Escolar Documentos
Profissional Documentos
Cultura Documentos
BUSINESS SERIES
Wireless-G Exterior
Access Point with
Power Over Ethernet
Model: WAP200E
About This Guide
Online Resources
Most web browsers allow you to enter the web address
without adding the http:// in front of the address. This
User Guide will refer to websites without including http://
in front of the address. Some older web browsers may
require you to add it.
Resource Website
Linksys www.linksys.com
Glossary www.linksys.com/glossary
Chapter 1: Introduction 1
Chapter 2: Planning Your Wireless Network 2
Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Network Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Example of a Simple Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Chapter 4: Installation 6
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Personal Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Installation Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
External Antenna . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Installation Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Appendix A: Troubleshooting 25
Appendix B: Wireless Security Checklist 28
General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Appendix C: Glossary 29
Appendix D: Specifications 33
Appendix E: Warranty and Regulatory Information 35
Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Chapter 1:
Introduction
Thank you for choosing the Wireless-G Exterior Access
Point with Power Over Ethernet.
The Linksys Wireless-G Exterior Access Point with Power
Over Ethernet lets you connect Wireless-G (802.11g) or
Wireless-B (802.11b) devices to your wired network so you
can add PCs to the network with no cabling hassle. This
weather-proof Access Point creates a “wireless bubble” in
exterior spaces, like patios, pool areas, and outdoor cafés.
Power over Ethernet support makes it easy to install, and
you can create multiple SSIDs that connect to individual
VLANs to keep your traffic separated.
It’s also perfect for use as a bridge, a kind of “cable-less
cable” to connect remote areas together. Maybe your
warehouse is in a separate building from your offices. Or
maybe you need to connect the separate buildings of a
college campus. With one Wireless-G Exterior Access Point
on each building, you’re connected with no cable to run.
The exterior-rated case protects the access point, and
contains an internal antenna.
To protect your data and privacy, the Wireless-G Exterior
Access Point with Power Over Ethernet supports both
Wired Equivalent Privacy (WEP) and the industrial-strength
wireless security of Wi-Fi Protected Access™ (WPA),
encoding all your wireless transmissions with powerful
encryption. The MAC Address filter lets you decide exactly
who has access to your wireless network, and advanced
logging keeps you appraised. Configuration is a snap with
the web browser-based configuration utility.
The Linksys Wireless-G Exterior Access Point with Power
Over Ethernet is the best way to add wireless access to the
outdoor areas of your home or business.
Roaming
Infrastructure mode also supports roaming capabilities
for mobile users. Roaming means that you can move your
wireless PC within your network and the access points
will pick up the wireless PC’s signal, providing that they
both share the same wireless channel, SSID, and wireless
security settings.
Before you consider roaming, choose a feasible radio
channel and optimum access point position. Proper access
point positioning combined with a clear radio signal will Example of Simple Wireless Network
greatly enhance performance.
The above diagram shows a typical infrastructure
wireless network setup. The Wireless Access Points are
NOTE: Spanning Tree Protocol should be
connecting to a Linksys switch that provides power to
disabled on the switches connecting to the APs
the Access Points. Each Access Point can connect multiple
to allow roaming to work without disruption.
wireless devices to the network. This network will provide
connectivity among wireless network devices and PCs
Network Layout that have a wired connection to the switch.
The switch then can connect to a router that can connect
The Access Point has been designed for use with 802.11g
to an ISP for Internet access.
and 802.11b products, such as the Notebook Adapters
for your laptop computers, PCI Adapters for your desktop
PCs, and USB Adapters.
Front Panel
The Access Point’s LEDs, where information about network
activity is displayed, are located on the front panel.
Bottom Panel
Top Panel
The antenna port is located on the top panel of the Access
Point.
Top Panel
Ground
Overview
This chapter explains how to mount and connect the
Access Point.
Depending on your application, you might want to set
up the IP address of the device first before mounting
the device. Refer to “Chapter 5: Quick Configuration
Overview”.
Personal Installation
This product should be installed by a qualified installation
professional with RF and related rule knowledge. General
users should not attempt to install this product or modify
the settings.
Mark the Locations of the Two Wall-Mount Slots
Installation Location
3. Use four screws (included with the Access Point) to
The product should be installed in a location where the attach the mounting plate to the back panel of the
radiating antenna is at least 20 cm from anyone under Access Point.
normal operating conditions. This is required to meet
regulatory RF exposure requirements.
External Antenna
Use only antennas approved by Linksys. Antennas that have
not been approved by Linksys may produce unwanted
spurious or excessive RF transmitting power, this may lead
to violation of FCC limitations and is prohibited.
Installation Procedure
Follow the Hardware Installation instructions for details
on installing this product.
Hardware Installation
1. Locate an optimum location on a wall for the Access
Point. Refer to the antenna pattern in “Chapter 3:
Product Overview” to adjust the angle of the Access
Attach the Mounting Plate
Point for your application.
4. Connect the included Category 5e Ethernet network
cable to the Ethernet network port of the Access Point.
•• Setup On the Setup screen, enter your basic network The following briefly describes the main and sub tabs of
settings (IP address) here. the Utility.
AP Mode
Use this screen to configure the Access Point operation
mode with WDS (Wireless Distribution System).
Administration
You will use the Administration tabs to manage the Access
Point.
Management This screen allows you to customize the
password and Simple Network Management Protocol
(SNMP) settings.
Log Configure the Log settings for the Access Point on
this screen.
Factory Default Use this screen to reset the Access Point
to its factory default settings.
Firmware Upgrade Upgrade the Access Point’s firmware
on this screen.
Reboot Use this screen to reboot the Access Point.
Config Management You can back up the configuration
file for the Access Point, as well as save the backup
configuration file to the Access Point.
Status
You will be able to view status information for your local
network, wireless networks, and network performance.
