0% found this document useful (0 votes)
60 views54 pages

User Guide: LAPN600

The document is a user guide for the Linksys LAPN600 Wireless Access Point, detailing its quick start setup, physical details, and package contents. It includes chapters on access point setup, operation and status, management, and troubleshooting. The guide provides comprehensive instructions for configuring and managing the device effectively.

Uploaded by

omaralfarooq786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views54 pages

User Guide: LAPN600

The document is a user guide for the Linksys LAPN600 Wireless Access Point, detailing its quick start setup, physical details, and package contents. It includes chapters on access point setup, operation and status, management, and troubleshooting. The guide provides comprehensive instructions for configuring and managing the device effectively.

Uploaded by

omaralfarooq786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

User Guide

LAPN600
Linksys Table of Contents

Table of Contents
CHAPTER 1 QUICK START GUIDE . . . . . . . . . . . . . . . . . . . . . 1 Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 CHAPTER 3 OPERATION AND STATUS . . . . . . . . . . . . . . . . 27
Physical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Mounting Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 System Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
CHAPTER 2 ACCESS POINT SETUP . . . . . . . . . . . . . . . . . . . . 3 LAN Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Setup Using a Web Browser . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Log View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Time Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 CHAPTER 4 ACCESS POINT MANAGEMENT . . . . . . . . . . . . . 32
Log Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
SSL Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Configuration Backup/Restore . . . . . . . . . . . . . . . . . . . . . 33
Network Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Factory Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Basic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Packet Capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Rogue AP Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Diagnostic Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 APPENDIX A TROUBLESHOOTING . . . . . . . . . . . . . . . . . . . 37
Scheduler Association . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Connection Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 General Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Rate Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 APPENDIX B ABOUT WIRELESS LANS . . . . . . . . . . . . . . . . . 38
QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Workgroup Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Wireless LAN Terminology . . . . . . . . . . . . . . . . . . . . . . . 38

ii
Linksys Table of Contents

APPENDIX C PC AND SERVER CONFIGURATION . . . . . . . . . . 40


Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Using WEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Using WPA2-PSK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Using WPA2-Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . 41
802.1x Server Setup (Windows 2000 Server) . . . . . . . . . . . . 41
802.1x Client Setup on Windows XP . . . . . . . . . . . . . . . . . 46
Using 802.1x Mode (without WPA) . . . . . . . . . . . . . . . . . . 49

iii
Linksys CHAPTER 1 Quick Start Guide

CHAPTER 1 Quick Start Guide Physical Details


There is one LED for the device.

LED
Package Contents LED Color Activity Status
Green Blinking System is booting.
Solid System is normal; no wireless device
• Linksys Wireless Access Point
connected.
• Quick Start Guide Blue Blinking Software upgrade in process.
• Ethernet Cable Solid System is normal; at least one wireless
• AC Power Adapter device connected.
• CD with Documentation Red Solid Booting process or update failed; hard
reset or service required.
• Mounting Bracket
• Mounting Kit
• Ceiling Mount Back Plate Port and Button
• Drilling Layout Template Power Port - Connect the AC power adapter to this port.
NOTE: Use only the adapter that came with your access point.
Ethernet Port - Connect a wired network device to this port. This port supports
PoE (Power over Ethernet) with a PoE switch or PoE injector. LAPN600 is
powered on from an 802.3at compliant source.
NOTE: When both PoE and AC power adapter are connected to access point,
device will get power from PoE as higher precedence.
Using Cat5e or better cable is highly recommended.
Reset Button - Press and hold this button for less than 15 seconds to power
cycle device. Press and hold for longer than 15 seconds to reset the device to
factory default settings.

1
Linksys CHAPTER 1 Quick Start Guide

Mounting Guide 5. Connect the Ethernet cable and/or AC power adapter to your device
6. Slide the device into the bracket. Turn access point clockwise until it locks.
To avoid overheating, do not install your access point if ambient temperatures
exceed 104°F (40°C). Install on a flat, stable surface, near the center of your 7. Replace tile in ceiling.
wireless coverage area making sure not to block vents on the sides of the device
enclosure.

Wall Installation IMPORTANT


1. Position drilling layout template at the desired location. Improper or insecure mounting could result in damage to the device or personal
injury. Linksys is not responsible for damages caused by improper mounting.
2. Drill four screw holes on the mounting surface. If your Ethernet cable is
routed behind the wall, mark Ethernet cable hole as well.
3. Secure the mounting bracket on the wall with anchors and screws.
4. If your Ethernet cable is routed behind the wall, cut or drill the Ethernet
cable hole you marked in Step 2. Feed the Ethernet cable through the hole.
5. Connect the Ethernet cable and/or AC power adapter to your device.
6. Slide the device into the bracket. Turn clockwise until it locks into place.

Ceiling Installation
1. Select ceiling tile for mounting and remove tile.
2. Position drilling layout template at the desired location.
3. Drill four screw holes and Ethernet cable hole on the surface of ceiling tile.
4. Place back plate on the opposite side of ceiling tile. Secure mounting
bracket to the ceiling tile with flathead screw and nut. Route the Ethernet
cable through the Ethernet cable hole.

2
Linksys CHAPTER 2 Access Point Setup

CHAPTER 2 Access Point Setup 3. Type in default username: admin, and password: admin.
4. Click Login to launch the browser-based setup and follow the on-screen
instructions.

Overview
This chapter describes the setup procedure to connect the wireless access
point to your LAN, and configure it as an access point for your wireless stations.
Wireless stations may also require configuration. For details, see Appendix C -
Wireless Station Configuration.
The wireless access point can be configured using a Web browser.

Setup using a Web Browser


Your browser must support JavaScript. The configuration program has been Figure 1: Password Dialog
tested on the following browsers:
IF YOU CAN’T CONNECT:
• Firefox 3.5 or later, Chrome 8 or later, Safari 5 or later It is likely that your PC’s IP address is incompatible with the wireless
• Internet Explorer 7 or later access point’s IP address. This can happen if your LAN does not
have a DHCP Server. If there is no DHCP server in your network, the
access point will fall back to its default IP address: 192.168.1.252,
Setup Procedure with a network mask of 255.255.255.0.

Make sure device is powered on before you continue setup. If LED light is off, Or, if your PC’s IP address is not compatible with this, you must
check that AC power adapter, or PoE cable, is properly connected on both ends. change your PC’s IP address to an unused value in the range
192.168.1.1 ~ 192.168.1.254, with a network mask of 255.255.255.0.
Access device’s browser-based setup:
See Appendix A - Windows TCP/IP for details for this procedure.
1. Use the included cable to connect the access point to your network via a
network switch or router.
2. Open a web browser on a computer connected to your network. Enter the
IP address of your access point. By factory default, the IP address will be
assigned by a DHCP server (usually the network router). If there is no DHCP
server on your network, the default IP address is 192.168.1.252/255.255.255.0.
Note: Use a computer hardwired to the same network as your access point for
browser-based setup access. Access to browser-based setup via WiFi is disabled
by default.

3
Linksys CHAPTER 2 Access Point Setup

Setup Wizard 5. On the IPv4 Address screen (Figure 4) configure the IP address of the device
then click Next. If you want to configure more than 4 SSIDs, please go to
The first time you connect to the wireless access point, run the Setup Wizard to Configuration → Wireless → Basic Settings. The access point supports up
configure the device. to 8 SSIDs per radio.
1. Click the Quick Start link on the main menu

Figure 4: Setup Wizard - IPv4

6. Set the SSID information on the Wireless Network screen. Click Next.

Figure 2: Setup Wizard


2. On the first screen, click Launch.
3. Set the password on the Device Password screen, if desired.
4. Configure the time zone, date and time for the device on System Settings
screen.

Figure 5: Setup Wizard - Wireless Network

7. On the Wireless Security Screen (Figure 6) configure the wireless security


settings for the device. Click Next. If you are looking for security options that
are not available in the wizard, go to Configuration → Wireless → Security
page. The access point supports more sophisticated security options there.

Figure 3: Setup Wizard - System Settings


4
Linksys CHAPTER 2 Access Point Setup

9. Click Finish to leave the wizard.

Figure 6: Setup Wizard - Wireless Security


Figure 8: Setup Wizard - Finish
8. On the Summary screen, check the data to make sure they are correct and
then click Submit to save the changes.
User Accounts
Click User Accounts on the Administration menu to manage user accounts. The
access point supports up to 5 users: one administrator and four normal users.

