Select the Time Zone to match your location. If your location uses daylight
saving, check the box Adjust for Daylight Saving Time.
•The Current Time, as used on the wireless access point, is displayed.
Note: You must have an Internet connection to get the current time.
Wireless Settings
T o configure the wireless settings, click W ireless Settings in the Setup sec tion of the WG302 main
menu. The Wireless Settings menu appears, as shown in Figure 3-8.
Figure 3-8
Basic Installation and Configuration3-11
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
The Wireless Settings menu options are discussed below.
Note: Channel selection and power management are automatically adjusted by the
AutoCell Auto RF Management option. The Auto RF Management option is
enabled by default.
•Country/Region. This is the region where the WG302 can be used. It may not be legal to
operate the wireless features of the wireless access point in a region other than one of those
identified in this field. For products sold in the United States, the default country domain is
preset. Also, the channel is set to 11. For products sold outside the United States, unless a
country domain is selected, the channel cannot be changed.
•Turn Radio On. On by default, you can also turn off the radio to disable access through this
device. This can be helpful for configuration, network tuning, or troubleshooting activities.
•Operating Mode. Select the desired wireless operating mode. The options are:
–Auto (802.11g/802.11b): Both 802.11g and 802.11b wireless stations can be used. This is
the default.
–802.11g Only: Only 802.11g wireless stations can be used.
–802.11b Only: All 802.11b wireless stations can be used. 802.11g wireless stations can
still be used if they can operate in 802.11b mode.
•Channel. This sets which operating frequency is used. You should not need to change the
channel unless you notice interference problems, or if you are setting up the WG302 near
another access point.The wireless channel range is 1 to 11 for USA and Canada and 1 to 13 for
Europe and Australia. The default is channel 11.
Note: AutoCell automatically adjusts the channel selection when the Auto RF
Management option is used. The AutoCell Auto RF Management option is
enabled by default.
–Access points use a fixed channel. You can select the channel to provide the least
interference and best performance. In the USA and Canada, 11 channels are available.
–If you use multiple access points, it is better if adjacent access points use different
channels to reduce interference. The recommended channel spacing between adjacent
access points is five channels (for example, use channels 1 and 6, or 6 and 11).
3-12Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
–In “Infrastructure” mode, wireless stations normally scan all channels, looking for an
access point. If more than one access point can be used, the one with the strongest signal is
used. This can only happen when the access points use the same SSID.
See http://documentation.netgear.com/reference/enu/wireless/index.htm for more information
on wireless channels.
•Data Rate. Shows the available transmit data rate of the wireless network. The default is Best.
•Output Power. Set the transmit signal strength of the access point (AP). The options are full,
half, quarter, eighth, and min. Decrease the transmit power if two or more APs are close
together and use the same channel frequency. The default is Full.
Security Profiles
Security profiles let you configure
unique security settings for each
SSID. The WG302 supports up to
eight SSIDs. The Security Profile
Settings menu is shown to the right.
To edit a security profile, select it
from the list, and click Edit.
Selected
Security Profile
The Security Profile Configuration
page opens for that profile.
Figure 3-9
The settings for Security Profile Configuration are explained below.
•Security Profile Name. Use a name that makes it easy to recognize the profile, and to tell
profiles apart.
Basic Installation and Configuration3-13
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Wireless Network Name (SSID). The SSID is also known as the wireless network name. The
SSID separates network traffic from different wireless networks. To connect any wireless
device to a wireless network, you need to use the SSID. The WG302 default SSID is:
NETGEAR-0 for the first profile, NETGEAR-1 for the second, and so on. You can enter a
value of up to 32 alphanumeric characters. Some concepts regarding the SSID are explained
below:
–Using the same SSID is essential. Devices with different SSIDs cannot communicate with
each other. However, some access points allow connections from wireless stations that
have their SSID set to “any” or whose SSID is blank (null).
–A Basic Service Set (BSS) is a group of wireless stations and a single access point, all
using the same SSID.
–An Extended Service Set (ESS) is a group of wireless stations and multiple access points,
all using the same ID (ESSID).
–Different access points within an ESS can use different channels. To reduce interference,
adjacent access points should use different channels.
–Roaming is the ability of wireless stations to connect wirelessly when they physically
move from one ESS to another. The wireless station automatically changes to the access
point with the least interference or best performance.
Note: The AutoCell Auto RF Management option enhances the roaming,
interference, and channel selection of an extended wireless network.
•Broadcast Wireless Network Name (SSID). This field lets you turn off the SSID broadcast.
If you do so, then only stations that know the SSID can connect. Disabling the SSID broadcast
somewhat hampers the wireless network ‘discovery’ feature of some products. The default is
to enable SSID broadcast.
Note: Broadcast Wireless Network Name (SSID) is turned off if you enable the
AutoCell Enhanced RF Security option (disabled by default).
Network Authentication
The WG302 Wireless Access Point is set by default as an open system with no authentication.
When setting up Network Authentication, bear in mind the following:
3-14Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•If you are using Access Point mode, then all options are available. In other modes such as
Repeater or Bridge, some options may be unavailable.
•Not all wireless adapters support WPA or WPA2. Windows XP and Windows 2000 with
Service Pack 3 do include the client software that supports WPA. However, client software is
required on the client. Consult the product documentation for your wireless adapter and WPA
or WPA2 client software for instructions on configuring WPA2 settings.
You can configure the WG302 to use the types of network authentication shown in the table below .
Network Authentication Types
Open SystemCan be used with WEP encryption, or no encryption.
Shared KeyWEP must be used. At least one shared key must be entered.
Legacy 802.1x You must configure the Radius Server Settings to use this option.
WPA-PSKYou must use TKIP encryption, and enter the WPA passphrase
(Network key).
WPA with RadiusYou must configure the Radius Server Settings to use this option.
WPA2-PSKWPA2 is a later version of WPA. Only select this if all clients support
WPA2. If selected, you must use AES encryption, and enter the WPA
passphrase (Network key).
WPA-PSK and
WPA2-PSK
WPA2 with RadiusWPA2 is a later version of WPA. Only select this if all clients support
WPA and WPA2 with
Radius
This selection allows clients to use either WPA (with TKIP) or WPA2
(with AES). If selected, encryption must be TKIP + AES. The WPA
passphrase (Network key) must also be entered.
WPA2. If selected, you must use AES encryption, and configure the
Radius Server Settings Screen.
This selection allows clients to use either WPA (with TKIP) or WPA2
(with AES). If selected, encryption must be TKIP + AES, and you must
also configure the Radius Server Settings Screen
Data Encryption
Select the data encryption that you want to use. The available options depend on the Network
Authentication setting above (otherwise, the default is None). The Data Encryption settings are
explained in the table below:
Data Encryption Settings
NoneNo encryption is used.
64 bits WEPStandard WEP encryption, using 40/64 bit encryption.
Basic Installation and Configuration3-15
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Data Encryption Settings
128 bits WEPStandard WEP encryption, using 104/128 bit encryption.
152 bits WEPProprietary mode that will only work with other wireless devices that
support this mode.
TKIP This is the standard encryption method used with WPA.
AESThis is the standard encryption method for WPA2. Some clients may
support AES with WPA, but this is not supported by this Access Point.
TKIP + AESThis setting supports both WPA and WPA2. Broadcast packets use
TKIP. For unicast (point-to-point) transmissions, WPA clients use TKIP,
and WPA2 clients use AES.
The Passphrases and Keys are explained below:
•Passphrase. T o use the Passphrase to generate the WEP keys, enter a passphrase and click the
Generate Keys button. You can also enter the keys directly. These keys must match the other
wireless stations.
•Key 1, Key 2, Key 3, Key 4. If using WEP, select the key to be used as the default key. Data
transmissions are always encrypted using the default key. The other keys can only be used to
decrypt received data.
•WP A Passphrase (Network Key). If using WPA-PSK, enter the passphrase here. All wireless
stations must use the same passphrase (network key). The network key must be from 8 to 63
characters in length.
Wireless Client Security Separation
If enabled, the associated wireless clients will not be able to communicate with each other. This
feature is used for hotspots and other public access situations. The default is Disabled.
3-16Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Before You Change the SSID and WEP Settings
For a new wireless network, print or copy this form and fill in the settings. For an existing wireless
network, the person who set up or is responsible for the network can provide this information. Be
sure to set the Regulatory Domain correctly as the first step. Store this information in a safe place.
•SSID: The Service Set Identification (SSID) identifies the wireless local area network. You
may customize it by using up to 32 alphanumeric characters. Write your SSID on the line.
SSID: _________________________ __ __ ___ ___
Note: The SSID in the wireless access point is the SSID you configure in the wireless adapter
card. All wireless nodes in the same network must be configured with the same SSID.
•Authentication
Circle one: Open System or Shared Key. Choose “Shared Key” for more security.
Note: If you select shared key, the other devices in the network will not connect unless they
are set to Shared Key and have the same keys in the same positions as those in the WG302.
•WEP Encryption Keys
For all four 802.11b keys, choose the Key Size. Circle one: 64, 128, or 152 bits
Key 1: ___________________________________
Key 2: ___________________________________
Key 3: ___________________________________
Key 4: ___________________________________
Record the WPA-PSK key:Record the WPA2-PSK key:
Key: ________________________________
Key: _______________________________
•WPA RADIUS Settings
For WPA, record the following settings for the primary and secondary RADIUS servers:
Server Name/IP Address: Primary _________________
Port: ___________________________________
For WPA2, record the following settings for the primary and secondary RADIUS servers:
Server Name/IP Address: Primary _________________
Port: ___________________________________
Shared Secret: ___________________________________
Secondary __________________
Use the procedures described in the following sections to configure the WG302.
