à πƒπ π Ã WA 100 Wireless Access Point
.
ÂÚÈÂ fiìâó ÂÚÈÂ fiìâó 3 1 ÂÚÈÂ fiìâó ÛÎÂ Û 4 2 Ô WA 100 Wireless Access Point 4 2.1 Ã Ú ÎÙËÚÈÛÙÈÎ ÚÔ fióùô 5 2.2 ªappleÚÔÛÙÈÓ Ÿ Ë 5 2.3 Ûˆ Ÿ Ë 6 2.4 apple ÈÙ ÛÂÈ ÛÙ Ì ÙÔ 6 3 ÂÎÈÓÒÓÙ ÌÂ Ù Û ÚÌ Ù ÎÙ 6 3.1 ÚfiappleÔÈ Û Ó ÂÛË Û ÚÌ ÙˆÓ ÈÎÙ ˆÓ 7 3.2 ÚfiÙ apple Û ÚÌ ÙË Ó ÂÛË 7 3.3 ÚfiappleÔÈ ÂÈÙÔ ÚÁ (Modes) ÙÔ Access Point 8 3.3.1 AP Mode 8 3.3.2 Bridge Mode 9 3.3.3 Client Mode 9 3.3.4 Repeater Mode 11 4 È ÈÎ Û ÁÎ Ù ÛÙ ÛË 11 5 ƒ ıì ÔÓÙ ÙÔ Access Point 12 5.1 Ù ÛÙ ÛË ÙË Û ÛÎÂ (Status) 13 5.1.1 ÛÙËÌ (System ) 13 5.1.2 Ù ÙÈÛÙÈÎ ÙÔÈ Â (Statistics) 14 5.1.3 ÓÂÚÁÔ (Active) Clients 14 5.2 Wireless 14 5.2.1 µ ÛÈÎ ƒ ıì ÛÂÈ (Basic Settings) 15 5.2.2 ƒ ıì ÛÂÈ ÁÈ ÚÔ ˆÚËÌ ÓÔ (Advanced Settings) 16 5.2.3 ƒ ıì ÛÂÈ ÛÊ ÏÂ (Security) 17 5.2.4 È Â ÚÈÛË ÚfiÛ ÛË (Access Control) 19 5.2.5 Ó ÙËÛË (Site Survey) 20 5.2.6 ƒ ıì ÛÂÈ WDS (WDS Settings) 20 5.3 TCP/IP 22 5.4 Other Settings 23 5.4.1 Upgrade Firmware 23 5.4.2 Save/Reload Settings 24 5.4.3 Password 24 5.4.4 Log 25 6 Â ÓÈÎ ÀappleÔÛÙ ÚÈÍË 25 7 Â ÓÈÎ ÚÔ È ÁÚ Ê 26 8 ÂÍÈÏfiÁÈÔ 27
1 ÂÚÈ fiìâó ÛÎÂ Û ñ Crypto WA 100 Wireless Access Point ñ ªÂÙ Û ËÌ ÙÈÛÙ ƒâ Ì ÙÔ ñ Á ÂÈÚ ÈÔ ÃÚ ÛÙË, ÁÁ ËÛË 2 Ô WA 100 Wireless Access Point Á ÚËÙ ÚÈ ÁÈ ÙËÓ ÁÔÚ ÙÔ WA 100 Wireless Access Point, ÙÔ ÔappleÔ Ô ÂÍ ÛÊ ÏÈ- ÂÈ ËÏ applefi ÔÛË, È ÓÈÎ ÁÈ Û ÚÌ ÙË Û Ó ÂÛË ÈÎÙ ˆÓ Û ËÏ Ù ÙËÙÂ! Ô WA 100 Wireless Access Point appleôûùëú ÂÈ ÙÔ Ó Ô appleúfiù appleô ËÏ Ù ÙËÙ IEEE 802.11g ÙÔ ÔappleÔ Ô ÂappleÈÙ Á ÓÂÈ Ù ÙËÙÂ Û Ó ÂÛË 54Mbps. Ô 802.11g Â Ó È Âapple ÛË Û Ì Ùfi ÌÂ Û ÛΠappleô appleôûùëú Ô Ó ÙÔ appleúfiù appleô 802.11b. Ùfi ÛËÌ - ÓÂÈ fiùè ÂÓ ÚÂÈ ÂÙ È Ó ÏÏ ÍÂÙ ÔÏfiÎÏËÚÔ ÙÔ ÎÙ Ô Û ÁÈ Ó ÂÓÛˆÌ ÙÒÛÂÙ ÙÈ Î ÈÓÔ ÚÁÈ 802.11g Û ÛÎÂ. appleèappleï ÔÓ, apple Ú ÙË appleúôûêâúfiìâóë ÁÚ ÁÔÚË ÌÂÙ ÊÔÚ Â ÔÌ ÓˆÓ, ÙÔ WA 100 Wireless Access Point appleôûùëú ÂÈ ÙÈ Î ÈÓÔ ÚÁÈÂ Î È appleèô appleúôëáì Ó ÏÂÈÙÔ ÚÁ  ÛÊ Ï appleô apple Ú ÔÓÙ È Û ÌÂÚ. È apple Ú ÌÂÙÚÔÈ ÛÊ Ï ÌappleÔÚÔ Ó Ó È - ÌÔÚʈıÔ Ó ÁÈ ÂÙ ÈÚ Â, ÁÚ ÊÂ, Î È Âapple ÁÁÂÏÌ ÙÈÎÔ ÒÚÔ Î ıò Î È ÁÈ ÔÈÎÈ Î Ú ÛË. ËÏÔ Î Ú Ô appleôûappleòìâóë ÎÂÚ ÙÔ WA 100 Wireless Access Point Î ıèûù Ó Ù ÙËÓ ÂÁÎ Ù ÛÙ ÛË ÂÓfi ÂÍ ÈÚÂÙÈÎ ÁÚ ÁÔÚÔ ÈÎÙ Ô, ˆÚ ÙËÓ ÂÁÎ Ù - ÛÙ ÛË Î Ïˆ ˆÓ. ªappleÔÚ ÙÂ Ó appleôîù ÛÂÙ appleúfiû ÛË Û appleôïôáèûù Û Â fió applefi fiappleô Î È Ó Ú ÛÎÂÛÙÂ Ì Û ÛÂ Ó ÎÙ ÚÈÔ Û ÓÔÈ ÙÔ ÒÚÔ. Ó È ÎfiÌË Ó Ùfi Ó ËÌÈÔ ÚÁ ÛÂÙÂ Ó ÌÂÁ Ï ÙÂÚÔ, appleèô ÛÊ Ï Î È appleèô  ÏÈÎÙÔ ÎÙ Ô ÛÙÔ Ûapple ÙÈ ÛÙÔ ÁÚ Ê Ô. ªappleÔÚ ÙÂ Ó ÌÔÈÚ ÂÛÙÂ Ú Â, ÂÎÙ appleˆù Î È ÒÚÔ Û ÛÎÏËÚÔ ÛÎÔ, Û Ó ÂÛË ÛÙÔ Internet Î È Ó ÂÁÎ Ù ÛÙ ÛÂÙÂ Ó ÌÈÎÚfi ÎÙ Ô ÛÙÔ Ûapple ÙÈ ÛÙÔ ÁÚ ÊÂ Ô Û ˆÚ ÂappleÈappleÏ ÔÓ ÍÔ ÁÈ ÙËÓ ÂÁÎ Ù ÛÙ ÛË Î Ïˆ ˆÓ. 4
2.1 Ã Ú ÎÙËÚÈÛÙÈÎ ÚÔ fióùô ñ Ì Ùfi Ì ٠appleúfiù apple IEEE 802.11g Î È 802.11b ñ ÙËÙ ÌÂÙ ÊÔÚ Â ÔÌ ÓˆÓ ÛÙ 54Mbps ÁÈ ÙÔ 802.11g Î È 11Mps ÁÈ ÙÔ 802.11b ñ À ËÏ ÛÊ ÏÂÈ ÈÎÙ Ô Ì appleôûù ÚÈÍË WEP, WPA Î È WPA-PSK. ñ ÔÏÏ appleïô ÚfiappleÔÈ ÂÈÙÔ ÚÁ : AP, Client, Bridge Î È Repeater ñ appleôûappleòìâóë ÂÚ 2.2 Ó Â ÍÂÈ LED ÌappleÚÔÛÙÈÓ fi Ë ÙÔ Crypto WA 100 Wireless Access Point: 4 3 2 1 5 6 7 8 LED Ú ÛÙËÚÈfiÙËÙ 1 Power Ó appleú ÛÈÓË Ó ÂÈÍË ËÏÒÓÂÈ fiùè Ë Û ÛÎÂ Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓË 2 Status Ó ÎfiÎÎÈÓË Ó ÂÈÍË ËÏÒÓÂÈ fiùè Ë Û ÛΠÍÂÎÈÓ ÂÈ ÙË ÏÂÈÙÔ ÚÁ ÙË 3 Link/Act. Ó appleú ÛÈÓË Ó ÂÈÍË ËÏÒÓÂÈ fiùè Ë Û Ó ÂÛË WLAN ÂÈ ÂappleÈÙ ıâ Î È fiù Ó Ó ÔÛ ÓÂÈ fiùè apple Ú ÂÈ WLAN Ú ÛÙËÚÈfiÙËÙ 4 WEP/WPA Ó appleôúùôî Ï Ó ÂÈÍË ËÏÒÓÂÈ fiùè Ë Û ÚÌ ÙË ÛÊ ÏÂÈ Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓË 5 MAC Ctrl Ó appleôúùôî Ï Ó ÂÈÍË ËÏÒÓÂÈ fiùè ÙÔ MAC Control Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ 6 WDS Ó appleôúùôî Ï Ó ÂÈÍË ËÏÒÓÂÈ fiùè ÙÔ WDS Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ 7 LAN1 Ó appleú ÛÈÓË Ó ÂÈÍË ËÏÒÓÂÈ fiùè Ë Û Ó ÂÛË Ì Ûˆ LAN 8 LAN2 ÂÈ ÂappleÈÙ ıâ Î È fiù Ó Ó ÔÛ ÓÂÈ fiùè apple Ú ÂÈ LAN Ú ÛÙËÚÈfiÙËÙ 5
2.3 Ûˆ Ÿ Ë Ô Crypto WA 100 Wireless Access Point: 1 2 3 4 5 Port/button ÂÈÙÔ ÚÁ  1 12V DC Ó ÂÙ È Ì ÙÔ ÌÂÙ Û ËÌ ÙÈÛÙ ÚÂ Ì ÙÔ 2 LAN1 Ó ÂÙ È ÛÙÔ ÎÙ Ô Ethernet 3 LAN2 Ó ÂÙ È ÛÙÔ ÎÙ Ô Ethernet 4 RESET Ù ÛÙ ÁÈ appleâúèûûfiùâúô applefi 3  ÙÂÚfiÏÂappleÙ ÁÈ Ó Âapple ÓÂÎÎÈÓ ÛÂÙ ÙË Û ÛÎÂ. Ù ÛÙ ÁÈ appleâúèûûfiùâúô applefi 10  ÙÂÚfiÏÂappleÙ ÁÈ Ó Âapple Ó Ê ÚÂÙ ÙÈ ÂÚÁÔÛÙ ÛÈ Î Ú ıì ÛÂÈ. 5 Antenna Ó ÂÙ È Ì ÙËÓ appleôûappleòìâóë ÎÂÚ 2.4 apple ÈÙ ÛÂÈ ÛÙ Ì ÙÔ ñ ÂÈÙÔ ÚÁÈÎ Û ÛÙ Ì Ù Windows 98, Me, 2000, XP ñ ÀappleÔÏÔÁÈÛÙ Ì Pentium 200MHz appleâúèûûfiùâúô Â Ó È appleúôùâèófiìâóô ñ 64MB RAM ñ Microsoft Internet Explorer 6.0 ÓÂfiÙÂÚÔ ÁÈ Web-based È Â ÚÈÛË ñ Ô Ï ÈÛÙÔÓ ÌÈ Â ÛÔ Ô RJ-45 ÈÎÙ Ô Ethernet ñ ŒÓ Ô ËÁfi CD-ROM 3 ÂÎÈÓÒÓÙ ÌÂ Ù Û ÚÌ Ù ÎÙ ÏÒ Úı Ù ÛÙÔ ÎfiÛÌÔ ÙˆÓ Û ÚÌ ÙˆÓ ÈÎÙ ˆÓ! ÙÔÈÌ ÛÙ ÙÂ Ó ÛÂÙ ÙËÓ Ù ÙËÙ Î È ÙËÓ Â ÂÏÈÍ ÂÓfi Û ÚÌ ÙÔ ÈÎÙ Ô ÚËÛÈÌÔappleÔÈÒÓÙ ÙÔ WA 100 Wireless Access Point. Ò ı Ú Ù ÌÈ Û ÓÙÔÌË appleâú ÏË Ë ÙˆÓ ÛÈÎÒÓ Â Ô- Ì ÓˆÓ ÙˆÓ Û ÚÌ ÙˆÓ ÈÎÙ ˆÓ. È appleâúèûûfiùâúâ appleïëúôêôú  ÌappleÔÚ ÙÂ Ó ÎÔÈ- Ù ÍÂÙÂ Î È ÛÙÔ ÂÍÈÏfiÁÈÔ. 6
3.1 ÚfiappleÔÈ Û Ó ÂÛË Û ÚÌ ÙˆÓ ÈÎÙ ˆÓ ŒÓ ÙÔappleÈÎfi Û ÚÌ ÙÔ ÎÙ Ô (WLAN) Â Ó È fiìôèô ÌÂ Ó Û ÓËıÈÛÌ ÓÔ ÙÔappleÈÎfi ÂÓÛ ÚÌ ÙÔ ÎÙ Ô (LAN). ÙË Û ÁÎÂÎÚÈÌ ÓË appleâú appleùˆûë fiìˆ, ÂÓ apple Ú Ô Ó Î ÏÒ È Î È Ë Û Ó ÂÛË ÂappleÈÙ Á ÓÂÙ È Ì Ûˆ Û ÚÌ ÙˆÓ Î Ó ÏÈÒÓ. È appleôïôáè- ÛÙ ÛÂ Ó WLAN ÌÔÈÚ ÔÓÙ È ÙÔ ÈÔ Î Ó ÏÈ Û ÓÔÙ ÙˆÓ Î È ÚËÛÈÌÔappleÔÈÔ Ó ÙÔ ÈÔ fióôì Û ÚÌ ÙË Û Ó ÂÛË ÙÔ ÔappleÔ Ô Î ÏÂ Ù È SSID (Service Set Identifier). ÓÙÈı Ùˆ Ì ٠ÂÓÛ ÚÌ Ù ÎÙ, Ù Û ÚÌ Ù ÎÙ Ô Ó Ô È ÊÔÚÂÙÈÎÔ ÙÚfiappleÔ Û Ó ÂÛË : Infrastructure Î È Ad-Hoc. ŒÓ Û ÚÌ ÙÔ ÎÙ Ô Ù appleô Infrastructure Â Ó È ÛÙËÓ Ô Û Ó WLAN appleô ÂÓÛˆ- Ì ÙÒÓÂÈ Ó Wireless Access Point / Router. È Ó ÂÁÎ Ù ÛÙ ÛÂÙÂ Ó Û ÚÌ ÙÔ ÎÙ Ô Ù appleô Infrastructure, fiappleˆ ÛÙÔ apple Ú - ÂÈÁÌ apple Ú apple Óˆ, ı ÚÂÈ Û٠٠٠ÎfiÏÔ ı : 1. ŒÓ Wireless Access Point appleô ËÌÈÔ ÚÁÂ Û ÚÌ ÙÔ ÎÙ Ô Ù appleô Infrastructure. 2. ÀappleÔÏÔÁÈÛÙ ÂÍÔappleÏÈÛÌ ÓÔ Ì ΠÚÙÂ Û ÚÌ ÙË ÈÎÙ ˆÛË fiappleˆ Ë WP 100E Wireless PCI Card. 3.2 ÚfiÙ apple Û ÚÌ ÙË Ó ÂÛË Ô IEEE 802.11g Â Ó È ÌÈ Âapple ÎÙ ÛË ÙÔ apple Ï ÈÔÙ ÚÔ appleúôù appleô 802.11b. Í ÓÂÈ ÙË Ù ÙËÙ ÌÂÙ ÊÔÚ Â ÔÌ ÓˆÓ Ì ÚÈ Ù 54 Mbps ÛÙË Û ÓfiÙËÙ ÙˆÓ 2.4GHz, ÂÎÌÂÙ ÏÏ fiìâóô ÙËÓ Ù ÓÔÏÔÁ OFDM (Orthogonal Frequency Division Multiplexing). Ô OFDM ÏÂÈÙÔ ÚÁÂ È ÛappleÒÓÙ ÙÔ Î Ó ÏÈ ÂappleÈÎÔÈÓˆÓ ÛÂ Ó Ó ÚÈıÌfi applefi-î Ó ÏÈÒÓ. ıâ Ú ÛÙË ÂÎapple ÌappleÂÈ Û Ì ÚËÛÈÌÔappleÔÈÒÓÙ Ó ÂÛÌÂ Ì ÓÔ applefi-î Ó ÏÈ. Ùfi Â Ó È Ó appleôï appleôùâïâûì ÙÈÎfi ÙÚfiappleÔ ÂÎÌÂ- Ù ÏÏ ÛË ÙˆÓ È ı ÛÈÌˆÓ Û ÓÔÙ ÙˆÓ Î È Û Ó appleôù ÏÂÛÌ Î ı ÛÙ Ù È Ó Ùfi Ó ˆÚ ÛÂÈ Ó apple Ú appleôï ÌÂÁ ÏÔ ÚÈıÌfi  ÔÌ ÓˆÓ ÛÂ Ó ÌÈÎÚfi  ÚÔ Ê ÛÌ ÙÔ. 7
