Page 106 / 112 Scroll up to view Page 101 - 105
Appendix A - Troubleshooting
106
Problem 2:
Some applications do not run properly when using the Wireless
Router.
Solution 2:
The Wireless Router processes the data passing through it, so it is
not transparent.
For incoming connections, you must use the Virtual Server or Firewall
Rules to specify the PC which will receive the incoming traffic.
You can also use the
DMZ
function. This should work with almost
every application, but:
It is a security risk, since the firewall is disabled.
Only one (1) PC can use this feature.
Wireless Access
Problem 1:
My PC can't locate the Wireless Access Point.
Solution 1:
Check the following.
Your PC is set to
Infrastructure Mode
. (Access Points are always
in
Infrastructure Mode
)
The SSID on your PC and the Wireless Access Point are the
same.
Remember that the SSID is case-sensitive. So, for example
"Workgroup" does NOT match "workgroup".
Both your PC and the Wireless Router must have the same
setting for WEP. The default setting for the Wireless Router is
disabled, so your wireless station should also have WEP dis-
abled.
If WEP is enabled on the Wireless Router, your PC must have
WEP enabled, and the key must match.
If the Wireless Router's
Wireless
screen is set to
Allow Trusted
PCs only
, then each of your Wireless stations must have been
designated as "Trusted", or the Wireless station will be blocked.
To see if radio interference is causing a problem, see if connec-
tion is possible when close to the Wireless Router.
Remember that the connection range can be as little as 100 feet
in poor environments.
Downloaded from
www.Manualslib.com
manuals search engine
Page 107 / 112
107
Problem 2:
Wireless connection speed is very slow.
Solution 2:
The wireless system will connect at the highest possible speed,
depending on the distance and the environment. To obtain the high-
est possible connection speed, you can experiment with the following:
Wireless Router location.
Try adjusting the location and orientation of the Wireless Router.
Wireless Channel
If interference is the problem, changing to another channel may
show a marked improvement.
Radio Interference
Other devices may be causing interference. You can experiment
by switching other devices Off, and see if this helps. Any "noisy"
devices should be shielded or relocated.
RF Shielding
Your environment may tend to block transmission between the
wireless stations. This will mean high access speed is only possi-
ble when close to the Wireless Router.
Downloaded from
www.Manualslib.com
manuals search engine
Page 108 / 112
108
Appendix B
About Wireless LANs
This Appendix provides some background information about using
Wireless LANs (WLANs).
Modes
Wireless LANs can work in either of two (2) modes:
Ad-hoc
Infrastructure
Ad-hoc Mode
Ad-hoc mode does not require an Access Point or a wired (Ethernet) LAN.
Wireless Stations (e.g. notebook PCs with wireless cards) communicate directly
with each other.
Infrastructure Mode
In Infrastructure Mode, one or more Access Points are used to connect Wire-
less Stations (e.g. Notebook PCs with wireless cards) to a wired (Ethernet) LAN.
The Wireless Stations can then access all LAN resources.
Access Points can only function in "Infrastructure" mode,
and can communicate only with Wireless Stations which are
set to "Infrastructure" mode.
BSS/ESS
BSS
A group of Wireless Stations and a single Access Point, all using the same ID
(SSID), form a Basic Service Set (BSS).
Using the same SSID is essential
. Devices with different SSIDs are unable to
communicate with each other.
ESS
A group of Wireless Stations, and multiple Access Points, all using the same ID
(ESSID), form an Extended Service Set (ESS).
Different Access Points within an ESS can use different Channels. In fact, to re-
duce interference, it is recommended that adjacent Access Points SHOULD use
different channels.
As Wireless Stations are physically moved through the area covered by an ESS,
they will automatically change to the Access Point which has the least interference
or best performance. This capability is called
Roaming
. (Access Points do not have
or require Roaming capabilities.)
B
Downloaded from
www.Manualslib.com
manuals search engine
Page 109 / 112
Appendix B - About Wireless LANs
109
Channels
The Wireless Channel sets the radio frequency used for communication.
Access Points use a fixed Channel. You can select the Channel used. This
allows you to choose a Channel which provides the least interference and best
performance. In the USA and Canada, 11 channels are available. If using mul-
tiple Access Points, it is better if adjacent Access Points use different Channels
to reduce interference.
In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking
for an Access Point. If more than one Access Point can be used, the one with
the strongest signal is used. (This can only happen within an ESS.)
If using "Ad-hoc" mode (no Access Point), all Wireless stations should be set to
use the same Channel. However, most Wireless stations will still scan all
Channels to see if there is an existing "Ad-hoc" group they can join.
WEP
WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is
transmitted.
This is desirable because it is impossible to prevent snoopers from receiving any
data which is transmitted by your Wireless Stations. But if the data is encrypted,
then it is meaningless unless the receiver can decrypt it.
If WEP is used, the Wireless Stations and the Access Point must have the
same settings for each of the following:
WEP
Off, 64 Bit, 128 Bit
Key
For 64 Bit encryption, the Key value must match.
For 128 Bit encryption, the Key value must match
WEP Authentication
Open System or Shared Key.
WPA-PSK
WPA-PSK is another standard for encrypting data before it is transmitted. This is a
later standard than WEP (Wired Equivalent Privacy), and provides greater security
for your data. Data is encrypted using a 256Bit key which is automatically generated
and changed often.
If all your Wireless stations support WPA-PSK, you should use this instead of WEP.
If WPA-PSK is used, the Wireless Stations and the Access Point must have
the same settings for each of the following:
WPA PSK
(Pre-shared Key)
Enter the same value on every station and the AP. The
PSK must be from 8 to 63 characters in length. The
256Bit key used for the actual encryption is derived
from this key.
Encryption
The same encryption method must be used. The most
common encryption method is TKIP. Another widely-
supported method is AES.
Downloaded from
www.Manualslib.com
manuals search engine
Page 110 / 112
Appendix B - About Wireless LANs
110
WPA2-PSK
This is a later version of WPA (WPA-PSK). The major change is the use of AES
(Advanced Encryption System) for protecting data. AES is very secure, considered
to be unbreakable. The PSK (Pre-shared Key) must be entered on each Wireless
station.
If WPA2-PSK is used, the Wireless Stations and the Access Point must have
the same settings for each of the following:
WPA2 PSK
(Pre-shared Key)
Enter the same value on every station and the AP. The
PSK must be from 8 to 63 characters in length. The
256Bit key used for the actual encryption is derived
from this key.
Encryption
The same encryption method must be used. The most
common encryption method is TKIP. Another widely-
supported method is AES.
WPA-802.1x
WPA-802.1x - This version of WPA requires a Radius Server on your LAN to
provide the client authentication according to the 802.1x standard. Data transmis-
sions are encrypted using the WPA standard.
If this option is used:
The Access Point must have a "client login" on the Radius Server.
Each user must have a "user login" on the Radius Server.
Each user's wireless client must support 802.1x and provide the login data
when required.
All data transmission is encrypted using the WPA standard. Keys are automati-
cally generated, so no key input is required.
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4.7 / 5 based on 3 votes.

Popular LevelOne Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top