Local Network This screen displays system information,
including software & hardware version, MAC address, and
IP address on the LAN side of the Access Point.
Wireless This screen displays wireless network settings
including SSID, network mode, and wireless channel.
System Performance This screen displays the current
traffic statistics of the Access Point’s Wireless and LAN
ports.
Address Bar
The first time you open the web‑based utility, enter Enter names for the Access Point. The host name can be
admin (the default username) in the User name field and used to access the Web Utility through the network if DNS
enter it again in the Password field. Click the OK button. has been set up. The device name is for the benefit of
You can change the Access Point’s password later from the identifying your Access Point after you log in.
Administration > Management screen.
Setup
Host Name This is the host name assigned to the Access
Point. This host name will be published to your DNS server
if the Access Point is configured to acquire the IP address
through DHCP. In that case, Linksys recommends to follow
the company policy on the host name assignment. The
Login Screen default name is Linksys.
Device Name You may assign any device name to
Web-Based Utility the Access Point. This name is only used by the Access
Point administrator for identification purposes. Unique,
The first screen that appears in the web-based utility is the memorable names are helpful, especially if you are
Setup screen. This allows you to change the Access Point’s employing multiple access points on the same network.
general settings. There are five tabs across the top of The default name is WAP200E.
the screen: Setup, Wireless, AP Mode, Administration,
and Status. Each tab contains screens that will help you Network Setup
configure and manage the Access Point.
The selections under this heading allow you to configure
the Access Point’s IP address setting(s).
IP Settings
Static IP Address Selected by default, this option is used
to assign a static or fixed IP address to the Access Point.
•• Local IP Address The IP address must be unique to your
network. The default IP address is 192.168.1.245.
•• Subnet Mask The Subnet Mask must be the same as
that set on the LAN that your Access Point is connected
to. The default is 255.255.255.0.
•• Default Gateway Enter the Default Gateway Address,
typically this is the IP address of your router.
•• Primary DNS (Required) and Secondary DNS to cancel your changes. Help information is available on
(Optional) Your ISP will provide you with at least one the right side of the screen.
DNS (Domain Name System) Server IP Address.
Automatic Configuration - DHCP If you have a DHCP Wireless > Basic Wireless Settings
server enabled on the LAN and want it to assign an IP Change the basic wireless network settings on this screen.
address to the Access Point, the select this option. The Access Point can connect to up to four wireless
Change these settings as described here and click Save networks (SSIDs) at the same time, so this screen offers
Settings to apply your changes, or click Cancel Changes settings for up to four different SSIDs. Each SSID owns its
to cancel your changes. Help information is available on own MAC address on this Access Point.
the right side of the screen.
Basic Settings
Configure the Wireless Network basic attributes for the
entire system and for each SSID.
Setup > Time
Wireless Network Mode Select one of the following
Time modes. The default is Mixed.
You can set the time either manually or automatically •• Disable To disable wireless connectivity completely.
from a time server if the Access Point can access the public This might be useful during system maintenance.
Internet. The default is to set the time Automatically.
•• B-Only All the wireless client devices can be
Manually Select this option to set the date and time connected to the Access Point at Wireless-B data rates
manually. with maximum speed at 11Mbps.
Automatically Select this option and time zone. The •• G-Only Wireless-G client devices can be connected at
Access Point will contact the public time server to get the Wireless-G data rates with maximum speed at 54Mbps.
current time. Wireless-B clients cannot be connected in this mode.
•• Automatically adjust clock for daylight saving •• Mixed Both Wireless-B and Wireless-G client devices
changes Select this option if you are in using the can be connected at their respective data rates.
Access Point in a location that observes daylight saving Wireless-G devices can be connected at Wireless-G
time. data rates.
•• User Defined NTP Server Enable this option if you Wireless Channel Select the appropriate channel to be
have set up local NTP server. Default is Disabled. used among your Access Point and your client devices.
When Auto is selected, your Access Point will select the
•• NTP Server IP Enter the IP address of user defined
channel with the lowest amount of wireless interference
NTP Server.
while the system is powering up. Auto channel selection
Change these settings as described here and click Save will start when you click Save Settings button, it will take
Settings to apply your changes, or click Cancel Changes several seconds to scan through all the channels to find
the best channel. The default setting is Auto.
Wireless-G Exterior Access Point with Power Over Ethernet 11
Chapter 6 Advanced Configuration
SSID Name The SSID is the unique name shared among Wireless Isolation (between SSID) Wireless Isolation
all devices in a wireless network. It is case-sensitive, must prevents eavesdropping in the network. When it is
not exceed 32 alphanumeric characters, and may be any Enabled, wireless frames received on this Access Point will
keyboard character. Make sure this setting is the same not be forwarded to other wireless networks (SSIDs). For
for all devices in your wireless network. The default SSID example, if you have a wireless hotspot, you may want to
name is linksys-g. keep the wireless network (SSID) isolated from your other
wireless networks (SSIDs). This is a global option applying
SSID Broadcast This option allows the SSID to be
to all SSIDs. The default is Enabled.
broadcast on your network. You may want to enable
this function while configuring your network, but make The following options are specific for each SSID:
sure that you disable it when you are finished. With
Security Mode Select the wireless security mode you
this enabled, someone could easily obtain the SSID
want to use: WPA-Personal, WPA2-Personal, WPA2-Personal
information with site survey software or Windows XP and
Mixed, WPA-Enterprise, WPA2-Enterprise, WPA2-Enterprise
gain unauthorized access to your network. Click Enabled
Mixed, RADIUS, or WEP. (WPA stands for Wi-Fi Protected
to broadcast the SSID to all wireless devices in range.