appleèappleï ÔÓ, Ë Î ÈÓÔ ÚÁÈ Ù ÓÔÏÔÁ appleôï appleïâí (multiplexing) ÂÈÚ ÂÙ È ı Ì Ù ÈÎÙ Î Î ÓËÛË (traffic) appleôï appleôùâïâûì ÙÈÎ, ÂÏ ÈÛÙÔappleÔÈÒÓÙ ÙËÓ appleèı Ófi- ÙËÙ Û ÁÎÚÔ ÛË apple Î ÙˆÓ (packet collisions). Ô Î ÈÓÔ ÚÁÈÔ appleúfiù appleô Û ÚÌ ÙË Û Ó ÂÛË ÈÎÙ ˆÓ IEEE 802.11g appleúôûê ÚÂÈ ÂappleÈappleÏ ÔÓ ÌÈ ÛÂÈÚ applefi ÂÍÂÏÈÁÌ Ó ÏÂÈÙÔ ÚÁ  ÛÊ ÏÂÈ. Ô appleúfiù appleô appleôûùë- Ú ÂÈ ÙË ÏÂÈÙÔ ÚÁ ÛÊ ÏÂÈ Wired Equivalent Privacy (WEP), appleô apple ÚÔ ÛÈ ÛÙË- Π̠ÙÔ 802.11b. Ô WEP Â Ó È Ó Ù appleô ÎÚ appleùôáú ÊËÛË Ô ÔappleÔ Ô ÂÈÛ ÁÂÈ Ó ÎÚ Êfi ÎÏÂÈ Û Ó Ó ÂappleÈappleÏ ÔÓ Ì ÙÚÔ ÛÊ ÏÂÈ ÁÈ ÙËÓ ÂÌapplefi ÈÛË appleúfiû ÛË ÓÂappleÈı ÌËÙˆÓ ÚËÛÙÒÓ ÛÂ Ó Û ÚÌ ÙÔ ÎÙ Ô. Ô Ó Ô appleúfiù appleô Wi-Fi ÚËÛÈÌÔappleÔÈ Âapple ÛË ÙÔ Î ÈÓÔ ÚÁÈÔ appleúfiù appleô WPA, ÙÔ ÔappleÔ Ô Â Ó È Û Â È ÛÌ ÓÔ ÁÈ ÂÙ ÈÚÈ- Î Û ÚÌ Ù ÈÎÙ Î Ú ÛÂÈ. apple Ú ÏÏ Á ÙÔ WPA-PSK Â Ó È È ÓÈÎ ÁÈ Ú ÛË Û ÁÚ ÊÂ Î È ÔÈÎÈ Î ÎÙ Î È Û Â È ÛÙËΠÁÈ Ó ÂÏÙÈÒÛÂÈ ÙË ÏÂÈ- ÙÔ ÚÁ ÛÊ ÏÂÈ WEP ÛÙ WLAN ÎÙ. Ô WPA-PSK ÂÓÛˆÌ ÙÒÓÂÈ ÌÈ ÊÚ ÛË ÎÏÂÈ ÁÈ Ó appleôùú ÂÈ ÓÂappleÈı ÌËÙÔ ÛÙ ıìô applefi ÙÔ Ó Û Ó ÂıÔ Ó ÌÂ Ó Access Point / Router. ŒÓ ÏÏÔ ÛËÌ ÓÙÈÎfi ÛÙÔÈ Â Ô ÙÔ IEEE 802.11g Â Ó È Ë Û Ì ÙfiÙËÙ Ì ÙÈ apple Ï Èfi- ÙÂÚ 802.11b Û ÛÎÂ. È Ù Ô appleúfiù apple ÏÂÈÙÔ ÚÁÔ Ó ÛÙÔ ÈÔ Â ÚÔ Û ÓÔ- Ù ÙˆÓ Î È ÙÔ Ó Ô Û ÚÌ ÙÔ appleúfiù appleô ÂÈ ÙË Ó ÙfiÙËÙ Ó ÏÏ ÂÈ ÌÂÙ Í ÙÔ OFDM Î È ÙÔ DSSS, ÙË Ù ÓÔÏÔÁ ÌÂÙ ÔÛË appleô ÚËÛÈÌÔappleÔÈÔ Û ÙÔ 802.11b, fiù Ó Û ÛΠappleô ÚËÛÈÌÔappleÔÈÔ Ó Ùfi ÙÔ appleúfiù appleô Â Ó È apple ÚÔ Û ÛÂ Ó WLAN. Ùfi Û ÓÂapple ÁÂÙ È fiùè Â Ó Ë ÂÙÂ Ó Û ÚÌ ÙÔ ÎÙ Ô ÛÈÛÌ ÓÔ ÛÙÔ appleúfiù appleô IEEE 802.11b, ÔÈ Û ÛΠ۠ÂΠÓÔ ÙÔ ÎÙ Ô ı ÏÂÈÙÔ ÚÁ ÛÔ Ó ˆÚ Î Ó - Ó appleúfi ÏËÌ Ì ÙÈ Û ÛΠ802.11g Û ٠ÙËÙÂ Ì ÚÈ Ù 11Mbps. Ú Ù ÌÈ appleèô Ó Ï ÙÈÎ appleâúèáú Ê ÙˆÓ ÏÂÈÙÔ ÚÁÈÒÓ ÛÊ ÏÂÈ Î È ÈÎÙ ˆÓ appleô apple Ú ÔÓÙ È ÛÙÔ ÎÂÊ Ï Ô ƒ ıì ÔÓÙ ÙÔ Access Point ÙÔ Á ÂÈÚÈ Ô ÃÚ ÛÙË. 3.3 ÚfiappleÔÈ ÂÈÙÔ ÚÁ (Modes) ÙÔ Access Point Àapple Ú Ô Ó Ù ÛÛÂÚÈ ÙÚfiappleÔÈ Û Ó ÂÛË ÙÔ Access Point. 3.3.1 AP Mode ŸÙ Ó ÂÓÂÚÁÔappleÔÈÂ Ù È Ë ÏÂÈÙÔ ÚÁ AP Mode (Access Point Mode), Ë Û ÛÎÂ Û Ó- ÂÈ fiïâ ÙÈ Û ÚÌ ÙÂ Û ÛΠÌÂÙ Í ÙÔ Î È, appleèı ÓfiÓ, ÌÂ Ó ÂappleÈappleÏ ÔÓ ÂÓÛ ÚÌ ÙÔ ÎÙ Ô. Ó ÙÔ Access Point ÂÈ appleúfiû ÛË ÛÂ Û Ó ÂÛË Internet, ÙfiÙ fiïôè ÔÈ Û Ó Â ÂÌ ÓÔÈ Ú ÛÙÂ Ô Ó appleúfiû ÛË Û ٠ÙËÓ Û Ó ÂÛË. 8
3.3.2 Bridge Mode ŸÙ Ó ÏÂÈÙÔ ÚÁÔ Ó Û Ó Bridges, ÙÔ AP1 Î È ÙÔ AP2 ÌappleÔÚÔ Ó Ó ÂappleÈÎÔÈÓˆÓÔ Ó ÌÂÙ - Í ÙÔ Ì Ûˆ ÙË Û ÚÌ ÙË Û Ó ÂÛË. ŒÙÛÈ ÙÔ AP1 ÌappleÔÚÂ Ó ÂappleÈÎÔÈÓˆÓ Ì ÙÔ AP2, Î È Ù Ô fiìˆ Ô Ó appleúfiû ÛË ÛÙÔ Internet Â Ó ÙÔ AP1 ÙÔ AP2 ÂÈ Û Ó- ÂÛË Internet. 3.3.3 Client Mode Àapple Ú Ô Ó Ô Ù appleôè Û Ó ÂÛË ÙÔ Client Mode: ñ Infrastructure Ó Â Ó È Ú ıìèûì ÓÔ ÛÙÔ Client (Infrastructure) mode, Ë Û ÛÎÂ Â Ó È Ú ıìèûì - ÓË Ó ÏÂÈÙÔ ÚÁÂ Û Ó Û ÚÌ ÙÔ Ú ÛÙË ÂÓfi apple Ú ÔÓÙÔ AP (AP 2) ÙÔ ÔappleÔ Ô ËÌÈÔ ÚÁÂ Ó ÎÙ Ô Infrastructure Network. Ô AP 1 Â Ó È appleâ ıâ Û Ó Â Â- Ì ÓÔ ÛÙÔÓ appleôïôáèûù (ÂÓÛ ÚÌ ÙË Û Ó ÂÛË) Î È apple Ú ÂÈ Û Ó ÂÛÈÌfiÙËÙ ÛÂ Ó apple Ú ÔÓ WLAN appleô ÂÈ ËÌÈÔ ÚÁ ÛÂÈ Ó ÏÏÔ AP. 9
Ó ÙÔ AP 2 ÂÈ Û Ó ÂÛË ÛÙÔ Internet, ÙfiÙÂ ÙÔ AP1 fiappleˆ Î È ÔÈ ÂÓÛ ÚÌ ÙÔÈ Ú - ÛÙÂ ı Ô Ó appleúfiû ÛË ÛÙÔ Internet. Ù Ë ÏÂÈÙÔ ÚÁ, ÌÂÙ ÏÂÈ ÙË Û ÛÎÂ ÛÂ ÌÈ Û ÚÌ ÙË ÈÎÙ Î Û ÛÎÂ appleô appleúôôú ÂÙ È ÁÈ Ó Infrastructure ÎÙ Ô. ñ Ad-hoc Ó Â Ó È Ú ıìèûì ÓÔ ÛÙÔ Client (Ad-Hoc) mode, Ë Û ÛÎÂ Â Ó È Ú ıìèûì ÓË Ó ÏÂÈÙÔ ÚÁÂ Û Ó Û ÚÌ ÙÔ Ú ÛÙË ÂÓfi apple Ú ÔÓÙÔ ÈÎÙ Ô Ad-Hoc. Ô AP Â Ó È appleâ ıâ Û Ó Â ÂÌ ÓÔ ÛÂ Ó appleôïôáèûù (ÂÓÛ ÚÌ ÙË Û Ó ÂÛË) Î È apple Ú ÂÈ Û Ó ÂÛÈÌfiÙËÙ ÛÂ Ó apple Ú ÔÓ Ad-Hoc WLAN appleô Ô Ó ËÌÈÔ ÚÁ ÛÂÈ ÏÏÔÈ Û ÚÌ ÙË Ú ÛÙÂ. Ó ÔÈ Ú ÛÙÂ Ô Ó Û Ó ÂÛË Internet, ÙfiÙÂ ÙÔ AP fiappleˆ Î È ÔÈ ÂÓÛ ÚÌ ÙÔÈ Ú ÛÙÂ ı Ô Ó appleúfiû ÛË ÛÙÔ Internet. Ù Ë ÏÂÈÙÔ ÚÁ, ÌÂÙ - ÏÂÈ ÙË Û ÛÎÂ ÛÂ ÌÈ Û ÚÌ ÙË ÈÎÙ Î Û ÛÎÂ appleô appleúôôú ÂÙ È ÁÈ Ó Ad- Hoc ÎÙ Ô. 10
3.3.4 Repeater Mode ªappleÔÚ ÙÂ Ó ÚËÛÈÌÔappleÔÈ ÛÂÙ ٠ÙË ÏÂÈÙÔ ÚÁ ÁÈ Ó ÊÙÈ ÍÂÙÂ Ó ÌÂÁ Ï ÙÂ- ÚÔ Û ÚÌ ÙÔ ÎÙ Ô Û ÌÂÁ Ï ÙÂÚÔ ÒÚÔ fiappleˆ ÂÚÔ ÚfiÌÈ, ÍÂÓÔ Ô Â, Û ÔÏ Î... Ù Ë ÏÂÈÙÔ ÚÁ Â Ó È Âapple ÛË Ú ÛÈÌË fiù Ó ÔÈ Ú ÛÙ ı ÏÔ Ó Ó Û Ó ÛÔ Ó ÎÙ ÌÂÙ Í ÎÙÈÚ ˆÓ, fiù Ó Â Ó È Ó ÙÔÓ Ó Á ÓÂÈ ÂÓÛ ÚÌ ÙË Û Ó- ÂÛË ÌÂÙ Í ÙÔ. ËÌ ˆÛË: È Ó ÂÓÂÚÁÔappleÔÈ ÛÂÙ ٠Client, Bridge Î È Repeater modes, fiï Ù APs appleú appleâè Ó Ô Ó ÙÔ WDS ÂÓÂÚÁÔappleÔÈËÌ ÓÔ Î È appleú appleâè Ó appleúôûı ÛÔ Ó ÙÔ Î ı Ó ÙÔ ÏÏÔ Û Ó WDS Access Point. (apple... ÚÔÛı ÛÙ ÙËÓ MAC address ÙÔ AP2 ÛÙÔ WDS AP List ÙÔ AP1 Î È ÙÔ ÓÙ ÛÙÚÔÊÔ). 4 È ÈÎ Û ÁÎ Ù ÛÙ ÛË ñ µè ÒÛÙ ÙËÓ ÎÂÚ ÛÙË apple Ûˆ fi Ë ÙÔ Access Point. ñ Ó ÛÙ ÙÔ ÌÂÙ Û ËÌ ÙÈÛÙ ÚÂ Ì ÙÔ ÙÔ Access Point ÛÙÔ Ú Ì. ñ Ó Âı Ù Ì ÙÔ Access Point Àapple Ú Ô Ó Ô ÙÚfiappleÔÈ ÁÈ Ó Û Ó Âı Ù Ì ÙÔ Access Point: Û ÚÌ ÙË Ó ÂÛË: ÁÎ Ù ÛÙ ÛÙÂ Ì Û ÛÎÂ Û ÚÌ ÙË Û Ó ÂÛË ÈÎÙ Ô fiappleˆ Ë Crypto WP 100E Wireless PCI Card. ƒ ıì ÛÙ ÙËÓ WP 100E Î È Û Ó Âı ÙÂ Û ÚÌ Ù Ì ÙÔ Access Point. ÓÛ ÚÌ ÙË Ó ÂÛË: Ó ÛÙ ÙÔ Access Point Ì ÙËÓ Î ÚÙ ÈÎÙ Ô ÙÔ appleôïôáè- ÛÙ Û, ÚËÛÈÌÔappleÔÈÒÓÙ Ó Î ÏÒ ÈÔ ÈÎÙ Ô RJ-45. 11
5 ƒ ıì ÔÓÙ ÙÔ Access Point Ô ÚfiÁÚ ÌÌ È Â ÚÈÛË Û ÂappleÈÙÚ appleâè Ó Û Ó Âı ÙÂ Û ÚÌ Ù Î È Ó È ÌÔÚ- ÊÒÛÂÙ ÙÈ Ú ıì ÛÂÈ ÙË Û Ó ÂÛË. Ú ÂÈ ÛËÌ ÓÙÈÎ appleïëúôêôú  ÁÈ ÙËÓ appleôèfiùëù Î È ÙË Û ÌappleÂÚÈÊÔÚ ÙÔ Û ÚÌ ÙÔ Î Ó ÏÈÔ Î È ÂappleÈÙÚ appleâè Ó ÂÏÙÈÒ- ÛÂÙ ÙËÓ applefi ÔÛË ÙÔ WA 100 Wireless Access Point. ªappleÔÚ ÙÂ Ó ÂÙ appleúfiû ÛË ÛÙÔ WA 100 Wireless Access Point Ì Ûˆ ÙÔ Web Browser. È Ó Ìapple Ù ÛÙÔ ÌÂÓÔ Ú ıì ÛÂˆÓ ÓÔ ÍÙÂ Ó apple Ú ı ÚÔ ÙÔ web browser Î È appleïëîùúôïôá ÛÙ ÙËÓ IP address ÙÔ Access Point. appleúôî ıôúèûì ÓË IP Â Ó È 192.168.1.254 ÈÛ ÁÂÙ ÙÔ user name Î È password. Ô appleúôî ıôúèûì ÓÔ username Â Ó È: admin, Î È ÂÓ ÚÂÈ ÂÙ È Î appleôèô password. ÎÂÓÙÚÈÎ ÛÂÏ ı ÂÌÊ ÓÈÛÙÂ. 12
