54Mbps 802.11g Wireless Access Point Version 1.
Table of Contents Quick Start Guide Version 1.0 1. Package Content 2. Installing the 54Mbps 802.11g Wireless Access Point 3. Configuring the 54bps 802.11g Wireless Access Point 3.1 How to access the Web-based configuration Utility 3.2 Configuration: 3.2.1 Local Area Network settings: 3.2.2 Wireless settings 3.2.3 WDS links 3.2.4 Wireless Security 3.2.4.1 ACL 3.2.4.2 WEP 3.2.4.3 RADIUS 3.2.4.4 802.1x 3.2.4.5 WPA 3.3 Install Wizard 3.
Introduction The next-generation wireless LAN device – 54Mbps 802.11g Wireless Access Point, brings an extremely high performance to the wireless realm. Fully compliant with IEEE802.11g standard, the 54Mbps 802.11g Wireless Access Point also provides powerful features such as the WDS, WPA security, SNMP and more. Maximize network efficiency while minimizing your network investment and maintenance costs. 1.
3. Configuring the 54bps 802.11g Wireless Access Point The 54Mbps 802.11g Wireless Access Point allows configuration only via Web. 3.1 How to access the Web-based configuration Utility The following gives instructions guiding you through the installations of the Wireless Access Point. 1. Connect your computer to the Access Point either through wireless or wired connection. Please set a fixed IP address, within the range of 192.168.1.X (X can’t be 254), to your computer.
3.2.1 Local Area Network settings: Three selections are provided. If you plan to use any external DHCP server, select Dynamic. Otherwise set the LAN address to Static. Under the Static IP, you have the third choice to turn on the internal DHCP server. First enter the setting on the DHCP server page and enable the default DHCP server. Once DHCP is enabled, you have to make sure the IP address at the Static IP settings is in the range of the DHCP server in which the default DHCP server is usually enabled. 3.
enhancement in both mixed and g-only networks, you can also enable Prism Nitro mode by using Intersil’s packet bursting technology. The burst size is adjustable, usually the bigger burst packet, the more sharing of 11g transmission while a mixed network is introduced. You can also do something to logically hide the Access Point. By unclicking the broadcase SSID, your Access Point will refuse the connection request from whom is not aware the Network ID.
3.2.4 Wireless Security To protect your wireless intellectual property, it is important to secure your wireless connection. This Access Point is equipped a sophisticated security algorithm to protect against intruders entering your system or listening to the conversation over your network. 3.2.4.1 ACL You can assign different access rules for different users by adding the MAC address and the access rights which is to either accept or reject the connection. 3.2.4.
3.2.4.3 RADIUS RADIUS performs the authentication function required to check the credentials of users and intermediate Access Points and indicates whether the users are authorized to access the Access Points. Enabling RADIUS is therefore the first step toward building up an 802.1x-capable environment. Even more, it is also a must-do to accommodate the recently introduced Wi-Fi protected access (WPA-EAP) to wireless networks. Adding RADIUS information in your Access Points is quite simple.
3.2.4.5 WPA The Wi-Fi Protected Access (WPA) is currently the highest levels of security a wireless network can achieve. It is a subset of the security specification and has been introduced as an interim solution for most known security weaknesses in comparison to the plain WEP. TKIP, the successor to WEP, enhances the ability to eliminate the known vulnerabilities of WEP. It also introduced that enterprises that already have RADIUS in place can use WPA with 802.
country in order to comply with the regulation. Then select a specific SSID as your network identification. Client stations can roam freely using this product and other Access Point that have the same SSID. Also select a number for radio channel which determines the channel can be used to transmit and receive signals. Then setup your security policy by simply enabling the legacy WEP or the latest introduced WPA or just use the default setting that allow any client to associate with. 3.
FCC Information This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received; including interference that may cause undesired operation. Federal Communications Commission (FCC) Statement This Equipment has been tested and found to comply with the limits for a Class B and C digital device, pursuant to Part 15 of the FCC rules.
Limited Warranty This Warranty constitutes the sole and exclusive remedy of any buyer or reseller’s equipment and the sole and exclusive liability of the supplier in connection with the products and is in lieu of all other warranties, express, implied or statutory, including, but not limited to, any implied warranty of merchantability of fitness for a particular use and all other obligations or liabilities of the supplier.
Please complete the information below and include it along with your products. Name: Title: Company: Telephone: Fax: Email: City/State/Zipcode: Country: Product Name: Serial Number: MAC Address: Invoice Date: Product Description: If you have any further questions, please contact your local authorized reseller for support.