User Guide: LAPN600
User Guide: LAPN600
LAPN600
Linksys Table of Contents
Table of Contents
CHAPTER 1 QUICK START GUIDE . . . . . . . . . . . . . . . . . . . . . 1 Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 CHAPTER 3 OPERATION AND STATUS . . . . . . . . . . . . . . . . 27
Physical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Mounting Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 System Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
CHAPTER 2 ACCESS POINT SETUP . . . . . . . . . . . . . . . . . . . . 3 LAN Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Setup Using a Web Browser . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Setup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Log View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Time Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 CHAPTER 4 ACCESS POINT MANAGEMENT . . . . . . . . . . . . . 32
Log Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
SSL Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Configuration Backup/Restore . . . . . . . . . . . . . . . . . . . . . 33
Network Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Factory Default . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Basic Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Ping Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Packet Capture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Rogue AP Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Diagnostic Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Scheduler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 APPENDIX A TROUBLESHOOTING . . . . . . . . . . . . . . . . . . . 37
Scheduler Association . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Connection Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 General Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Rate Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 APPENDIX B ABOUT WIRELESS LANS . . . . . . . . . . . . . . . . . 38
QoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Workgroup Bridge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Wireless LAN Terminology . . . . . . . . . . . . . . . . . . . . . . . 38
ii
Linksys Table of Contents
iii
Linksys CHAPTER 1 Quick Start Guide
LED
Package Contents LED Color Activity Status
Green Blinking System is booting.
Solid System is normal; no wireless device
• Linksys Wireless Access Point
connected.
• Quick Start Guide Blue Blinking Software upgrade in process.
• Ethernet Cable Solid System is normal; at least one wireless
• AC Power Adapter device connected.
• CD with Documentation Red Solid Booting process or update failed; hard
reset or service required.
• Mounting Bracket
• Mounting Kit
• Ceiling Mount Back Plate Port and Button
• Drilling Layout Template Power Port - Connect the AC power adapter to this port.
NOTE: Use only the adapter that came with your access point.
Ethernet Port - Connect a wired network device to this port. This port supports
PoE (Power over Ethernet) with a PoE switch or PoE injector. LAPN600 is
powered on from an 802.3at compliant source.
NOTE: When both PoE and AC power adapter are connected to access point,
device will get power from PoE as higher precedence.
Using Cat5e or better cable is highly recommended.
Reset Button - Press and hold this button for less than 15 seconds to power
cycle device. Press and hold for longer than 15 seconds to reset the device to
factory default settings.
1
Linksys CHAPTER 1 Quick Start Guide
Mounting Guide 5. Connect the Ethernet cable and/or AC power adapter to your device
6. Slide the device into the bracket. Turn access point clockwise until it locks.
To avoid overheating, do not install your access point if ambient temperatures
exceed 104°F (40°C). Install on a flat, stable surface, near the center of your 7. Replace tile in ceiling.
wireless coverage area making sure not to block vents on the sides of the device
enclosure.
Ceiling Installation
1. Select ceiling tile for mounting and remove tile.
2. Position drilling layout template at the desired location.
3. Drill four screw holes and Ethernet cable hole on the surface of ceiling tile.
4. Place back plate on the opposite side of ceiling tile. Secure mounting
bracket to the ceiling tile with flathead screw and nut. Route the Ethernet
cable through the Ethernet cable hole.
2
Linksys CHAPTER 2 Access Point Setup
CHAPTER 2 Access Point Setup 3. Type in default username: admin, and password: admin.
4. Click Login to launch the browser-based setup and follow the on-screen
instructions.
Overview
This chapter describes the setup procedure to connect the wireless access
point to your LAN, and configure it as an access point for your wireless stations.
Wireless stations may also require configuration. For details, see Appendix C -
Wireless Station Configuration.
The wireless access point can be configured using a Web browser.
Make sure device is powered on before you continue setup. If LED light is off, Or, if your PC’s IP address is not compatible with this, you must
check that AC power adapter, or PoE cable, is properly connected on both ends. change your PC’s IP address to an unused value in the range
192.168.1.1 ~ 192.168.1.254, with a network mask of 255.255.255.0.
Access device’s browser-based setup:
See Appendix A - Windows TCP/IP for details for this procedure.
1. Use the included cable to connect the access point to your network via a
network switch or router.
2. Open a web browser on a computer connected to your network. Enter the
IP address of your access point. By factory default, the IP address will be
assigned by a DHCP server (usually the network router). If there is no DHCP
server on your network, the default IP address is 192.168.1.252/255.255.255.0.