5.1 Ù ÛÙ ÛË ÙË Û ÛΠ(Status) Ù Ë ÛÂÏ apple Ú ÂÈ ÛËÌ ÓÙÈÎ appleïëúôêôú  ÁÈ ÙËÓ Î Ù ÛÙ ÛË ÙÔ WA 100 Wireless Access Point Î È ÔÏfiÎÏËÚÔ ÙÔ Û ÚÌ ÙÔ ÈÎÙ Ô. 5.1.1 ÛÙËÌ (System ) ªappleÔÚ ÙÂ Ó ÂÙ ÌÈ appleï ÚË appleô Ë ÙË Î Ù ÛÙ ÛË ÙË Û ÛÎÂ Û : Uptime:  ÓÂÈ ÙËÓ ÚÔÓÈÎ appleâú Ô Ô appleô Ë Û ÛÎÂ Â Ó È Û ÏÂÈÙÔ ÚÁ. Firmware Version:  ÓÂÈ ÙËÓ Î ÔÛË ÙÔ firmware. Wireless Mode: ÀappleÔÛÙËÚ ÔÓÙ È Ù ÛÛÂÚÈ ÏÂÈÙÔ ÚÁ  : Access Point, Client (Ad-hoc Î È Infrastructure), Bridge Î È Repeater. appleúôâappleèïâáì ÓË ÏÂÈÙÔ ÚÁ Â Ó È Access Point. SSID: Service Set Identifier, Â Ó È Ó ÌÔÓ ÈÎfi fióôì appleô ÚËÛÈÌÔappleÔÈÂ Ù È applefi fiïô ÙÔ clients Î È nodes ÛÂ Ó Û ÚÌ ÙÔ ÎÙ Ô Î È ÙÔ ÔappleÔ Ô appleú appleâè Ó Â Ó È ÙÔ ÈÔ ÁÈ fiïô ÙÔ clients Î È nodes Ì Û ÛÂ Ó Û ÚÌ ÙÔ ÎÙ Ô. Channel: Ô Î Ó ÏÈ ÛÙÔ ÔappleÔ Ô ÙÔ Access Point ı ÏÂÈÙÔ ÚÁÂ. È ÙÈ Úˆapple Î ÃÒÚÂ, ÌappleÔÚ ÙÂ Ó È Ï ÍÂÙÂ Ó Î Ó ÏÈ applefi ÙÔ 1 ˆ ÙÔ 13. Encryption: Ô Encryption Â Ó È Ó ÙÚfiappleÔ ÁÈ Ó ÂÙ ÛÊ ÏÂÈ ÙˆÓ Â ÔÌ - ÓˆÓ. ªappleÔÚ ÙÂ Ó Â Ù appleôè Ì ıô Ô encryption ÚËÛÈÌÔappleÔÈÂ Ù È applefi ÙË Û ÛÎÂ. Associated Clients:  ÓÂÈ ÙÔ Û ÓÔÏÈÎfi ÚÈıÌfi ÙˆÓ ÚËÛÙÒÓ appleô Â Ó È Û Ó Â Â- Ì ÓÔÈ Ì ÙÔ AP. ªappleÔÚÂ Ó apple Ú Ô Ó Ì ÚÈ Î È 64 Ú ÛÙÂ Û Ó Â ÂÌ ÓÔÈ Ì ÙÔ Access Point. BSSID:  ÓÂÈ ÙÔ ID ÙÔ ÚËÛÈÌÔappleÔÈÔ ÌÂÓÔ Service Set. ÙË ÏÂÈÙÔ ÚÁ AP mode, Ù Ë ÙÈÌ Â Ó È Ë MAC address ÙÔ Access Point. IP Protocol:  ÓÂÈ ÙË Ì ıô Ô appleô ÚËÛÈÌÔappleÔÈ ÙÔ access point, ÁÈ Ó ÓÂÈ IP Û Πıâ Ú ÛÙË. ªappleÔÚÂ Ó Â Ó È Fixed-IP DHCP-client. ªappleÔÚ Ù Âapple ÛË Ó Â Ù ÙËÓ È ı ÓÛË IP, ÙÔ subnet mask, ÙË ÙÈÌ ÙÔ default gateway Î È ÙËÓ MAC address ÙÔ WA 100. 13
5.1.2 Ù ÙÈÛÙÈÎ ÙÔÈ Â (Statistics) Ù Ë ÛÂÏ apple Ú ÂÈ appleïëúôêôú  ÁÈ Ù ÛÙ ÏÌ Ó Î È ÏËÊı ÓÙ apple Î Ù, ÙfiÛÔ applefi ÙËÓ Û ÚÌ ÙË fiûô Î È applefi ÙËÓ ÂÓÛ ÚÌ ÙË Û Ó ÂÛË. 5.1.3 ÓÂÚÁÔ (Active) Clients Ù Ë ÛÂÏ Â ÓÂÈ applefiûôè Ú ÛÙÂ Â Ó È Û Ó Â ÂÌ ÓÔÈ Ì ÙÔ Access Point. ŸÙ Ó Ë Û ÛÎÂ Â Ó È Ú ıìèûì ÓË Û Ó DHCP server, ÔÈ IPs appleô Ô Ó ÔÈ Ú ÛÙÂ Â Ó È ÔÚ Ù. Ó Ô DHCP server Â Ó È appleâóâúáôappleôèëì ÓÔ, ÙfiÙ ÌfiÓÔ ÔÈ MAC addresses Â Ó È È ı ÛÈÌÂ. ÛÂÏ Âapple ÛË apple Ú ÂÈ appleïëúôêôú  ÁÈ ÙË Û Ó ÂÛË Ì ÙÔ Î ıâ Ú ÛÙË. 5.2 Wireless Ò apple Ú Ô Ó ÌÂÚÈÎ ÛÂÏ Â appleô Û ÓÔ Ó appleúfiû ÛË ÛÙÈ Û ÚÌ ÙÂ Ú ıì - ÛÂÈ ÙÔ AP. ªappleÔÚ ÙÂ Ó Ú ıì ÛÂÙ Πıâ ÏÂappleÙÔÌ ÚÂÈ ÙË Û ÛÎÂ Û ÌÊˆÓ Ì ÙÈ Ó ÁÎÂ Î È ÙÈ appleúôùèì ÛÂÈ Û. ŸÏ ÔÈ Ú ıì ÛÂÈ appleâúèáú ÊÔÓÙ È Î È Ó Ï Ô- ÓÙ È apple Ú Î Ùˆ. È ÂappleÈappleÏ ÔÓ appleïëúôêôú Â, ÌappleÔÚ ÙÂ Ó ÎÔÈÙ ÍÂÙ ÙÔ ÂÍÈÏfiÁÈÔ. 14
5.2.1 µ ÛÈÎ ƒ ıì ÛÂÈ (Basic Settings) Ù Ë ÛÂÏ apple Ú ÂÈ appleïëúôêôú  ÁÈ Ù ÛÙ ÏÌ Ó Î È ÏËÊı ÓÙ apple Î Ù, ÙfiÛÔ applefi ÙËÓ Û ÚÌ ÙË fiûô Î È applefi ÙËÓ ÂÓÛ ÚÌ ÙË Û Ó ÂÛË. Disable Wireless LAN Interface: ÛÂÎ ÚÂÙ Ùfi ÙÔ ÎÔ Ù ÎÈ ÁÈ Ó appleâóâúáôappleôè - ÛÂÙ ÙÔ Wireless LAN Interface. Ó ÙÔ Î ÓÂÙ Ùfi, Ë Û ÛΠÂÓ ı Â Ó È ÔÚ Ù applefi Î Ó Ó Û ÚÌ ÙÔ Ú ÛÙË. Band: ªappleÔÚ ÙÂ Ó È Ï ÍÂÙÂ Ì ÏÂÈÙÔ ÚÁ applefi ÙÈ ÎfiÏÔ ıâ : ñ 2.4GHz (B): 802.11b appleôûù ÚÈÍË ÌfiÓÔ. ñ 2.4GHz (G): 802.11g appleôûù ÚÈÍË ÌfiÓÔ. ñ 2.4GHz (B+G): 802.11b appleôûù ÚÈÍË Î È 802.11g appleôûù ÚÈÍË. Mode: Ô Wireless Access Point ÌappleÔÚÂ Ó appleôûùëú ÍÂÈ Ù ÛÛÂÚ modes: AP, Client, Bridge Î È Repeater Network Type: ŸÙ Ó Â ÛÙ Û Client mode, ÌappleÔÚ ÙÂ Ó ÂappleÈÏ ÍÂÙ ÌÂÙ Í Ad-Hoc Î È Infrastructure. SSID: Ô Service Set Identifier Â Ó È Ó ÌÔÓ ÈÎfi fióôì appleô ÚËÛÈÌÔappleÔÈÂ Ù È applefi fiïô ÙÔ clients Î È nodes ÛÂ Ó Û ÚÌ ÙÔ ÎÙ Ô. Ô SSID appleú appleâè Ó Â Ó È ÙÔ ÈÔ ÁÈ fiïô ÙÔ clients Î È nodes Ì Û ÛÂ Ó Û ÚÌ ÙÔ ÎÙ Ô, Î È ÂÓ appleú appleâè Ó ÍÂappleÂÚÓ ÙÔ 32 Ú ÎÙ ÚÂ. Region Domain: Ô domain ÙÔ AP Î ıôú ÂÈ ÙÔÓ ÚÈıÌfi ÙˆÓ È ı ÛÈÌˆÓ Î Ó - ÏÈÒÓ. Channel Number: ÂappleÈÙÚ appleâè Ó Ú ıì ÛÂÙ ÙÔ Û ÚÌ ÙÔ Î Ó ÏÈ manually (ÌfiÓÔÈ Û ) automatically ( ÙfiÌ Ù ). ŸÏÔÈ ÔÈ Ú ÛÙ appleô ÂappleÈÎÔÈÓˆÓÔ Ó Ì ÙÔ Access Point appleú appleâè Ó ÚËÛÈÌÔappleÔÈÔ Ó ÙÔ ÈÔ Î Ó ÏÈ. Enable Mac Clone (Single Ethernet Client): Ó Ô ISP Û, appleâúèôú ÂÈ ÙË Ú ÛË ÙË Û Ó ÂÛË ÌfiÓÔ ÛÂ Ó Ó appleôïôáèûù, ÚËÛÈÌÔappleÔÈ ÛÙ ÙË ÏÂÈÙÔ ÚÁ MAC Clone ÁÈ Ó ÓÙÈÁÚ ÂÙÂ Ì PC Media Access Control (MAC) address ÛÙÔ router Û. Ù Ë È ÈÎ Û ı ÂÌÊ Ó ÛÂÈ ÙÔ router Û Ó Ó appleïfi appleôïôáèûù, ÂappleÈÙÚ appleôóù Û Á- ÚfiÓˆ appleúfiû ÛË Û appleôïï appleïô appleôïôáèûù ÛÙÔ ÎÙ Ô Û. 15
ÓÙ ÎÏÈÎ ÛÙÔ Apply Changes ÁÈ Ó ÛÒÛÂÙ ÙÈ Î ÈÓÔ ÚÁÈÂ Ú ıì ÛÂÈ ÛÙËÓ ÔıfiÓË Û. ÓÙ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó appleôúú ÂÙ ٠ ÔÌ Ó appleô ÂÙ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏ ٠ÊÔÚ appleô apple Ù Û Ù ÙÔ Apply Changes. 5.2.2 ƒ ıì ÛÂÈ ÁÈ ÚÔ ˆÚËÌ ÓÔ (Advanced Settings) Ù Ë ÛÂÏ appleâúè ÂÈ Ú ıì ÛÂÈ appleô ÂÛÙÈ Ô Ó Î Ú ˆ Û appleúô ˆÚËÌ ÓÔ Ú - ÛÙÂ. ªappleÔÚ ÙÂ Ó ÚËÛÈÌÔappleÔÈ ÛÂÙ ٠ÙË ÛÂÏ ÁÈ Ó ÏÏ ÍÂÙ ٠ÙÈ Ú ıì ÛÂÈ ÁÈ Ó Î Ï ÙÂÚ ÛÂÙ ÙËÓ applefi ÔÛË ÙÔ ÈÎÙ Ô. Authentication Type: Ù appleô ÙÔ authentication Â Ó È appleúôî ıôúèûì ÓÔ ÛÙÔ Open System. Àapple Ú Ô Ó ÙÚÂÈ ÂappleÈÏÔÁ : Open System, Shared Key and Auto. ŸÏÔÈ ÔÈ nodes Î È ÔÈ hosts ÛÙÔ ÎÙ Ô ÚËÛÈÌÔappleÔÈÔ Ó ÙÔÓ ÈÔ Ù appleô authentication. Ô Open System authentication Â Ó È Ó ÌË ÂÓÈÎfi ÏÁfiÚÈıÌÔ. ıâ Û ÛΠappleô ËÙ ÂÈ authentication ÙÔ Ï Ì ÓÂÈ. ŸÙ Ó Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ ÙÔ Shared Key authentication, ÙÔ Access Point / Router ÛÙ ÏÓÂÈ Ó apple Î ÙÔ ÛÙÔÓ client. Ó ÙÔ apple Î ÙÔ Â Ó È ÛˆÛ٠Έ ÈÎÔappleÔÈËÌ ÓÔ ÙfiÙÂ Ô client Â Ó È authenticated. Fragmentation Threshold: È Ó Ú ıì ÛÂÙ ÙÔ ÚÈıÌfi ÙˆÓ bytes appleô appleôùâïô Ó ÙÔ fiúèô ÙÔ fragmentation ÙˆÓ apple Î ÙˆÓ. Ú ÛË ÙÔ Î Ù ÏÏËÏÔ ÔÚ Ô fragmentation ÌappleÔÚÂ Ó Ô ËÁ ÛÂÈ ÛÂ Î Ï ÙÂÚË appleôèfiùëù ÙÔ Û ÚÌ ÙÔ ÈÎÙ Ô, ÁÈ Ù ÛÙ ÏÓÔÓÙ ÌÈÎÚfiÙÂÚ frames ÂÈ Û Ó appleôù ÏÂÛÌ Ó Î Ù appleôïâì Ù ÙË appleèı ÓfiÙËÙ Û ÁÎÚÔ - ÛË apple Î ÙˆÓ ÏfiÁˆ ÙË Î ÓËÛË ÛÙÔ ÎÙ Ô. Ó fiìˆ ÔÚ ÛÂÙ ÙÔ fiúèô appleôï ÌËÏ ÌappleÔÚÂ Ó Ô ËÁ ÛÂÈ Û ÌËÏfiÙÂÚÔ throughput. Ô ËÏfi fiúèô fragmentation ÂÈ ÎÚÈ Ò Ù ÓÙ ıâù appleôùâï ÛÌ Ù. ÚÔÎ ıôúèûì ÓË ÙÈÌ : 2346 bytes. RTS Threshold: È Ó Ú ıì ÛÂÙ ÙÔ Ì ÁÂıÔ ÙˆÓ apple Î ÙˆÓ RTS. Ô RTS (Request To Send) Â Ó È Ó Û Ì appleô ÛÙ ÏÓÂÙ È applefi ÙË Û ÛΠappleô ı ÏÂÈ Ó ÌÂÙ ÒÛÂÈ appleïë- ÚÔÊÔÚ Â ÛÙË Û ÛΠÙÔ Ú ÛÙË ËÙÒÓÙ ÂÈ ÁÈ Ó ÌÂÙ ÒÛÂÈ. Ó ÙÔ apple Î - ÙÔ appleô ÌÂÙ ÂÈ ÙÔ Access Point Â Ó È ÌÂÁ Ï ÙÂÚÔ applefi ÙÔ fiúèô, ı ÍÂÎÈÓ ÛÂÈ ÙË ÏÂÈ- ÙÔ ÚÁ RTS. Ó ÙÔ Ì ÁÂıÔ ÙÔ apple Î ÙÔ Â Ó È ÛÔ ÌÂÁ Ï ÙÂÚÔ applefi ÙÔ fiúèô, ÙÔ access point ÂÓ ı ÍÂÎÈÓ ÛÂÈ ÙÔ RTS. ªappleÔÚ ÙÂ Ó ÚËÛÈÌÔappleÔÈ ÛÂÙÂ Ó fiúèô Á Úˆ ÛÙÔ 500. Ó Î ıôú Û Ù appleôï ËÏ ÙÈÌ, ÙfiÙÂ Û ÁÎÚÔ ÛÂÈ apple Î ÙˆÓ ÌappleÔÚÔ Ó Ó ÂappleËÚ ÛÔ Ó ÙË appleôèfiùëù ÙË Û Ó ÂÛË. Ó Ë ÙÈÌ ÙÔ RTS Â Ó È Î ıôúèûì ÓË appleôï ÌËÏ, ÙfiÙ ÙÔ throughput appleèı ÓfiÓ Ó ÌÂȈıÂ. ÚÔÎ ıôúèûì ÓË ÙÈÌ : 2347 bytes. 16