Access, which is a security standard stronger than WEP
Click Disabled to increase network security and prevent
encryption and forward compatible with IEEE 802.11i. WEP
the SSID from being seen on networked PCs. The default
stands for Wired Equivalent Privacy, Enterprise modes use
is Enabled in order to help users configure their network
a RADIUS server for authentication, while RADIUS stands
before use.
for Remote Authentication Dial-In User Service.) Refer to
Change these settings as described here and click Save the appropriate instructions below after you select the
Settings to apply your changes, or click Cancel Changes Authentication Type and SSID Interoperability settings.
to cancel your changes. Help information is available on For detailed instructions on configuring wireless security
the right side of the screen. for the Access Point, refer to “Appendix B: Wireless Security
Checklist”. To disable wireless security completely, select
Wireless > Wireless Security Disabled. The default is Disabled.
Change the Access Point’s wireless security settings on Wireless Isolation (within SSID) When disabled, wireless
this screen. PCs that are associated to the same network name (SSID),
can see and transfer files between each other. By enabling
this feature, Wireless PCs will not be able to see each other.
This feature is very useful when setting up a wireless
hotspot location. The default is Disabled.
Following section describes the detailed options for each
Security Mode.
Select SSID Select any of the SSID names configured on Encryption WPA offers you two encryption methods, TKIP
the Basic Wireless Settings tab. and AES for data encryption. Select the type of algorithm
you want to use, TKIP or AES. The default is TKIP.
Shared Secret Enter a shared secret of 8-63 characters.
Wireless-G Exterior Access Point with Power Over Ethernet 12
Chapter 6 Advanced Configuration
Key Renewal Timeout Enter a Key Renewal Timeout Key Renewal Timeout Enter a Key Renewal Timeout
period, which instructs the Access Point how often it period, which instructs the Access Point how often it
should change the encryption keys. The default is 3600 should change the encryption keys. The default is 3600
seconds. seconds.
WPA2-Personal WPA-Enterprise
This option features WPA used in coordination with a
RADIUS server for client authentication. (This should only
be used when a RADIUS server is connected to the Access
Point.)
WPA2-Enterprise
This option features WPA2 used in coordination with a
RADIUS server for client authentication. (This should only
be used when a RADIUS server is connected to the Access
Point.)
RADIUS
Wireless > Wireless Security > WPA2-Enterprise This security mode is also known as Dynamic WEP with IEEE
802.1X. A RADIUS server is used for client authentication
RADIUS Server IP Address Enter the RADIUS server’s IP and WEP is used for data encryption. The WEP key is
address. automatically generated by the RADIUS server. Manual
RADIUS Server Port Enter the port number used by the WEP key is no longer supported to ensure compatibility
RADIUS server. The default is 1812. with Microsoft’s Windows implementation.
WPA2-Enterprise Mixed
This security mode supports the transition from WPA-
Enterprise to WPA2-Enterprise. You can have client devices
that use either WPA-Enterprise or WPA2-Enterprise. The
Access Point will automatically choose the encryption
algorithm used by each client device.
WEP
Wireless > Wireless Security > WPA2-Enterprise Mixed This security mode is defined in the original IEEE 802.11.
This mode is not recommended now due to its weak
RADIUS Server IP Address Enter the RADIUS server’s IP security protection. Users are urged to migrate to WPA or
address. WPA2.
Connection Control List Power Output You can adjust the output power of the
Access Point to get the appropriate coverage for your
MAC 01-16 Enter the MAC addresses of the wireless client wireless network. Select the level you need for your
devices you want to control. environment. If you are not sure of which setting to
Change these settings as described here and click Save choose, then keep the default setting, 100%.
Settings to apply your changes, or click Cancel Changes Beacon Interval This value indicates the frequency
to cancel your changes. Help information is available on interval of the beacon. A beacon is a packet broadcast
the right side of the screen. by the Access Point to keep the network synchronized. A
beacon includes the wireless networks service area, the
Wireless > Advanced Wireless Settings Access Point address, the Broadcast destination addresses,
a time stamp, Delivery Traffic Indicator Maps, and the
This screen allows you to configure the advanced settings Traffic Indicator Message (TIM). The default is 100 ms.
for the Access Point. Linksys recommends to let your
Access Point automatically adjust the parameters for DTIM Interval This value indicates how often the Access
maximum data throughput. Point sends out a Delivery Traffic Indication Message
(DTIM). Lower settings result in more efficient networking,
while preventing your PC from dropping into power-
saving sleep mode. Higher settings allow your PC to
enter sleep mode, thus saving power, but interferes with
wireless transmissions. The default is 1 ms.
RTS Threshold This setting determines how large a packet
can be before the Access Point coordinates transmission
and reception to ensure efficient communication. This
value should remain at its default setting of 2347. If you
encounter inconsistent data flow, only minor modifications
are recommended.
Fragmentation Threshold This specifies the maximum
size a data packet can be before splitting and creating a
new packet. It should remain at its default setting of 2346.
A smaller setting means smaller packets, which will create
Wireless > Advanced Wireless Settings
more packets for each transmission. If you experience
high packet error rates, you can decrease this value, but
Advanced Settings it will likely decrease overall network performance. Only
minor modifications of this value are recommended.
CTS Protection Mode CTS (Clear-To-Send) Protection
Mode function boosts the Access Point’s ability to catch Change these settings as described here and click Save
all wireless transmissions, but will severely decrease Settings to apply your changes, or click Cancel Changes
performance. Keep the default setting, Auto, so the Access to cancel your changes. Help information is available on
Point can use this feature as needed, when the Wireless-G the right side of the screen.
products are not able to transmit to the Access Point in an
environment with heavy 802.11b traffic. Select Disabled
if you want to permanently disable this feature.