Figure 7: Setup Wizard - Summary

Figure 9: User Accounts

5
Linksys CHAPTER 2 Access Point Setup

Data - User Accounts Screen Data - Time Screen

User Account Table Time


User Name Enter the User Name to connect to the access Current Time Display current date and time of the system.
point’s admin interface. User Name is effective Manually Set date and time manually.
once you save settings.
Automatically When enabled (default setting) the access point will get
User Name can include up to 63 characters. the current time from a public time server.
Special characters are allowed.
Time Zone Choose the time zone for your location from the drop-
User Level Only administrator account has Read/Write down list. If your location observes daylight saving time,
permission to the access point’s admin interface. enable “Automatically adjust clock for daylight saving
All other accounts have Read Only permission. changes.”
New Password Enter the Password to connect to the access Start Time Specify the start time of daylight saving.
point’s admin interface.
End Time Specify the end time of daylight saving.
Password must be between 4 and 63 characters. Offset Select the adjusted time of daylight saving.
Special characters are allowed.
NTP
Confirm New Password Re-enter password.
NTP Server 1 Enter the primary NTP server. It can be an IPv4 address or
a domain name.
Valid characters include alphanumeric characters, “_”, “-”
Time and “.”. Maximum length is 64 characters.
Click Time on the Administration menu to configure system time of the device. NTP Server 2 Enter the secondary NTP server. It can be an IPv4 address
or a domain name.
Valid characters include alphanumeric characters, “_”, “-”
and “.”. Maximum length is 64 characters.

Figure 10: Time Screen 6


Linksys CHAPTER 2 Access Point Setup

Log Settings Data - Logs Settings Screen


The logs record various types of activity on the access point. This data is useful Log Types
for troubleshooting, but enabling all logs will generate a large amount of data Log Types Select events to log. Checking all options increase the
and adversely affect performance. size of the log, so enable only events you believe are
required.
Email Alertt
Email Alert Enable email alert function.
SMTP Server Enter the email server that is used to send logs. It can
be an IPv4 address or a domain name.
Valid characters include alphanumeric characters, “_”,
“-” and “.”. Maximum length is 64 characters.
Data Encryption Enable if you want to use data encryption.
Port Enter the port for the SMTP server. The port is a value
from 1 to 65535 and default is 25.
Username Enter the Username to log in to your SMTP server.
The Username can include up to 32 characters. Special
characters are allowed.
Password Enter the Password to log in to your SMTP server.
The Password can include up to 32 characters. Special
characters are allowed.
Email Address for Logs Enter the email address the log messages are to be
Figure 11: Log Settings Screen sent to.
Valid characters include alphanumeric characters, “_”,
“-”, “.” and “@”. Maximum length is 64 characters.
Log Queue Length Enter the length of the queue: up to 500 log messages.
The default is 20 messages. When messages reach the
set length the queue will be sent to the specified email
address.
Log Time Threshold Enter the time threshold (in seconds) used to check if
the queue is full. It’s a value from 1 to 600 and default
is 600 seconds.
Syslog
Syslog Notification Enable Syslog notification.
IP Type Select the IP type of the syslog server: IPv4 or IPv6.
Server IP Address Enter the IPv4 or IPv6 address of syslog server here.

7
Linksys CHAPTER 2 Access Point Setup

Management Access Data - Management Access Screen


You can use the Management page to configure the management methods of Web Access
the access point. HTTP HTTP (Hyper Text Transfer Protocol) is the standard
for transferring files (text, graphic images and
other multimedia files) on the World Wide Web.
Enable to allow Web access by HTTP protocol.
HTTP Port Specify the port for HTTP. It can be 80 (default) or
from 1024 to 65535.
HTTP to HTTPS Enable to redirect Web access of HTTP to HTTPS
Redirect automatically.
This field is available only when HTTP access is
disabled.
HTTPS HTTPS (Hypertext Transfer Protocol Secure) can
provide more secure communication with the
SSL/TLS protocol, which support data encryption
to HTTP clients and servers.
Enable to allow Web access by HTTPS protocol.
HTTPS Port Specify the port for HTTPS. It can be 443 (default)
or from 1024 to 65535.

Figure 12: Management Access Screen From Wireless Enable wireless devices to connect to access
point’s admin page. Disabled by default.
Access Control By default, no IP addresses are prohibited from
accessing the device’s admin page. You can
enable access control and enter specified IP
addresses for access. Four IPv4 and four IPv6
addresses can be specified.
SNMP Settings
SNMP Simple Network Management Protocol (SNMP) is
a network monitoring and management protocol.
Enable or disable SNMP function here. Disabled by
default.
Contact Enter contact information for the access point.
The contact includes 1 to 32 characters. Special
characters are allowed.

8
Linksys CHAPTER 2 Access Point Setup

Location Enter the area or location where the access point SSL Certificate
resides.
This screen can be used to manage SSL certificate used by HTTPS.
The location includes 1 to 32 characters. Special
characters are allowed.
SNMPv1/v2 Settings
Get Community Enter the name of Get Community. Get Community
is used to read data from the access point and not
for writing data into the access point.
Get Community includes 1 to 32 characters.
Special characters are allowed.
Set Community Enter the name of Set Community. Set Community
is used to write data into the access point.
The Set Community includes 1 to 32 characters.
Special characters are allowed.
SNMPv3 Settings
SNMPv3 Settings Configure the SNMPv3 settings if you want to use
SNMPv3.
Username: Enter the username. It includes 0 to 32
characters. Special characters are allowed.
Authentication Protocol: None or HMAC-MD5. Figure 13: SSL Certificate Screen

Authentication Key: 8 to 32 characters. Special


characters are allowed.
Privacy Protocol: None or CBC-DES.
Privacy Key: 8 to 32 characters. Special characters
are allowed.
Access Control
Access Control When SNMP is enabled, any IP address can connect
to the access point’s admin page through SNMP.
You can enable access control to allow specified
IP addresses. Two IPv4 and two IPv6 addresses can
be specified.
SNMP Trap
Trap Community Enter the Trap Community server. It includes 1 to
32 characters. Special characters are allowed.
Trap Destination Two Trap Community servers are supported: can
be IPv4 or IPv6. 9
Linksys CHAPTER 2 Access Point Setup

Data - SSL Certificate Screen Data - Network Setup Screen


Export/Restore to/from Local PC TCP/IP
Export SSL Click to export the SSL certificate. Host Name Assign a host name to this access point. Host name
Certificate consists of 1 to 15 characters. Valid characters include
A-Z, a-z, 0-9 and -. Character cannot be first and last
Install Certificate Browse to choose the certificate file. Click Install character of hostname and hostname cannot be
Certificate button. composed of all digits.
Export to TFTP Server VLAN Enables or disables VLAN function.Workgroup Bridge
Destination File Enter the name of the destination file. can only be enabled when VLAN function is disabled.
TFTP Server Enter the IPv4 address for the TFTP server. Untagged VLAN Enables or disables VLAN tagging. If enabled (default),
traffic is untagged when VLAN ID is equal to Untagged
Export Click to export the SSL certificate to the TFTP VLAN ID and un-tagged traffic can be accepted by LAN
server. port. If disabled, traffic from the LAN port is always
Restore from TFTP Server tagged and only tagged traffic can be accepted from
LAN port.
Source File Enter the name of the source file.
By default all traffic on the access point uses VLAN 1,
TFTP Server Enter the IPv4 address for the TFTP server.
the default untagged VLAN.
Install Click to install the file to the device.
Untagged VLAN ID Specifies a number between 1 and 4094 for the
Network Setup untagged VLAN ID. The default is 1. Traffic on the
VLAN that you specify in this field is not be tagged
Use this screen to configure basic device settings, VLAN settings and settings with a VLAN ID when forwarded to the network.
for the LAN interface, including static or dynamic IPv4/IPv6 address assignment. Untagged VLAN ID field is active only when untagged
VLAN is enabled.
VLAN 1 is the default for untagged VLAN.
Management VLAN The VLAN associated with the IP address you use to
connect to the access point. Provide a number between
1 and 4094 for the Management VLAN ID. The default
is 1.
IPv4/v6
IP Settings Select Automatic Configuration or Static IP Address.
IP Address Enter an unused IP address from the address range used
on your LAN.
Subnet Mask Enter the subnet mask for the IP address above.
Default Gateway Enter the gateway for the IP address above.
Primary DNS Enter the DNS address.
Figure 14: Network Setup Screen
Secondary DNS Optional. If entered, this DNS will be used if the Primary
DNS does not respond.