Beacon Interval: È Ó Ú ıì ÛÂÙ ÙËÓ appleâú Ô Ô ÚfiÓÔ Û milliseconds appleô ÙÔ Access Point ÛÙ ÏÓÂÈ Ó beacon. ÚÔÎ ıôúèûì ÓË ÙÈÌ : 100msec. Data Rate: ŸÙ Ó ÙÔ Auto Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ Ë Û ÛΠı È Ï ÍÂÈ ÙË Î Ù Ï- ÏËÏfiÙÂÚË Ù ÙËÙ ÌÂÙ ÔÛË. Ó apple Ú Ô Ó ÂÌapplefi È apple ÚÂÌ ÔÏ, ÙÔ Û ÛÙËÌ ÙfiÌ Ù ı ÏÏ ÍÂÈ Û ÌÈ ÌËÏfiÙÂÚË Ù ÙËÙ. ªappleÔÚ Ù Âapple ÛË Ó È Ï ÍÂ- Ù ÌÈ Ù ÙËÙ ÌÂÙ ÔÛË Â ÔÌ ÓˆÓ ÌfiÓÔÈ Û. Preamble: Ô preamble Â Ó È Ó Û Ì appleô ÚËÛÈÌÔappleÔÈÂ Ù È ÛÙ ÎÙ ÁÈ ÙÔÓ Û Á ÚÔÓÈÛÌfi ÙÔ ÚfiÓÔ ÌÂÙ ÔÛË ÌÂÙ Í Ô appleâúèûûfiùâúˆó Û ÛÙËÌ ÙˆÓ.  "ıôú Ò Ë" ÎÙ, Ô Ù appleô Preamble ı appleú appleâè Ó ÔÚ ÂÙ ÛÙÔ Long. Ô Short appleúô Ï appleâùâ ÁÈ ÂÊ ÚÌÔÁ fiappleô ÙÔ ÂÏ ÈÛÙÔ overhead Â Ó È ÂappleÈı ÌËÙfi. Broadcast SSID: ŸÙ Ó ÙÔ SSID Broadcast Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ, Î ıâ appleèı Ófi Û Ú- Ì ÙÔ Ú ÛÙË ı ÌappleÔÚÂ Ó ÂÓÙÔapple ÛÂÈ Ì ÙÔ access point. È ÏfiÁÔ ÛÊ ÏÂ, ÌappleÔ- ÚÂ Ó ı ÏÂÙÂ Ó appleâóâúáôappleôè ÛÂÙ ÙÔ SSID broadcast ÙÛÈ ÒÛÙÂ Ó ÂappleÈÙÚ appleâùâ ÌfiÓÔ ÙÔ Û ÚÌ ÙÔ Ú ÛÙ appleô ÁÓˆÚ Ô Ó ÙÔ SSID Ó ÂappleÈÎÔÈÓˆÓÔ Ó Ì ÙÔ access point. IAPP: TÔ IAPP (Inter Access Point Protocol) Â Ó È ÌÈ appleúô ÎÙ ÛË ÙÔ appleúfiù appleô IEEE 802.11 Î È Â Ó È Û Â È ÛÌ ÓÔ ÁÈ Ó appleôûùëú ÂÈ ÙËÓ appleú ÎÙÈÎfiÙËÙ, ÙËÓ Â ÎÈÓËÛ, ÙËÓ ÌÂÙ ÛË Î È ÙÔ Û ÓÙÔÓÈÛÌfi ÌÂÙ Í ÙˆÓ WLAN APs. Ú ÂÈ Ó ÙÚfiappleÔ ÁÈ Ó ÂappleÈÎÔÈÓˆÓÔ Ó Ù APs ÌÂÙ Í ÙÔ. 802.11g Protection: TÔ appleúfiù appleô 802.11g appleâúèï Ì ÓÂÈ Ó ÌË ÓÈÛÌfi ÁÈ Ó ÂÍ - ÛÊ Ï ÛÂÈ apple Ú ÏÏËÏË ÏÂÈÙÔ ÚÁ ÙÔ 802.11b Î È ÙÔ 802.11g. Â Ó ÂÓ apple Ú ÂÈ Ù ÙÔÈÔ ÌË ÓÈÛÌfi, Ù Ô appleúfiù apple ÌappleÔÚÔ Ó ÌÔÈ Ó apple ÚÂÌ ÏÔ Ó Î È Ó ÌÂÈÒÛÔ Ó ÙËÓ applefi ÔÛË ÙÔ ÈÎÙ Ô. ÓÙ ÎÏÈÎ ÛÙÔ Apply Changes ÁÈ Ó ÛÒÛÂÙ ÙÈ Î ÈÓÔ ÚÁÈÂ Ú ıì ÛÂÈ ÛÙËÓ ÔıfiÓË Û. ÓÙ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó appleôúú ÂÙ ٠ ÔÌ Ó appleô ÂÙ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏ ٠ÊÔÚ appleô apple Ù Û Ù ÙÔ Apply Changes. 5.2.3 ƒ ıì ÛÂÈ ÛÊ Ï (Security) Ù Ë ÛÂÏ Û ÂappleÈÙÚ appleâè Ó È ÌÔÚÊÒÛÂÙ ÙÈ Ú ıì ÛÂÈ ÛÊ Ï appleô appleô- ÛÙËÚ ÂÈ ÙÔ Access Point. 17
Encryption: Ó ÙÔ WEP Â Ó È ÂappleÈÏÂÁÌ ÓÔ, ÔÈ Ú ÛÙ ı appleú appleâè  ÙÂ Ó Ú ıì ÛÔ Ó Ù WEP ÎÏÂÈ È (Set WEP keys) ÌfiÓÔÈ ÙÔ,  ÙÂ Ó ÂappleÈÏ ÍÔ Ó ÙÔ Use 802.1x Authentication ÁÈ Ó ÔÚ ÛÂÈ Ô RADIUS server ÎÏÂÈ È WEP. WEP Key: ªappleÔÚÂ Ó ı ÏÂÙÂ Ó ÔÚ ÛÂÙÂ Ó ÎÏÂÈ WEP fiù Ó ı ÏÂÙ fiïôè ÔÈ Ú - ÛÙ ÛÙÔ Û ÚÌ ÙÔ ÎÙ Ô Ó ÚËÛÈÌÔappleÔÈÔ Ó Ó ÎÚ Êfi ÎÏÂÈ ÁÈ Ó Û Ó ÂıÔ Ó Ì ÙÔ ÎÙ Ô. ŒÓ WEP ÎÏÂÈ ÌappleÔÚÂ Ó ÔÚÈÛÙÂ Î È ÛÙÔ Open System Î È ÛÙÔ Shared Key authentication (Î È ÛÙÈ Ô appleâúèappleùòûâè Ó ÎÚ Êfi ÎÏÂÈ ÚËÛÈÌÔappleÔÈÂ Ù È ÏÏ Ë È ÈÎ Û ÙÔ authentication Â Ó È È ÊÔÚÂÙÈÎ ). È Ó appleâóâú- ÁÔappleÔÈ ÛÂÙ ÙËÓ ÛÊ ÏÂÈ WEP, Î ÓÙ ÎÏÈÎ ÛÙËÓ ÂappleÈÏÔÁ Disable. È Ó ÂÓÂÚÁÔappleÔÈ ÛÂÙ ÙËÓ ÛÊ ÏÂÈ WEP, È Ï ÍÙ ÙÔ Ì ÎÔ ÙÔ ÎÏÂÈ ÈÔ Ó Â Ó È 64bits 128 bits. ŸÙ Ó ÂÙÂ È Ï ÍÂÈ ÙÔ Ì ÎÔ ÙÔ ÎÏÂÈ ÈÔ, appleú appleâè Ó ÂÈÛ ÁÂÙ ÙËÓ ÙÈÌ ÙÔ ÎÏÂÈ ÈÔ Û ÌÔÚÊ ASCII HEX. Ú ÂÈÁÌ : WEP Key Û ÌÔÚÊ HEX 64bits: WEP Key Û ÌÔÚÊ ASCII 64bits: 1234AC9E01 PG7+A ËÌ ˆÛË: ŸÙ Ó Ë ÛÊ ÏÂÈ WEP Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓË, fiïôè ÔÈ Û ÚÌ ÙÔÈ Ú ÛÙ appleô ÂappleÈı ÌÔ Ó Ó Û Ó ÂıÔ Ó Ì ÙÔ Access Point appleú appleâè Ó Ô Ó Âapple ÛË ÙÔ WEP ÂÓÂÚÁÔappleÔÈËÌ ÓÔ Ì ÎÚÈ Ò ÙÔ ÈÔ ÎÏÂÈ WEP. ÓÙ ÎÏÈÎ ÛÙÔ Apply Changes ÁÈ Ó ÛÒÛÂÙ ÙÈ Î ÈÓÔ ÚÁÈÂ Ú ıì ÛÂÈ ÛÙËÓ ÔıfiÓË Û. ÓÙ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó appleôúú ÂÙ ٠ ÔÌ Ó appleô ÂÙ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏ ٠ÊÔÚ appleô apple Ù Û Ù ÙÔ Apply Changes. 18
WPA (TKIP/AES/Mixed): Ó ÂÙÂ È Ï ÍÂÈ ÙÔ WPA, ÌappleÔÚ ÙÂ Ó È Ï ÍÂÙ ÙÔ Ù appleô Authentication ÌÂÙ Í ÙÔ Enterprise (RADIUS) Î È ÙÔ Personal (Pre-shared Key). ªappleÔÚ ÙÂ Ó ÚËÛÈÌÔappleÔÈ ÛÂÙ applefi Ó 1 ˆ 63 Ú ÎÙ Ú ÁÈ Ó ÔÚ ÛÂÙ ÙÔ password ÌappleÔÚ ÙÂ Ó ÙÔ Ê ÛÂÙ ÎÂÓfi.  ٠ÙËÓ appleâú appleùˆûë, ÙÔ 802.1x Authentication ı ÂÓÂÚÁÔappleÔÈËıÂ. ÈÁÔ Ú Ù Ù fiùè ÎÚÈ Ò ÙÔ ÈÔ password ÚËÛÈÌÔappleÔÈÂ Ù È Î È applefi ÙÔ Ú ÛÙÂ. Group Key Life Time: ÈÛ ÁÂÙ ÙÔÓ ÚÈıÌfi ÙˆÓ Â ÙÂÚÔÏ appleùˆó appleô ı appleâú ÛÔ Ó Ì ÚÈ ÙÔ ÎÏÂÈ ÙÔ ÁÎÚÔ apple Ó ÏÏ ÍÂÈ ÙfiÌ Ù. appleúôî ıôúèûì ÓË ÙÈÌ Â Ó È 86400  ÙÂÚfiÏÂappleÙ. Port: ÈÛ ÁÂÙ ÙËÓ ı Ú (port) ÙÔ RADIUS Server appleô Û apple Ú ÂÈ Ô ISP Û. appleúôî ıôúèûì ÓË ÙÈÌ Â Ó È 1812. IP Address: ÈÛ ÁÂÙ ÙËÓ È ı ÓÛË IP ÙÔ RADIUS Server appleô Û apple Ú ÂÈ Ô ISP Û. Password: ÈÛ ÁÂÙ ÙÔ password appleô ÙÔ AP ÌÔÈÚ ÂÙ È Ì ÙÔÓ RADIUS Server. ÓÙ ÎÏÈÎ ÛÙÔ Apply Changes ÁÈ Ó ÛÒÛÂÙ ÙÈ Î ÈÓÔ ÚÁÈÂ Ú ıì ÛÂÈ appleô ÂÙ ÂÈÛ ÁÂÈ ÛÙËÓ ÔıfiÓË. ÓÙ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó appleôúú ÂÙ ٠ ÔÌ - Ó appleô ÂÙ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏ ٠ÊÔÚ appleô apple Ù Û Ù ÙÔ Apply Changes. 5.2.4 È Â ÚÈÛË ÚfiÛ ÛË (Access Control) ŸÙ Ó Ë ÏÂÈÙÔ ÚÁ Wireless Access Control Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓË, ÌfiÓÔ ÙÔ ÔÈ Ú ÛÙ appleô ÔÈ Û ÚÌ Ù MAC addresses ÙÔ Â Ó È ÛÙË Ï ÛÙ ÙÔ access control ÌappleÔÚÔ Ó Ó Ô Ó appleúfiû ÛË ÛÙÔ Access Point. Ù Ë ÏÂÈÙÔ ÚÁ MAC Filter (ÊÈÏ- ÙÚ Ú ÛÌ ÙÔ ) Â Ó È ÌÈ ÂappleÈappleÏ ÔÓ ÏÂÈÙÔ ÚÁ ÛÊ ÏÂ. Ó Ë Ï ÛÙ ÂÓ appleâúè ÂÈ Ù appleôù Î È Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓË Ù Ë ÏÂÈÙÔ ÚÁ, ÙfiÙÂ Î Ó Ó Ú ÛÙË ÂÓ ı ÌappleÔÚÂ Ó ÂÈ appleúfiû ÛË ÛÙÔ Access Point. ªappleÔÚ ÙÂ Ó apple Ù ÛÂÙ ÛÙÔ Delete Selected ÛÙÔ Delete All ÁÈ Ó È ÁÚ ÂÙ È ı ÓÛË MAC applefi ÙË Ï ÛÙ. Ú Ù ÚËÛË: ªappleÔÚ ÙÂ Ó ÂÈÛ ÁÂÙÂ Ì ÚÈ Î È 20 Ú ÎÙ ÚÂ Û Ó Û fiïèô ÛÙËÓ appleúôëáô ÌÂÓË È ı ÓÛË MAC. 19
