Contents v
July 2005 v3.0
How to Configure a WG302 as a Point-to-Point Bridge ................................... ........5-9
How to Configure Multi-Point Wireless Bridging ....................................................5-10
How to Configure Wireless Repeating ................................... ................................5-11
Chapter 6
Troubleshooting
No lights are lit on the access point. ...............................................................................6-1
The Wireless LAN activity light does not light up. ...........................................................6-2
The LAN light is not lit. .................................................................................................... 6-2
I cannot access the Internet or the LAN with a wireless capable computer. ................. 6-2
I cannot connect to the WG302 to configure it. ..... ... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... .. 6-3
When I enter a URL or IP address I get a timeout error. ........................................... ... .. 6-3
Using the Reset Button to Restore Factory Default Settings ..........................................6-4
Appendix A
Specifications
Specifications for the WG302 ............................................. ........................................... A-1
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ...................................................................... ........................... B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................B-2
Authentication and WEP Data Encryption .................................................................... . B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size ....................................................................... ........................................... B-6
WEP Configuration Options ............................................ .... ... ... ... .... ... ... ... ... .... .......B-7
Wireless Channels ......................................................................................................... B-7
WPA and WPA2 Wireless Security ................................................................................ B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................B-10
What are the Key Features of WPA and WPA2 Security? .................................... B-10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. B-12
WPA/WPA2 Data Encryption Key Management .............................................B-14