Note: Use a computer hardwired to the same network as your access point for
browser-based setup access. Access to browser-based setup via WiFi is disabled
by default.
3
Linksys CHAPTER 2 Access Point Setup
Setup Wizard 5. On the IPv4 Address screen (Figure 4) configure the IP address of the device
then click Next. If you want to configure more than 4 SSIDs, please go to
The first time you connect to the wireless access point, run the Setup Wizard to Configuration → Wireless → Basic Settings. The access point supports up
configure the device. to 8 SSIDs per radio.
1. Click the Quick Start link on the main menu
6. Set the SSID information on the Wireless Network screen. Click Next.
5
Linksys CHAPTER 2 Access Point Setup
7
Linksys CHAPTER 2 Access Point Setup
Figure 12: Management Access Screen From Wireless Enable wireless devices to connect to access
point’s admin page. Disabled by default.
Access Control By default, no IP addresses are prohibited from
accessing the device’s admin page. You can
enable access control and enter specified IP
addresses for access. Four IPv4 and four IPv6
addresses can be specified.
SNMP Settings
SNMP Simple Network Management Protocol (SNMP) is
a network monitoring and management protocol.
Enable or disable SNMP function here. Disabled by
default.
Contact Enter contact information for the access point.
The contact includes 1 to 32 characters. Special
characters are allowed.
8
Linksys CHAPTER 2 Access Point Setup
Location Enter the area or location where the access point SSL Certificate
resides.
This screen can be used to manage SSL certificate used by HTTPS.
The location includes 1 to 32 characters. Special
characters are allowed.
SNMPv1/v2 Settings
Get Community Enter the name of Get Community. Get Community
is used to read data from the access point and not
for writing data into the access point.
Get Community includes 1 to 32 characters.
Special characters are allowed.
Set Community Enter the name of Set Community. Set Community
is used to write data into the access point.
The Set Community includes 1 to 32 characters.
Special characters are allowed.
SNMPv3 Settings
SNMPv3 Settings Configure the SNMPv3 settings if you want to use
SNMPv3.
Username: Enter the username. It includes 0 to 32
characters. Special characters are allowed.
Authentication Protocol: None or HMAC-MD5. Figure 13: SSL Certificate Screen
10
Linksys CHAPTER 2 Access Point Setup
Advanced
Use this screen to configure advanced network settings of the access point.
Port Settings
Auto Negotiation If enabled, Port Speed and Duplex Mode will become
grey and cannot be configured. If disabled, Port Speed
and Duplex Mode can be configured.
Operational Auto Current Auto Negotiation mode of the Ethernet port.
Negotiation
Port Speed Select the speed of the Ethernet port. Available only
when Auto Negotiation is disabled. The option can be
10M, 100M or 1000M (default).
Operational Port Displays the current port speed of the Ethernet port.
Speed
Duplex Mode Select the duplex mode of the Ethernet port. Available
only when Auto Negotiation is disabled. The option
can be Half or Full (default).
Operational Displays the current duplex mode of the Ethernet port.
Duplex Mode
Flow Control Enable or disable flow control of the Ethernet port.
802.1x Supplicant
Figure 15: Advanced Screen
802.1x Supplicant Enable if your network requires this access point to use
802.1X authentication in order to operate.
12
Linksys CHAPTER 2 Access Point Setup
Data - Wireless Basic Settings Screen Broadcast Enable or disable the broadcast of the SSID.
Basic Wireless Settings When the access point does not broadcast its SSID,
the network name is not shown in the list of available
Wireless Radio Select the wireless radio from the list. networks on a client station. In-stead, you must enter
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz. the exact network name manually into the wireless
connection utility on the client so that it can connect.
Enable Radio Enable or disable the wireless radio.
Isolation Enable or disable isolation among clients of the SSID.
Wireless Mode Select the desired option for radio 1: If enabled, wireless clients cannot communicate with
•• G only - allow connection by 802.11G wireless stations others in the same SSID.
only. Disabled by default.
•• N only - allow connection by 802.11N wireless stations VLAN ID Enter the VLAN ID of the SSID.
only.
Used to tag packets which are received from the wireless
•• B/G-Mixed - allow connection by 802.11B and G wireless clients of the SSID and sent from Ethernet or Workgroup
stations only. Bridge interfaces.