5.2.5 Ó ÙËÛË (Site Survey) Ô Site survey  ÓÂÈ fiï Ù ÂÓÂÚÁ Access Points ÛÙÔ Á Úˆ ÒÚÔ. ŸÙ Ó Â ÛÙ ÛÙÔ client mode, ÌappleÔÚ ÙÂ Ó È Ï ÍÂÙÂ Ó AP ÁÈ Ó Û Ó Âı ÙÂ. Ù ÛÙ ÛÙÔ Refresh ÁÈ Ó Ï ÂÙ ÙÈ ÙÂÏ ٠ appleïëúôêôú Â. Ù ÛÙ ÛÙÔ Connect ÁÈ Ó Û Ó Âı Ù Û Πappleôèô ÏÏÔ AP ÛÙËÓ appleâúèô. 5.2.6 ƒ ıì ÛÂÈ WDS (WDS Settings) Ù Ë ÛÂÏ Û ÂappleÈÙÚ appleâè Ó Ú ıì ÛÂÙ ÙÔ È ÊÔÚÔ ÙÚfiappleÔ Û Ó ÂÛË, ÂÎÙfi ÙÔ AP mode, appleô appleôûùëú ÂÈ ÙÔ WA 100. È Ó ÂÙ appleúfiû ÛË Û ٠ÙË ÛÂÏ, ı appleú appleâè Ó È Ï ÍÂÙÂ Ó mode È ÊÔÚÂÙÈÎfi ÙÔ AP ÛÙË ÛÂÏ Basic Settings. Enable WDS: ÛÂÎ ÚÂÙ ÙÔ ÎÔ Ù ÎÈ ÁÈ Ó ÂÓÂÚÁÔappleÔÈ ÛÂÙ ÙÔ WDS. Add WDS AP MAC Address: ÈÛ ÁÂÙ ÙËÓ MAC Address ÁÈ ÙÔ Access Point Ì ÙÔ ÔappleÔ Ô ÂappleÈı Ì ÙÂ Ó Û Ó Âı Ù Ì WDS. Ú Ù ÚËÛË: ªappleÔÚ ÙÂ Ó ÂÈÛ ÁÂÙÂ Ì ÚÈ Î È 20 Ú ÎÙ ÚÂ Û Ó Û fiïèô ÛÙËÓ appleúôëáô ÌÂÓË MAC Address.. 20
Current WDS AP List: Access Points appleô Ô Ó appleúôûùâıâ ÁÈ Ó Ï Ì ÓÔ Ó Ì ÚÔ ÛÙÔ WDS. ÓÙÂ ÎÏÈÎ ÛÙÔ Apply Changes ÁÈ Ó ÛÒÛÂÙÂ ÙÈ Î ÈÓÔ ÚÁÈÂ Ú ıì ÛÂÈ appleô ÂÙÂ ÂÈÛ ÁÂÈ ÛÙËÓ ÔıfiÓË Û. ÓÙÂ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó appleôúú ÂÙÂ Ù Â Ô- Ì Ó appleô ÂÙÂ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏÂ Ù ÊÔÚ appleô apple Ù Û ÙÂ ÙÔ Apply Changes. Set Security: ÓÙÂ ÎÏÈÎ ÁÈ Ó Ú ıì ÛÂÙÂ ÙËÓ ÛÊ ÏÂÈ ÙÔ WDS. Ú apple ÌappleÂÈ ÛÙË ÛÂÏ Wireless Security Setup. Show Statistics: ÓÙÂ ÎÏÈÎ ÁÈ Ó Â ÙÂ ÙÈ ÏÂappleÙÔÌÂÚÂ appleïëúôêôú Â ÁÈ ÙÔ Î ıâ WDS AP. 21
5.3 TCP/IP Ù Ë ÛÂÏ Û ÂappleÈÙÚ appleâè Ó Ú ıì ÛÂÙ ÙÈ IP Î È DHCP Ú ıì ÛÂÈ ÙÔ Access Point: appleúôî ıôúèûì ÓË IP address ÙÔ access point Â Ó È Ë 192.168.1.254 (subnet mask: 255.255.255.0). ªappleÔÚ ÙÂ Ó ÂÈÛ ÁÂÙÂ Î È ÏÏ ÙÈÌ ÁÈ ÙËÓ È ı ÓÛË IP, ÙÔ Subnet Mask Î È ÙÔ Gateway. ÓÙ ÎÏÈÎ ÛÙÔ Apply Changes ÁÈ Ó ÛÒÛÂÙ ÙÈ Î ÈÓÔ ÚÁÈÂ Ú ıì ÛÂÈ appleô ÂÙ ÂÈÛ ÁÂÈ ÛÙËÓ ÔıfiÓË. ÓÙ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó appleôúú ÂÙ ٠ ÔÌ Ó appleô ÂÙ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏ ٠ÊÔÚ appleô apple Ù Û Ù ÙÔ Apply Changes. DHCP: ªappleÔÚ ÙÂ Ó ÂÓÂÚÁÔappleÔÈ ÛÂÙ ÙË ÏÂÈÙÔ ÚÁ DHCP server È Ï ÁÔÓÙ ÙË ÂappleÈ- ÏÔÁ Enable, Î È ÂÈÛ ÁÔÓÙ ÙÔ Â ÚÔ ÙˆÓ IP. ÓÙ ÎÏÈÎ ÛÙÔ Apply ÁÈ Ó ÂÓÂÚ- ÁÔappleÔÈËıÔ Ó ÔÈ ÏÏ Á. ªappleÔÚ Ù Âapple ÛË Ó ÔÚ ÛÂÙ ÙËÓ IP address ÙÔ DNS server. Ë ËÌ ˆÛË: ÂÓ Û ÓÈÛÙ Ù È Ó appleâóâúáôappleôè ÛÂÙ ÙÔ DHCP Server Â Ó ÂÙÂ Ó DHCP server appleô ÏÂÈÙÔ ÚÁ ÛÙÔ LAN ÎÙ Ô Û ÁÈ Ù appleèı ÓfiÓ Ó appleúôî Ï ÛÂÈ Û ÁÎÚÔ ÛË IP (IP conflict). 802.1d Spanning Tree: Ô 802.1d Spanning Tree ı appleúôûù Ù ÛÂÈ ÙÔ ÎÙ Ô applefi Ù ÚÌ ÙÔ ÚfiÁ Ô (infinite loops). Infinite loops Û Ì ÓÔ Ó fiù Ó ÙÔ WDS Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ Î È apple Ú Ô Ó appleôïïô ÚfiÌÔÈ ÌÂÙ Í ÙˆÓ ÚËÛÙÒÓ. 22
Clone MAC Address: ªappleÔÚ ÙÂ Ó ÔÚ ÛÂÙ ÙËÓ MAC address ÙÔ Access Point Û ÁÈ Ó ÓÙÈÎ Ù ÛÙ ÛÂÙ ÙËÓ appleúôî ıôúèûì ÓË ÙÈÌ. 5.4 Other Settings Ù Ë ÛÂÏ Û apple Ú ÂÈ ÌÂÚÈÎ appleôï Ú ÛÈÌ ÂÚÁ ÏÂ. ªappleÔÚ ÙÂ Ó ÂÓËÌÂÚÒ- ÛÂÙ ÙÔ Firmware ÙË Û ÛÎÂ, Ó ÛÒÛÂÙ ÙÈ ÙÚ Ô ÛÂ Ú ıì ÛÂÈ, Ó ÂÓÂÚÁÔappleÔÈ - ÛÂÙ ÙÈ ÛˆÛÌ ÓÂ Ú ıì ÛÂÈ Î È Ó ËÌÈÔ ÚÁ ÛÂÙÂ Ó administrator password. appleèappleï ÔÓ, ÌappleÔÚ ÙÂ Ó Â Ù ٠log files ( Ú Â Ô ÈÛÙÔÚÈÎÔ ) ÙˆÓ WLAN/LAN Û Ó ÛˆÓ. 5.4.1 Upgrade Firmware Firmware Upgrade: ÓÙ ÎÏÈÎ ÛÙÔ Browse ÁÈ Ó ÓÔ ÍÂÙÂ Ó FileOpen apple Ú ı ÚÔ, fiappleô ı ÌappleÔÚ ÙÂ Ó È Ï ÍÂÙ ÙÔ Ú Â Ô ÙÔ firmware, ÙÔ ÔappleÔ Ô ÂÙ ΠÙ ÛÂÈ applefi ÙË ÛÂÏ ÙË Crypto. È Ï ÍÙ ÙÔ Ú Â Ô ÙÔ firmware, Î ÓÙ ÎÏÈÎ ÛÙÔ Upload. ÓÙ ÎÏÈÎ ÛÙÔ Reset Â Ó ı ÏÂÙÂ Ó appleôúú ÂÙ ٠ ÔÌ Ó appleô ÂÙ ÂÈÛ ÁÂÈ. 23
5.4.2 Save/Reload Settings Save Settings to File: ÓÙ ÎÏÈÎ ÛÙÔ Save, ÙÔ ÔappleÔ Ô ı ÓÔ ÍÂÈ Ó FileSave apple Ú - ı ÚÔ, fiappleô ÂΠÌappleÔÚ ÙÂ Ó ÛÒÛÂÙ fiïâ ÙÈ ÙÚ Ô ÛÂ Ú ıì ÛÂÈ ÛÂ Ó Ú Â Ô. Load Settings to File: ÓÙ ÎÏÈÎ ÛÙÔ Browse ÁÈ Ó ÓÔ ÍÂÙÂ Ó FileOpen apple Ú ı - ÚÔ, fiappleô ÌappleÔÚ ÙÂ Ó È Ï ÍÂÙ ÙÔ Ú Â Ô fiappleô ÂÙ ÛÒÛÂÈ ÙÈ appleúôëáô ÌÂÓÂ Ú ı- Ì ÛÂÈ. È Ï ÍÙ ÙÔ ÛˆÛÌ ÓÔ Ú Â Ô Î È Î ÓÙ ÎÏÈÎ ÛÙÔ Upload. Restore Settings to Default: ÓÙ ÎÏÈÎ ÛÙÔ Reset ÁÈ Ó Âapple Ó Ê ÚÂÙ ÙÔ access point apple Ûˆ ÛÙÈ ÂÚÁÔÛÙ ÛÈ Î Ú ıì ÛÂÈ. 5.4.3 Password Password Setup: ÂappleÈÙÚ appleâè Ó ÏÏ ÍÂÙ ÙÔ password appleúfiû ÛË. Ù Â Ó È Ù apple Ú ÙËÙ Ì Ù : 1. ÈÛ ÁÂÙ ÙÔ Î ÈÓÔ ÚÁÈÔ password ÛÙÔ appleâ Ô New Password:. 2. ÈÛ ÁÂÙÂ Í Ó ÙÔ Î ÈÓÔ ÚÁÈÔ password ÛÙÔ appleâ Ô Confirm. 3. ÓÙ ÎÏÈÎ ÛÙÔ Apply Change. 4. ªappleÔÚ Ù Âapple ÛË Ó Î ÓÂÙ ÎÏÈÎ ÛÙÔ Reset Â Ó ı ÏÂÙÂ Ó appleôúú ÂÙ ٠ Ô- Ì Ó appleô ÂÙ ÂÈÛ ÁÂÈ applefi ÙËÓ ÙÂÏ ٠ÊÔÚ appleô apple Ù Û Ù ÙÔ Apply Change 24
5.4.4 Log Enable Log: ÓÙ ÎÏÈÎ ÛÙÔ Enable Log ÁÈ Ó Â Ù appleïëúôêôú  ÁÈ ÙÔ ÈÛÙÔÚÈÎfi (log). ÛÂÏ ÈÛÙÔÚÈÎÔ (log page) Î Ù ÁÚ ÊÂÈ Î ıâ ÁÂÁÔÓfi Ì Û ÛÙÔ Û ÚÌ - ÙÔ ÎÙ Ô Î È ÙÔ ÚfiÓÔ appleô Û Ó Ë. ªappleÔÚ ÙÂ Ó Ú ıì ÛÂÙ ÙÔ ÈÛÙÔÚÈÎfi Ó Î Ù - ÁÚ ÊÂÈ Î ıâ ÁÂÁÔÓfi ÙÔ Û ÛÙ Ì ÙÔ, Ó ÙÔ appleâúèôú ÛÂÙ ÌfiÓÔ ÁÈ ÁÂÁÔÓfiÙ ÙË Û ÚÌ ÙË Û Ó ÂÛË. ÓÙ ÎÏÈÎ ÛÙÔ Clear ÁÈ Ó È ÁÚ ÂÙ fiïâ ÙÈ Î Ù ˆÚ ÛÂÈ appleô Ô Ó Î Ù - ÁÚ Ê ÛÙÔ ÈÛÙÔÚÈÎfi Î È Î ÓÙ ÎÏÈÎ ÛÙÔ Refresh Â Ó ı ÏÂÙÂ Ó Â Ù ÙÈ ÙÂÏ - Ù Â Î Ù ˆÚ ÛÂÈ. 6  ÓÈÎ ÀappleÔÛÙ ÚÈÍË È Ù ÓÈÎ appleïëúôêôú Â Î È appleôûù ÚÈÍË apple Ú Î ÏÔ Ì ÂappleÈÎÔÈÓˆÓ ÛÙÂ Ì Ì : Web Site: www.crypto.gr E-mail: support@crypto.gr 25
7 Â ÓÈÎ ÚÔ È ÁÚ Ê Standards ñieee 802.11b ñieee 802.11g Modulation Technique ñ802.11b: Direct Sequence Spread Spectrum (PBCC, CCK, DQPSK, DBPSK) ñ802.11g: Orthogonal Frequency Division Multiplexing Media Access Protocol ñcsma / CA (Collision Avoidance) with ACK Receiver Sensitivity Weight ñ147g 802.11g (PER 10%) ñ54mbps: -70dBm ñ48mbps: -73dBm ñ36mbps: -78dBm ñ24mbps: -82dBm ñ18mbps: -84dBm ñ12mbps: -86dBm ñ9mbps: -87dBm ñ6mbps: -87dBm 802.11b (PER 8%) ñ11mbps: -86dBm ñ5.5mbps: -86dBm ñ2mbps: -86dBm ñ1mbps: -86dBm Output Power ñ802.11b: 16dBm ñ802.11g: 12dBm Interface ñ wo 10/100Mbps RJ-45 port Physical Dimensions ñ128 x 89 x 27 (L x W x H) Data Rates ñ802.11g: Up to 54Mbps (6/9/12/18/24/36/48/54) ñ802.11b: Up to 11Mbps (1/2/5.5/11) Data Modulation Type ñ802.11b: Direct Sequence Spread Spectrum 11/5,5Mbps: CCK ñ802.11g: Orthogonal Frequency Division Multiplexing (OFDM) 54/48Mbps: 64QAM 36/24Mbps: 16QAM 18/12Mbps: QPSK 9/6Mbps: BPSK Power ñ12volt Power Consumption ñ802.11b: TX 335mA, RX 303mA ñ802.11g: TX 325mA, RX 303mA Regulation Compliance Europe ETSI EN 300 328, ETSI EN 301 489 17 ETSI EN 6950-01, ETSI EN 55022-024 ETSI EN 61000-3-2, ETSI EN 61000-3-3 US FCC Part 15.247 26