10
Linksys CHAPTER 2 Access Point Setup

Advanced
Use this screen to configure advanced network settings of the access point.
Port Settings
Auto Negotiation If enabled, Port Speed and Duplex Mode will become
grey and cannot be configured. If disabled, Port Speed
and Duplex Mode can be configured.
Operational Auto Current Auto Negotiation mode of the Ethernet port.
Negotiation
Port Speed Select the speed of the Ethernet port. Available only
when Auto Negotiation is disabled. The option can be
10M, 100M or 1000M (default).
Operational Port Displays the current port speed of the Ethernet port.
Speed
Duplex Mode Select the duplex mode of the Ethernet port. Available
only when Auto Negotiation is disabled. The option
can be Half or Full (default).
Operational Displays the current duplex mode of the Ethernet port.
Duplex Mode
Flow Control Enable or disable flow control of the Ethernet port.
802.1x Supplicant
Figure 15: Advanced Screen
802.1x Supplicant Enable if your network requires this access point to use
802.1X authentication in order to operate.

Data - Advanced Screen


11
Linksys CHAPTER 2 Access Point Setup

Authentication This feature supports following two kinds of Basic Settings


authentication: Basic Settings provides the essential configuration for your wireless radio and
•• Authentication via MAC Address SSIDs. You should be able to set up your wireless network with these essential
parameters configured. Advanced wireless settings such as Band Steering,
Select this if you want to use MAC address for
Channel Bandwidth, etc., will be on Configuration → Wireless → Advanced
authentication.
Settings screen.
The access point uses lowercase MAC address for Name
Click Basic Settings on the Wireless menu.
and Password, like xxxxxxxxxxxx.
•• Authentication via Name and Password
Select this if you want to use name and password for
authentication.
Name - Enter the login name. The name includes 1 to 63
characters. Special characters are allowed.
Password - Enter the desired login password. The
password includes 4 to 63 characters. Special characters
are allowed.
Discovery Settings
Bonjour Enable if administrator wants the access point to be
discovered by Bonjour enabled devices automatically.
If VLAN is enabled, the discovery packets will be sent
out via management VLAN only. The access point
supports http and https services.
LLDP Enable if administrator wants the access point to be
discovered by switch by LLDP protocol. Information
such as product name, device name, firmware version, Figure 16: Basic Settings Screen
IP address, MAC address and so on will be advertised.
LLDP-MED Enable if administrator wants the access point to
be discovered by switch by LLDP-MED protocol.
Information such as product name, device name,
firmware version, IP address, MAC address and so on
will be advertised.

12
Linksys CHAPTER 2 Access Point Setup

Data - Wireless Basic Settings Screen Broadcast Enable or disable the broadcast of the SSID.

Basic Wireless Settings When the access point does not broadcast its SSID,
the network name is not shown in the list of available
Wireless Radio Select the wireless radio from the list. networks on a client station. In-stead, you must enter
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz. the exact network name manually into the wireless
connection utility on the client so that it can connect.
Enable Radio Enable or disable the wireless radio.
Isolation Enable or disable isolation among clients of the SSID.
Wireless Mode Select the desired option for radio 1: If enabled, wireless clients cannot communicate with
•• G only - allow connection by 802.11G wireless stations others in the same SSID.
only. Disabled by default.
•• N only - allow connection by 802.11N wireless stations VLAN ID Enter the VLAN ID of the SSID.
only.
Used to tag packets which are received from the wireless
•• B/G-Mixed - allow connection by 802.11B and G wireless clients of the SSID and sent from Ethernet or Workgroup
stations only. Bridge interfaces.
•• B/G/N-Mixed (Default) - allow connections by 802.11N, Applicable only when VLAN function is enabled. VLAN
802.11B and 802.11G wireless stations. function can be configured in Configuration → LAN →
Select the desired option for radio 2: Network Setup screen.
•• A only - allow connection by 802.11A wireless stations Max Clients Enter the number of clients that can connect to the SSID.
only. The range is from 0 to 32, and 0 means no limit.

•• N only - allow connection by 802.11N wireless stations


only.
•• A/N-Mixed - allow connection by 802.11A and N wireless
stations only.
Wireless Channel Select wireless channel of the radio.
If Auto is selected, the access point will select the best
available channel when device boots up.
If you experience lost connections and/or slow data
transfers, experiment with manually setting different
channels to see which is the best.
SSID Settings
SSID Name Enter the desired SSID Name. Each SSID must have a
unique name. The name includes 1 to 32 characters

13
Linksys CHAPTER 2 Access Point Setup

Security Settings • WPA2-Personal - This is a further development of WPA-PSK, and offers even
greater security, using the AES (Advanced Encryption Standard) method.
Use this screen to configure security settings of SSIDs to provide data protection This method, sometimes called “Mixed Mode”, allows clients to use either
over the wireless network. WPA-Personal (with TKIP) or WPA2-Personal (with AES).
• WPA2-Enterprise - Requires a RADIUS Server on your LAN to provide the
client authentication according to the 802.1x standard. Data transmissions
are encrypted using the WPA2 standard.
If this option is selected:
• This access point must have a client login on the RADIUS Server.
• Each user must authenticate on the RADIUS Server. This is usually done
using digital certificates.
• Eachuser’swirelessclientmustsupport802.1xandprovidetheRADIUS
authentica-tion data when required.
• All data transmission is encrypted using the WPA2 standard. Keys are
automatically generated, so no key input is required.
• RADIUS - RADIUS mode utilizes RADIUS server for authentication and
dynamic WEP key generation for data encryption.

Figure 17: Security Settings

Data - Wireless Basic Settings Screen


Security
Select SSID Select the desired SSID from the drop-down list.
Security Mode Select the desired security method from the list.

Security Settings
• Disabled - No security. Anyone using the correct SSID can connect to
your network.
• WEP - The 802.11b standard. Data is encrypted before transmission, but
the encryption system is not very strong.

14
Linksys CHAPTER 2 Access Point Setup

Security Settings - WEP Security Settings - WPA2-Personal


This is the 802.11b standard. Data is encrypted before transmission, but the This is a further development of WPA-Personal, and offers even greater security.
encryption system is not very strong.

Figure 19: WPA2-Personal Wireless Security Screen


Figure 18: WEP Wireless Security Screen
Data - WPA2-Personal Screen
Data - WEP Screen
WPA2-Personal
WEP
WPA Algorithm The encryption method is AES. Wireless stations must also
Authentication Select Open System or Shared Key. All wireless use AES.
stations must use the same method.
Pre-shared Key Enter the key value. It is 8 to 63 ASCII characters or 64 HEX
Default Transmit Select a transmit key. characters. Other wireless stations must use the same key.
Key
Key Renewal Specify the value of Group Key Renewal. It’s a value from
WEP Encryption Select an encryption option, and ensure your wireless 600 to 36000 and default is 3600 seconds.
stations have the same setting:
WPA automatically changes secret keys after a certain
64-Bit Encryption - Keys are 10 Hex characters.
period of time. The group key interval is the period of time
128-Bit Encryption - Keys are 26 Hex characters. in between automatic changes of the group key, which all
Passphrase Generate a key or keys instead of entering them devices on the network share.
directly. Enter a word or group of printable characters Constantly keying the group key protects your network
in the Passphrase box and click the Generate button against intrusion, as the would-be intruder must cope
to automatically configure the WEP key. It consists of
with an ever-changing secret key.
1 to 30 characters.
Key Value Enter a key in hexadecimal format.

15
Linksys CHAPTER 2 Access Point Setup

Security Settings - WPA/WPA2-Personal Security Settings - WPA2-Enterprise


This method, sometimes called Mixed Mode, allows clients to use either WPA- This version of WPA2-Enterprise requires a RADIUS Server on your LAN to
Personal or WPA2-Personal. provide the client authentication. Data transmissions are encrypted using the
WPA2 standard.

Figure 20: WPA/WPA2-Personal Wireless Security Screen


Figure 21: WPA2-Enterprise Wireless Security Screen
Data - WPA/WPA2-Personal Screen
WPA/WPA2-Personal
WPA Algorithm The encryption method is TKIP or AES.
Pre-shared Key Enter the key value. It is 8 to 63 ASCII characters
or 64 HEX characters. Other wireless stations
must use the same key.
Key Renewal Specify the value of Group Key Renewal. It’s a value
from 600 to 36000, and default is 3600 seconds. .
WPA automatically changes secret keys after a certain
period of time. The group key interval is the period of
time in between automatic changes of the group
key, which all devices on the network share.
Constantly keying the group key protects your
network against intrusion, as the would-be intruder
must cope with an ever-changing secret key.