Basic Installation and Configuration3-17
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Setting up and Testing Basic Wireless Connectivity
Follow the instructions below to set up and test basic wireless connectivity. After this is done, then
you can set up wireless security settings appropriate to your needs.
1. Connect to the WG302.
In the address field of your Web browser, enter the default LAN address of
http://192.168.1.128. Log in with the user name of admin and default password of password,
or using the LAN address and password that you set up.
2. Click the Wireless Settings link in the main menu of the WG302.
The default SSID is NETGEAR-0.
Note: The SSID of any wireless access adapters must match the SSID you configure
in the NETGEAR ProSafe 802.11g Wireless Access Point WG302. If they do
not match, you will not get a wireless connection to the WG302.
3. Select the Country/Region in which the wireless interface will operate.
4. For now, do not make other changes
5. Click Apply to save your changes.
Note: If you are configuring the WG302 from a wireless computer and you change the
SSID, channel, or security settings, you will lose your wireless connection when
you click Apply. You must then change the wireless settings of your computer to
match the new settings.
6. Configure and test your PCs for wireless connectivity.
Set up the wireless adapters of your PCs so that they all have the same SSID and channel that
you configured in the WG302. Check that they have a wireless link and are able to obtain an IP
address by DHCP from the WG302.
Now that your PCs can connect to the WG302, you can configure the wireless security.
3-18Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Configuring the Radius Server Settings
Use the following steps to view or change the Radius Server Settings.
1. Connect to the WG302.
In the address field of your Web browser,
enter the default LAN address of
http://192.168.1.128. Log in with the user
name of admin and default password of
password, or log in by using the LAN address
and password that you configured.
2. In the Security menu, click Radius Server
Settings.
3. Enter the settings, and click Apply.
The Radius Server Settings are explained below:
•Authentication/Access Control Radius Server Configuration. This configuration is
required for authentication using Radius. IP
Address, Port No. and Shared Secret is
required for communication with Radius
Server. A Secondary Radius Server can be
configured which is used on failure on
Primary Radius Server
•IP Address. The IP address of the Radius
Server. The default is 0.0.0.0.
Figure 3-10
•Port Number. Port number of the Radius Server. The default is 1812.
•Shared Secret. This is shared between the Wireless Access Point and the Radius Server while
authenticating the supplicant.
•Re-authentication Time. The time interval in seconds after which the supplicant will be
authenticated again with the Radius Server. The default is 3600 seconds.
•Global-key Re-Key Time. Select this option to enable Re-keying of Global Key. The Global
Key Re-Key can be done based on time interval in seconds or number of packets exchanged
using the global key. The default is 3600 seconds.
Basic Installation and Configuration3-19
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Update if any station disassociates. Select this option to refresh global key when any stations
disassociated with wireless Access Point.
•Accounting Radius Server Configuration. This configuration is required for accounting
using Radius Server. IP Address, Port Number and Shared Secret is required for
communication with Radius Server. A Secondary Radius Server can be configured which is
used on failure on Primary Radius Server.
•IP Address. The IP address of the Radius Server. The default is 0.0.0.0.
•Port Number. Port number of the Radius Server. The default is 1813.
•Shared Secret. This is shared between the Wireless Access Point and the Radius Server while
authenticating the supplicant.
Configuring Network Authentication
Use the following steps to configure network authentication.
1. Connect to the WG302.
In the address field of your Web browser, enter the default LAN address of
http://192.168.1.128. Log in with the user name of admin and default password of password,
or log in by using the LAN address and password that you configured.
2. If you are using Radius Server Settings, set them up first, as described in “Configuring the
Radius Server Settings” on page 3-19.
3. Set the Network Authentication that you
want to use.
a. On the Security menu, click Security
Profiles Settings.
b. Select the profile that you want.
c. Click Edit to view the Security Profiles
Configuration menu.
d. Choose the type of Network
Authentication that you want from the
list.
Figure 3-11
3-20Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Note: You can use WEP with Open System or Shared Key. Choose the
encryption strength, and then enter the Keys as explained in “Entering
WEP Data Encryption Keys” on page 3-21
e. Click Apply to save your settings.
Note: If you use a wireless computer to configure WEP settings, you will be
disconnected when you click Apply. Reconfigure your wireless adapter to
match the new settings or access the wireless access point from a wired
computer to make any further changes.
Entering WEP Data Encryption Keys
You can manually or automatically program the four data encryption keys. These values must be
identical on all PCs and Access Points in your network.
•Automatic: Enter a word or group of printable characters in the Passphrase box and click the
Generate button. The four key boxes are automatically populated with key values.
•Manual: Enter ten hexadecimal digits (any combination of 0-9, a-f, or A-F).
Select which of the four keys is the default.
See http://documentation.netgear.com/reference/enu/wireless/index.htm for a full explanation of
each of these options, as defined by the IEEE 802.11 wireless communication standard.
Restricting Wireless Access by MAC Address
To restrict access based on MAC addresses, follow these steps:
1. Connect to the WG302.
In the address field of your Web browser, enter the default LAN address of
http://192.168.1.128. Log in with the user name of admin and default password of password,
or log in by using the LAN address and password that you configured.
Basic Installation and Configuration3-21
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Note: When configuring the WG302 from a wireless computer whose MAC address
is not in the access control list, if you select Turn Access Control On, you will
lose your wireless connection when you click Apply . You must then access the
wireless access point from a wired computer or from a wireless computer
which is on the access control list to make any further changes.
2. From the Security menu, click the Access Control link to display the Access Control List
(ACL) menu shown below.
Figure 3-12
3. Select the Turn Access Control On check box.
4. Choose to use the local MAC address database stored on the access point, or use the RADIUS
MAC address database stored on a RADIUS server.
•If you choose the RADIUS MAC Address Database, you must configure the RADIUS
Server Settings first.
•If you choose Local MAC Address Database, either select from the list of available
wireless cards the WG302 has found in your area, or enter the MAC address and device
name for a device you plan to use.
3-22Basic Installation and Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
You can usually find the MAC address printed on the wireless adapter. Click Add to add
the wireless device to the access list. Repeat these steps for each additional device you
want to add to the list.
5. Be sure to click Apply to save your wireless access control list settings.
Now, only devices on the MAC ACL will be allowed to wirelessly connect to the WG302.
Basic Installation and Configuration3-23
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
3-24Basic Installation and Configuration
v0.1, December 2005
Chapter 4
Management
This chapter describes how to use the management features of your NETGEAR ProSafe 802.11g
Wireless Access Point WG302. To get to these features, connect to the WG302 as described in
“Logging in to the WG302 Using Its Default IP Address” on page 3-9.
Remote Management
Access the Remote Management screen by clicking Remote Management under Management on
the main menu.
Figure 4-1
Enter the Remote Management information.
•Remote Console, Secure Shell (SSH): If set to Enable, the Wireless Access Point will only
allow remote access via Secure Shell and Secure Telnet. The default is Enable.
•SNMP: Enable SNMP to allow the SNMP network management software, such as HP
OpenView, to manage the wireless access point via SNMPv1/v2 protocol.
Management4-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Public Community Name: The community string to allow the SNMP manager to read the
wireless access point's MIB objects. The default is public.
•Private Community Name: The community string to allow the SNMP manager to read and
write the wireless access point's MIB objects. The default is private.
•IP address to Receive T raps: The IP address of the SNMP manager to receive traps sent from
the wireless access point. The default is 0.0.0.0.
Using the Secure Telnet Interface
The WG302 includes a secure Telnet command line interface (CLI). You can access the CLI from
a secure Telnet client over the Ethernet port or over the serial console port.
Note: You must use a secure Telnet client such as Absolute Telnet. Also, when you
configure the client, use the SSH1, 3DES option. If you use the Telnet client to
connect over the Ethernet port, use the IP address of the WG302 as the host name.
How to Use the CLI via the Console Port
1. Using the null-modem cable, connect a VT100/ANSI terminal or a workstation to the port
labeled Console.
If you attached a PC, Apple Macintosh, or UNIX workstation, start a secure
terminal-emulation program.
2. Configure the terminal-emulation program to use the following settings:
•Baud rate: 9600 bps
•Data bits: 8
•Parity: none
•Stop bit: 1
•Flow control: none
These settings appear below the connector on the back panel.
4-2Management
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
3. Press the return key, and the screen below should appear.
Figure 4-2
The login name is admin and password is the default password.
After successful login, the screen should show the (Access Point Name)> prom pt. In this
example, the prompt is netgear74F35E.
Enter help to display the CLI command help.
CLI Commands
The CLI commands are listed in Appendix C, “Command Line Reference.”
SNMP Remote Management
Enable SNMP to allow SNMP network management software such as HP OpenView to manage
the wireless access point via the SNMPv1/v2 protocol.
1. Click Enable to use the SNMP remote management feature.
2. Fill in the fields according to the requirements of your location.
•Public Community Name. (Default: public) The community string to allow the SNMP
manager to read the MIB objects of the WG302.
•Private Community Name. (Default: private) The community string to allow the SNMP
manager to read and write the MIB objects of the WG302.
•Manager IP address. Enter the IP address of the SNMP manager. If this is set to
255.255.255.255, any SNMP manager is allowed.
Management4-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•IP address to Receive Traps. Enter the IP address of the SNMP manager to receive traps
sent from the wireless Access Point. If you don't want Traps to be sent, leave this at the
default value of 0.0.0.0
3. Be sure to click Apply to save your changes.
Viewing the Activity Log
From the WG302 main menu, under the Information heading, click Activity Log.