BSSBasicRateSet This setting is a series of rates that
are advertised to other wireless devices as defined in
IEEE 802.11 specifications, so they know which data rates
the Access Point can support. One of the rates is picked
from the list for transmitting control frames, broadcast/
multicast frames, or ACK frames. To support both 802.11b
& 802.11g devices, use the Default (Mixed mode) setting
so that frames can be decoded by all devices. To support
802.11g devices only, use the All (G-only mode) setting
to achieve higher frame rates. For regular data frames,
the transmission rate is configured through the Tx Rate
Limiting on the Wireless > VLAN & QoS tab.
Access Point
- Wireless
Repeater
Mode
Desktop
Access Point
Laptop
Switch
Wired LAN
Modem
AP Mode
MAC Address
The MAC address of the Access Point is displayed here.
Access Point The Mode is set to Access Point by default.
This connects your wireless PCs to a wired network. In
most cases, no change is necessary.
•• Allow wireless signal to be repeated by a
repeater Select this option if you want to use another
wireless device to repeat the signal of this Access Point.
You will need to enter the MAC address(es) of the
repeating device(s). Up to 3 repeaters can be used.
Switch Switch
Web Access
To increase the security on accessing web-based utility.
Wired LAN Wired LAN You can enable HTTPS. Once enabled, users need to use
Wireless Bridge Mode https:// when accessing the web-based utility.
Web HTTPS Access Use secured HTTP session to access
Web based Utility. The default is Disabled.
Wireless Web Access Allow or deny wireless clients to
access Web based Utility. The default is Enabled.
SNMP
SNMP is a popular network monitoring and management
protocol. It provides network administrators with the
ability to monitor the status of the Access Point and
Firmware Upgrade
Before you upgrade the Access Point’s firmware, note all of
your custom settings. After you upgrade its firmware, you
Administration > Factory Default may have to re-enter all of your configuration settings. To
upgrade the Access Point’s firmware:
Factory Default 1. Download the firmware upgrade file from the Linksys
website, www.linksys.com.
Note any custom settings before you restore the factory
defaults. Once the Access Point is reset, you will have to 2. Extract the firmware upgrade file on your computer.
re-enter all of your configuration settings.
3. On the Firmware Upgrade screen, enter the location of
Restore Factory Defaults To restore the Access Point’s the firmware upgrade file in the field provided, or click
factory default settings, click the Yes radio button. Then, the Browse button to find the file.
click Save Settings. Your Access Point will reboot and
4. Click the Upgrade button, and follow the on-screen
come back up with the factory default settings in a few
instructions.
seconds.
Help information is available on the right side of the
Click Save Settings to apply your change, or click Cancel
screen.
Changes to cancel your change. Help information is
available on the right side of the screen.
Reboot
This feature is useful when you need to remotely reboot
the Access Point.
Device Reboot To reboot the Access Point, click the Yes
option.
Click Save Settings to apply your change and the Access
Point will reboot itself, or click Cancel Changes to cancel
your change. Help information is available on the right
side of the screen.
Information
Hardware Version This is the version of the Access Point’s
current hardware.
Software Version This is the version of the Access Point’s
current software.
Local MAC Address The MAC address of the Access
Point’s Local Area Network (LAN) interface is displayed
here.
System Up Time This is the length of time the Access
Point has been running.
Local Network
IP Address This shows the Access Point’s IP Address, as it
Administration > Config Management appears on your local network.
System Performance
Status > Wireless
Wired
Wireless Network Name This indicates that the statistics are for the wired
network, the LAN.
Mode The Access Point’s wireless network mode is
displayed here. IP Address The Access Point’s local IP address is displayed
here.
SSID 1-4 MAC Address The MAC Addresses of the Access
Point’s wireless interfaces are displayed here. MAC Address This shows the MAC Address of the Access
Point’s wired interface.
SSID 1-4 The Access Point’s SSIDs that have been
configured are displayed here. Connection This shows the status of the Access Point’s
connection for the wired network.
Channel The Access Point’s Channel setting for the SSID
is shown here. Packets Received This shows the number of packets
received.
VLAN Trunk The VLAN Trunk Status is displayed here.
Packets Sent This shows the number of packets sent.
Priority Setting The priority setting status is displayed
here. Bytes Received This shows the number of bytes
received.
To update the status information, click the Refresh
button. Help information is available on the right side of Bytes Sent This shows the number of bytes sent.
the screen. Error Packets Received This shows the number of error
packets received.
Drop Received Packets This shows the number of
packets being dropped after they were received.
Wireless-G Exterior Access Point with Power Over Ethernet 23
Chapter 6 Advanced Configuration
Wireless
Name This indicates the wireless network/SSID to which
the statistics refer.
IP Address The Access Point’s local IP address is displayed
here.
MAC Address This shows the MAC Address of the Access
Point’s wireless interface.
Connection This shows the status of the Access Point’s
wireless networks.
Packets Received This shows the number of packets
received for each wireless network.
Packets Sent This shows the number of packets sent for
each wireless network.
Bytes Received This shows the number of bytes received
for each wireless network.
Bytes Sent This shows the number of bytes sent for each
wireless network.
Error Packets Received This shows the number of error
packets received for each wireless network.
Drop Received Packets This shows the number of
packets being dropped after they were received.
Reset Counter Press this button to reset packet statistic
counters to zeros.
To update the status information, click the Refresh
button. Help information is available on the right side of
the screen.
Can I run an application from a remote computer over •• CSMA/CA plus Acknowledge protocol
the wireless network? •• OFDM protocol
This will depend on whether or not the application •• Multi-Channel Roaming
is designed to be used over a network. Consult the
•• Automatic Rate Selection
application’s documentation to determine if it supports
operation over a network. •• RTS/CTS feature
•• Fragmentation
Can I play multiplayer games with other users of the
wireless network? •• Power Management
To achieve true seamless connectivity, the wireless What is DSSS? What is FHSS? And what are their
LAN must incorporate a number of different functions. differences?