•• B/G/N-Mixed (Default) - allow connections by 802.11N, Applicable only when VLAN function is enabled. VLAN
802.11B and 802.11G wireless stations. function can be configured in Configuration → LAN →
Select the desired option for radio 2: Network Setup screen.
•• A only - allow connection by 802.11A wireless stations Max Clients Enter the number of clients that can connect to the SSID.
only. The range is from 0 to 32, and 0 means no limit.
13
Linksys CHAPTER 2 Access Point Setup
Security Settings • WPA2-Personal - This is a further development of WPA-PSK, and offers even
greater security, using the AES (Advanced Encryption Standard) method.
Use this screen to configure security settings of SSIDs to provide data protection This method, sometimes called “Mixed Mode”, allows clients to use either
over the wireless network. WPA-Personal (with TKIP) or WPA2-Personal (with AES).
• WPA2-Enterprise - Requires a RADIUS Server on your LAN to provide the
client authentication according to the 802.1x standard. Data transmissions
are encrypted using the WPA2 standard.
If this option is selected:
• This access point must have a client login on the RADIUS Server.
• Each user must authenticate on the RADIUS Server. This is usually done
using digital certificates.
• Eachuser’swirelessclientmustsupport802.1xandprovidetheRADIUS
authentica-tion data when required.
• All data transmission is encrypted using the WPA2 standard. Keys are
automatically generated, so no key input is required.
• RADIUS - RADIUS mode utilizes RADIUS server for authentication and
dynamic WEP key generation for data encryption.
Security Settings
• Disabled - No security. Anyone using the correct SSID can connect to
your network.
• WEP - The 802.11b standard. Data is encrypted before transmission, but
the encryption system is not very strong.
14
Linksys CHAPTER 2 Access Point Setup
15
Linksys CHAPTER 2 Access Point Setup
16
Linksys CHAPTER 2 Access Point Setup
17
Linksys CHAPTER 2 Access Point Setup
18
Linksys CHAPTER 2 Access Point Setup
Rogue AP Detection Wireless Radio Select the desired radio from the list.
Rogue AP detection is used to detect the unexpected or unauthorized access Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
point installed in a secure network environment. Rogue AP Enable or disable Rogue AP Detection on the selected radio.
Detected Rogue AP List
Action Click Trust to move the AP to the Trusted AP List.
MAC Address The MAC address of the Rogue AP.
SSID The SSID of the Rogue AP.
Channel The channel of the Rogue AP.
Security The security method of the Rogue AP.
Signal The signal level of the Rogue AP.
Trusted AP List
Action Click Untrust to move the AP to the Rogue AP List.
MAC Address The MAC address of the Trusted AP.
SSID The SSID of the Trusted AP.
Channel The channel of the Trusted AP.
Security The security method of the Trusted AP.
Figure 24: Rogue AP Screen Signal The signal level of the Trusted AP.
New MAC Add one trusted AP by MAC address.
Address
19
Data - Rogue AP Screen
Linksys CHAPTER 2 Access Point Setup
Data - Scheduler Association Screen SSID Select the desired SSID from the list.
Wireless Radio Select the desired radio from the list. Connection Type Select the option from the drop-down list as desired.
•• Local: Choose either Allow only following MAC addresses
Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz. to connect to wireless network or Prevent following MAC
Scheduler Association addresses from connection to wireless network. You can
enter up to 20 MAC addresses of wireless stations or
SSID The index of SSID. choose the MAC address.
SSID Name The name of the SSID. •• RADIUS
Profile Name Choose the profile that is associated with the SSID. Primary/Backup RADIUS Server - Enter the IP address of the
If the profile associated with the SSID is deleted, then the RADIUS Server.
association will be removed. Primary/Backup RADIUS Server Port – Enter the Port number
of the RADIUS Server.
If “None” is selected, it means no scheduler profile is
Primary/Backup Shared Secret - This is shared between
associated. the wireless access point and the RADIUS Server while
Interface Status The Status of the SSID. It can be Enabled or Disabled. authenticating the device attempting to connect.
Scheduler only works when the SSID is enabled. •• Disabled
21
Linksys CHAPTER 2 Access Point Setup
22
Linksys CHAPTER 2 Access Point Setup
24
Linksys CHAPTER 2 Access Point Setup
25
Linksys CHAPTER 2 Access Point Setup
Fragmentation
Threshold Enter the fragmentation threshold, an integer from
256 to 2346. The default is 2346.