16
Linksys CHAPTER 2 Access Point Setup

Data - WPA2-Enterprise Screen Security Settings - WPA/WPA2-Enterprise


WPA2-Enterprise WPA/WPA2-Enterprise requires a RADIUS Server on your LAN to provide the
client authen-tication. Data transmissions are encrypted using WPA2 standard.
Primary Server Enter the IP address of the RADIUS Server on your
network.
Primary Server Port Enter the port number used for connections to
the RADIUS Server. It is a value from 1 to 65534,
and default is 1812.
Primary Shared Secret Enter the key value to match the RADIUS Server. It
consists of 1 to 64 characters.
Backup Server The Backup Authentication Server will be used
when the Primary Authentication Server is not
available.
Backup Server Port Enter the port number used for connections to
the Backup RADIUS Server. It’s a value from 1 to
65534, and default is 1812.
Backup Shared Secret Enter the key value to match the Backup RADIUS
Server. It consists of 1 to 64 characters.
WPA Algorithm The encryption method is AES.
Key Renewal Timeout Specify the value of Group Key Renewal. It is a value Figure 22: WPA/WPA2-Enterprise Wireless Security Screen
from 600 to 36000, and default is 3600 seconds.
WPA automatically changes secret keys after a
certain period of time. The group key interval
is the period of time in between automatic
changes of the group key, which all devices on
the network share.
Constantly keying the group key protects your
network against intrusion, as the would-be intruder
must cope with an ever-changing secret key.

17
Linksys CHAPTER 2 Access Point Setup

Data - WPA/WPA2-Enterprise Screen RADIUS


WPA/WPA2-Enterprise Use RADIUS server for authentication and dynamic WEP key generation for
data encryption.
Primary Server Enter the IP address of the RADIUS Server on your
network.
Primary Server Port Enter the port number used for connections to the
RADIUS Server. It is a value from 1 to 65534, and
default is 1812.
Primary Shared Enter the key value to match the RADIUS Server. It
Secret consists of 1 to 64 characters.
Backup Server The Backup Authentication Server will be used
when the Primary Authentication Server is not
available.
Backup Server Port Enter the port number used for connections to the
Backup RADIUS Server. It is a value from 1 to 65534,
and default is 1812.
Backup Shared Secret Enter the key value to match the Backup RADIUS
Server. It consists of 1 to 64 characters.
WPA Algorithm The encryption method is TKIP or AES.
Key Renewal Timeout Specify the value of Group Key Renewal. It is a value Figure 23: RADIUS Settings
from 600 to 36000, and default is 3600 seconds.
Data - RADIUS Screen
WPA automatically changes secret keys after a
certain period of time. The group key interval is the Authentication Server
period of time between automatic changes of the Primary Server Enter the IP address of the RADIUS Server on your
group key, which all devices on the network share. network.
Constantly keying the group key protects your Primary Server Port Enter the port number used for connections to the
network against intrusion, as the would-be intruder RADIUS Server. It is a value from 1 to 65534, and
must cope with an ever-changing secret key. default is 1812.
Primary Shared Enter the key value to match the RADIUS Server. It
Secret consists of 1 to 64 characters.
Backup Server The Backup Authentication Server will be used when
the Primary Authentication Server is not available.
Backup Server Port Enter the port number used for connections to the
Backup RADIUS Server. It is a value from 1 to 65534,
and default is 1812.
Backup Shared Secret Enter the key value to match the Backup RADIUS
Server. It consists of 1 to 64 characters.

18
Linksys CHAPTER 2 Access Point Setup

Rogue AP Detection Wireless Radio Select the desired radio from the list.
Rogue AP detection is used to detect the unexpected or unauthorized access Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
point installed in a secure network environment. Rogue AP Enable or disable Rogue AP Detection on the selected radio.
Detected Rogue AP List
Action Click Trust to move the AP to the Trusted AP List.
MAC Address The MAC address of the Rogue AP.
SSID The SSID of the Rogue AP.
Channel The channel of the Rogue AP.
Security The security method of the Rogue AP.
Signal The signal level of the Rogue AP.
Trusted AP List
Action Click Untrust to move the AP to the Rogue AP List.
MAC Address The MAC address of the Trusted AP.
SSID The SSID of the Trusted AP.
Channel The channel of the Trusted AP.
Security The security method of the Trusted AP.
Figure 24: Rogue AP Screen Signal The signal level of the Trusted AP.
New MAC Add one trusted AP by MAC address.
Address

19
Data - Rogue AP Screen
Linksys CHAPTER 2 Access Point Setup

Scheduler Wireless Scheduler Enable or disable wireless scheduler.


Configure a rule with a specific time interval for SSIDs to be operational. If disabled, even if some SSIDs are associated with
Automate enabling or disabling SSIDs based on the profile definition. Support profiles, they will be always active.
up to 16 profiles and each profile can include 4 time rules. Scheduler Operational Status
Status The operational status of the scheduler.
Reason The detailed reason for the scheduler operational
status. It includes the following situations.
•• System time is outdated.
Scheduler is inactive because system time is outdated.
•• Administrative Mode is disabled.
Scheduler is disabled by administrator.
•• Active
Scheduler is active.
Scheduler Profile Configuration
New Profile Name Enter the name for new profile.
Profile Name Select the desired profile from the list to configure.
Day of the Week Select the desired day from the list.
Figure 25: Scheduler Screen
Option None means this time rule is disabled.
Start Time Choose the start time.
Finish Time Choose the finish time.

Data - Scheduler Screen


20
Linksys CHAPTER 2 Access Point Setup

Scheduler Association Connection Control


Associate defined scheduler profiles with SSIDs. Exclude or allow only listed client stations to authenticate with the access point.

Figure 27: Connection Control Screen


Figure 26: Scheduler Association Screen
Data - Connection Control Screen

Data - Scheduler Association Screen SSID Select the desired SSID from the list.
Wireless Radio Select the desired radio from the list. Connection Type Select the option from the drop-down list as desired.
•• Local: Choose either Allow only following MAC addresses
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz. to connect to wireless network or Prevent following MAC
Scheduler Association addresses from connection to wireless network. You can
enter up to 20 MAC addresses of wireless stations or
SSID The index of SSID. choose the MAC address.
SSID Name The name of the SSID. •• RADIUS
Profile Name Choose the profile that is associated with the SSID. Primary/Backup RADIUS Server - Enter the IP address of the
If the profile associated with the SSID is deleted, then the RADIUS Server.
association will be removed. Primary/Backup RADIUS Server Port – Enter the Port number
of the RADIUS Server.
If “None” is selected, it means no scheduler profile is
Primary/Backup Shared Secret - This is shared between
associated. the wireless access point and the RADIUS Server while
Interface Status The Status of the SSID. It can be Enabled or Disabled. authenticating the device attempting to connect.
Scheduler only works when the SSID is enabled. •• Disabled

21
Linksys CHAPTER 2 Access Point Setup

Rate Limit QoS


Limit downstream and upstream rate of SSIDs. The QoS (Quality of Service) feature allows you to specify priorities for different
traffic coming from your wireless client. Lower priority traffic will be slowed
down to allow greater throughput or less delay for high priority traffic.

Figure 28: Rate Limit Screen

Data - Rate Limit Screen Figure 29: QoS Screen


Wireless Radio Select the desired radio from the list.
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
Rate Limit
SSID The index of SSID.
SSID Name The name of the SSID.
Upstream Rate Enter a maximum upstream for the SSID. The range is
from 0 to 200 Mbps; 0 means no limitation. Upstream is
for traffic from wireless client to access point.
D o w n s t r e a m Enter a maximum downstream for the SSID. The range is
Rate from 0 to 200 Mbps; 0 means no limitation. Downstream
is for traffic from access point to wireless client.