Each node and Access Point, for example, must always
acknowledge receipt of each message. Each node must Frequency Hopping Spread Spectrum (FHSS) uses a
maintain contact with the wireless network even when narrowband carrier that changes frequency in a pattern
not actually transmitting data. Achieving these functions that is known to both transmitter and receiver. Properly
simultaneously requires a dynamic RF networking synchronized, the net effect is to maintain a single logical
technology that links Access Points and nodes. In such channel. To an unintended receiver, FHSS appears to be
a system, the user’s end node undertakes a search for short-duration impulse noise. Direct Sequence Spread
the best possible access to the system. First, it evaluates Spectrum (DSSS) generates a redundant bit pattern for
such factors as signal strength and quality, as well as the each bit to be transmitted. This bit pattern is called a
message load currently being carried by each Access chip (or chipping code). The longer the chip, the greater
Point and the distance of each Access Point to the wired the probability that the original data can be recovered.
backbone. Based on that information, the node next Even if one or more bits in the chip are damaged during
selects the right Access Point and registers its address. transmission, statistical techniques embedded in the
Communications between end node and host computer radio can recover the original data without the need for
can then be transmitted up and down the backbone. retransmission. To an unintended receiver, DSSS appears
as low power wideband noise and is rejected (ignored) by
As the user moves on, the end node’s RF transmitter most narrowband receivers.
regularly checks the system to determine whether it
is in touch with the original Access Point or whether Would the information be intercepted while transmitting
it should seek a new one. When a node no longer on air?
receives acknowledgment from its original Access Point,
it undertakes a new search. Upon finding a new Access WLAN features two-fold protection in security. On the
Point, it then re-registers, and the communication process hardware side, as with Direct Sequence Spread Spectrum
continues. technology, it has the inherent security feature of
scrambling. On the software side, the WLAN series offers
What is the ISM band? a variety of wireless security methods to enhance security
and access control. Users can set it up depending upon
The FCC and their counterparts outside of the U.S. have set their needs.
aside bandwidth for unlicensed use in the ISM (Industrial,
Scientific and Medical) band. Spectrum in the vicinity of Can Linksys wireless products support file and printer
2.4 GHz, in particular, is being made available worldwide. sharing?
This presents a truly revolutionary opportunity to place
convenient high speed wireless capabilities in the hands Linksys wireless products perform the same function as
of users around the globe. LAN products. Therefore, Linksys wireless products can
work with NetWare, Windows NT/2000, or other LAN
What is Spread Spectrum? operating systems to support printer or file sharing.
1. Change the default wireless WEP is an older encryption standard and may be the
network name or SSID only option available on some older devices that do not
support WPA.
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This General Network Security Guidelines
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products Wireless network security is useless if the underlying
use linksys as the default wireless network name. You network is not secure.
should change the wireless network name to something •• Password protect all computers on the network and
unique to distinguish your wireless network from other individually password protect sensitive files.
wireless networks that may exist around you, but do not
use personal information (such as your Social Security •• Change passwords on a regular basis.
number) because this information may be available for •• Install anti-virus software and personal firewall
anyone to see when browsing for wireless networks. software.
•• Disable file sharing (peer-to-peer). Some applications
2. Change the default password may open file sharing without your consent and/or
knowledge.
For wireless products such as access points and routers,
you will be asked for a password when you want to change Additional Security Tips
their settings. These devices have a default password set
•• Keep wireless routers, access points, or gateways away
by the factory. The Linksys default password is admin.
from exterior walls and windows.
Hackers know these defaults and may try to use them
to access your wireless device and change your network •• Turn wireless routers, access points, or gateways
settings. To thwart any unauthorized changes, customize off when they are not being used (at night, during
the device’s password so it will be hard to guess. vacations).
•• Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
3. Enable MAC address filtering standard words that can be found in the dictionary.
Linksys routers give you the ability to enable Media Access
Control (MAC) address filtering. The MAC address is a
unique series of numbers and letters assigned to every
networking device. With MAC address filtering enabled,
wireless network access is provided solely for wireless
devices with specific MAC addresses. For example, you can
specify the MAC address of each computer in your home
so that only those computers can access your wireless
network.
Wireless-G Exterior Access Point with Power Over Ethernet 28
Appendix C Glossary
CoS (Class of Service) The 802.1p priority scheme. CoS Full Duplex The ability of a networking device to receive
provides a method for tagging packets with priority and transmit data simultaneously.
information. A CoS value between 0-7 is added to the
GARP (General Attributes Registration Protocol)
Layer II header of packets, where zero is the lowest priority
Registers client stations into a multicast domain.
and seven is the highest.
Gateway A device that interconnects networks with
DDNS (Dynamic Domain Name System) Allows the
different, incompatible communications protocols.
hosting of a website, FTP server, or e-mail server with a
fixed domain name (e.g., www.xyz.com) and a dynamic IP GBIC (GigaBit Interface Converter) A hardware module
address. used to attach network devices to fiber-based transmission
systems. GBIC converts the serial electrical signals to serial
Default Gateway A device that forwards Internet traffic
optical signals and vice versa.
from your local area network.
GVRP (GARP VLAN Registration Protocol) Registers
DHCP (Dynamic Host Configuration Protocol) A
client stations into a VLANs.
networking protocol that allows administrators to assign
temporary IP addresses to network computers by “leasing” Half Duplex Data transmission that can occur in two
an IP address to a user for a limited amount of time, instead directions over a single line, but only one direction at a
of assigning permanent IP addresses. time.
DHCP Clients An Internet host using DHCP to obtain HTTP (HyperText Transport Protocol) The
configuration parameters, such as a network address. communications protocol used to connect to servers on
the World Wide Web.
DHCP Server An Internet host that returns configuration
parameters to DHCP clients. HTTPS (HyperText Transport Protocol Secure) An
extension to the standard HTTP protocol that provides
DNS (Domain Name Server) The IP address of your ISP’s
confidentiality by encrypting the traffic from the website.
server, which translates the names of websites into IP
By default this protocol uses TCP port 443.
addresses.