The fragmentation threshold is a way of limiting the
size of packets (frames) transmitted over the network.
If a packet exceeds the fragmentation threshold you
set, the fragmentation function is activated and the
packet is sent as multiple 802.11 frames.
If the packet being transmitted is equal to or less than
the threshold, fragmentation is not used. Setting the
threshold to the largest value (2,346 bytes, which is
the default) effectively disables fragmentation.
Fragmentation involves more overhead because of
the extra work of dividing up and reassembling of
frames it requires, and because it increases message
traffic on the network. However, fragmentation can
help improve network performance and reliability if
properly configured.
Output Power Select the output power of the access point. If many
access points exist, lower power can reduce the signal
interference among them.
26
Linksys Chapter 3 Operation and Status
27
Linksys Chapter 3 Operation and Status
LAN Status Untagged VLAN ID Displays the untagged VLAN ID. Traffic on
the VLAN that you specify in this field is not
LAN Status displays settings, and status of LAN interface. be tagged with a VLAN ID when forwarded
to the network. VLAN 1 is the default ID for
untagged VLAN.
Management VLAN Displays the Management VLAN ID. The
VLAN associated with the IP address you
use to connect to the access point. Provide
a number between 1 and 4094 for the
Management VLAN ID. The default is 1.
This VLAN is also the default untagged VLAN.
If you already have a management VLAN
configured on your network with a different
VLAN ID, you must change the VLAN ID of the
management VLAN on the access point.
IPv4/v6
IP Address The IP address of the wireless access point.
Figure 33: LAN Status Screen
Subnet Mask The Network Mask (Subnet Mask) for the IP
address above.
Data - LAN Status Default Gateway Enter the gateway for the LAN segment to
which the wireless access point is attached
(the same value as the PCs on that LAN
segment).
VLAN
Primary DNS The primary DNS address provided by the
VLAN Enabled or disabled (default). DHCP server or configured manually.
Untagged VLAN Enabled (default) or disabled. Secondary DNS The secondary DNS address provided by the
If enabled (default), traffic is untagged when DHCP server or configured manually.
VLAN ID is equal to Untagged VLAN ID and
untagged traffic can be accepted by LAN
port. If disabled, traffic from the LAN port is
always tagged and only tagged traffic can be
accepted from LAN port.
By default all traffic on the access point uses
VLAN 1, the default untagged VLAN.
28
Linksys Chapter 3 Operation and Status
29
Linksys Chapter 3 Operation and Status
Wireless Interface Select the desired interface from the list. The interfaces Radio 1 is for 2.4 GHz, and Radio 2 is for 5 GHz.
include 8 SSIDs per radio. Transmit/Receive •• Total Packets - The total packets sent (in Transmit
table) or received (in Received table) by the interface.
SSID Name Name of the SSID to which the client connects.
•• Total Bytes - The total bytes sent (in Transmit table) or
Client MAC The MAC address of the client.
received (in Received table) by the interface.
SSID MAC MAC of the SSID to which the client connects.
•• Total Dropped Packets - The total number of dropped
Link Rate The link rate of the client. Unit is Mbps. packets sent (in Transmit table) or received (in
RSSI The signal strength of the client. Unit is dBm. Received table) by the interface.
Online Time How long this client has been online. Unit is seconds. •• Total Dropped Bytes - The total number of dropped
bytes sent (in Transmit table) or received (in Received
table) by the interface.
•• Errors - The total number of errors related to sending
and receiving data on this interface.
30
Linksys Chapter 3 Operation and Status
Log View
Log View shows a list of system events that are generated by each single log
entry, such as login attempts and configuration changes.
31
Linksys Chapter 4 Access Point Management
Overview
This chapter covers features available on the wireless access point’s Maintenance
menu.
• Maintenance
• Firmware Upgrade
• Configuration Backup/Restore
• Factory Default Figure 38: Firmware Upgrade Screen
• Reboot To perform the firmware upgrade from local PC:
• Diagnostics 1. Click the Browse button and navigate to the location of the upgrade file.
• Ping Test 2. Select the upgrade file. Its name will appear in the Upgrade File field.
• Packet Capture 3. Click the Upgrade button to commence the firmware upgrade.
• Diagnostic Log
To perform the firmware upgrade from TFTP server:
1. Enter the IPv4 address of the TFTP server and the source file. The source file
is the firm-ware filename you stored in your TFTP server.
