USER GUIDE Wireless-G Access Point Model: WAP54G
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Product Overview 4 Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Chapter 2: Wireless Security Checklist 5 General Network Security Guidelines . . . . . . . . . . . . . . . . . .
Table of Contents Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Appendix E: Software License Agreement 33 Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product Overview Chapter 1 Chapter 1: Product Overview Thank you for choosing the Wireless-G Access Point. Use the instructions in this User Guide to help you connect the Access Point, set it up, and configure it to bridge your different networks. These instructions should be all you need to get the most out of the Access Point. Front Panel Link Act (Green) The Activity LED lights up when the Access Point is ready for wireless use.
Wireless Security Checklist Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Configuration Chapter 2 Chapter 2: Using the Linksys Wireless Guard Service 3. The next screen will tell you to close all other applications before continuing. If no other applications are open, click Next to continue. If you want to exit to close your other applications, click Cancel. This chapter is only for users who have signed up for Linksys Wireless Guard to secure their network and have configured the Access Point for Linksys Wireless Guard.
Configuration Chapter 2 5. On this screen, you will be informed where the Linksys Wireless Guard client software will be installed. To install to this folder, click Next. If you want to choose a different location for the folder, click Browse and select the location. 7. The Linksys Wireless Guard client software is successfully installed. Before you can use the program, you must restart your computer. Select Yes to restart your computer now. Select No to restart your computer at a later time.
Configuration Chapter 2 Network Access Your Account After Linksys Wireless Guard is installed, any time you access a Linksys Wireless Guard protected network, the Wireless Guard Login screen will appear. To access your network, click Login as a Wireless Guard Member, or if you are a guest, click Login as a Wireless Guard Guest. Enter your user name and password, and then click Login.
Configuration Chapter 2 Add a Guest 1. On the Wireless Guard Member Website home screen, click the Network Admin tab. 4. The Add Guest screen will appear. Enter the Guest User Name, Guest First Name, Guest Last Name, Password, Password Verify, and Access Duration. Then click Submit. Home 2. The Network Administration screen will appear. Under Network Administration, click Modify Access Control. Add Guest Guest User Name Enter a user name of the guest you want to add.
Configuration Chapter 2 Add a Member To add a member, follow the instructions in steps 1 through 3 of Add a Guest, page 9, except in step 3, click Add Member. The Add Member screen will appear. Registered members can enter their e-mail address in the field provided and select the duration for access from the drop-down menu. If you want this network member to have the authority to put the network in Fallback Mode in case network security is lost, select Permission to Initiate Network Fallback.
Configuration Chapter 2 5. When this screen appears, enter the information you will be using with the account. Enter a user name and password, and then enter the password again. Also select a security question and answer in case you forget your password in the future. Click Next to continue. Click Back to return to the previous screen. Click Cancel to cancel the member registration.
Configuration Chapter 3 Chapter 3: Configuring the Wireless-G Access Point How to Navigate within the Utility The Access Point has been designed to be functional right out of the box, with the default settings in the Setup Wizard. However, if you want to change these settings, the Access Point can be configured through your web browser with the Web-based Utility. This chapter explains how to use the Utility.
Configuration Chapter 3 IP Address The IP address must be unique to your network. It is recommended to use the default IP address of 192.168.1.245. Subnet Mask The Subnet Mask must be the same as that set on your Ethernet network. Default Gateway Enter the IP address of your network’s gateway. The gateway is the device that enables communication between your computers and the Internet. In most cases, your router acts as your gateway.
Configuration Chapter 3 Wireless Bridge Diagram Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information. The Wireless Tab > Basic Wireless Settings Change the wireless network settings on this screen. Wireless Repeater Diagram Wireless Bridge This mode connects two physically separated wired networks using two access points (use additional access points to connect more wired networks).
Configuration Chapter 3 Channel Select the appropriate channel from the list provided; this will be the channel that all of your wireless devices will use. When the SecureEasySetup process is complete, the Basic Wireless Settings screen will appear, and the Current Encryption and Status information will be updated. SSID Broadcast This feature allows the SSID to be broadcast by the Access Point.
Configuration Chapter 3 The Wireless Tab > Wireless Security WPA2-Personal Change the Access Point’s wireless security settings on this screen. Wireless Security Security Mode Select the security method you want to use, WPA-Personal, WPA2-Personal, WPA2-Mixed, WPA-Enterprise, RADIUS, or WEP. (WPA stands for WiFi Protected Access, which is a security standard stronger than WEP encryption. WPA2 is a stronger version of WPA.
Configuration Chapter 3 Shared Secret Enter the Shared Secret key used by the Access Point and RADIUS server. Encryption Select a level of WEP encryption, 40/64 bits (10 hex digits) or 128 bits (26 hex digits). Passphrase To generate WEP keys using a Passphrase, enter the Passphrase and click the Generate key. Wireless > Wireless Security (WPA-Enterprise) Encryption WPA offers you two encryption methods, TKIP and AES, with dynamic encryption keys.