ICMP (Internet Control Message Protocol) Allows the
Domain A specific name for a network of computers.
gateway or destination host to communicate with the
Download To receive a file transmitted over a network. source host. For example, to report a processing error.
DSL (Digital Subscriber Line) An always-on broadband IGMP (Internet Group Management Protocol) Allows
connection over traditional phone lines. hosts to notify their local switch or router that they want
to receive transmissions assigned to a specific multicast
DSCP (DiffServ Code Point) Provides a method of
group.
tagging IP packets with QoS priority information.
IP (Internet Protocol) A protocol used to send data over
Dynamic IP Address A temporary IP address assigned by
a network.
a DHCP server.
IP Address The address used to identify a computer or
EIGRP (Enhanced Interior Gateway Routing
device on a network.
Protocol) Provides fast convergence, support for
variable-length subnet mask, and supports multiple IPCONFIG A Windows 2000 and XP utility that displays
network layer protocols. the IP address for a particular networking device.
Encryption Encoding data transmitted in a network. IPSec (Internet Protocol Security) A VPN protocol used
to implement secure exchange of packets at the IP layer.
Ethernet IEEE standard network protocol that specifies
how data is placed on and retrieved from a common ISP (Internet Service Provider) A company that provides
transmission medium. access to the Internet.
Firmware The programming code that runs a networking Jumbo Frames Enable transporting identical data in
device. fewer frames. Jumbo Frames reduce overhead, lower
processing time, and ensure fewer interrupts.
Flow Control Enables lower speed devices to
communicate with higher speed devices. This is LAG (Link Aggregated Group) Aggregates ports or
implemented by the higher speed device refraining from VLANs into a single virtual port or VLAN.
sending packets.
LAN The computers and networking products that make
FTP (File Transfer Protocol) A protocol used to transfer up your local network.
files over a TCP/IP network.
MAC (Media Access Control) Address The unique RADIUS (Remote Authentication Dial-In User
address that a manufacturer assigns to each networking Service) A protocol that uses an authentication server to
device. control network access.
Mask A filter that includes or excludes certain values, for RJ-45 (Registered Jack-45) An Ethernet connector that
example parts of an IP address. holds up to eight wires.
Mbps (MegaBits Per Second) One million bits per RMON (Remote Monitoring) Provides network
second; a unit of measurement for data transmission. information to be collected from a single workstation.
MD5 (Message Digest 5) An algorithm that produces a Router A networking device that connects multiple
128-bit hash. MD5 is a variation of MD4, and increases MD4 networks together.
security. MD5 verifies the integrity of the communication
RSTP (Rapid Spanning Tree Protocol) Detects and uses
and authenticates the origin of the communication.
network topologies that allow a faster convergence of the
MDI (Media Dependent Interface) A cable used for end spanning tree, without creating forwarding loops.
stations.
Server Any computer whose function in a network is to
MDIX (Media Dependent Interface with Crossover) A provide user access to files, printing, communications,
cable used for hubs and switches. and other services.
MIB (Management Information Base) MIBs contain SMTP (Simple Mail Transfer Protocol) The standard
information describing specific aspects of network e‑mail protocol on the Internet.
components.
SNMP (Simple Network Management Protocol) A
Multicast Transmits copies of a single packet to multiple widely used network monitoring and control protocol.
ports.
SSH Secure Shell. A utility that uses strong authentication
Network A series of computers or devices connected for and secure communications to log in to another computer
the purpose of data sharing, storage, and/or transmission over a network.
between users.
SSL (Secure Socket Layer) Encryption technology for
NMS (Network Management System) An interface that the Internet used to provide secure transactions, such as
provides a method of managing a system. the transmission of credit card numbers for e-commerce.
OID (Object Identifier) Used by SNMP to identify Static IP Address A fixed address assigned to a computer
managed objects. In the SNMP Manager/Agent network or device that is connected to a network.
management paradigm, each managed object must have
STP (Spanning Tree Protocol) Prevents loops in network
an OID to identify it.
traffic. The Spanning Tree Protocol (STP) provides tree
Packet A unit of data sent over a network. topography for any arrangement of bridges. STP provides
one path between end stations on a network, eliminating
Ping (Packet INternet Groper) An Internet utility used
loops.
to determine whether a particular IP address is online.
Subnet (Sub-network) Subnets are portions of a
Policing Determines if traffic levels are within a specified
network that share a common address component. In
profile. Policing manages the maximum traffic rate used
TCP/IP networks, devices that share a prefix are part of
to send or receive packets on an interface.
the same subnet. For example, all devices with a prefix of
Port The connection point on a computer or networking 157.100.100.100 are part of the same subnet.
device used for plugging in cables or adapters.
Subnet Mask An address code that determines the size
Port Mirroring Monitors and mirrors network traffic by of the network.
forwarding copies of incoming and outgoing packets
Switch Filters and forwards packets between LAN
from one port to a monitoring port.
segments. Switches support any packet protocol type.
Power over Ethernet (PoE) A technology enabling an
TACACS+ (Terminal Access Controller Access Control
Ethernet network cable to deliver both data and power.
System Plus) Proprietary Cisco enhancement to Terminal
QoS (Quality of Service) Provides policies that contain Access Controller Access Control System (TACACS). Provides
sets of filters (rules). QoS allows network managers additional support for authentication, authorization, and
to decide how and what network traffic is forwarded accounting.
according to priorities, application types, and source and
destination addresses.
