Page 36 / 74 Scroll up to view Page 31 - 35
30
Chapter 6: Configuring the Wireless-G Access Point
The AP Mode Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
Wireless Bridge
. This mode connects physically separated wired networks using multiple access points.
Wireless clients will not be able to connect to the access point in this mode. Enter the MAC address(es) of the
access point(s) that will bridge to this access point.
WAP200 (Wireless Bridge mode)
Access Point
Access Point
Access Point
Access Point
Switch
Switch
Switch
Switch
Wired LAN
Wired LAN
Wired LAN
Wired LAN
Figure 6-19: Wireless Bridge Mode
(Wireless
Bridge Mode)
(Wireless
Bridge Mode)
(Wireless
Bridge Mode)
(Wireless
Bridge Mode)
IMPORTANT:
In Wireless Bridge mode, the Access Point can ONLY be accessed by another access
point set to Wireless Bridge mode. In order for your other wireless devices to connect to the
Access Point, you must reset it to Access Point mode. The two modes are mutually exclusive.
Page 37 / 74
31
Chapter 6: Configuring the Wireless-G Access Point
The Security Monitor - Basic Settings Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
The Security Monitor - Basic Settings Tab
On this screen you can enable or disable the security monitor feature of this Wireless Access Point. It also allows
you to create user accounts for system administrators to use this advanced feature.
This feature works together with Linksys Business Series wireless client adapters. A client utility will be provided
with the client card, which will allow you to download information from the Access Point. The current version will
support wireless Access Points and wireless clients detection and classification. Please check Linksys.com for
future updates on this powerful security feature.
Wireless Security Monitor
Enabled/Disabled
. You can enable or disable the security monitor feature here. When it is enabled, the Access
Point will work with selected wireless PCs to monitor your wireless network. If you don’t plan to use the client
utility to actively monitor your network, you can disable this feature to improve your wireless network
performance. The default is
Disabled
.
Security Monitor Accounts
The section allows the system administrator to create accounts for the purpose of wireless security monitoring.
You can create one account at a time. The administrator will be able to use his client utility to log in and get
authenticated to the system after user accounts are created.
User Name.
Enter the user name of this account.
Password.
Enter the password of this account.
Re-enter to confirm.
Enter the password a second time to re-confirm it.
Identify.
You can create either an Administrator or User account by making the selection here. You can create one
Administrator account and five User accounts.
Click the
Add/Save
button to create an account. The accounts that are created will display in the table.
Change these settings as described here and click
Save Settings
to apply your changes, or click
Cancel
Changes
to cancel your changes. Help information is available on the right side of the screen.
Figure 6-20: Security Monitor - Basic Settings
Page 38 / 74
32
Chapter 6: Configuring the Wireless-G Access Point
The Security Monitor - Event Log Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
The Security Monitor - Event Log Tab
Configure the event logging options for security monitor.
E-mail Notification
Recipient To
. Enter the e-mail address that the alarm notifications should be sent to.
Alarm Type
. Select the type of intrusions that should require an e-mail notification.
Rogue AP Detected
. Indicates a rogue access point has been detected.
AP SSID Changed
. Indicates the Access Point’s SSID has been changed.
Spoofed MAC Address
. Indicates another device is using the AP’s MAC address to send out packets.
Client is Sending Spurious Traffic
. Indicates an unassociated client is sending out frames to the AP.
Adhoc SSID same as AP
. Indicates an Adhoc network uses the same SSID as the AP.
Adhoc Network Operating
. Indicates when a STA is advertising a peer-to-peer (Adhoc) network.
Rogue Client Detected
. Indicates when a STA is conducting an illegal transaction with an AP.
Default SSID in use
. Indicates when the default SSID is in use on an AP.
Association Table Full
. Indicates an AP refused a new STA association due to resource unavailability.
Low Speed Connection
. Indicates when a STA is transmitting data at a much slower rate set by AP.
New Client Detected
. Indicates a new STA is associated with an AP.
New Access Point Detected
. Indicates a new AP has been detected joining the network.
Duration Attack
. Indicates a STA packet contains an abnormally large duration value in the 802.11
header.
AP is Not Using Encryption
. Indicates when an AP has wireless security disabled.
AP Channel Changed
. Indicates when an AP changes its wireless channel.
AP Broadcasting SSID
. Indicates when SSID broadcasting is enabled on an AP.
Figure 6-21: Security Monitor - Event Log
Page 39 / 74
33
Chapter 6: Configuring the Wireless-G Access Point
The Security Monitor - Event Log Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
Duplicate SSID in use
. Indicates an unauthorized AP has the same SSID value as an authorized AP.
SYSLOG Notification
Logviewer IP Address
. Enter the IP address of the system that will store the system log.
Alarm Type
. Select the type of intrusions that should require an e-mail notification.
Rogue AP Detected
. Indicates a rogue access point has been detected.
AP SSID Changed
. Indicates the Access Point’s SSID has been changed.
Spoofed MAC Address
. Indicates another device is using the AP’s MAC address to send out packets.
Client is Sending Spurious Traffic
. Indicates an unassociated client is sending out frames to the AP.
Adhoc SSID same as AP
. Indicates an Adhoc network uses the same SSID as the AP.
Adhoc Network Operating
. Indicates when a STA is advertising a peer-to-peer (Adhoc) network.
Rogue Client Detected
. Indicates when a STA is conducting an illegal transaction with an AP.
Default SSID in use
. Indicates when the default SSID is in use on an AP.
Association Table Full
. Indicates an AP refused a new STA association due to resource unavailability.
Low Speed Connection
. Indicates when a STA is transmitting data at a much slower rate set by AP.
New Client Detected
. Indicates a new STA is associated with an AP.
New Access Point Detected
. Indicates a new AP has been detected joining the network.
Duration Attack
. Indicates a STA packet contains an abnormally large duration value in the 802.11
header.
AP is Not Using Encryption
. Indicates when an AP has wireless security disabled.
AP Channel Changed
. Indicates when an AP changes its wireless channel.
AP Broadcasting SSID
. Indicates when SSID broadcasting is enabled on an AP.
Duplicate SSID in use
. Indicates an unauthorized AP has the same SSID value as an authorized AP.
Page 40 / 74
34
Chapter 6: Configuring the Wireless-G Access Point
The Administration - Management Tab
Wireless-G Access Point with Power Over Ethernet and Rangebooster
Security Monitor Server
This is a special Syslog server that can record all security monitor events instead of selected events.
Server IP Address
. Enter the IP address of the server.
The Administration - Management Tab
On this screen you can configure the password, Web Access, and SNMP settings.
Management
You should change the username/password that controls access to the Access Point’s web-based utility to
prevent unauthorized access.
Local AP Password
User name
. Modify the administrator user name. The default is
admin
.
AP password
. Modify the administrator password for the Access Point’s web-based utility. The default is
admin
.
Re-enter to confirm
. To confirm the new password, enter it again in this field.
Web Access
To increase the security on accessing the web-based utility, you can enable HTTPS. Once enabled, users need to
use
https://
when accessing the web-based utility.
Web HTTPS Access
. The default is
Disabled
.
Wireless Web Access
. Allow or deny wireless clients to access Web based Utility. The default is
Disabled
.
Figure 6-22: Administration - Management

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top