22
Linksys CHAPTER 2 Access Point Setup

Data - QoS Screen Workgroup Bridge


QoS Setting Workgroup Bridge feature enables the access point to extend the accessibility
Wireless Radio Select the desired radio from the list. of a remote network. In Workgroup Bridge mode, the access point acts as a
wireless station (STA) on the wireless LAN. It can bridge traffic between a remote
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
wired network and a wireless LAN.
QoS Settings
When Workgroup Bridge is enabled, SSID configuration still works to provide
SSID The index of SSID. wireless ser-vices to clients.
SSID Name The name of the SSID.
All access points participating in Workgroup Bridge must have the identical
VLAN ID The VLAN ID of the SSID. settings for Radio interface, IEEE 802.11 mode, Channel Bandwidth, Channel
Priority Select the priority level from the list. VLAN must be enabled (Auto is not recommended).
in order to set priority.
The 802.1p will be included in the VLAN header of the
packets which are received from the SSID and sent from
Ethernet interface.
WMM Enable or disable WMM.
WMM (Wi-Fi Multimedia) is a component of the IEEE 802.11e
wireless LAN standard for QoS.
WMM provides prioritization of wireless data packets from
different applications based on four access categories:
voice, video, best effort, and background. For an application
to receive the benefits of WMM QoS, both it and the client
running that application have to have WMM enabled.
Legacy applications that do not support WMM and
applications that do not require QoS, are assigned to the
best effort category, which receives a lower priority than
voice and video.
WMM is enabled by default.
Figure 30: Workgroup Bridge

Data - Workgroup Bridge Screen


23
Linksys CHAPTER 2 Access Point Setup

Workgroup Bridge Advanced Settings


Radio Select the desired radio from the list. Configure advanced parameters of the wireless radios.
Workgroup Bridge Status
Status Enable or disable Workgroup Bridge function.
Workgroup Bridge can only be enabled when
VLAN function is disabled.
Before configuring Workgroup Bridge, make
sure all devices in Workgroup Bridge have
the following identical settings.
•• Radio
•• IEEE 802.11 Mode
•• Channel Bandwidth
•• Channel (Auto is not recommended)
Infrastructure Client Interface
SSID Enter the name of the SSID to which Figure 31: Advanced Settings
Workgroup Bridge will connect. Click Site
Survey button to choose from the list.
Workgroup Bridge must connect to a remote
access point.
Remote MAC Address Normally, Workgroup Bridge connects to a
remote access point by matching SSID. When
multiple remote access points have the
same SSID,Workgroup Bridge can connect to
different remote access points.
Optional: You can specify the MAC address of
the remote access point to limit Workgroup
Bridge’s connection to a specific remote
access point.The format is xx:xx:xx:xx:xx:xx.
Security Mode Select the desired mode from the list.
•• Disabled
•• WPA-Personal
•• WPA2-Personal

24
Linksys CHAPTER 2 Access Point Setup

Data - Advanced Settings Screen


Band Steering Beacon Interval The access point transmits beacon frames at regular
Band Steering Enable or disable Band Steering function. intervals to announce the existence of the wireless
network. Enter the interval between the transmissions
Band Steering is a technology that detects whether of beacon frames. The value range is between 40 and
the wireless client is dual-band capable. If it is, band 1000 milliseconds and default is 100 milliseconds.
steering pushes the client to connect to the less-
DTIM Interval Enter the Delivery Traffic Information Map (DTIM)
congested 5 GHz network. It does this by actively
period, an integer from 1 to 255 beacons. The default
blocking the client’s attempts to connect with the
is 1 beacon.
2.4GHz network.
Isolation The DTIM message is an element included in some
beacon frames. It indicates which client stations,
Isolation between Define whether to isolate traffic between SSIDs. If currently sleeping in low-power mode, have data
SSIDs enabled, wireless clients in different SSIDs cannot buffered on the access point await-ing pickup.
communicate with each other. Enabled by default.
The DTIM period that you specify indicates how often
Advanced Parameters
the clients served by this WAP device should check
Wireless Radio Select the desired radio from the list. for buffered data still on the access point awaiting
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz. pickup.
Worldwide Mode Worldwide Mode (802.11d) enables the access point For example, if you enter 1, clients check for buffered
(802.11d) to direct connected wireless devices to radio settings data on the access point at every beacon. If you enter
specific to where in the world the devices are in use. 10, clients check on every 10th beacon.
Channel Bandwidth You can select the channel bandwidth manually for RTS Threshold Enter the Request to Send (RTS) Threshold value, an
Wireless-N connections. When it is set to 20MHz, only integer from 1 to 2347. The default is 2347 octets.
20MHz channel is being used. The RTS threshold indicates the number of octets in
Guard Interval Select the guard interval manually for Wireless-N a Medium Access Control Protocol Data Unit (MPDU)
connections. The two options are Short (400 below which an RTS/CTS handshake is not performed.
nanoseconds) and Long (800 nanoseconds). The
Changing the RTS threshold can help control traffic
default is Auto.
flow through the access point, especially one with a
CTS Protection CTS (Clear-To-Send) Protection Mode boosts lot of clients. If you specify a low threshold value, RTS
Mode the access point’s ability to catch all Wireless-G packets are sent more frequently, which consumes
transmissions, but it severely decreases performance. more bandwidth and reduces the throughput of the
By default, CTS Protection Mode is disabled, but the packet. However, sending more RTS packets can help
access point will automatically enable this feature the network recover from interference or collisions
when Wireless-G devices are not able to transmit that might occur on a busy network, or on a network
to the access point in an environment with heavy experiencing electromagnetic interference.
802.11b traffic.

25
Linksys CHAPTER 2 Access Point Setup

Fragmentation
Threshold Enter the fragmentation threshold, an integer from
256 to 2346. The default is 2346.
The fragmentation threshold is a way of limiting the
size of packets (frames) transmitted over the network.
If a packet exceeds the fragmentation threshold you
set, the fragmentation function is activated and the
packet is sent as multiple 802.11 frames.
If the packet being transmitted is equal to or less than
the threshold, fragmentation is not used. Setting the
threshold to the largest value (2,346 bytes, which is
the default) effectively disables fragmentation.
Fragmentation involves more overhead because of
the extra work of dividing up and reassembling of
frames it requires, and because it increases message
traffic on the network. However, fragmentation can
help improve network performance and reliability if
properly configured.
Output Power Select the output power of the access point. If many
access points exist, lower power can reduce the signal
interference among them.

26
Linksys Chapter 3 Operation and Status

Chapter 3 Operation and Status Data - System Summary Screen


System Summary
Device SKU The SKU is often used to identify device model
number and region.
Firmware Version The version of the firmware currently installed.
Operation Firmware Checksum The checksum of the firmware running in the
access point.
You may need to perform the following operations on a regular basis.
Local MAC Address The MAC (physical) address of the wireless
• If using the Access Control feature, update the Trusted PC database as access point.
required. (See Access Control in Chapter 2 for details.)
Serial Number The serial number of the device.
• If using 802.1x mode, update the User Login data on the Windows 2000
Host Name The host name assigned to the access point.
Server, and configure the client PCs, as required.
System Up Time How long the system has been running since the
last restart or reboot.
System Summary System Time The current date and time.
Power Source The power source of the access point. It can be
Provides system status of the access point.
Power over Ethernet (PoE) or Power Adapter.
When two power sources are plugged in, PoE
has higher precedence.
Buttons
Refresh Click to update the data on the screen.

Figure 32: System Summary Screen

27
Linksys Chapter 3 Operation and Status

LAN Status Untagged VLAN ID Displays the untagged VLAN ID. Traffic on
the VLAN that you specify in this field is not
LAN Status displays settings, and status of LAN interface. be tagged with a VLAN ID when forwarded
to the network. VLAN 1 is the default ID for
untagged VLAN.
Management VLAN Displays the Management VLAN ID. The
VLAN associated with the IP address you
use to connect to the access point. Provide
a number between 1 and 4094 for the
Management VLAN ID. The default is 1.
This VLAN is also the default untagged VLAN.
If you already have a management VLAN
configured on your network with a different
VLAN ID, you must change the VLAN ID of the
management VLAN on the access point.
IPv4/v6
IP Address The IP address of the wireless access point.
Figure 33: LAN Status Screen
Subnet Mask The Network Mask (Subnet Mask) for the IP
address above.
Data - LAN Status Default Gateway Enter the gateway for the LAN segment to
which the wireless access point is attached
(the same value as the PCs on that LAN
segment).
VLAN
Primary DNS The primary DNS address provided by the
VLAN Enabled or disabled (default). DHCP server or configured manually.
Untagged VLAN Enabled (default) or disabled. Secondary DNS The secondary DNS address provided by the
If enabled (default), traffic is untagged when DHCP server or configured manually.
VLAN ID is equal to Untagged VLAN ID and
untagged traffic can be accepted by LAN
port. If disabled, traffic from the LAN port is
always tagged and only tagged traffic can be
accepted from LAN port.
By default all traffic on the access point uses
VLAN 1, the default untagged VLAN.

28
Linksys Chapter 3 Operation and Status

Wireless Status Status Status of the SSID, enabled or disabled.