Configuration Chapter 3 The Wireless Tab > Wireless MAC Filter This screen allows you to permit or block wireless access for computers with specific MAC addresses. The Wireless Tab > Advanced Wireless Settings This screen allows you to configure the advanced settings for the Access Point. In most cases, these settings do not need to be changed.
Configuration Chapter 3 Transmission Power You can adjust the output power of the Access Point to get the appropriate coverage for your wireless network. Select the level you need for your environment. If you are not sure which setting to choose, then keep the default setting, Full (Default). Change these settings as described here and click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Click Help for more information.
Configuration Chapter 3 The Administration Tab > SNMP The Administration Tab > Log SNMP is a popular network monitoring and management protocol. It provides network administrators with the ability to monitor the status of the Access Point and receive notification of any critical events as they occur on the Access Point. On this screen you can configure the log settings. Administration > Log Management You can have logs that keep track of the Access Point’s activities.
Configuration Chapter 3 The Administration Tab > Factory Defaults 1. Download the firmware upgrade file from the Linksys website, www.linksys.com. On this screen you can restore the Access Point’s factory default settings. 2. Extract the firmware upgrade file on your computer. 3. On the Firmware Upgrade screen, enter the location of the firmware upgrade file in the field provided, or click Browse to find the file. 4. Click Upgrade, and follow the on-screen instructions.
Configuration Chapter 3 The Status Tab > Wireless Network The Wireless Network screen displays the Access Point’s current status information for its wireless network. Status > Wireless Network Wireless Network MAC Address The MAC Address of the Access Point’s wireless interface is displayed here. Mode The Access Point’s mode is displayed here. Network Name (SSID) The Access Point’s main SSID is displayed here. Channel The Access Point’s channel setting for wireless broadcast is shown here.
Appendix A Appendix A: Troubleshooting Troubleshooting WEB: If your questions are not addressed here, refer to the Linksys website, www.linksys.com I can’t connect to the Internet. 1. Verify the proper LEDs are lit on the Access Point. •• Make sure the Power LED has a steady green light and is not flashing. •• Verify the Ethernet LED has a fairly steady green light. It will flash occasionally, indicating activity. •• Verify the Signal Strength LEDs are lit. 2.
Specifications Appendix B Appendix B: Specifications Model WAP54G Standards IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u Ports One 10/100 Auto-Cross Over (MDI/MDI-X) port, power port Buttons Reset, SES (SecureEasySetup) Cabling Type RJ-45 LEDs Power, Activity, Link, SecureEasySetup Transmit Power 802.11g: Typ. 13.5 ± 2 dBm @ Normal Temp Range 802.11b: Typ. 16.
Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the date of purchase by the original end-user purchaser and lasts for the period specified below: •• One (1) year for new product •• Ninety (90) days for refurbished product This limited warranty is non-transferable and extends only to the original end-user purchaser.
Appendix C Warranty Information rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix D Appendix D: Regulatory Information Safety Notices FCC Statement •• Do not use this product near water, for example, in a This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. •• Avoid using this product during an electrical storm.
Appendix D Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. il ne doit pas produire de brouillage et 2. il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Le dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximum de 2 dBi.
Appendix D User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix D Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix D Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix E Appendix E: Software License Agreement Software in Linksys Products This product from Cisco-Linksys LLC or from one of its affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or CiscoLinksys K.K. (“Linksys”) contains software (including firmware) originating from Linksys and its suppliers and may also contain software from the open source community. Any software originating from Linksys and its suppliers is licensed under the Linksys Software License Agreement contained at Schedule 1 below.
Software License Agreement Appendix E your Linksys product and/or the Software is being used in accordance with the terms of this Agreement; (iii) to provide improvements to the way Linksys delivers technology to you and to other Linksys customers; (iv) to enable Linksys to comply with the terms of any agreements it has with any third parties regarding your Linksys product and/or Software and/or (v) to enable Linksys to comply with all applicable laws and/or regulations, or the requirements of any regulat
Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.) You can apply it to your programs, too.
Appendix E c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Software License Agreement Appendix E 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
Appendix E GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix E freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. 3.
Appendix E Software License Agreement b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user’s computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. 8.
Software License Agreement Appendix E software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12.
Appendix E Software License Agreement OpenSSL License Original SSLeay License Copyright © 1998-2007 The OpenSSL Project. All rights reserved. Copyright © 1995-1998 Eric Young (eay@cryptsoft.com)All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: This package is an SSL implementation written by Eric Young (eay@cryptsoft.com). 1.
Appendix E Software License Agreement DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.