Firmware Upgrade 2. Click the Upgrade button to commence the firmware upgrade.
The firmware (software) in the wireless access point can be upgraded by using
HTTP/HTTPS, or TFTP.
Check Linksys support website (http://www.linksys.com/business/support) and
download the latest firmware release to your storage such as PC. Then, perform
firmware upgrade by
following the steps below.
During firmware upgrade, do not power off device or disconnect Ethernet cable.
Device will reboot automatically after firmware upgrade is completed.
32
Linksys Chapter 4 Access Point Management
Configuration Backup/Restore
Configuration backup/restore allows you to download the configuration file
from device the access point to external storage. You can save to , e.g., your PC, Data - Configuration Backup/Restore Screen
or networked storage, or to upload a previously saved configuration file from
external storage to device your access point. It is highly recommended you Backup/Restore to/from Local PC
save one extra copy of the configuration file to external storage after you are Backup Configuration Once you have the access point working
done with access point setup. properly, you should back up the settings to
a file on your computer. You can later restore
the access point’s settings from this file, if
necessary.
To create a backup file of the current settings:
•• Click Backup.
•• If you don’t have your browser set up
to save downloaded files automatically,
locate where you want to save the file,
rename it if you like, and click Save.
Restore Configuration To restore settings from a backup file:
•• Click Browse.
•• Locate and select the previously saved
backup file.
•• Click Restore
Backup/Restore to/from TFTP server
Figure 39: Configuration Backup/Restore Screen
Backup Configuration To create a backup file of the current settings:
•• Enter the destination file name you plan
to save in TFTP server.
•• Enter the IPv4 address for the TFTP server.
•• Click Backup
Restore Configuration To restore settings from a backup file:
•• Enter the source file name stored in TFTP
server.
•• Enter the IPv4 address for the TFTP server.
•• Click Restore
33
Linksys Chapter 4 Access Point Management
Factory Default
It’s highly recommended you save your current configuration file before you Reboot
restore to factory default settings. To save your current configuration file, click
Reboot power cycles the device. The current configuration file will remain
Maintenance → Configuration Backup/Restore.
after reboot.
34
Linksys Chapter 4 Access Point Management
35
Linksys Chapter 4 Access Point Management
Diagnostic Log
Diagnostic Log provides system detail information, such as configuration file,
system status and statistics data, hardware information, operational status. The
information is useful in troubleshooting and working with technical support.
36
Linksys Appendix A Troubleshooting
Appendix A Troubleshooting
Overview
This chapter covers some common problems encountered while using the
wireless access point, and some possible solutions to them. If you follow the
suggested steps and the wireless access point still does not function properly, Figure 45: Ping
contact your dealer for further advice. If your PC uses a Fixed (Static) IP address, ensure that it is using an IP address
that is in the network segment (subnet) with the wireless access point. On
Windows PCs, you can use Control Panel->Network to check the Properties for
General Problems the TCP/IP protocol.
Problem 1: I can’t find new access point on my network. If there is no DHCP Server found, the wireless access point will roll back to an IP
address and mask of 192.168.1.252 and 255.255.255.0.
Solution 1 : Check the following.
Problem 2: My PC can’t connect to the LAN via the wireless access point.
• The wireless access point is properly installed, LAN connections are OK,
and it is powered ON. Check the LEDs for system and port status. Solution 2: Check the following:
• Ensure that your PC and the wireless access point are on the same network • The SSID and security settings on the PC match the settings on the wireless
segment. (If you don’t have a router, this must be the case.) access point.
• You can use the following method to determine the IP address of the • On the PC, the wireless mode is set to “Infrastructure”
wireless access point, and then try to connect using the IP address, in- • If using the Access Control feature, the PC’s name and address is in the
stead of the name. Trusted Stations list.
To find the access point’s IP address • If using 802.1x mode, ensure the PC’s 802.1x software is configured correct-
1. Open a MS-DOS Prompt or Command Prompt Window. ly. See Appendix C for details of setup for the Windows XP 802.1x client. If
using a different client, refer to the vendor’s documentation.
2. Use the Ping command to ping the wireless access point. Enter ping
followed by the default name of the wireless access point. Default name is
a string with “lap” and the last 5 characters of device MAC address.
e.g.
ping lap964d6
3. Check the output of the ping command to determine the IP address of the
wireless access point, as shown below.
37
Linksys Appendix B About Wireless LANs
BSS/SSID
A group of wireless stations and a single access point, all using the same ID (SSID),
form a Basic Service Set (BSS).