Wireless Status displays settings and status of wireless radios and SSIDs. MAC Address MAC address of the SSID.
VLAN ID VLAN ID of the SSID.
Priority The 802.1p priority of the SSID.
Scheduler State Current scheduler status of the SSID.
• N/A
No scheduler is enabled on the SSID, or the SSID is
disabled by administrator.
• Active
The SSID is enabled.
• Inactive
The SSID is disabled.
Workgroup Bridge Status
Status Status of the Workgroup Bridge: enabled or disabled.
Local MAC MAC address of the Workgroup Bridge.
Figure 34: Wireless Status Screen Remote SSID SSID of the destination access point on the other end
of the Workgroup Bridge link to which data is sent
and from which data is received.
Remote MAC MAC address of the destination access point on the
Data - Wireless Status other end of the Workgroup Bridge link to which data
is sent and from which data is received.
Connection Status Status of the Workgroup Bridge: disabled, connected
Radio Status or not connected.
Wireless Radio Select the desired radio from the list.
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
Radio Status Indicates whether the radio is enabled.
Mode Current 802.11mode (a/b/g/n) of the radio.
Channel The channel currently in use.
Channel Bandwidth Current channel bandwidth of the radio.
SSID Status
Interface SSID index.
SSID Name Name of the SSID.

29
Linksys Chapter 3 Operation and Status

Wireless Clients Statistics


Wireless Clients screen displays a list of connected clients based on each wireless Statistics provides real-time transmitted and received statistics data based on
interface. each SSID per Radio, and LAN interface.

Figure 36: Statistics Screen


Figure 35: Wireless Clients Screen
Data - Statistics
Data - Wireless Clients Wireless Radio Select the desired radio from the list.

Wireless Interface Select the desired interface from the list. The interfaces Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
include 8 SSIDs per radio. Transmit/Receive •• Total Packets - The total packets sent (in Transmit
table) or received (in Received table) by the interface.
SSID Name Name of the SSID to which the client connects.
•• Total Bytes - The total bytes sent (in Transmit table) or
Client MAC The MAC address of the client.
received (in Received table) by the interface.
SSID MAC MAC of the SSID to which the client connects.
•• Total Dropped Packets - The total number of dropped
Link Rate The link rate of the client. Unit is Mbps. packets sent (in Transmit table) or received (in
RSSI The signal strength of the client. Unit is dBm. Received table) by the interface.
Online Time How long this client has been online. Unit is seconds. •• Total Dropped Bytes - The total number of dropped
bytes sent (in Transmit table) or received (in Received
table) by the interface.
•• Errors - The total number of errors related to sending
and receiving data on this interface.

30
Linksys Chapter 3 Operation and Status

Log View
Log View shows a list of system events that are generated by each single log
entry, such as login attempts and configuration changes.

Figure 37: Log View Screen

Data - Log View


Log Messages
Log Messages Show the log messages.
Buttons
Refresh Update the data on screen.
Save Save the log to a file on your PC.
Clear Delete the existing logs from device.

31
Linksys Chapter 4 Access Point Management

Chapter 4 Access Point


Management

Overview
This chapter covers features available on the wireless access point’s Maintenance
menu.
• Maintenance
• Firmware Upgrade
• Configuration Backup/Restore
• Factory Default Figure 38: Firmware Upgrade Screen
• Reboot To perform the firmware upgrade from local PC:
• Diagnostics 1. Click the Browse button and navigate to the location of the upgrade file.
• Ping Test 2. Select the upgrade file. Its name will appear in the Upgrade File field.
• Packet Capture 3. Click the Upgrade button to commence the firmware upgrade.
• Diagnostic Log
To perform the firmware upgrade from TFTP server:
1. Enter the IPv4 address of the TFTP server and the source file. The source file
is the firm-ware filename you stored in your TFTP server.
Firmware Upgrade 2. Click the Upgrade button to commence the firmware upgrade.
The firmware (software) in the wireless access point can be upgraded by using
HTTP/HTTPS, or TFTP.
Check Linksys support website (http://www.linksys.com/business/support) and
download the latest firmware release to your storage such as PC. Then, perform
firmware upgrade by
following the steps below.
During firmware upgrade, do not power off device or disconnect Ethernet cable.
Device will reboot automatically after firmware upgrade is completed.

32
Linksys Chapter 4 Access Point Management

Configuration Backup/Restore
Configuration backup/restore allows you to download the configuration file
from device the access point to external storage. You can save to , e.g., your PC, Data - Configuration Backup/Restore Screen
or networked storage, or to upload a previously saved configuration file from
external storage to device your access point. It is highly recommended you Backup/Restore to/from Local PC
save one extra copy of the configuration file to external storage after you are Backup Configuration Once you have the access point working
done with access point setup. properly, you should back up the settings to
a file on your computer. You can later restore
the access point’s settings from this file, if
necessary.
To create a backup file of the current settings:
•• Click Backup.
•• If you don’t have your browser set up
to save downloaded files automatically,
locate where you want to save the file,
rename it if you like, and click Save.
Restore Configuration To restore settings from a backup file:
•• Click Browse.
•• Locate and select the previously saved
backup file.
•• Click Restore
Backup/Restore to/from TFTP server
Figure 39: Configuration Backup/Restore Screen
Backup Configuration To create a backup file of the current settings:
•• Enter the destination file name you plan
to save in TFTP server.
•• Enter the IPv4 address for the TFTP server.
•• Click Backup
Restore Configuration To restore settings from a backup file:
•• Enter the source file name stored in TFTP
server.
•• Enter the IPv4 address for the TFTP server.
•• Click Restore

33
Linksys Chapter 4 Access Point Management

Factory Default
It’s highly recommended you save your current configuration file before you Reboot
restore to factory default settings. To save your current configuration file, click
Reboot power cycles the device. The current configuration file will remain
Maintenance → Configuration Backup/Restore.
after reboot.

Figure 40: Factory Default Screen


Figure 41: Reboot Screen

Data - Factory Default Screen


Data - Reboot Screen
Factory Default If Yes radio button is clicked and Save button is pressed,
your current configuration file will be deleted, and the Device Reboot If Yes radio button is checked, device will power cycle after
system will reboot. The access point will go back to Save button is pressed.
factory default mode after reboot.

34
Linksys Chapter 4 Access Point Management

Ping Test Packet Capture


Ping Test is used to determine the accessibility of a host on the network. Packet Capture is used to capture and store 802.3 packets received and
transmitted by the access point based on one specified network interface.
Network interface can be radio, SSID or LAN.

Figure 42: Ping Test Screen

Figure 43: Packet Size Screen


Data - Ping Test Screen
General Data - Packet Size Screen
IP Type Enter the IP type of destination address.
Network Interface Select the desired network interface from the drop-
IP or URL Address Enter the IP address or domain name that you want down list. The interface can be Wireless Radio, SSID or
to ping. Ethernet.
Packet Size Enter the size of the packet. Start Capture Click it to start the capture. You will be asked to specify
Times to Ping Select the desired number from the drop-list. a local file to store the packets.
•• 5 Stop Capture Click it to stop the capture.
•• 10
•• 15
•• Unlimited

35
Linksys Chapter 4 Access Point Management

Diagnostic Log
Diagnostic Log provides system detail information, such as configuration file,
system status and statistics data, hardware information, operational status. The
information is useful in troubleshooting and working with technical support.

Figure 44: Diagnostic Screen

Data - Diagnostic Screen


Download Click to download the device diagnostic log into a local file.

36
Linksys Appendix A Troubleshooting

Appendix A Troubleshooting

Overview
This chapter covers some common problems encountered while using the
wireless access point, and some possible solutions to them. If you follow the
suggested steps and the wireless access point still does not function properly, Figure 45: Ping
contact your dealer for further advice. If your PC uses a Fixed (Static) IP address, ensure that it is using an IP address
that is in the network segment (subnet) with the wireless access point. On
Windows PCs, you can use Control Panel->Network to check the Properties for
General Problems the TCP/IP protocol.
Problem 1: I can’t find new access point on my network. If there is no DHCP Server found, the wireless access point will roll back to an IP
address and mask of 192.168.1.252 and 255.255.255.0.
Solution 1 : Check the following.
Problem 2: My PC can’t connect to the LAN via the wireless access point.
• The wireless access point is properly installed, LAN connections are OK,
and it is powered ON. Check the LEDs for system and port status. Solution 2: Check the following:
• Ensure that your PC and the wireless access point are on the same network • The SSID and security settings on the PC match the settings on the wireless
segment. (If you don’t have a router, this must be the case.) access point.
• You can use the following method to determine the IP address of the • On the PC, the wireless mode is set to “Infrastructure”
wireless access point, and then try to connect using the IP address, in- • If using the Access Control feature, the PC’s name and address is in the
stead of the name. Trusted Stations list.
To find the access point’s IP address • If using 802.1x mode, ensure the PC’s 802.1x software is configured correct-
1. Open a MS-DOS Prompt or Command Prompt Window. ly. See Appendix C for details of setup for the Windows XP 802.1x client. If
using a different client, refer to the vendor’s documentation.
2. Use the Ping command to ping the wireless access point. Enter ping
followed by the default name of the wireless access point. Default name is
a string with “lap” and the last 5 characters of device MAC address.
e.g.
ping lap964d6
3. Check the output of the ping command to determine the IP address of the
wireless access point, as shown below.