Figure 4-3
You can use a SysLog server to view the Activity Log. If you have a SysLog server on your LAN,
then enable the SysLog. If enabled, you must enter the IP address of your SysLog server and the
port number that your SysLog server uses.
•SysLog Server IP address: The access point sends all the SysLog to the specified IP address if
SysLog option is enabled. Default: 0.0.0.0
4-4Management
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Port: The port number configured in the SysLog server on your LAN. The default is 514
The Activity Log Window displays the Access Point system activity.
You can click Refresh to update the display. To save the log contents into a file on your PC, click
Save As and save the file to a disk drive.
Viewing General Information
The General information is a summary of the WG302 configuration settings. From the WG302
main menu, click General to view the screen shown below.
Figure 4-4
Management4-5
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Table 4-1. General Information Fields
Field Description
Access Point Information
Access Point Name
(NetBIOS name)
Country/RegionThe domain or region for which the wireless access point is licensed for
Firmware VersionThe version of the firmware currently installed.
Access Point ModeThe operating mode of the WG302: Access Point, Point-to-point bridge,
VLAN (802.1Q)Indicates if VLAN support is enabled. The default is disabled.
Management VLAN IDDisplays the VLAN ID.
Current IP Settings
IP AddressThe IP address of the wireless access point.
Subnet MaskThe subnet mask for the wireless access point.
Default GatewayThe default gateway for the wireless access point communication.
DHCP ClientIf the DHCP Client is enabled, the current IP address was obtained
MAC AddressThe Media Access Control address (MAC address) of the wireless
Current Wireless Settings
Channel/FrequencyThe channel the wireless port uses. The default channel setting is 11.
The name of the access point, which you can configure.
use. It may not be legal to operate this wireless access point in a region
other than one of those identified in this field.
Multi-point bridge or Repeater.
from a DHCP server on your network. Disabled indicates a static IP
configuration.
Security ProfilesFor each Security Profile, the following information is displayed: Profile
name, SSID, security option, VLAN ID, and enabled/disabled.
4-6Management
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Viewing Statistics
The Statistics screen provides LAN and WLAN statistics. From the WG302 main menu, click
Statistics under the Information heading to view the screen shown in Figure 4-5.
Figure 4-5
Management4-7
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Viewing the Available Wireless Station List
The Available Wireless Station List contains a table of all IP devices associated with the wireless
access point for the Wired Network Name (SSID).
From the WG302 main menu, under the Information heading,
click Available Wireless Station List to view the list. The fields
in the list are explained below.
Figure 4-6
Table 4-2. Available Wireless Station List
Field Description
Wired Ethernet Received/Transmitted
PacketsThe number of packets sent since the WG302 was restarted.
BytesThe number of bytes sent since the WG302 was restarted.
For Each Wireless Security
Profile
Unicast PacketsThe Unicast packets sent since the WG302 was restarted.
Broadcast PacketsThe Broadcast packets sent since the WG302 was restarted.
Multicast PacketsThe Multicast packets sent since the WG302 was restarted.
Total PacketsThe Wireless packets sent since the WG302 was restarted.
Total BytesThe Wireless bytes sent since the WG302 was restarted.
Refresh buttonClick the Refresh button to update the statistics on this screen.
Received/Transmitted
For each device, the table shows the Station ID, MAC address, IP Address, and Status (whether the
device is allowed to communicate with the wireless access point or not).
4-8Management
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Note that if the wireless access point is rebooted, the table data is lost until the wireless access
point rediscovers the devices. To force the wireless access point to look for associated devices,
click the Refresh button.
Note: A wireless network can include multiple wireless access points that use the same
network name (SSID). This extends the reach of the wireless network. Users can
roam from one access point to another, providing seamless network connectivity. If
this is the case, only the stations associated with this access point are shown in the
Available Station List.
Upgrading the Wireless Access Point Firmware
Warning: When uploading firmware to the WG302 Wireless Access Point, do not
interrupt the W eb browser by closing the window, clicking a link, or loading a
new page. If the browser is interrupted, the upload may fail, corrupt the
firmware, and render the WG302 completely inoperable
You cannot upgrade the firmware from a computer that is connected to the WG302 with a wireless
link. You must use a computer that is connected to the WG302 with an Ethernet cable.
The WG302 Wireless Access Point firmware is stored in FLASH memory and can be upgraded as
new firmware is released by NETGEAR. Y ou can download the upgrade files from the NETGEAR
Web site. If the upgrade file is compressed (.ZIP file), you must first extract the image (.IMG) file
before you send it to the wireless access point. The upgrade file can be sent using your browser.
Note: The Web browser used to upload new firmware into the WG302 must support
HTTP uploads, such as Microsoft Internet Explorer 6.0 or above, or Netscape
Navigator 4.78 or above.
Use the following steps to upgrade the firmware:
1. Download the file from NETGEAR, save it to your hard disk, and unzip it.
2. If you want to save your configuration settings, see “Backing up and Restoring the
Configuration” on page 4-10.
3. From the main menu Management section, click the Upgrade Firmware link.
4. In the Upgrade Firmware menu, click the Browse button and browse to the location of the
image (.IMG) upgrade file.
Management4-9
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
5. Click Upload.
When the upload completes, your wireless access point automatically restarts. The upgrade
process typically takes about one minute.
In some cases, you may need to reconfigure the wireless access point after upgrading.
Configuration File Management
The WG302 Wireless Access Point settings are stored in the wireless access point in a
configuration file. This file can be saved (backed up) to a computer, retrieved (restored) from a
computer, or cleared to factory default settings.
Click Backup/Restore Settings under the Management heading to go to the menu shown in
Figure 4-7.
Figure 4-7
The three options displayed are described in the following sections.
Backing up and Restoring the Configuration
T o save your settings, click Backup. Your browser extracts the configuration file from the wireless
access point and prompts you for a location on your computer to store the file. You can give the
file a meaningful name at this time, such as WG302.cfg.
4-10Management
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
To restore your settings from a saved configuration file, enter the full path to the file on your
computer or click the Browse button to locate the file. When you have located it, click the Restore
button to upload the file. After completing the upload, the WG302 reboots automatically.
Erasing the Configuration
You can erase the wireless access point configurations and return to the factory default settings.
After you erase the configurations, the wireless access point’s password will be password, the
SSID will be NETGEAR, the DHCP client will be disabled, the default LAN IP address will be
192.168.1.128, and the access point name is reset to the name printed on the label on the bottom of
the unit.
Using the Reset Button to Restore Factory Default Settings
If you do not know the login password or IP address, you can still restore the factory default
configuration settings with the Reset button. This button is on the rear panel of the wireless access
point (see “Hardware Description” on page 2-7). The reset button has two functions:
•Reboot. When pressed and released, the Wireless Access Point reboots (restart).
•Reset to Factory Defaults. When pressed and held down, it clears all data and restores all
settings to the factory default values.
To clear all data and restore the factory default values:
1. Hold the Reset Button until the LEDs blink twice, usually more than five seconds.
2. Release the Reset Button.
The factory default configuration has now been restored, and the WG302 is ready for use.
Management4-11
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Changing the Administrator Password
The default password is password. NETGEAR recommends that you change this password to a
more secure password. You cannot change the administrator login name.
From the WG302 main menu,
click Change Password to go to
the menu shown below.
To change the password, first
enter the old password, and
then enter the new password
twice. Click Apply to save your
change.
Figure 4-8
4-12Management
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
AutoCell Rogue AP Detection
The AutoCell feature provides added security. It can detect rogue APs and wireless stations and
exclude them from connecting to the WG302 Wireless Access Point.
From the WG302 main menu,
click Rogue AP Detection to
view this menu.
•You can click Rescan to
discover the APs.
•Click Authorize to add any
AP to the Authorized AP
List. Click Delete to
remove an AP from the list.
•Optionally, you can export
or import lists of authorized
APs.
Figure 4-9
Management4-13
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
AutoCell Rogue Station Detection
The AutoCell feature provides added security. It can detect rogue APs and wireless stations and
exclude them from connecting to the WG302 Wireless Access Point.
From the WG302 main menu,
click Rogue Station Detection
to view this menu.
•Click Rescan to discover
the stations.
•Click Authorize to add any
station to the Authorized
Station List. Click Delete to
remove an station from the
list.
•Optionally, you can export
or import lists of authorized
stations.
Figure 4-10
.
4-14Management
v0.1, December 2005
Chapter 5
Advanced Configuration
This chapter describes how to configure the advanced features of your NETGEAR ProSafe
802.11g Wire less Access Point WG302. The following list describes the advanced features:
•IP Settings: Use the AP as a DHCP server for wireless clients.
•Wireless Settings: Set up AutoCell and configure advanced wireless LAN parameters.
•Access Point Settings: Enable wireless bridging and repeating.
•TBD: New features under the Advanced heading, like NAT and Load Balancing.
You can find these features under the Advanced heading in the main menu.
Understanding Advanced IP Settings for Wireless Clients
If you want the AP to act as a DHCP server gateway for wireless clients, use this feature. The AP
can accept both static and DHCP clients.
Figure 5-1
Advanced Configuration5-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
The following list provides information about how to configure DHCP settings.
•Use AP as DHCP Server: Y ou may turn on this option and the Access Point will funct ion as a
DHCP Server for Wireless Clients only. The Access Point will provide the pre-configured
TCP/IP configurations for all wireless stations connected to this Access Point.