Overview
Using the same SSID is essential. Devices with different SSIDs are unable to
Wireless networks have their own terms and jargon. It is necessary to understand communicate with each other.
many of these terms in order to configure and operate a wireless LAN.
ESS/ESSID
Wireless LAN Terminology A group of wireless stations, and multiple access points, all using the same ID
Modes (ESSID), form an Extended Service Set (ESS).
Wireless LANs can work in either of two (2) modes: Different access points within an ESS can use different channels. To reduce
• Ad-hoc interference, it is recommended that adjacent access points SHOULD use
different channels.
• Infrastructure
As wireless stations are physically moved through the area covered by an ESS,
Ad-hoc Mode they will automatically change to the access point that has the least interference
Ad-hoc mode does not require an access point or a wired (Ethernet) LAN. or best performance. This capability is called Roaming. (Access points do not
Wireless stations, e.g., notebook PCs with wireless cards communicate directly have or require roaming capabilities.)
with each other.
Infrastructure Mode
Channels
In Infrastructure Mode, one or more access points are used to connect wireless
stations, e.g., notebook PCs with wireless cards to a wired (Ethernet) LAN. The The wireless channel sets the radio frequency used for communication.
wireless stations can then access all LAN resources. • Access points use a fixed channel. You can select the channel used. This
allows you to choose a channel that provides the least interference and best
performance. For USA and Canada, the following channels are available.
NOTE
2.4GHz :
Access points can only function in Infrastructure Mode, and
can communicate only with wireless stations that are set to 2.412 to 2.462 GHz; 11 channels
Infrastructure Mode. 5GHz:
• 5.180 to 5.240 GHz; 4 channels
• 5.745 to 5.825 GHz; 5 channels
38
Linksys Appendix B About Wireless LANs
• If using multiple access points it is better if adjacent access points use If this option is used:
different channels to reduce interference. The recommended channel
• The access point must have a “client login” on the RADIUS server.
spacing between adjacent access points is five channels, e.g., use Channels
1 and 6, or 6 and 11. • Each user must have a “user login” on the RADIUS server.
• In “Infrastructure” Mode wireless stations normally scan all channels looking • Each user’s wireless client must support 802.1X and provide the login data
for an access point. If more than one access point can be used, the one with when required.
the strongest signal is used. (This can only happen within an ESS.) All data transmission is encrypted using the WPA standard. Keys are automatically
• If using Ad-hoc Mode (no access point) all wireless stations should be set generated, so no key input is required.
to use the same channel. However, most wireless stations will still scan all
channels to see if there is an existing Ad-hoc group they can join.
WPA2-Enterprise
This version of WPA2 requires a RADIUS server on your LAN to provide the client
WEP
authentication according to the 802.1X standard. Data transmissions are encrypted
WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is using the WPA2 standard.
transmitted. This is desirable because it is impossible to prevent snoopers from
receiving any data which is transmitted by your wireless stations. If the data is If this option is used:
encrypted, it is meaningless unless the receiver can decrypt it. • The access point must have a “client login” on the RADIUS server.
If WEP is used, the wireless stations and the wireless access point must have the • Each user must have a “user login” on the RADIUS server.
same settings.
• Each user’s wireless client must support 802.1X and provide the login data
when required.
WPA-PSK All data transmission is encrypted using the WPA2 standard. Keys are automatically
generated, so no key input is required.
In WPA-PSK, like WEP, data is encrypted before transmission. WPA is more secure
than WEP. The PSK (Pre-shared Key) must be entered on each wireless station.
The 256-bit encryption key is derived from the PSK, and changes frequently.
802.1x
This uses the 802.1X standard for client authentication, and WEP for data encryption.
WPA2-PSK If possible, you should use WPA-Enterprise instead, because WPA encryption is
much stronger than WEP encryption.
This is a further development of WPA-PSK, and offers even greater security, using
the AES (Advanced Encryption Standard) method of encryption. It should be If this option is used:
used if possible. • The access point must have a “client login” on the RADIUS server.
• Each user must have a “user login” on the RADIUS server.
WPA-Enterprise • Each user’s wireless client must support 802.1X and provide the login data
when required.
This version of WPA requires a RADIUS server on your LAN to provide the
client authentica-tion according to the 802.1X standard. Data transmissions are • All data transmission is encrypted using the WEP standard. You only have to
encrypted using the WPA standard. select the WEP key size; the WEP key is automatically generated.