37
Linksys Appendix B About Wireless LANs

Appendix B About Wireless LANs SSID/ESSID

BSS/SSID
A group of wireless stations and a single access point, all using the same ID (SSID),
form a Basic Service Set (BSS).
Overview
Using the same SSID is essential. Devices with different SSIDs are unable to
Wireless networks have their own terms and jargon. It is necessary to understand communicate with each other.
many of these terms in order to configure and operate a wireless LAN.

ESS/ESSID
Wireless LAN Terminology A group of wireless stations, and multiple access points, all using the same ID
Modes (ESSID), form an Extended Service Set (ESS).
Wireless LANs can work in either of two (2) modes: Different access points within an ESS can use different channels. To reduce
• Ad-hoc interference, it is recommended that adjacent access points SHOULD use
different channels.
• Infrastructure
As wireless stations are physically moved through the area covered by an ESS,
Ad-hoc Mode they will automatically change to the access point that has the least interference
Ad-hoc mode does not require an access point or a wired (Ethernet) LAN. or best performance. This capability is called Roaming. (Access points do not
Wireless stations, e.g., notebook PCs with wireless cards communicate directly have or require roaming capabilities.)
with each other.
Infrastructure Mode
Channels
In Infrastructure Mode, one or more access points are used to connect wireless
stations, e.g., notebook PCs with wireless cards to a wired (Ethernet) LAN. The The wireless channel sets the radio frequency used for communication.
wireless stations can then access all LAN resources. • Access points use a fixed channel. You can select the channel used. This
allows you to choose a channel that provides the least interference and best
performance. For USA and Canada, the following channels are available.
NOTE
2.4GHz :
Access points can only function in Infrastructure Mode, and
can communicate only with wireless stations that are set to 2.412 to 2.462 GHz; 11 channels
Infrastructure Mode. 5GHz:
• 5.180 to 5.240 GHz; 4 channels
• 5.745 to 5.825 GHz; 5 channels

38
Linksys Appendix B About Wireless LANs

• If using multiple access points it is better if adjacent access points use If this option is used:
different channels to reduce interference. The recommended channel
• The access point must have a “client login” on the RADIUS server.
spacing between adjacent access points is five channels, e.g., use Channels
1 and 6, or 6 and 11. • Each user must have a “user login” on the RADIUS server.
• In “Infrastructure” Mode wireless stations normally scan all channels looking • Each user’s wireless client must support 802.1X and provide the login data
for an access point. If more than one access point can be used, the one with when required.
the strongest signal is used. (This can only happen within an ESS.) All data transmission is encrypted using the WPA standard. Keys are automatically
• If using Ad-hoc Mode (no access point) all wireless stations should be set generated, so no key input is required.
to use the same channel. However, most wireless stations will still scan all
channels to see if there is an existing Ad-hoc group they can join.
WPA2-Enterprise
This version of WPA2 requires a RADIUS server on your LAN to provide the client
WEP
authentication according to the 802.1X standard. Data transmissions are encrypted
WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is using the WPA2 standard.
transmitted. This is desirable because it is impossible to prevent snoopers from
receiving any data which is transmitted by your wireless stations. If the data is If this option is used:
encrypted, it is meaningless unless the receiver can decrypt it. • The access point must have a “client login” on the RADIUS server.
If WEP is used, the wireless stations and the wireless access point must have the • Each user must have a “user login” on the RADIUS server.
same settings.
• Each user’s wireless client must support 802.1X and provide the login data
when required.
WPA-PSK All data transmission is encrypted using the WPA2 standard. Keys are automatically
generated, so no key input is required.
In WPA-PSK, like WEP, data is encrypted before transmission. WPA is more secure
than WEP. The PSK (Pre-shared Key) must be entered on each wireless station.
The 256-bit encryption key is derived from the PSK, and changes frequently.
802.1x
This uses the 802.1X standard for client authentication, and WEP for data encryption.
WPA2-PSK If possible, you should use WPA-Enterprise instead, because WPA encryption is
much stronger than WEP encryption.
This is a further development of WPA-PSK, and offers even greater security, using
the AES (Advanced Encryption Standard) method of encryption. It should be If this option is used:
used if possible. • The access point must have a “client login” on the RADIUS server.
• Each user must have a “user login” on the RADIUS server.
WPA-Enterprise • Each user’s wireless client must support 802.1X and provide the login data
when required.
This version of WPA requires a RADIUS server on your LAN to provide the
client authentica-tion according to the 802.1X standard. Data transmissions are • All data transmission is encrypted using the WEP standard. You only have to
encrypted using the WPA standard. select the WEP key size; the WEP key is automatically generated.

39
Linksys Appendix C PC And Server Configuration

Appendix C PC And Server Using WPA2-PSK


For each of the following items, each wireless station must have the same
Configuration settings as the wireless access point.

Mode On each PC, the mode must be set to Infrastructure.


SSID (ESSID) This must match the value used on the wireless
access point.
Overview The default value is LinksysSMB24G for radio 1 and
All wireless stations need to have settings that match the wireless access point. These LinksysSMB5G for radio 2.
settings depend on the mode in which the access point is being used. Note The SSID is case sensitive.
• If using WEP or WPA2-PSK, it is only necessary to ensure that each wireless Wireless Security On each client, wireless security must be set to
station’s settings match those of the wireless access point, as described below. WPA2-PSK.
• For 802.1x modes, configuration is much more complex. The RADIUS server The Pre-shared Key entered on the access point must
must be configured correctly, and setup of each wireless station is also more also be entered on each wireless client.
complex.
The Encryption method (e.g. TKIP, AES) must be set to
Using WEP match the access point.

For each of the following items, each wireless station must have the same settings as
the wireless access point.
Mode On each PC, the mode must be set to Infrastructure.
SSID (ESSID) This must match the value used on the wireless access point.
The default value is LinksysSMB24G for radio 1 and
LinksysSMB5G for radio 2.
Note: The SSID is case sensitive.
Wireless Security •• Each wireless station must be set to use WEP data
encryption.
•• The key size (64 bit, 128 bit) must be set to match the
access point.
•• The key values on the PC must match the key values
on the access point.
Note:
On some systems, the key sizes may be shown as 40-bit
and 104-bit instead of 64-bit, 128-bit. This is because the
key input by the user is 24 bits less than the key size used
for encryption.

40
Linksys Appendix C PC And Server Configuration

Using WPA2-Enterprise 802.1x Server Setup (Windows 2000 Server)


This is the most secure and most complex system. This section describes using Microsoft Internet Authentication Server as the
WPA-Enterprise mode provides greater security and centralized management, RADIUS server, since it is the most common RADIUS server available that
but it is more complex to configure. supports the EAP-TLS authentica-tion method.
The following services on the Windows 2000 Domain Controller (PDC) are
Wireless Station Configuration also required.
For each of the following items, each wireless station must have the same • dhcpd
settings as the wireless access point.
• dns
Mode On each PC, the mode must be set to Infrastructure. • rras
SSID (ESSID) This must match the value used on the wireless
• webserver (IIS)
access point.
• RADIUS Server (Internet Authentication Service)
The default value is LinksysSMB24G for radio 1 and
LinksysSMB5G for radio 2. • Certificate Authority
Note The SSID is case sensitive.
802.1x Each client must obtain a certificate for authentication Windows 2000 Domain Controller Setup
for the RADIUS server.
Authentication 1. Run dcpromo.exe from the command prompt.
802.1x Typically, EAP-TLS is used. This is a dynamic key
2. Follow all of the default prompts, ensure that DNS is installed and enabled
system, so keys do NOT have to be entered on each
Encryption during installation.
wireless station.
Services Installation
You can also use a static WEP key (EAP-MD5). The
wireless access point supports both methods 1. Select the Control Panel -> Add/Remove Programs.
simultaneously. 2. Click Add/Remove Windows Components from the left side.
3. Ensure that the following components are selected.
RADIUS Server Configuration
Certificate Services. After enabling this, you will see a warning that the
If using WPA2-Enterprise mode, the RADIUS server on your network must be computer cannot be renamed and joined after installing certificate services.
configured as follows. Select Yes to select certificate services and continue
• It must provide and accept Certificates for user authentication. World Wide Web Server. Select World Wide Web Server on the Internet
• There must be a Client Login for the wireless access point itself. Information Services (IIS) component.