Appendix D:
Specifications
Specifications Security
Model WAP200E WEP/WPA/WPA2 WEP, WPA-PSK, WPA2-PSK,
Standards IEEE802.11g, IEEE802.11b, WPA-ENT, WPA2-ENT
IEEE802.3, IEEE802.3u, Connection Control Wireless Connection Control:
IEEE802.3af (Power Over MAC-Based
Ethernet), 802.1p (QoS SSID Broadcast SSID Broadcast Enable/Disable
priority), 802.1Q (VLAN), 802.1X
(Security Authentication), 802.1X IEEE 802.1X support
802.11i - Ready (Security Wireless Client Isolation Wireless Client devices can
WPA2), 802.11e - Ready (WMM be isolated from each other
& U-APSD), 802.11F (Wireless either within an SSID or
Roaming) between two SSIDs.
Ports 1 Ethernet, 1 External Antenna Both isolation modes can be
enabled in the same time.
Buttons Reset
Web-based Utility
Cabling Type UTP CAT 5 Access Control HTTP/HTTPS, wireless client
LEDs Power, Ethernet, Wireless web GUI access control
Operating System Linux Wireless Security
Management WEP bits 64, 128
SNMP Version 1, 2 and 2c WPA bits & params 128 - TKIP/AES
Operating Modes WPA2 bits & params 256 - AES
Access Point Access Point Mode, SSID Broadcast on/off Yes
point-to-point Bridge Mode, Client Isolation Yes
point-to-multipoint Bridge
MAC-based Wireless
Mode, Repeater Mode
Connection Control Yes
Wireless Wireless Web GUI
Spec/Modulation 802.11b/DSSS, 11g/ODFM Access on/off Yes
Data Rates 11b: 1, 2, 5.5, 11 Mbps, Quality of Service
11g: 6, 9, 11, 12, 18, 24, 36, 48,
QoS 4 queues
54 Mbps
WMM wireless traffic
Channels 11 North America,
prioritization
13 Europe (ETSI and Japan)
Auto-channel selection General
# of Internal Ant. 2x 6dBi (directional) Wireless roaming based on
Ant. connector type Reverse Polarity Female N-type IAPP (802.11F)
Auto-channel selection
Detachable y/n/na y (sold separately)
RF Pwr (EIRP) in dBm 11.g: Typical - 16.5dBm,
11.b: Typical - 17dBm
Antenna Gain in dBi Internal antenna: 6dBi
Adjustable power y
Receiver Sensitivity 11.g: 54Mbps@ -65dBm,
11.b: 11Mbps@ -85dBM
Environmental
Dimensions 6.42" x 8.07" x 2.17"
163 x 205 x 55mm
Weight 2.47 lb (1.121 kg)
Mounting options Industrial-strength,
weather‑proof housing, NEMA
IP53 rating, lighting protection
for outdoor enclosure, ceiling
or wall mountable
Power 48V DC, 350mA
Max Power Draw 4.8 Watt
PoE In Yes
PoE Out No
Certification FCC, IC, CE
Operating Temp. -4 to 140ºF (-20 to 60ºc)
Storage Temp. -4 to 140ºF (-20 to 60ºc)
Operating Humidity 5 to 95%, noncondensing
Storage Humidity 5 to 95%, noncondensing
User Information for Consumer Products Ceština (Czech) - Informace o ochraně životního
prostředí pro zákazníky v zemích Evropské unie
Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené
Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno
s netříděným komunálním odpadem. Tento symbol udává,
(WEEE) že daný produkt musí být likvidován odděleně od běžného
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu
This document contains important information for users a dalších elektrických a elektronických zařízení prostřednictvím
with regards to the proper disposal and recycling of určených sběrných míst stanovených vládou nebo místními
úřady. Správná likvidace a recyklace pomáhá předcházet
Linksys products. Consumers are required to comply with
potenciálním negativním dopadům na životní prostředí a lidské
this notice for all electronic products bearing the following zdraví. Podrobnější informace o likvidaci starého vybavení si
symbol: laskavě vyžádejte od místních úřadů, podniku zabývajícího se
likvidací komunálních odpadů nebo obchodu, kde jste produkt
zakoupili.
Magyar (Hungarian) - Környezetvédelmi információ az Polski (Polish) - Informacja dla klientów w Unii
európai uniós vásárlók számára Europejskiej o przepisach dotyczących ochrony
A 2002/96/EC számú európai uniós irányelv megkívánja, hogy środowiska
azokat a termékeket, amelyeken, és/vagy amelyek csomagolásán Dyrektywa Europejska 2002/96/EC wymaga, aby sprzęt
az alábbi címke megjelenik, tilos a többi szelektálatlan lakossági oznaczony symbolem znajdującym się na produkcie i/lub jego
hulladékkal együtt kidobni. A címke azt jelöli, hogy az adott opakowaniu nie był wyrzucany razem z innymi niesortowanymi
termék kidobásakor a szokványos háztartási hulladékelszállítási odpadami komunalnymi. Symbol ten wskazuje, że produkt
rendszerektõl elkülönített eljárást kell alkalmazni. Az Ön nie powinien być usuwany razem ze zwykłymi odpadami z
felelõssége, hogy ezt, és más elektromos és elektronikus gospodarstw domowych. Na Państwu spoczywa obowiązek
berendezéseit a kormányzati vagy a helyi hatóságok által wyrzucania tego i innych urządzeń elektrycznych oraz
kijelölt gyűjtõredszereken keresztül számolja fel. A megfelelõ elektronicznych w punktach odbioru wyznaczonych przez władze
hulladékfeldolgozás segít a környezetre és az emberi egészségre krajowe lub lokalne. Pozbywanie się sprzętu we właściwy sposób
potenciálisan ártalmas negatív hatások megelõzésében. Ha i jego recykling pomogą zapobiec potencjalnie negatywnym
elavult berendezéseinek felszámolásához további részletes konsekwencjom dla środowiska i zdrowia ludzkiego. W celu
információra van szüksége, kérjük, lépjen kapcsolatba a helyi uzyskania szczegółowych informacji o usuwaniu starego sprzętu,
hatóságokkal, a hulladékfeldolgozási szolgálattal, vagy azzal prosimy zwrócić się do lokalnych władz, służb oczyszczania
üzlettel, ahol a terméket vásárolta. miasta lub sklepu, w którym produkt został nabyty.