39
Linksys Appendix C PC And Server Configuration
For each of the following items, each wireless station must have the same settings as
the wireless access point.
Mode On each PC, the mode must be set to Infrastructure.
SSID (ESSID) This must match the value used on the wireless access point.
The default value is LinksysSMB24G for radio 1 and
LinksysSMB5G for radio 2.
Note: The SSID is case sensitive.
Wireless Security •• Each wireless station must be set to use WEP data
encryption.
•• The key size (64 bit, 128 bit) must be set to match the
access point.
•• The key values on the PC must match the key values
on the access point.
Note:
On some systems, the key sizes may be shown as 40-bit
and 104-bit instead of 64-bit, 128-bit. This is because the
key input by the user is 24 bits less than the key size used
for encryption.
40
Linksys Appendix C PC And Server Configuration
The wireless access point will use its default name as its client login name. From the Networking Services category, select Dynamic Host Configuration
(However, your RADIUS server may ignore this and use the IP address instead.) Protocol (DHCP), and Internet Authentication Service (DNS should already be
selected and installed).
The Shared Key, set on the Security Screen of the access point, must match the
Shared Secret value on the RADIUS server.
• Encryption settings must be correct.
41
Linksys Appendix C PC And Server Configuration
Figure 46: Components Screen 7. Click Next if you don’t want to change the CA’s configuration data.
4. Click Next. 8. Installation will warn you that Internet Information Services are running,
and must be stopped before continuing. Click OK, then Finish.
5. Select the Enterprise root CA, and click Next.
DHCP server configuration
1. Click on Start -> Programs -> Administrative Tools -> DHCP
2. Right-click on the server entry, and select New Scope.
3. Click Next when the New Scope Wizard Begins. 10. For the parent domain, enter the domain you specified for the domain
controller setup, and enter the server’s address for the IP address.
4. Enter the name and description for the scope, click Next.
Click Next.
5. Define the IP address range. Change the subnet mask if necessary. Click Next.
43
Linksys Appendix C PC And Server Configuration
Certificate Authority Setup 4. Select Start -> Programs -> Administrative Tools -> Active Directory Users
and Computers.
1. Select Start -> Programs -> Administrative Tools -> Certification Authority.
5. Right-click on your active directory domain, and select Properties.
2. Right-click Policy Settings, and select New -> Certificate to Issue.
44
Linksys Appendix C PC And Server Configuration
7. Select Computer Configuration -> Windows Settings -> Security Settings 10. Ensure that your Certificate Authority is checked, click Next.
-> Public Key Policies, right-click Automatic Certificate Request Settings -> 11. Review the policy change information and click Finish.
New -> Automatic Certifi-cate Request.
12. Click Start -> Run, type cmd and press enter.
Enter secedit /refreshpolicy machine_policy
This command may take a few minutes to take effect.
12. Select No if you don’t want to view the help for EAP. Click Finish.
47
Linksys Appendix C PC And Server Configuration
48
Linksys Appendix C PC And Server Configuration
Encryption Settings 2. Select the wireless network from the Available Networks list, and click
Configure.
The encryption settings must match the access point’s on the wireless network
you wish to join. 3. Select and enter the correct values, as advised by your Network
Administrator.
• Windows XP will detect any available wireless networks, and allow you to
configure each network independently. For example, to use EAP-TLS, you would enable Data encryption, and click the
checkbox for the setting The key is provided for me automatically, as shown
• Your network administrator can advise you of the correct settings for each
below.
network. 802.1x networks typically use EAP-TLS. This is a dynamic key
system, so there is no need to enter key values.
Enabling Encryption
To enable encryption for a wireless network, follow this procedure.
1. Click on the Wireless Networks tab.
49
Linksys Appendix C PC And Server Configuration
Instead, you must enter the WEP key manually, ensuring it matches the WEP
key used on the access point.
NOTE
On some systems, the 64-bit WEP key is shown as 40-bit and the
128-bit WEP key is shown as 104-bit. This difference arises because
the key input by the user is 24 bits less than the key size used for
encryption.
50
Visit linksys.com/support for award-winning
technical support
© 2014 Belkin International, Inc. and/or its affiliates. All rights reserved.
BELKIN, LINKSYS and many product names and logos are trademarks
of the Belkin group of companies. Third-party trademarks mentioned are
the property of their respective owners.