There are two options available for managing the wireless clients:
— Accept DHCP Enabled Wireless Clients Only: The Access Point can only provide the
TCP/IP configurations to those wireless clients with the DHCP enabled.
— Accept Both DHCP Enabled and Static IP Configured Wireless Clients: The Access
Point will support wireless clients with the DHCP enabled and the static IP configured.
If you use the AP as a DHCP server, you must configure the following TCP/IP configurations for
using Access Point as a DHCP Server for Wireless Clients.
•Starting IP Address: Type the starting IP address can be assigned from the DHCP server on
this Access Point.
•Ending IP Address: Type the Ending IP address can be assigned from the DHCP server on
this Access Point
•Subnet Mask: The Access Point will assign the specified subnet mask to the connected
wireless stations.
•Gateway Address: The Access Point will assign this IP address as the default gateway for any
traffic beyond the local network.
•Primary DNS Server: The Access Point will assign this IP address as the primary Domain
Name Server used by the connected wireless stations.
•Secondary DNS Server: The Access Point will assign this IP address as the secondary
Domain Name Server used by the connected wireless stations.
•Primary WINS Server: The Access Point will assign this IP address as the primary WINS
Server used by the connected wireless stations.
•Secondary WINS Server: The Access Point will assign this IP address as the secondary
WINS Server used by the connected wireless stations.
•Lease: The lease time for the IP address assigned. The wireless client user is required to renew
the IP address as soon as the lease is expired.
5-2Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Configuring Advanced Wireless LAN Settings
This section describes the advanced wireless settings menu, which enables configuration of the
following features:
•AutoCell RF management
•Wi-Fi multimedia (WMM) setup
•Hotspot settings
•Advanced wireless parameters
AutoCell Overview
AutoCell provides advanced RF wireless management features that improve performance and
enhance security.
Table 5-1. What does AutoCell do?
ProblemAutoCell Settings
Erosion of privacyYou can enab le these two settings:
• Enhanced RF Security (Default: Disabled): Makes your Wi-Fi network
nearly undetectable by neighbors and hackers.
• Rogue Device Detection (Default: Disabled): Blocks rogue wireless
devices from connecting to your network.
Diminishing performance from
multiple APs installed in one
area.
The Auto RF Management feature (Default: Enabled) manages APs
and clients load-balance traffic across underutilized APs.
Complexity of installationWith the Auto RF Management feature (Default: Enabled), the APs can
be put in any convenient location and in any density.
Increasing interferenceThe Auto RF Management feature (Default: Enabled) lets clients and
APs avoid interference from neighbors and other unexpected sources.
AutoCell’s self-organizing micro cells provide an additional level of privacy for enterprises.
AutoCell clients are highly-recommended for Enhanced RF Security.
Advanced Configuration5-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
AutoCell AP/Client Interaction
AutoCell’s self-organizing micro cells provide performance benefits and an additional level of
privacy for enterprises.
•Automatic Transmit Power Control. An AP with AutoCell enabled coordinates the RF
transmit power level of AutoCell-enabled clients. This creates client micro-cells and reduces
co-channel interference with other clients and APs on the same frequency. It also improves
overall throughput and performance.
•Automatic Load-Balancing. An AutoCell-enabled client seeks out and associates with the
lightest loaded AutoCell-enabled AP available.
•Rapid Roaming. An AutoCell-enabled client quickly distinguishes movement from RF
anomalies such as arbitrary and momentary changes in the surrounding RF domain. When it
detects true movement, the client immediately seeks the best available AP at the highest data
rate possible instead of waiting for the data rate to decline. This feature does not require
AutoCell-enabled APs.)
Additional AutoCell View Management Options
Figure 5-2
AutoCell V iew is a management tool that provides sophisticated views of your wireless network so
that you can manage the wireless communications easily from a simple console.
5-4Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
AutoCell Configuration Options
There are three AutoCell configuration setting
choices:
•Auto RF Management: Enabled by default.
•Enhanced RF Security: Disabled by default.
•Rogue Device Detection: Disabled by
default.
These options are discussed below.
Auto RF Management
Note: Channel selection and power management is automatically adjusted by the
AutoCell Auto RF Management option. The Auto RF Management option is
enabled by default.
Figure 5-3
In this mode, AutoCell APs and clients load-balance traffic across underutilized APs. This mode
avoids interference from neighbors, clients, APs, and other unexpected sources.
Enhanced RF Security
Note: Broadcast Wireless Network Name (SSID) is automatically turned off when you
select the AutoCell Enhanced RF Security option.
In this mode, AutoCell shrinks the size of coverage to the minimum to reach clients but also
shrinks the size of the beacons that access points use to announce their presence. This mode makes
an enterprise wireless LAN nearly invisible to users outside an office building.
Rogue Device Detection
The AutoCell Rogue Device Detection feature lets you identify and block wireless devices that
should never be given access to the wireless network.
Advanced Configuration5-5
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Wi-Fi Multimedia (WMM) Setup
WMM is a subset of the 802.11e standard. WMM allows wireless traffic to have a range of
priorities, depending on the kind of data. Time-dependent information, such as video or audio, will
have a higher priority than normal traffic. For WMM to function correctly, wireless clients must
also support WMM.
WMM Support: Select Yes or No as required on the Advanced Wireless Settings menu. The
default is No.
Hotspot Settings
If you want the access point (AP) to capture and redirect all HTTP (TCP , port 80) requests, use this
feature. For example, a hotel might want all wireless connections to go to its server to start a
billing transaction.
Figure 5-4
Enter the URL of the Web server where you wish to redirect HTTP requests.
5-6Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Configuring Wireless LAN Parameters
The default advanced wireless LAN parameter settings usually work well. If you want the AP to
operate in Super-G mode, use this feature.
Figure 5-5
Table 5-1 describes the advanced wireless parameters.
Table 5-1.Advanced Wireless LAN Settings Fields
Field Description
Enable SuperG ModeClick Enable to enable SuperG Mode.
RTS ThresholdThe pa cket size used to determine whether it should use the CSMA/CD (Carrier
Sense Multiple Access with Collision Detection) or the CSMA/CA (Carrier
Sense Multiple Access with Collision Avoidance) mechanism for packet
transmission.
Fragmentation LengthThis is the maximum packet size used for fragmentation. Packets larger than
the size programmed in this field will be fragmented. The Fragment Threshold
value must be larger than the RTS Threshold value.
Beacon IntervalSpecifies the data beacon rate between 20 and 1004.
DTIM Interval The Delivery Traffic Indication Message specifies the data beacon rate between
1 and 255.
Preamble TypeA long transmit preamble may provide a more reliable connection or slightly
longer range. A short transmit preamble gives better performance. Long is the
default
AntennaSelect the desired antenna for transmitting and receiving. Auto is the default.
Advanced Configuration5-7
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Wireless Bridging and Repeating
The WG302 Wireless Access Point lets you build large bridged wireless networks.
Note: All bridge mode options are not available when AutoCell Auto RF Management is
enabled (the default setting).
Examples of wireless bridged configurations are:
•Point-to-Point Bridge. The WG302 communicates with another bridge-mode wireless station.
See “Point-to-Point Bridge Configuration” on page 5-10.
•Multi-Point Bridge. The WG102 is the “master” for a group of bridge-mode wireless stations.
Then all traffic is sent to this “master,” rather than to other access points. See “Multi-Point
Bridge Configuration” on page 5-11.
5-8Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Repeater with Wireless Client Association. Sends all traffic to the remote AP. See “Repeater
with Wireless Client Association” on page 5-12.
These configurations can be set up
from the Advanced Access Point
Settings menu, shown to the right.
Figure 5-6
Advanced Configuration5-9
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Point-to-Point Bridge Configuration
In Point-to-Point Bridge mode, the WG302 communicates with another bridge-mode wireless
station. In addition, you can enable client associations with this WG302. You must enter the MAC
address of the other bridge-mode wireless station in the field provided. Use WEP to protect this
communication. The figure below shows an example of Point-to-Point Bridge mode.
Both APs are in
Point-to-Point Bridge mode.
AP 1
AP 2
Router
Internet
192.168.0.1
PCs
LAN Segment 1
Figure 5-7
Hub or Switch
PCs
LAN Segment 2
Follow the steps below to set up a Point-to-Point Bridge configuration.
1. Configure the WG302 (AP1) on LAN Segment 1 in Point-to-Point Bridge mode.
2. Configure the other access point (AP2) on LAN Segment 2 in Point-to-Point Bridge mode.
AP 1 must have AP 2’s MAC address in its Remote MAC Address field and AP 2 must have
AP 1’s MAC address in its Remote MAC Address field.
3. Configure and verify the following for both access points:
•Verify the LAN network configuration of the access points. Both must be configured to
operate in the same LAN network address range as the LAN devices
•Both APs must use the same ESSID, Channel, authentication mode, if any, and security
settings if security is in use.
4. Verify connectivity across the LAN 1 and LAN 2.
A computer on either LAN segment should be able to connect to the Internet or share files and
printers of any other PCs or servers connected to LAN Segment 1 or LAN Segment 2.
5-10Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Multi-Point Bridge Configuration
Set up a Multi-Point Bridge only if this WG102 is the “master” for a group of bridge-mode
wireless stations. Then all traffic is sent to this “master,” rather than to the other access points. In
addition, you can enable client associations with this WG302.
•You must enter the MAC addresses of the other access points in the fields provided.
•The other bridge-mode wireless stations must be set to Point-to-Point Bridge mode, using the
MAC address of this WG102 as the Remote MAC Address.
•Use WEP to protect this traffic.