The wireless access point will use its default name as its client login name. From the Networking Services category, select Dynamic Host Configuration
(However, your RADIUS server may ignore this and use the IP address instead.) Protocol (DHCP), and Internet Authentication Service (DNS should already be
selected and installed).
The Shared Key, set on the Security Screen of the access point, must match the
Shared Secret value on the RADIUS server.
• Encryption settings must be correct.

41
Linksys Appendix C PC And Server Configuration

Figure 48: CA Screen

Figure 46: Components Screen 7. Click Next if you don’t want to change the CA’s configuration data.

4. Click Next. 8. Installation will warn you that Internet Information Services are running,
and must be stopped before continuing. Click OK, then Finish.
5. Select the Enterprise root CA, and click Next.
DHCP server configuration
1. Click on Start -> Programs -> Administrative Tools -> DHCP
2. Right-click on the server entry, and select New Scope.

Figure 47: Certification Screen


6. Enter the information for the Certificate Authority, and click Next.

Figure 49: DHCP Screen


42
Linksys Appendix C PC And Server Configuration

3. Click Next when the New Scope Wizard Begins. 10. For the parent domain, enter the domain you specified for the domain
controller setup, and enter the server’s address for the IP address.
4. Enter the name and description for the scope, click Next.
Click Next.
5. Define the IP address range. Change the subnet mask if necessary. Click Next.

Figure 51: DNS Screen


Figure 50: IP Address Screen
11. If you don’t want a WINS server, just click Next.
6. Add exclusions in the address fields if required. If no exclusions are required,
12. Select Yes, I want to activate this scope now. Click Next, then Finish.
leave it blank. Click Next.
13. Right-click on the server, and select Authorize. It may take a few minutes
7. Change the Lease Duration time if preferred. Click Next.
to complete.
8. Select Yes, I want to configure these options now, and click Next.
9. Enter the router address for the current subnet. The router address may be
left blank if there is no router. Click Next.

43
Linksys Appendix C PC And Server Configuration

Certificate Authority Setup 4. Select Start -> Programs -> Administrative Tools -> Active Directory Users
and Computers.
1. Select Start -> Programs -> Administrative Tools -> Certification Authority.
5. Right-click on your active directory domain, and select Properties.
2. Right-click Policy Settings, and select New -> Certificate to Issue.

Figure 52: Certificate Authority Screen


3. Select Authenticated Session and Smartcard Logon (select more than one Figure 54: Active Directory Screen
by holding down the Ctrl key). Click OK. 6. Select the Group Policy tab, choose Default Domain Policy then click Edit.

Figure 53: Template Screen

Figure 55: Group Policy Tab

44
Linksys Appendix C PC And Server Configuration

7. Select Computer Configuration -> Windows Settings -> Security Settings 10. Ensure that your Certificate Authority is checked, click Next.
-> Public Key Policies, right-click Automatic Certificate Request Settings -> 11. Review the policy change information and click Finish.
New -> Automatic Certifi-cate Request.
12. Click Start -> Run, type cmd and press enter.
Enter secedit /refreshpolicy machine_policy
This command may take a few minutes to take effect.

Internet Authentication Service (RADIUS) Setup


1. Select Start -> Programs -> Administrative Tools -> Internet Authentication
Service

2. Right-click on Clients, and select New Client.

Figure 56: Group Policy Screen


8. When the Certificate Request Wizard appears, click Next.
9. Select Computer, click Next.

Figure 58: Service Screen


3. Enter a name for the access point, click Next.
4. Enter the address or name of the wireless access point, and set the shared
secret, as entered on the Security Settings of the wireless access point.
5. Click Finish.
6. Right-click on Remote Access Policies, select New Remote Access Policy.
7. Assuming you are using EAP-TLS, name the policy eap-tls, and click Next.
8. Click Add...
If you don’t want to set any restrictions and a condition is required, select Day-
And-Time-Restrictions, and click Add...

Figure 57: Certificate Template Screen


45
Linksys Appendix C PC And Server Configuration

12. Select No if you don’t want to view the help for EAP. Click Finish.

Remote Access Login for Users


1. Select Start -> Programs -> Administrative Tools -> Active Directory Users
and Comput-ers.
2. Double click on the user who you want to enable.
3. Select the Dial-in tab, and enable Allow access. Click OK.

Figure 59: Attribute Screen


11. Click Edit Profile... and select the Authentication tab. Enable Extensible
Authentication Protocol, and select Smart Card or other Certificate. Deselect
other authentication meth-ods listed. Click OK.

Figure 61: Dial-in Screen

802.1x Client Setup on Windows XP


Windows XP ships with a complete 802.1x client implementation. If using
Windows 2000, you can install SP3 (Service Pack 3) to gain the same functionality.
If you don’t have either of these systems, you must use the 802.1x client software
provided with your wireless adapter. Refer to your vendor’s documentation for
setup instructions.
Figure 60: Authentication Screen
46
Linksys Appendix C PC And Server Configuration

The following instructions assume that:


• You are using Windows XP
• You are connecting to a Windows 2000 server for authentication.
• You already have a login (User-name and password) on the Windows 2000
server.

Client Certificate Setup


1. Connect to a network that doesn’t require port authentication.
2. Start your Web browser. In the Address box, enter the IP address of the
Windows 2000 Server, followed by /certsrv
e.g
http://192.168.0.2/certsrv
3. You will be prompted for a user name and password. Enter the User name
and Password assigned to you by your network administrator, and click OK.

Figure 63: Wireless CA Screen


5. Select User certificate request and select User Certificate, click Next.

Figure 62: Connect Screen


4. On the first screen (below), select Request a certificate, click Next.

Figure 64: Request Type Screen

47
Linksys Appendix C PC And Server Configuration

6. Click Submit. 8. You will receive a confirmation message. Click Yes.

Figure 67: Root Certificate Screen


9. Certificate setup is now complete.

802.1x Authentication Setup


1. Open the properties for the wireless connection, by selecting Start - Control
Panel - Network Connections.
2. Right-click on the Wireless Network Connection, and select Properties.
3. Select the Authentication Tab, and ensure that Enable network access
Figure 65: Identifying Information Screen control using IEEE 802.1X is selected, and Smart Card or other Certificate is
7. A message will be displayed and the certificate will be returned to you. selected from the EAP type.

Click Install this certificate.

Figure 66: Certificate Issued Screen Figure 68: Authentication Tab

48
Linksys Appendix C PC And Server Configuration

Encryption Settings 2. Select the wireless network from the Available Networks list, and click
Configure.
The encryption settings must match the access point’s on the wireless network
you wish to join. 3. Select and enter the correct values, as advised by your Network
Administrator.
• Windows XP will detect any available wireless networks, and allow you to
configure each network independently. For example, to use EAP-TLS, you would enable Data encryption, and click the
checkbox for the setting The key is provided for me automatically, as shown
• Your network administrator can advise you of the correct settings for each
below.
network. 802.1x networks typically use EAP-TLS. This is a dynamic key
system, so there is no need to enter key values.

Enabling Encryption
To enable encryption for a wireless network, follow this procedure.
1. Click on the Wireless Networks tab.

Figure 70: Properties Screen


Setup for Windows XP and 802.1x client is now complete.

Using 802.1x Mode (without WPA)


This is very similar to using WPA-Enterprise.
Figure 69: Wireless Networks Screen
The only difference is that on your client, you must NOT enable the setting The
key is provided for me automatically.

49
Linksys Appendix C PC And Server Configuration

Instead, you must enter the WEP key manually, ensuring it matches the WEP
key used on the access point.

Figure 71: Properties Screen

NOTE
On some systems, the 64-bit WEP key is shown as 40-bit and the
128-bit WEP key is shown as 104-bit. This difference arises because
the key input by the user is 24 bits less than the key size used for
encryption.

50
Visit linksys.com/support for award-winning
technical support

© 2014 Belkin International, Inc. and/or its affiliates. All rights reserved.
BELKIN, LINKSYS and many product names and logos are trademarks
of the Belkin group of companies. Third-party trademarks mentioned are
the property of their respective owners.

LNKPG-00090 Rev. A00

You might also like