8 ÂÍÈÏfiÁÈÔ 802.1x: Ô IEEE 802.1x Â Ó È Ó ÈÎÙ Îfi appleúˆùfiîôïïô Ù ÙÔappleÔ ËÛË ÚËÛÙÒÓ. Access Point: ŒÓ ÌË ÓËÌ ÏÔÁÈÛÌÈÎfi appleô ÛÎÔapplefi ÂÈ Ó Û Ó ÛÂÈ ÂÓÛ ÚÌ Ù Î È Û ÚÌ Ù ÎÙ ÌÂÙ Í ÙÔ. Ad-Hoc: ŒÓ ÓÂÍ ÚÙËÙÔ Û ÚÌ ÙÔ ÎÙ Ô appleô appleôùâïâ Ù È applefi ÌÈ ÔÌ appleôïôáè- ÛÙÒÓ ÂÍÔappleÏÈÛÌ ÓˆÓ ÌÂ Û ÚÌ Ù ΠÚÙ ÈÎÙ Ô. ADSL: Ô Asymmetric Digital Subscriber Line Â Ó È ÌÈ Ó Ù ÓÔÏÔÁ appleô ÂappleÈÙÚ appleâè ÙËÓ ÌÂÙ ÊÔÚ ÛËÌ ÓÙÈÎ appleâúèûûfiùâ- ÚˆÓ Â ÔÌ ÓˆÓ Ì Ûˆ ÙˆÓ ÙËÏÂʈÓÈÎÒÓ Î Ïˆ ˆÓ. Ô ADSL appleôûùëú ÂÈ Ù ÙË- Ù ÌÂÙ ÊÔÚ Â ÔÌ ÓˆÓ applefi 1.5 Ì ÚÈ 8 Mbps downstream Î È applefi 16 Ì ÚÈ 640 Kbps upstream. AES: Ô Advanced Encryption System Â Ó È ÌÈ Ù ÓÈÎ ÎÚ appleùôáú ÊËÛË appleô ÚËÛÈ- ÌÔappleÔÈÂ Û ÌÌÂÙÚÈÎfi ÌappleÏÔÎ ÎÚ appleùôáú ÊË- ÛË 128-Bit. ASCII: Ô American Standard Code for Information Interchange Â Ó È Ó ÎÒ È- Î appleô Ó apple ÚÈÛÙ Ú ÎÙ Ú Ì ÚÈı- ÌÔ. ıâ ÁÚ ÌÌ ÓÙÈÛÙÔÈ Â ÛÂ Ó Ó ÚÈıÌfi applefi ÙÔ 0 ˆ ÙÔ 127. ÎÒ ÈÎ ASCII Ó appleù ıëîâ Ú ÈÎ ÁÈ ÂappleÈÎÔÈÓˆ- Ó Â Î È ÚËÛÈÌÔappleÔÈ ÂappleÙ bits Ó Ú - ÎÙ Ú. È appleôïôáèûù ÚËÛÈÌÔappleÔÈÔ Ó bytes Ì 8-bit (256 Û Ó ÛÌÔ Ú ÎÙ - ÚˆÓ). appleâè Ô ASCII ÚËÛÈÌÔappleÔÈ ÌfiÓÔ ÙÔ appleúòùô 128 (0-127), ÔÈ applefiïôèappleôè (128-255) ıâˆúëùèî ÂÓ appleâúèáú ÊÔÓÙ È applefi ÙÔÓ ASCII, ÏÏ ÛÙËÓ appleú ÍË ÚËÛÈÌÔappleÔÈÔ ÓÙ È ÁÈ ÙËÓ Ó apple Ú ÛÙ ÛË Ú ÎÙ - ÚˆÓ applefi È ÊÔÚÂÙÈÎ ÁÏÒÛÛ Πıò Î È Ì ıëì ÙÈÎÒÓ Û Ì fiïˆó. Authentication: È ÈÎ Û Ó ÁÓÒÚÈÛË ÂÓfi network client appleô Û Ó ıˆ Á ÓÂÙ È Ì ÛË Î appleôèô username Î È password. Beacon: ÚfiÎÂÈÙ È ÁÈ Ó apple Î ÙÔ appleô ÂÎapple ÌappleÂÙ È applefi ÙÔ Access Point / Router Î È ÚËÛÈÌ ÂÈ ÛÙËÓ È Ù ÚËÛË ÙÔ Û Á- ÚÔÓÈÛÌÔ ÛÙÔ ÎÙ Ô. CCX: Ô Cisco Compatible extensions Program, Â Ó È Ó appleúfiáú ÌÌ appleô ÂÍ - ÛÊ Ï ÂÈ ÙËÓ Û Ì ÙfiÙËÙ Û ÛΠÒÓ ÌÂ Û ÚÌ Ù (proprietary) ÏÂÈÙÔ ÚÁ  ÙË Cisco. Channel: Ô Î Ó ÏÈ Â Ó È Ó Í ˆÚÈÛÙfi ÌÔÓÔapple ÙÈ Ì Û applefi ÙÔ ÔappleÔ Ô ÌappleÔÚÔ Ó Ó Ù ÍÈ Â Ô Ó Û Ì Ù. CTS: Ô Clear To Send Â Ó È Ó Ì Ó Ì ÂappleÈ Â ˆÛË appleô appleôûù ÏÏÂÙ È applefi ÙÔÓ ÎÙË ÛÙÔÓ appleôìapplefi Î È ÙÔ ÔappleÔ Ô ÙÔ ÓÂÈ ÙËÓ ÂÈ Ó ÍÂÎÈÓ ÛÂÈ ÙËÓ ÌÂÙ ÔÛË. DHCP: Ô Dynamic Host Configuration Protocol Â Ó È Ó appleúˆùfiîôïïô appleô Ó ı - ÙÂÈ ÙfiÌ Ù Ó ÌÈÎ È ı ÓÛÂÈ IP ÛÙÈ È ÊÔÚÂ Û ÛΠÂÓfi ÈÎÙ Ô. DSSS: Ô Direct Sequence Spread Spectrum Â Ó È ÌÈ Ù ÓÔÏÔÁ ÌÂÙ ÔÛË Â ÔÌ ÓˆÓ ÛÙËÓ ÔappleÔ Ù Â ÔÌ Ó Û Ó- ÔÓÙ È Ì ÌÈ ÎÔÏÔ ı applefi bits Ì ÚÎÂÙ ËÏfiÙÂÚÔ data rate. ÂappleÈappleÏ ÔÓ bits Í ÓÔ Ó ÙËÓ ÓÙ ÛÙ ÛË ÙÔ Û Ì ÙÔ ÛÙÈ apple ÚÂÌ ÔÏ. DTIM: Ô Delivery Traffic Indication Message Â Ó È Ó Ì Ó Ì appleô ÂÓËÌÂÚÒÓÂÈ ÙÔ clients ÁÈ ÙÔ ÂapplefiÌÂÓÔ ÚÔÓÈÎfi apple Ú - ı ÚÔ ÛÙÔ ÔappleÔ Ô ı ÌappleÔÚ ÛÔ Ó Ó ÎÔ - ÛÔ Ó broadcast Î È multicast ÌËÓ Ì Ù. EAP: Ô Extensive Authentication Protocol Â Ó È Ë ÛË ÁÈ ÙËÓ Âapple ÎÙ ÛË ÙˆÓ Ù ÓÈ- ÎÒÓ Ù ÙÔappleÔ ËÛË appleô ÚËÛÈÌÔappleÔÈÔ ÓÙ È ÛÙÔ PPP (Point-to-Point Protocol), Ó appleúˆ- ÙfiÎÔÏÏÔ appleô ÚËÛÈÌÔappleÔÈÂ Ù È Û Ó ıˆ ÁÈ Û Ó ÛÂÈ dial-up. Ô EAP ÓÔ ÁÂÈ ÙÈ Ó - ÙfiÙËÙ ÁÈ Ó ÚËÛÈÌÔappleÔÈËı ÌÈ ÛÂÈÚ applefi appleúˆùfiîôïï Ù ÙÔappleÔ ËÛË, Û ÌappleÂÚÈ- Ï Ì ÓÔÌ ÓˆÓ Î È ÙˆÓ token cards, onetime passwords ÎÏapple. Encryption: ÌÂÙ ÙÚÔapple ÙˆÓ Â ÔÌ ÓˆÓ 27
ÌÂ Ú ÛË ÂÓfi ÎÚ ÊÔ Îˆ ÈÎÔ. Ô encryption Â Ó È Ó appleôùâïâûì ÙÈÎfi ÙÚfiappleÔ ÁÈ Ó ÂÍ ÛÊ ÏÈÛÙÂ Ë ÛÊ ÏÂÈ Î Ù ÙËÓ ÌÂÙ ÊÔÚ Â ÔÌ ÓˆÓ. Ethernet: Ú ÈÙÂÎÙÔÓÈÎ ÙÔappleÈÎÔ ÈÎÙ Ô (LAN) appleô Ó appleù ıëîâ applefi ÙËÓ Xerox Corporation ÛÂ Û ÓÂÚÁ Û Ì ÙÈ DEC Î È Intel ÙÔ 1976. appleèô Û ÓËıÈÛÌ Ó Û ÛÙ Ì - Ù Ethernet ÔÓÔÌ ÔÓÙ È 10BASE-T Î È apple Ú Ô Ó Ù ÙËÙ ÌÂÙ ÊÔÚ Â ÔÌ - ÓˆÓ Ì ÚÈ 10 Mbps. Ô Fast Ethernet (100BASE-T) apple Ú ÂÈ Ù ÙËÙ ÌÂÙ ÊÔÚ Â ÔÌ ÓˆÓ Ì ÚÈ 100 megabits per second. Gigabit Î È 10-Gigabit Ethernet apple Ú - Ô Ó ÎfiÌË ËÏfiÙÂÚ ٠ÙËÙ ÌÂÙ - ÔÛË. ÁÎÂÎÚÈÌ Ó 1 gigabit per second Î È 10 gigabits per second ÓÙ ÛÙÔÈ. Fragmentation: ŸÙ Ó Ó apple Î ÙÔ ÍÂappleÂÚÓ ÛÂ Ì ÁÂıÔ Ó Û ÁÎÂÎÚÈÌ ÓÔ fiúèô appleô ÂappleÈÙÚ appleâè ÙÔ Ì ÛÔ È ÔÛË, ÙfiÙ Ûapple ÂÈ Û ÌÈÎÚfiÙÂÚ ÎÔÌÌ ÙÈ. È ÈÎ Û ÔÓÔÌ - ÂÙ È fragmentation. ÌËÏ fragmentation thresholds ËÌÈÔ ÚÁÔ Ó ÌÈÎÚfiÙÂÚ frames Î È ÓÙÈÌÂÙˆapple Ô Ó Ù appleúô Ï Ì Ù Û ÁÎÚÔ ÛË apple Î ÙˆÓ (packet collisions) appleô ËÌÈÔ ÚÁÔ ÓÙ È ÏfiÁˆ ÍËÌ ÓË Î ÓËÛË ÛÙÔ ÎÙ Ô. Ó ÙÔ threshold Â Ó È appleâú ÔÏÈÎ ÌËÏfi, ÙfiÙ ı ÌÂȈı ÙÔ throughput ÏfiÁˆ ÙˆÓ ÂappleÈappleÏ ÔÓ headers appleô appleúôûù ıâóù È Û Πıâ Ó apple Î ÙÔ. Ô ËÏfi fragmentation threshold ÂÈ Ù ÓÙ ıâù appleôùâï ÛÌ Ù. Gateway: ªÈ Û ÛΠappleô È Û Ó ÂÈ ÎÙ. HEX: ÂÎ ÂÍ ÈÎfi Û ÛÙËÌ. IAPP: TÔ IAPP (Inter Access Point Protocol) Â Ó È ÌÈ appleúô ÎÙ ÛË ÙÔ appleúfiù appleô IEEE802.11 Î È Â Ó È Û Â È ÛÌ ÓÔ ÁÈ Ó appleôûùëú ÂÈ ÙËÓ appleú ÎÙÈÎfiÙËÙ, ÙËÓ Â ÎÈÓË- Û, ÙËÓ ÌÂÙ ÛË Î È ÙÔ Û ÓÙÔÓÈÛÌfi ÌÂÙ Í ÙˆÓ WLAN APs. Ú ÂÈ Ó ÙÚfiappleÔ ÁÈ Ó ÂappleÈÎÔÈÓˆÓÔ Ó Ù APs ÌÂÙ Í ÙÔ. IEEE: Institute of Electrical and Electronics Engineers. Ô IEEE Â Ó È Ó ÔÚÁ ÓÈÛÌfi appleô Â Ó È Î Ú ˆ ÁÓˆÛÙfi ÁÈ ÙËÓ Ó appleù - ÍË standards ÁÈ ÙËÓ ÈÔÌË Ó appleôïôáè- ÛÙÒÓ Î È ËÏÂÎÙÚÔÓÈÎÒÓ. Infrastructure: Ô Û ÚÌ ÙÔ Infrastructure ÎÙ Ô Â Ó È ÛÙËÓ Ô Û Ó WLAN appleô appleâúèï Ì ÓÂÈ Ó Û ÚÌ ÙÔ Access Point / Router. ISM Band: Industrial, Scientific and Medical Band Â Ó È Ë Ìapple ÓÙ Û ÓÔÙ ÙˆÓ 2.4 2.483 GHz. LEAP: Ô Lightweight Extensible Authentication Protocol Â Ó È Ì ÚÔ ÙˆÓ ÏÂÈÙÔ ÚÁÈÒÓ CCX. Ú ÂÈ authentication Ì username/password ÌÂÙ Í ÙˆÓ clients Î È ÙˆÓ RADIUS server. LED: Ô Light Emitting Diode Â Ó È ÌÈ ËÏÂ- ÎÙÚÔÓÈÎ Û ÛΠappleô ÂÎapple ÌappleÂÈ Êˆ fiù Ó ÙËÓ È appleâúó ËÏÂÎÙÚÈÎfi Ú Ì. MAC Address: Ô Media Access Control Address Â Ó È Ó ÌÔÓ ÈÎfi ÂÎ ÂÍ È- Îfi ÚÈıÌfi appleô Ó Ù ıâù È applefi ÙÔ Î Ù ÛΠÛÙ Û Πıâ Ì Û ÛΠEthernet. Node: ªÈ È ÛÙ ÚˆÛË Ó ÛËÌÂ Ô Û Ó- ÂÛË ÛÂ Ó ÎÙ Ô. ÙËÓ Ô Û appleúfiîâèù È ÁÈ Ó Access Point / Router. OFDM: Orthogonal Frequency Division Multiplexing Î ÏÂ Ù È Ë Ì ıô Ô È ÌfiÚ- ʈÛË Ë ÔappleÔ ˆÚ ÂÈ Ó Î Ó ÏÈ Û ÌÈÎÚfiÙÂÚ applefi-î Ó ÏÈ appleô È ˆÚ ÔÓÙ È ÍÂÎ ı Ú. Ùfi Ô È ˆÚÈÛÌfi ÂÍ ÛÊ - Ï ÂÈ fiùè Ù Û Ì Ù appleô appleôûù ÏÏÔÓÙ È ÛÂ È ÊÔÚÂÙÈÎ Î Ó ÏÈ Â Ó È «ÔÚıÔÁÒÓÈ» ÌÂÙ Í ÙÔ. Ì ıô Ô ÂappleÈÙÚ appleâè ÙËÓ ÂappleÈ- ÎÔÈÓˆÓ appleôìappleô Î È ÎÙË Û «ÂÛÌÂ Ì - Ó» applefi-î Ó ÏÈ Î È ÂÍ ÛÊ Ï ÂÈ appleô ÔÙÈ- Î Ú ÛË ÙÔ Ê ÛÌ ÙÔ Û ÓÔÙ ÙˆÓ Î È ÓÙ ÛÙ ÛË ÛÙÈ apple ÚÂÌ ÔÏ. Open Authentication: Ô Open System authentication Â Ó È Ó «ÎÂÓfi» ÏÁfi- ÚÈıÌÔ Ù ÙÔappleÔ ËÛË. ÂÙ È ÂÈ ÌÂÙ - ÔÛË Û Πıâ ÛÙ ıìfi appleô ÙËÓ ËÙ. Ó ÙÔ ÎÏÂÈ appleô ÚËÛÈÌÔappleÔÈÂ Ô ÛÙ ıìfi Â Ó È ÛˆÛÙfi, ÙfiÙ ÌfiÓÔ Â Ó È Ó Ù Ë appleâú ÈÙ - Úˆ ÂappleÈÎÔÈÓˆÓ. 28