The figure below shows an example of a Multi-Point Bridge mode configuration.
Point-to-Multi-Point
Bridge mode
Internet
192.168.0.1
LAN Segment 1
AP 1
Router
PCs
“Master AP”
Point-to-Point
Bridge Mode
Hub or Switch
Point-to-Point
Bridge Mode
AP 2
PCs
LAN Segment 2
Hub or Switch
LAN Segment 3
Figure 5-8
Follow the steps below to set up the Multi-Point Bridge configuration.
1. Configure the Operating Mode of the WG302 Wireless Access Points.
•Because it is in the central location, configure WG302 (AP 1) on LAN Segment 1 in
Point-to-Multi-Point Bridge mode. The MAC addresses of AP2 and AP3 are required in
AP1.
AP 3
PCs
•Configure WG302 (AP 2) on LAN Segment 2 in Point-to-Point Bridge mode with the
Remote MAC Address of AP1.
Advanced Configuration5-11
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Configure the WG302 (AP3) on LAN 3 in Point-to-Point Bridge mode with the Remote
MAC Address of AP1.
2. Verify the following for all access points:
•The LAN network configuration of the WG302 Wireless Access Points are configured to
operate in the same LAN network address range as the LAN devices
•Only one AP is configured in Point-to-Multi-Point Bridge mode, and all the others are in
Point-to-Point Bridge mode.
•All APs must be on the same LAN. That is, all the APs LAN IP address must be in the
same network.
•If using DHCP, all WG302 Wireless Access Points should be set to “Obtain an IP address
automatically (DHCP Client)” in the IP Address Source portion of the Basic IP Settings
menu.
•All WG302 Wireless Access Points use the same SSID, Channel, authentication mode, if
any, and encryption in use.
•All Point-to-Point APs must have AP2’s MAC address in its Remote AP MAC address
field.
3. Verify connectivity across the LANs.
•A computer on any LAN segment should be able to connect to the Internet or share files
and printers with any other PCs or servers connected to any of the three LAN segments.
•Wireless stations will not be able to connect to the WG302 Wireless Access Points in the
illustration above. If you require wireless stations to access any LAN segment, you can
use additional WG302 Wireless Access Points configured in Wireless Access Point mode
to any LAN segment.
Note: You can extend this multi-point bridging by adding additional WG302s configured
in Point-to-Point mode for each additional LAN segment. Furthermore, you can
extend the range of the wireless network with NETGEAR wireless antenna
accessories.
Repeater with Wireless Client Association
In this mode, the WG302 Wireless Access Point sends all traffic to the remote AP. For repeater
mode, you must enter the MAC address of the remote “parent” access point. You can also enter the
address of the “child” access point. Note that the following restrictions apply:
•You do not have the option of disabling client associations with this WG302.
5-12Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•You cannot configure a sequence of parent/child APs. You are limited to only one parent/child
AP pair.
The figure below shows an example of a Repeater Mode configuration.
AP 1
Wireless PC
Associated with AP 1
Router
Internet
192.168.0.1
PCs
Figure 5-9
Parent AP in Repeater Mode
Wireless PC
Associated with AP 2
AP 2
Child AP in Repeater Mode
Wireless PC
Associated with AP 2
To se t up a repeater with wirele ss client association, follow the steps below:
1. Configure the Operating Mode of the WG302 Wireless Access Points.
•Configure AP 1 on LAN Segment 1 as the Parent in Repeater mode with the its own MAC
address in the Parent AP MAC Address field, and the MAC Address of the ‘downstream’
AP (AP 2) in the Child AP MAC Address field.
•Configure AP 2 in the Child Repeater mode with its MAC addresses as in the Child AP
MAC Address field and the MAC address of the ‘upstream’ AP (AP 1) in the Parent MAC
Address field.
2. Verify the following for all access points:
•The LAN network configuration of the WG302 Wireless Access Points are configured to
operate in the same LAN network address range as the LAN devices
•All APs must be on the same LAN. That is, all the APs LAN IP address must be in the
same network.
•If using DHCP, all WG302 Wireless Access Points should be set to “Obtain an IP address
automatically (DHCP Client)” in the IP Address Source portion of the Basic IP Settings
menu.
Advanced Configuration5-13
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•All WG302 Wireless Access Points use the same SSID, Channel, authentication mode, if
any, and encryption in use.
3. Verify connectivity across the LANs.
A computer on any LAN segment should be able to connect to the Internet or share files and
printers with any other PCs or servers connected to any of the three WLAN segments.
Note: You can extend this repeating by adding up to two more WG302s configured in
repeater mode. However, since repeaters communicate in half-duplex mode, the
bandwidth decreases as you add repeaters to the network. Also, you can extend the
range of the wireless network with NETGEAR wireless antenna accessories.
Configuring NAT
TBD
Configuring QoS Queues
Configuring Quality of Service (QoS) on the WG302 Wireless Access Point consists of setting
parameters on existing queues for different types of wireless traffic, and effe ctively specifying
minimum and maximum wait times (via Contention Windows) for transmission. The settings
described here apply to data transmission behavior on the access point only, not to that of the client
stations.
Note: For the Guest interface, QoS queue settings apply to the access point load as a
whole (both BSSes together). On a two-radio access point these settings apply to
both radios but the traffic for each radio is queued independently . (The exception to
this is guest traffic as noted below.) Internal and Guest network traffic is always
queued together within each radio. This is the case on both one-radio and two-radio
APs.
5-14Advanced Configuration
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
QoS on the access point leverages existing information in the IP packet header related to Type of
Service (ToS). The access point examines the ToS field in the headers of all packets that pass
through the AP. Based on the value in a packet’s ToS field, the AP prioritizes the packet for
transmission by assigning it to one of the queues. A different type of data is associated with each
queue. You can configure parameters that determine how each queue is treated when it is sent by
the access point.
Setting up Guest Access
Out-of-the-box Guest Interface features allow you to configure the WG302 Wireless Access Point
for controlled guest access to an isolated network. You can configure the same access point to
broadcast and function as two different wireless networks: a secure “Internal” LAN and a public
“Guest” network.
Guest clients can access the guest network without a username or password. When guests log in,
they see a guest Welcome screen (also known as a captive portal).
You can define unique parameters for guest connectivity and isolate guest clients from other more
sensitive areas of the network. No security is provided on the guest network; only plain-text
security mode is allowed.
Simultaneously, you can configure a secure internal network (using the same access point as your
guest interface) that provides full access to protected information behind a firewall and requires
secure login or certificates for access.
Advanced Configuration5-15
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
5-16Advanced Configuration
v0.1, December 2005
Chapter 6
Troubleshooting
This chapter provides information about troubleshooting your NETGEAR ProSafe 802.11g
Wireless Access Point WG302. After each problem description, instructions are given to help you
diagnose and solve the problem. For the common problems listed, go to the section indicated.
•Is the WG302 on?
•Have I connected the wireless access point correctly?
Go to“Installing the WG302 Wireless Access Point” on page 3-5.
•I cannot remember the wireless access point’s configuration password.
Go to “Changing the Administrator Password” on page 4-12.
If you have trouble setting up your WG302, check the tips below.
No lights are lit on the access point.
It takes a few seconds for the power indicator to light up. Wa it a minute and check the power light
status on the access point.
If the access point has no power.
•Make sure the power cord is connected to the access point.
•Make sure the power adapter is connected to a functioning power outlet. If it is in a power
strip, make sure the power strip is turned on. If it is plugged directly into the wall, verify that it
is not a switched outlet.
•Make sure you are using the correct NETGEAR power adapter supplied with your access
point.
Troubleshooting6-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
The Wireless LAN activity light does not light up.
The access point’s antennae are not working.
•If the Wireless LAN activity light stays off, disconnect the adapter from its power source and
then plug it in again.
•Make sure the antennas are tightly connected to the WG302.
•Contact NETGEAR technical support if the Wireless LAN activity light remains off.
The LAN light is not lit.
There is a hardware connection problem. Check these items:
•Make sure the cable connectors are securely plugged in at the access point and the network
device (hub, switch, or router). A switch, hub, or router must be installed between the access
point and the Ethernet LAN or broadband modem.
•Make sure the connected device is turned on.
•Be sure the correct cable is used. Use a standard Category 5 Ethernet patch cable. If the
network device has Auto Uplink™ (MDI/MDIX) ports, you can use either a crossover cable or
a normal patch cable.
I cannot access the Internet or the LAN with a wireless
capable computer.
There is a configuration problem. Check these items:
•You may not have restarted the computer with the wireless adapter to have TCP/IP changes
take effect. Restart the computer.
•The computer with the wireless adapter may not have the correct TCP/IP settings to
communicate with the network. Restart the computer and check that TCP/IP is set up properly
for that network. The usual setting for Windows the Network Properties is set to “Obtain an IP
address automatically.”
•The access point’s default values may not work with your network. Check the access point
default configuration against the configuration of other devices in your network.
6-2Troubleshooting
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
I cannot connect to the WG302 to configure it.
Check these items:
•The WG302 is properly installed, LAN connections are OK, and it is powered on. Check that
the LAN port LED is on (amber indicating a 10 Mbps Ethernet connection or green indicating
a 100 Mbps Ethernet connection) to verify that the Ethernet connection is OK.
•The default configuration of the WG302 is for a static IP address of 192.168 .1.128 and a Mask
of 255.255.255.0 with DHCP disabled. Make sure your network configuration settings are
correct.
•If you are using the NetBIOS name of the WG302 to connect, ensure that your computer and
the WG302 are on the same network segment or that there is a WINS server on your network.