Português (Portuguese) - Informação ambiental para Slovenčina (Slovene) - Okoljske informacije za stranke
clientes da União Europeia v Evropski uniji
A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/EC prepoveduje odlaganje opreme,
que exibe este símbolo no produto e/ou na sua embalagem označene s tem simbolom – na izdelku in/ali na embalaži – med
não seja eliminado junto com os resíduos municipais não običajne, nerazvrščene odpadke. Ta simbol opozarja, da je treba
separados. O símbolo indica que este produto deve ser izdelek odvreči ločeno od preostalih gospodinjskih odpadkov.
eliminado separadamente dos resíduos domésticos regulares. Vaša odgovornost je, da to in preostalo električno in elektronsko
É da sua responsabilidade eliminar este e qualquer outro opremo odnesete na posebna zbirališča, ki jih določijo
equipamento eléctrico e electrónico através dos instalações državne ustanove ali lokalna uprava. S pravilnim odlaganjem
de recolha designadas pelas autoridades governamentais ou in recikliranjem boste preprečili morebitne škodljive vplive na
locais. A eliminação e reciclagem correctas ajudarão a prevenir okolje in zdravje ljudi. Če želite izvedeti več o odlaganju stare
as consequências negativas para o ambiente e para a saúde opreme, se obrnite na lokalno upravo, odpad ali trgovino, kjer
humana. Para obter informações mais detalhadas sobre a ste izdelek kupili.
forma de eliminar o seu equipamento antigo, contacte as
autoridades locais, os serviços de eliminação de resíduos ou o
estabelecimento comercial onde adquiriu o produto. Suomi (Finnish) - Ympäristöä koskevia tietoja EU-
alueen asiakkaille
EU-direktiivi 2002/96/EY edellyttää, että jos laitteistossa on tämä
Română (Romanian) - Informaţii de mediu pentru symboli itse tuotteessa ja/tai sen pakkauksessa, laitteistoa
clienţii din Uniunea Europeană ei saa hävittää lajittelemattoman yhdyskuntajätteen mukana.
Directiva europeană 2002/96/CE impune ca echipamentele care Symboli merkitsee sitä, että tämä tuote on hävitettävä erillään
prezintă acest simbol pe produs şi/sau pe ambalajul acestuia să tavallisesta kotitalousjätteestä. Sinun vastuullasi on hävittää
nu fie casate împreună cu gunoiul menajer municipal. Simbolul tämä elektroniikkatuote ja muut vastaavat elektroniikkatuotteet
indică faptul că acest produs trebuie să fie casat separat de viemällä tuote tai tuotteet viranomaisten määräämään
gunoiul menajer obişnuit. Este responsabilitatea dvs. să casaţi keräyspisteeseen. Laitteiston oikea hävittäminen estää
acest produs şi alte echipamente electrice şi electronice prin mahdolliset kielteiset vaikutukset ympäristöön ja ihmisten
intermediul unităţilor de colectare special desemnate de guvern terveyteen. Lisätietoja vanhan laitteiston oikeasta hävitystavasta
sau de autorităţile locale. Casarea şi reciclarea corecte vor ajuta saa paikallisilta viranomaisilta, jätteenhävityspalvelusta tai siitä
la prevenirea potenţialelor consecinţe negative asupra sănătăţii myymälästä, josta ostit tuotteen.
mediului şi a oamenilor. Pentru mai multe informaţii detaliate
cu privire la casarea acestui echipament vechi, contactaţi
autorităţile locale, serviciul de salubrizare sau magazinul de la Svenska (Swedish) - Miljöinformation för kunder i
care aţi achiziţionat produsul. Europeiska unionen
Det europeiska direktivet 2002/96/EC kräver att utrustning med
denna symbol på produkten och/eller förpackningen inte får
Slovenčina (Slovak) - Informácie o ochrane životného kastas med osorterat kommunalt avfall. Symbolen visar att denna
prostredia pre zákazníkov v Európskej únii produkt bör kastas efter att den avskiljts från vanligt hushållsavfall.
Podľa európskej smernice 2002/96/ES zariadenie s týmto Det faller på ditt ansvar att kasta denna och annan elektrisk och
symbolom na produkte a/alebo jeho balení nesmie byť elektronisk utrustning på fastställda insamlingsplatser utsedda
likvidované spolu s netriedeným komunálnym odpadom. av regeringen eller lokala myndigheter. Korrekt kassering och
Symbol znamená, že produkt by sa mal likvidovať oddelene återvinning skyddar mot eventuella negativa konsekvenser
od bežného odpadu z domácností. Je vašou povinnosťou för miljön och personhälsa. För mer detaljerad information om
likvidovať toto i ostatné elektrické a elektronické zariadenia kassering av din gamla utrustning kontaktar du dina lokala
prostredníctvom špecializovaných zberných zariadení určených myndigheter, avfallshanteringen eller butiken där du köpte
vládou alebo miestnymi orgánmi. Správna likvidácia a recyklácia produkten.
pomôže zabrániť prípadným negatívnym dopadom na životné
prostredie a zdravie ľudí. Ak máte záujem o podrobnejšie
informácie o likvidácii starého zariadenia, obráťte sa, prosím, na WEB: For additional information, please visit
miestne orgány, organizácie zaoberajúce sa likvidáciou odpadov www.linksys.com
alebo obchod, v ktorom ste si produkt zakúpili.
Appendix F:
Contact Information
Linksys Contact Information
Website http://www.linksys.com
E-Mail support@linksys.com
Support 800-326-7114
Fax 949-823-3002
8070310C-RC