Packet: ŒÓ ÛÂÙ applefi  ÔÌ Ó appleô Ô Ó ÌÈ ÊÂÙËÚ Î È Î Ù ı ÓÔÓÙ È Û Πappleôèô appleúôôúèûìfi Ì Û ÛÂ Ó ÎÙ Ô. PEAP: Ô Protected Extensible Authentication Protocol Î ÓÂÈ authentication ÛÂ Û ÚÌ ÙÔ clients ÚËÛÈÌÔappleÔÈÒÓÙ certificates ÌfiÓÔ applefi ÙËÓ ÌÂÚÈ ÙÔ server. Ô appleúˆùfiîôïïô Ó appleù ıëîâ applefi ÎÔÈÓÔ applefi ÙÈ : Microsoft, RSA Security Î È Cisco Î È appleúôôú ÂÙ È ÁÈ Ú ÛË ÛÂ Û ÚÌ ÙË ÌÂÙ Ô- ÛË Â ÔÌ ÓˆÓ authentication. Preamble Type: Ô preamble Â Ó È Ó Û Ì appleô ÚËÛÈÌÔappleÔÈÂ Ù È ÛÙ ÎÙ ÁÈ ÙÔÓ Û Á ÚÔÓÈÛÌfi ÙÔ ÚfiÓÔ ÌÂÙ ÔÛË ÌÂÙ Í Ô appleâúèûûfiùâúˆó Û ÛÙËÌ ÙˆÓ. RADIUS: Remote Authentication Dial-In User Service Â Ó È Ó Û ÛÙËÌ Ù ÙÔappleÔ Ë- ÛË appleô ÚËÛÈÌÔappleÔÈÂ Ù È applefi appleôïïô (ISPs). ŸÙ Ó Ô Ú ÛÙË Î Ï ÙÔÓ ISP appleú appleâè Ó ÂÈÛ ÁÂÈ ÙÔ username Î È password. Ù Ë appleïëúôêôú ÌÂÙ È ÂÙ È ÛÙÔÓ RADIUS server, Ô ÔappleÔ Ô ÂÏ Á ÂÈ ÙËÓ ÔÚıfi- ÙËÙ ÙˆÓ appleïëúôêôúèòó Î È ÂappleÈÙÚ appleâè ÙËÓ appleúfiû ÛË ÛÙ Û ÛÙ Ì Ù ÙÔ ISP. RTS: Ô Request To Send Â Ó È Ó Û Ì appleô appleôûù ÏÏÂÙ È applefi ÙÔÓ appleôìapplefi ÛÙÔÓ ÎÙË ËÙÒÓÙ ÙÔ ÂÈ Ó ÍÂÎÈÓ ÛÂÈ ÙËÓ ÌÂÙ ÔÛË. Shared Key Authentication: ŸÙ Ó Â Ó È ÂÓÂÚÁÔappleÔÈËÌ ÓÔ ÙÔ Shared Key authentication ÙÔ Access Point / Router ÛÙ ÏÓÂÈ Ó apple Î ÙÔ ÛÙÔÓ client. client ÚËÛÈÌÔappleÔÈ ÙÔ ÎÚ Êfi ÎÏÂÈ, Έ ÈÎÔappleÔÈ ÙÔ apple Î ÙÔ Î È ÙÔ ÛÙ ÏÓÂÈ apple Ûˆ ÛÙÔ Access Point / Router. Ó ÙÔ apple Î ÙÔ Â Ó È ÛˆÛ٠Έ ÈÎÔappleÔÈËÌ ÓÔ, ÙfiÙÂ Ô client ÂÈ Ù ÙÔappleÔÈËı ۈÛÙ. SSID: Ô Service Set Identifier Â Ó È Ó ÌÔÓ ÈÎfi fióôì appleô ÚËÛÈÌÔappleÔÈÂ Ù È applefi fiïô ÙÔ clients Î È nodes ÛÂ Ó Û Ú- Ì ÙÔ ÎÙ Ô. Ô SSID appleú appleâè Ó Â Ó È ÙÔ ÈÔ ÁÈ fiïô ÙÔ clients Î È nodes Ì Û ÛÂ Ó Û ÚÌ ÙÔ ÎÙ Ô. Subnet Mask: ª ıô Ô È ˆÚÈÛÌÔ ÙˆÓ IP networks Û sub-groups subnets. TKIP: Temporal Key Integrity Protocol. Ô TKIP ÂÊ ÚÌfi ÂÙ È applefi ÙÔ RADIUS servers Î È ÏÏ ÂÈ ÙÔ ÎÏÂÈ Î ıâ 10.000 apple Î Ù, ÂÍ ÛÊ Ï ÔÓÙ ÌÂÁ Ï ÙÂÚË ÛÊ ÏÂÈ. TLS: Ô Transport Layer Security Â Ó È Ó appleúˆùfiîôïïô appleô ÂÍ ÛÊ Ï ÂÈ ÙËÓ ÂÁÎ Úfi- ÙËÙ ÙˆÓ Â ÔÌ ÓˆÓ Î Ù ÙÈ server ÂÊ Ú- ÌÔÁ Ì Ûˆ Internet. ÂÓ ÂÍ ÚÙ Ù È applefi application protocol, Î È ÂappleÈÙÚ appleâè higherlevel appleúˆùfiîôïï Ó ÛÙËıÔ Ó applefi apple Óˆ transparently. Throughput: appleôûfiùëù  ÔÌ ÓˆÓ appleô ÌÂÙ Ê ÚÂÙ È applefi Ó ÛËÌÂ Ô ÛÂ Ó ÏÏÔ Ë appleôûfiùëù  ÔÌ ÓˆÓ appleô appleâúó applefi ÂappleÂÍÂÚÁ Û Ì Û ÛÂ Ó Â ÔÌ ÓÔ ÚÔÓÈ- Îfi È ÛÙËÌ. WEP: Ô Wired Equivalent Privacy Â Ó È Ì Ì ıô Ô encryption appleô ÚËÛÈÌÔappleÔÈÂ Ù È ÛÙËÓ Û ÚÌ ÙË È ÔÛË Â ÔÌ ÓˆÓ Î È appleôùú appleâè ÛÙ ıìô ÔÈ ÔappleÔ ÔÈ ÂÓ Ô Ó ÙÔ ÛˆÛÙfi WEP key Ó Û Ó ÂıÔ Ó ÛÙÔ Access Point / Router. WPA: Ô Wi-Fi Protected Access Â Ó È Ó standard appleô Û Â È ÛÙËΠÁÈ Ó ÂÏÙÈÒ- ÛÂÈ ÙÔ WEP ÛÙ WLANs. ÃÚËÛÈÌÔappleÔÈ TKIP Î È EAP. WPA-PSK: Ô Wi-Fi Protected Access Pre Shared Key Â Ó È ÌÈ Î ÔÛË ÙÔ WPA ÂÈ È- Î Û Â È ÛÌ ÓË ÁÈ small office home Ú ÛË. ÃÚËÛÈÌÔappleÔÈÂ Ó Pre Shared Key appleô ÔÓÔÌ ÂÙ È passphrase, ÁÈ Ó appleô- ÙÚ ÂÈ ÓÂappleÈı ÌËÙÔ Ú ÛÙ applefi ÙÔ Ó Û Ó ÂıÔ Ó ÛÙÔ Access Point / Router. 29
.
.
USER S MANUAL WA 100 Wireless Access Point
.
Contents Contents 3 1 Package Contents 4 2 The WA 100 Wireless Access Point 4 2.1 Product Features 5 2.2 Front Panel 5 2.3 Rear Panel 6 2.4 System Requirements 6 3 Getting Started with Wireless Networking 6 3.1 Wireless Network Modes 7 3.2 Wireless Standards 7 3.3 Access Point Connection Modes 8 3.3.1 AP Mode 8 3.3.2 Bridge Mode 9 3.3.3 Client Mode 9 3.3.4 Repeater Mode 11 4 Hardware Installation Procedure 11 5 Configuring the Access Point 12 5.1 Status 13 5.1.1 System 13 5.1.2 Statistics 14 5.1.3 Active Clients 14 5.2 Wireless 14 5.2.1 Basic Settings 15 5.2.2 Advanced Settings 16 5.2.3 Security 17 5.2.4 Access Control 19 5.2.5 Site Survey 20 5.2.6 WDS Settings 20 5.3 TCP/IP 22 5.4 Other Settings 23 5.4.1 Upgrade Firmware 23 5.4.2 Save/Reload Settings 24 5.4.3 Password 24 5.4.4 Log 25 6 Technical Support 25 7 Technical Specifications 26 8 Glossary 27
1 Package Contents ñ Crypto WA 100 Wireless Access Point ñ Power Adapter ñ Printed Manual, Warranty 2 The WA 100 Wireless Access Point Congratulations on purchasing the WA 100 Wireless Access Point, which provides superior performance, ideal for high-speed wireless networking! The WA 100 Wireless Access Point supports the new high speed IEEE 802.11g standard that enables connection speeds up to 54Mbps. The 802.11g standard is also compatible with 802.11b products. This means that you do not need to change your entire network structure in order to incorporate the new 802.11g products. In addition to offering fast data transfer speeds, the WA 100 Wireless Access Point supports the newest and most advanced security features available today. The security settings can be customized for companies, offices and business spaces as well as for home users. The WA 100 Wireless Access Point's high-gain detachable antenna makes it possible for you to quickly setup an extremely fast network, without having to install cables. You can access computers almost anywhere in the building or in open spaces. It is now possible to create a larger, secure and much more flexible home or office network. You can share files and other resources such as printers and hard disk storage space, share an Internet connection and setup a small home and office network without the hassle and added expense of installing cables. 4