•If your computer is set to “Obtain an IP Address automatically” (DHCP client), restart it.
•If your computer uses a Fixed (Static) IP address, ensure that it is using an IP Address in the
range of the WG302. The WG302 default IP Address is 192.168.1.128 and the default Subnet
Mask is 255.255.255.0.
When I enter a URL or IP address I get a timeout error.
A number of things could be causing this. Try the following troubleshooting steps.
•Check whether other PCs work. If they do, ensure that your PCs TCP/IP settings are correct. If
using a Fixed (Static) IP Address, check the Subnet Mask, Default Gateway, DNS, and IP
Addresses.
•If the PCs are configured correctly, but still not working, ensure that the WG302 is connected
and turned on. Connect to it and check its settings. If you cannot connect to it, check the LAN
and power connections.
•If the WG302 is configured correctly, check your Internet connection (DSL/Cable modem
etc.) to make sure that it is working correctly.
•Try again.
Troubleshooting6-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Using the Reset Button to Restore Factory Default Settings
The Reset button (see “Rear Panel” on page 2-8) has two functions:
•Reboot. When pressed and released quickly, the WG302 will reboot (restart).
•Reset to Factory Defaults. This button can also be used to clear ALL data and restore ALL
settings to the factory default values.
To clear all data and restore the factory default values:
1. Power off the WG302 and power it back on.
2. Use something with a small point, such as a pen, to press the Reset button in and hold it in for
at least 5 seconds.
3. Release the Reset button.
The factory default configuration has now been restored, and the WG302 is ready for use.
6-4Troubleshooting
v0.1, December 2005
Appendix A
Specifications
ParameterNETGEAR ProSafe 802.11g Wireless Access Point WG302
Network ManagementWeb-based configuration and status monitoring
Maximum
Status LEDsPower/Ethernet LAN/Wireless LAN/Test
Power
Electromag
Environmental Specifications Operating temperature: 0 to 50° C
Da
Maximum Computers Per
Wireless Network:
80
Radio Data Rate
802.11b and g
Operating Frequencies
80
Antenn
ClientsLimited by the amount of wireless network traffic generated by each node;
typically 30 to 70 nodes.
Adapter12V DC, 1 A
netic ComplianceFCC Part 15 Class B and Class E
Operating humidity: 5-95%, non-condensing
ta Encoding:802.11b: 1 and 2 Mbps, Direct Sequence Spread Spectrum (DSSS)
802.11b: 5.5 and 11 Mbps, Complementary Code Keying (CCK)
802.11g: All rates, Orthogonal Frequency Division Multiplexing (OFDM)
Limited by the amount of wireless network traffic generated by each node.
Typically 30-70 nodes.
2.11b and g
2.11g Encryption40-bits (also called 64-bits), 128- and 152-bits WEP data encryption
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
A-2Specifications
v0.1, December 2005
Appendix B
Wireless Networking Basics
This chapter provides an overview of Wireless networking.
Wireless Networking Overview
The WG302 Wireless Access Point conforms to the Institute of Electrical and Electronics
Engineers (IEEE) 802.11b and 802.11g standards for wireless LANs (WLANs).
On an 802.11b or g wireless link, data is encoded using direct-sequence spread-spectrum (DSSS)
technology and is transmitted in the unlicensed radio spectrum at 2.5GHz. The maximum data rate
for the 802.11b wireless link is 1 1 Mbps, but it will automatically back down from 11 Mbps to 5.5,
2, and 1 Mbps when the radio signal is weak or when interference is detected. The 802.11g auto
rate sensing rates are 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps.
The 802.11 standard is also called Wireless Ethernet or Wi-Fi by the Wireless Ethernet
Compatibility Alliance (WECA, see http://www.wi-fi.net), an industry standard group promoting
interoperability among 802.11 devices. The 802.11 standard offers two methods for configuring a
wireless network - ad hoc and infrastructure.
Infrastructure Mode
With a wireless Access Point, you can operate the wireless LAN in the infrastructure mode. This
mode provides wireless connectivity to multiple wireless network devices within a fixed range or
area of coverage, interacting with wireless nodes via an antenna.
In the infrastructure mode, the wireless access point converts airwave data into wired Ethernet
data, acting as a bridge between the wired LAN and wireless clients. Connecting multiple Access
Points via a wired Ethernet backbone can further extend the wireless network coverage. As a
mobile computing device moves out of the range of one access point, it moves into the range of
another. As a result, wireless clients can freely roam from one Access Point domain to another and
still maintain seamless network connection.
Wireless Networking BasicsB-1
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Ad Hoc Mode (Peer-to-Peer Workgroup)
In an ad hoc network, computers are brought together as needed; thus, there is no structure or fixed
points to the network - each node can generally communicate with any other node. There is no
Access Point involved in this configuration. This mode enables you to quickly set up a small
wireless workgroup and allows workgroup members to exchange data or share printers as
supported by Microsoft networking in the various W indows operating systems. Some vendors also
refer to ad hoc networking as peer-to-peer group networking.
In this configuration, network packets are directly sent and received by the intended transmitting
and receiving stations. As long as the stations are within range of one another, this is the easiest
and least expensive way to set up a wireless network.
Network Name: Extended Service Set Identification (ESSID)
The Extended Service Set Identification (ESSID) is one of two types of Service Set Identification
(SSID). In an ad hoc wireless network with no access points, the Basic Service Set Identification
(BSSID) is used. In an infrastructure wireless network that includes an access point, the ESSID is
used, but may still be referred to as SSID.
An SSID is a thirty-two character (maximum) alphanumeric key identifying the name of the
wireless local area network. Some vendors refer to the SSID as network name. For the wireless
devices in a network to communicate with each other, all devices must be configured with the
same SSID.
The ESSID is usually broadcast in the air from an access point. The wireless station sometimes can
be configured with the ESSID ANY. This means the wireless station will try to associate with
whichever access point has the stronger radio frequency (RF) signal, providing that both the access
point and wireless station use Open System authentication.
Authentication and WEP Data Encryption
The absence of a physical connection between nodes makes the wireless links vulnerable to
eavesdropping and information theft. To provide a certain level of security, the IEEE 802.11
standard has defined these two types of authentication methods:
•Open System. With Open System authentication, a wireless computer can join any network
and receive any messages that are not encrypted.
•Shared Key. With Shared Key authentication, only those PCs that possess the correct
authentication key can join the network. By default, IEEE 802.11 wireless devices operate in
an Open System network.
B-2Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Wired Equivalent Privacy (WEP) data encryption is used when the wireless devices are configured
to operate in Shared Key authentication mode.
802.11 Authentication
The 802.11 standard defines several services that govern how two 802.11 devices communicate.
The following events must occur before an 802.11 Station can communicate with an Ethernet
network through an access point, such as the one built in to the WG302:
1. Turn on the wireless station.
2. The station listens for messages from any access points that are in range.
3. The station finds a message from an access point that has a matching SSID.
4. The station sends an authentication request to the access point.
5. The access point authenticates the station.
6. The station sends an association request to the access point.
7. The access point associates with the station.
8. The station can now communicate with the Ethernet network through the access point.
An access point must authenticate a station before the station can associate with the access point or
communicate with the network. The IEEE 802.11 standard defines two types of authentication:
Open System and Shared Key.
•Open System Authentication allows any device to join the network, assuming that the device
SSID matches the access point SSID. Alternatively, the device can use the “ANY” SSID
option to associate with any available Access Point within range, regardless of its SSID.
•Shared Key Authentication requires that the station and the access point have the same WEP
Key to authenticate. These two authentication procedures are described below.
Open System Authentication
The following steps occur when two devices use Open System Authentication:
1. The station sends an authentication request to the access point.
2. The access point authenticates the station.
3. The station associates with the access point and joins the network.
Wireless Networking BasicsB-3
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
This process is illustrated below.
802.1 1 b Authentication
Open System Steps
Client
attempting
to connect
1) Authentication request sent to AP
2) AP authenticates
3) Client connects to network
100 Mbps
Servers
10 Mbps
PCs
Access Point
Cable or
DSL Modem
Internet
Figure 6-1
Shared Key Authentication
The following steps occur when two devices use Shared Key Authentication:
1. The station sends an authentication request to the access point.
2. The access point sends challenge text to the station.
3. The station uses its configured 64-bit or 128-bit default key to encrypt the challenge text, and
sends the encrypted text to the access point.
4. The access point decrypts the encrypted text using its configured WEP Key that corresponds
to the station’s default key. The access point compares the decrypted text with the original
challenge text. If the decrypted text matches the original challenge text, then the access point
and the station share the same WEP Key and the access point authenticates the station.
5. The station connects to the network.
If the decrypted text does not match the original challenge text (the access point and station do not
share the same WEP Key), then the access point will refuse to authenticate the station and the
station will be unable to communicate with either the 802.11 network or Ethernet network.
B-4Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
This process is illustrated below.
802.1 1 b Authentication
Shared Key Steps
Client
attempting
to connect
1) Authentication request sent to AP
2) AP sends challenge text
3) Client encrypts challenge text
and sends it back to AP
4) AP decrypts, and if correct,
authenticates client
100 Mbps
Servers
10 Mbps
PCs
Access Point
Cable or
DSL Modem
Internet
Figure 6-2
Overview of WEP Parameters
Before enabling WEP on an 802.11 network, you must first consider what type of encryption you
require and the key size you want to use. Typically, there are three WEP Encryption options
available for 802.11 products:
1. Do Not Use WEP: The 802.11 network does not encrypt data. For authentication purposes, the
network uses Open System Authentication.
2. Use WEP for Encryption: A transmitting 802.11 device encrypts the data portion of every
packet it sends using a configured WEP Key. The receiving device decrypts the data using the
same WEP Key. For authentication purposes, the network uses Open System Authentication.
3. Use WEP for Authentication and Encryption: A transmitting 802.11 device encrypts the data
portion of every packet it sends using a configured WEP Key. The receiving device decrypts the
data using the same WEP Key . For authentication purposes, the wireless network uses Shared Key
Authentication.
Note: Some 802.11 access points also support Use WEP for Authentication Only (Shared Key
Authentication without data encryption).
Wireless Networking BasicsB-5
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Key Size
The IEEE 802.11 standard supports two types of WEP encryption: 40-bit and 128-bit.
The 64-bit WEP data encryption method allows for a five-character (40-bit) input. Additionally , 24
factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. The 24
factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt all
data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption
as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits
wide.
The 128-bit WEP data encryption method consists of 104 user-configurable bits. Similar to the
forty-bit WEP data encryption method, the remaining 24 bits are factory set and not user
configurable. Some vendors allow passphrases to be entered instead of the cryptic hexadecimal
characters to ease encryption key entry.
128-bit encryption is stronger than 40-bit encryption, but 128-bit encryption may not be available
outside of the United States due to U.S. export regulations.
When configured for 40-bit encryption, 802.11 products typically support up to four WEP Keys.
Each 40-bit WEP Key is expressed as 5 sets of two hexadecimal digits (0-9 and A-F). For
example, “12 34 56 78 90” is a 40-bit WEP Key.
When configured for 128-bit encryption, 802.11 products typically support four WEP Keys but
some manufacturers support only one 128-bit key . The 128-bit WEP Key is expressed as 13 sets of
two hexadecimal digits (0-9 and A-F). For example, “12 34 56 78 90 AB CD EF 12 34 56 78 90”
is a 128-bit WEP Key.
Table 8-1:Encryption Key Sizes
Encryption Key Size# of Hexadecimal DigitsExample of Hexadecimal Key Content
Note: Typically, 802.11 access points can store up to four 128-bit WEP Keys but some 802.11
client adapters can only store one. Therefore, make sure that your 802.11 access and client
adapters’ configurations match.
WEP Configuration Options
The WEP settings must match on all 802.11 devices that are within the same wireless network as
identified by the SSID. In general, if your mobile clients will roam between access points, then all
of the 802.11 access points and all of the 802.11 client adapters on the network must have the same
WEP settings.
B-6Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Note: Whatever keys you enter for an AP, you must also enter the same keys for the client adapter
in the same order. In other words, WEP key 1 on the AP must match WEP key 1 on the client
adapter, WEP key 2 on the AP must match WEP key 2 on the client adapter, and so on.
Note: The AP and the client adapters can have different default WEP Keys as long as the keys are
in the same order. In other words, the AP can use WEP key 2 as its default key to transmit while a
client adapter can use WEP key 3 as its default key to transmit. The two devices will communicate
as long as the AP’s WEP key 2 is the same as the client’s WEP key 2 and the AP’s WEP key 3 is
the same as the client’s WEP key 3.
Wireless Channels
This section discusses the wireless frequencies the 802.11b/g networks use.
IEEE 802.11b/g wireless nodes communicate with each other by using radio frequency signals in
the ISM (Industrial, Scientific, and Medical) band between 2.4 GHz and 2.5 GHz. Neighboring
channels are 5 MHz apart. However, due to spread spectrum effect of the signals, a node sending
signals using a particular channel utilizes frequency spectrum 12.5 MHz above and below the
center channel frequency. As a result, two separate wireless networks using neighboring channels
(for example, channel 1 and channel 2) in the same general vicinity interfere with each other.
Applying two channels that allow the maximum channel separation decreases the amount of
channel cross-talk and provides a noticeable performance increase over networks with minimal
channel separation.
Table 8-2 lists th e radio frequency channels the 802.11b/g networks use.
Note: The available channels supported by the wireless products in various countries are
different. For example, Channels 1 to 11 are su pported in the U.S. and Canada, and
Channels 1 to 13 are supported in Europe and Australia.
The preferred channel separation between the channels in neighboring wireless networks is 25
MHz (5 channels). This means that you can apply up to three different channels within your
wireless network. There are only 11 usable wireless channels in the United States. It is
recommended that you start using channel 1 and grow to use channel 6, and 11 when necessary, as
these three channels do not overlap.
WPA and WPA2 Wireless Security
Wi-Fi Protected Access (WPA and WPA2) is a specification of standards-based, interope rable
security enhancements that increase the level of data protection and access control for existing and
future wireless LAN systems.
The IEEE introduced the WEP as an optional security measure to secure 802.11b (W i-Fi) WLANs,
but inherent weaknesses in the standard soon became obvious. In response to this situation, the
Wi-Fi Alliance announced a new security architecture in October 2002 that remedies the
shortcomings of WEP. This standard, formerly known as Safe Secure Network (SSN), is designed
to work with existing 802.11 products and offers forward compatibility with 802.11i, the new
wireless security architecture that has been defined by the IEEE.
WPA and WPA2 offer the following benefits:
•Enhanced data privacy
•Robust key management
•Data origin authentication
•Data integrity protection
B-8Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
The Wi-Fi Alliance is now performing interoperability certification testing on Wi-Fi Protected
Access products. Starting August of 2003, all new Wi-Fi certified products have to support WPA.
NETGEAR is implementing WPA and WPA2 on client and access point products. The 802.11i
standard was ratified in 2004.
How Does WPA Compare to WEP?
WEP is a data encryption method and is not intended as a user authentication mechanism. WPA
user authentication is implemented using 802.1x and the Extensible Authentication Protocol
(EAP). Support for 802.1x authentication is required in WPA. In the 802.11 standard, 802.1x
authentication was optional. For details on EAP specifically, refer to IETF RFC 2284.
With 802.1 1 WEP, all access points and client wireless adapters on a particular wireless LAN must
use the same encryption key. A major problem with the 802.11 standard is that the keys are
cumbersome to change. If you do not update the WEP keys often, an unauthorized person with a
sniffing tool can monitor your network for less than a day and decode the encrypted messages.
Products based on the 802.11 standard alone offer system administrators no effective method to
update the keys.
For 802.11, WEP encryption is optional. For WPA, encryption using Temporal Key Integrity
Protocol (TKIP) is required. TKIP replaces WEP with a new encryption algorithm that is stronger
than the WEP algorithm, but that uses the calculation facilities present on existing wireless devices
to perform encryption operations. TKIP provides important data encryption enhancements
including a per-packet key mixing function, a message integrity check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. Through
these enhancements, TKIP addresses all of known WEP vulnerabilities.
How Does WPA Compare to WPA2 (IEEE 802.11i)?
WPA is forward compatible with the WPA2 security specification. WPA is a subset of WPA2 and
used certain pieces of the early 802.11i draft, such as 802.1x and TKIP. The main pieces of WPA2
that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized
802.11 VoIP phones), as well as enhanced encryption protocols, such as AES-CCMP. These
features were either not yet ready for market or required hardware upgrades to implement.
What are the Key Features of WPA and WPA2 Security?
The following security features are included in the WPA and WPA2 standard:
•Support for a mixture of WP A, WPA2, and WEP wireless clients to allow a migration strategy ,
but mixing WEP and WPA/WPA2 is discouraged
These features are discussed below.
WPA/WPA2 addresses most of the known WEP vulnerabilities and is primarily intended for
wireless infrastructure networks as found in the enterprise. This infrastructure includes stations,
access points, and authentication servers (typically RADIUS servers). The RADIUS server holds
(or has access to) user credentials (for example, user names and passwords) and authenticates
wireless users before they gain access to the network.
The strength of WPA/WPA2 comes from an integrated sequence of operations that encompass
802.1X/EAP authentication and sophisticated key management and encryption techniques. Its
major operations include:
•Network security capability determination. This occurs at the 802.11 level and is
communicated through WPA information elements in Beacon, Probe Response, and (Re)
Association Requests. Information in these elements includes the authentication method
(802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES).
The primary information conveyed in the Beacon frames is the authentication method and the
cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared
key is an authentication method that uses a statically configured pass phrase on both the
stations and the access point. This obviates the need for an authentication server, which in
many home and small office environments will not be available nor desirable. Possible cipher
suites include: WEP, TKIP, and AES (Advanced Encryption Standard). We talk more about
TKIP and AES when addressing data privacy below.
•Authentication. EAP over 802.1X is used for authentication. Mutual authentication is gained
by choosing an EAP type supporting this feature and is required by WPA. 802.1X port access
control prevents full access to the network until authentication completes. 802.1X
EAPOL-Key packets are used by WPA to distribute per-session keys to those stations
successfully authenticated.
The supplicant in the station uses the authentication and cipher suite information contained in
the information elements to decide which authentication method and cipher suite to use. For
example, if the access point is using the pre-shared key method then the supplicant need not
authenticate using full-blown 802.1X. Rather, the supplicant must simply prove to the access
point that it is in possession of the pre-shared key. If the supplicant detects that the service set
does not contain a WPA information element then it knows it must use pre-WPA 802.1X
authentication and key management in order to access the network.
B-10Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•Key management. WPA/WPA2 features a robust key generation/management system that
integrates the authentication and data privacy functions. Keys are generated after successful
authentication and through a subsequent 4-way handshake between the station and Access
Point (AP).
•Data Privacy (Encryption). Temporal Key Integrity Protocol (TKIP) is used to wrap WEP in
sophisticated cryptographic and security techniques to overcome most of its weaknesses.
•Data integrity. TKIP includes a message integrity code (MIC) at the end of each plaintext
message to ensure messages are not being spoofed.
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
Wired Network with Optional
Wireless LAN
802.1x Port Based Network
Access Control
TCP/IP
Ports Closed
Until
Authenticated
TCP/IP
Ports Opened
After
Authenticated
RADIUS Server
Login
Authentication
Certificate
Authority
(for
example
Win Server,
VeriSign)
WPA/WPA2
enabled
wireless
client with
“supplicant”
WPA/WPA2
enabled
Access Point
using
pre-shared key
or 802.1x
Figure 8-3
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a
protected network, as well as providing a vehicle for dynamically varying data encry ption keys via
EAP from a RADIUS server, for example. This framework enables using a central authentication
server, which employs mutual authentication so that a rogue wireless user does not join the
network.
Wireless Networking BasicsB-11
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
It is important to note that 802.1x does not provide the actual authentication mechanisms. When
using 802.1x, the EAP type, such as Transport Layer Security (EAP-TLS), or EAP Tunneled
Transport Layer Security (EAP-TTLS), defines how the authenticati on takes place.
Note: For environments with a Remote Authentication Dial-In User Service (RADIUS)
infrastructure, WPA supports Extensible Authentication Protocol (EAP). For
environments without a RADIUS infrastructure, WPA supports the use of a
pre-shared key.
Together, these technologies provide a framework for strong user authentication.
Windows XP implements 802.1x natively, and several NETGEAR switch and wireless access
point products support 802.1x.
Client with a WPA/
WPA2-enabled wireless
adapter and supplicant
(Win XP, Funk,
Meetinghouse)
1
For example, a
WPA/WPA2-enabled
AP
2
56
7
For example, a
RADIUS server
3
4
Figure 8-4
B-12Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
The AP sends Beacon Frames with WPA/WPA2 information element to the stations in the service
set. Information elements include the required authentication method (802.1x or Pre-shared key)
and the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and
Association Requests (station to AP) also contain WPA information elements.
1. Initial 802.1x communications begin with an unauthenticated supplicant (client device)
attempting to connect with an authenticator (802.11 access point). The client sends an
EAP-start message. This begins a series of message exchanges to authenticate the client.
2. The access point replies with an EAP-request identity message.
3. The client sends an EAP-response packet containing the identity to the authentication server.
The access point responds by enabling a port for passing only EAP packets from the client to
an authentication server located on the wired side of the access point. The access point blocks
all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the
client's identity using an authentication server (for example, RADIUS).
4. The authentication server uses a specific authentication algorithm to verify the client's identity .
This could be through the use of digital certificates or some other EAP authentication type.
5. The authentication server will either send an accept or reject message to the access point.
6. The access point sends an EAP-success packet (or reject packet) to the client.
7. If the authentication server accepts the client, then the access point will transition the client's
port to an authorized state and forward additional traffic.
The important part to know at this point is that the software supporting the specific EAP type
resides on the authentication server and within the operating system or application “supplicant”
software on the client devices. The access point acts as a “pass through” for 802.1x messages,
which means that you can specify any EAP type without needing to upgrade an 802.1x-compliant
access point. As a result, you can update the EAP authentication type to such devices as token
cards (Smart Cards), Kerberos, one-time passwords, certificates, and public key authentication, or
as newer types become available and your requirements for security change.
WPA/WPA2 Data Encryption Key Management
With 802.1x, the rekeying of unicast encryption keys is optional. Additionally, 802.11 and 802.1x
provide no mechanism to change the global encryption key used for multicast and broadcast
traffic. With WPA/WPA2, rekeying of both unicast and global encryption keys is required.
For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for
every frame, and the change is synchronized between the wireless client and the wireless access
point (AP). For the global encryption key, WPA includes a facility (the Information Element) for
the wireless AP to advertise the changed key to the connected wireless clients.
Wireless Networking BasicsB-13
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
If configured to implement dynamic key exchange, the 802.1x authentication server can return
session keys to the access point along with the accept message. The access point uses the session
keys to build, sign and encrypt an EAP key message that is sent to the client immediately after
sending the success message. The client can then use contents of the key message to define
applicable encryption keys. In typical 802.1x implementations, the client can automatically change
encryption keys as often as necessary to minimize the possibility of eavesdroppers having enough
time to crack the key in current use.
Temporal Key Integrity Protocol (TKIP). WPA uses TKIP to provide important data
encryption enhancements including a per-packet key mixing function, a message integrity check
(MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a
re-keying mechanism. TKIP also provides for the following:
•The verification of the security configuration after the encryption keys are determined.
•The synchronized changing of the unicast encryption key for each frame.
•The determination of a unique starting unicast encryption key for each preshared key
authentication.
Michael. With 802.1 1 and WEP, data integrity is provided by a 32-bit integrity check value (ICV)
that is appended to the 802.11 payload and encrypted with WEP. Although the ICV is encrypted,
you can use cryptanalysis to change bits in the encrypted payload and update the encrypted ICV
without being detected by the receiver.
With WPA, a method known as Michael specifies a new algorithm that calculates an 8-byte
message integrity check (MIC) using the calculation facilities available on existing wireless
devices. The MIC is placed between the data portion of the IEEE 802.1 1 frame and the 4-byte ICV.
The MIC field is encrypted together with the frame data and the ICV.
Michael also provides replay protection. A new frame counter in the IEEE 802.11 frame is used to
prevent replay attacks.
AES Support for WPA2. One of the encryption methods supported by WPA2 is the advanced
encryption standard (AES), although AES support will not be required initially for Wi-Fi
certification. This is viewed as the optimal choice for security conscience organizations, but the
problem with AES is that it requires a fundamental redesign of the NIC hardware in both the
station and the access point. TKIP is a pragmatic compromise that allows organizations to deploy
better security while AES capable equipment is being designed, manufactured, and incrementally
deployed.
B-14Wireless Networking Basics
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
Is WPA/WPA2 Perfect?
WPA/WPA2 is not without its vulnerabilities. Specifically, it is susceptible to denial of service
(DoS) attacks. If the access point receives two data packets that fail the message integrity code
(MIC) within 60 seconds of each other, then the network is under an active attack, and as a result,
the access point employs counter measures, which include disassociating each station using the
access point. This prevents an attacker from gleaning information about the encryption key and
alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More
than anything else, this may just prove that no single security tactic is completely invulnerable.
WPA/WPA2 is a definite step forward in WLAN security over WEP and has to be thought of as a
single part of an end-to-end network security strategy.
Product Support for WPA/WPA2
Starting in August, 2003, NETGEAR, Inc. wireless W i-Fi certified products will support the WPA
standard. NETGEAR, Inc. wireless products that had their Wi-Fi certification approved before
August, 2003 will have one year to add WPA so as to maintain their Wi-Fi certification.
WPA/WPA2 requires software changes to the following:
•Wireless access points
•Wireless network adapters
•Wireless client programs
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged
To support the gradual transition of WEP-based wireless networks to WPA/WPA2, a wireless AP
can support both WEP and WPA/WPA2 clients at the same time. During the association, the
wireless AP determines which clients use WEP and which clients use WPA/WPA2. The
disadvantage to supporting a mixture of WEP and WPA/WP A2 clients is that the global encryption
key is not dynamic. This is because WEP-based clients cannot support it. All other benefits to the
WPA clients, such as integrity, are maintained.
However, a mixed mode supporting WPA/WPA2 and non-WPA/WPA2 clients would offer
network security that is no better than that obtained with a non-WPA/WP A2 network, and th us this
mode of operation is discouraged.
Changes to Wireless Access Points
Wireless access points must have their firmware updated to support the following:
Wireless Networking BasicsB-15
v0.1, December 2005
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
•The new WPA/WPA2 information element
To advertise the i r support of WPA/WPA2, wireless APs send the beacon frame with a new
802.11 WPA/WP A2 information element that contains the wireless AP's security configuration
(encryption algorithms and wireless security configuration information).
•The WPA/WPA2 two-phase authentication
Open system, then 802.1x (EAP with RADIUS or preshared key).
•TKIP
•Michael
•AES (WPA2)
To upgrade your wireless access points to support WPA/WPA2, obtain a WPA/WPA2 firmware
update from your wireless AP vendor and upload it to your wireless AP.
Changes to Wireless Network Adapters
Wireless networking software in the adapter, and possibly in the OS or client application, must be
updated to support the following:
•The new WPA/WPA2 information element
Wireless clients must be able to process the WPA/WPA2 information element and respond
with a specific security configuration.
•The WPA/WPA2 two-phase authentication
Open system, then 802.1x supplicant (EAP or preshared key).
•TKIP
•Michael
•AES (WPA2)
To upgrade your wireless network adapters to support WPA/WPA2, obtain a WPA/WPA2 update
from your wireless network adapter vendor and update the wireless network adapter driver.
For Windows wireless clients, you must obtain an updated network adapter driver that supports
WP A. For wireless network adapter drivers that are compatible with W indows XP (Service Pack 1)
and Windows Server 2003, the updated network adapter driver must be able to pass the adapter's
WPA capabilities and security configuration to the Wireless Zero Configuration service.
Microsoft has worked with many wireless vendors to embed the WP A driver update in the wireless
adapter driver. So, to update your Microsoft Windows wireless client, all you have to do is obtain
the new WPA/WPA2-compatible driver and install the driver.
B-16Wireless Networking Basics
v0.1, December 2005
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.