2.1 Product Features ñ Compliance with IEEE 802.11g and 802.11b standards ñ Data rates up to 54Mbps for 802.11g and 11Mps for 802.11b ñ Strong network security with WEP, WPA and WPA-PSK support ñ Multiple Operation Modes: AP, Client, Bridge and Repeater ñ Detachable Antenna 2.2 Front Panel The Crypto WA 100 Wireless Access Point Front Panel: 4 3 2 1 5 6 7 8 LED Activity 1 Power A steady green light indicates that the unit is powered up 2 Status A steady red light indicates that the device is booting 3 Link/Act. A steady green light indicates that a WLAN connection is established and a blinking light indicates WLAN activity 4 WEP/WPA A steady orange light indicates that wireless security is enabled 5 MAC Ctrl A steady orange light indicates that MAC Control is enabled 6 WDS A steady orange light indicates that WDS is enabled 7 LAN1 A steady green light indicates that a LAN connection is 8 LAN2 established and a blinking light indicates LAN activity 5
2.3 Rear Panel The Crypto WA 100 Wireless Access Point Rear Panel: 1 2 3 4 5 Port/button Functions 1 12V DC Connects to power adapter 2 LAN1 Connects to Ethernet 3 LAN2 Connects to Ethernet 4 RESET Press for over 3 seconds to reboot the device. Press for over 10 seconds to restore factory defaults. 5 Antenna Connects to detachable antenna 2.4 System Requirements ñ Windows 98, Me, 2000 and XP operating systems ñ PC with Pentium 200MHz system or above ñ 64MB RAM ñ Microsoft Internet Explorer 6.0 or higher for Web-based Configuration ñ At least one RJ-45 Ethernet network adapter ñ One CD-ROM drive 3 Getting Started with Wireless Networking Welcome to the world of Wireless Networking! Get ready to experience the speed and flexibility of a wireless network using your WA 100 Wireless Access Point. A brief overview of the basics of wireless networking can be found here. For more information you can also refer to the Glossary. 6
3.1 Wireless Network Modes A wireless local area network (WLAN) is similar to a regular local area network (LAN). In this case however, there are no cables present and the connection is established through wireless channels. Computers in a WLAN share the same frequency channel and use the same wireless connection name called SSID (Service Set Identifier). Unlike wired networks, wireless networks have two different setup modes: Infrastructure and Ad-Hoc. A Wireless Infrastructure network configuration is essentially a WLAN that incorporates a Wireless Access Point / Router. In order to setup a Wireless Infrastructure Network such as the example shown above, you will need the following: 1. A Wireless Access Point that creates a wireless infrastructure network. 2. Wireless clients equipped with wireless networking devices such as the WU 100 Wireless USB Adapter. 3.2 Wireless Standards The IEEE 802.11g is an extension of the older 802.11b standard. It increases the data rate up to 54 Mbps within the 2.4GHz band, utilizing OFDM (Orthogonal Frequency Division Multiplexing) technology. OFDM works by dividing the communication channel into a number of sub-channels. Every user transmits using one "dedicated" sub-channel. This is a very efficient way of utilizing the available frequencies and as a result this technique enables fitting an amazing amount of data into a relatively small bandwidth. In addition, the new multiplexing technology deals with network traffic issues quite efficiently, minimizing the possibility of packet collisions. 7
The new IEEE 802.11g wireless networking standard also offers a range of highly sophisticated network security features. The standard supports the Wired Equivalent Privacy (WEP) security feature, introduced in 802.11b. WEP is an encryption scheme that introduces a secret key as an additional security measure for preventing unwanted users from accessing a wireless network. The new Wi-Fi standard also features the new WPA standard, which is designed for enterprise wireless networking solutions. Its variant WPA-PSK is ideal for small office - home office use and is set to improve the WEP security feature on WLANs. It incorporates a passphrase to prevent unwanted stations from linking to an Access Point / Router. Another important feature of the IEEE 802.11g is its' backward compatibility with 802.11b devices. Both standards operate in the same frequency band and the new wireless standard is able to switch from OFDM to DSSS, the transmission technology used in 802.1b, when devices using that standard are present in a WLAN. This implies that if you already have a wireless network based on the IEEE 802.11b standard, the devices in that network will interoperate without problems with the 802.11g devices at speeds up to 11Mbps. You will find a more analytical description of the security and networking features available in the "Configuring the Access Point" chapter of this manual. 3.3 Access Point Connection Modes There are four Access Point Connection Modes. 3.3.1 AP Mode When enabling the AP Mode (Access Point Mode), the device connects all the wireless stations together and, perhaps, to an additional wired network. If the Access Point has access to an Internet connection, then all the associated clients will have access to this connection. 8
3.3.2 Bridge Mode While acting as Bridges, AP1 and AP2 can communicate with each other through the wireless interface. Thus Station 1 can communicate with Station 2 and both Station 1 and Station 2 are able to access the Internet if only AP1 or AP2 has an Internet connection. 3.3.3 Client Mode There are two types of Client Mode connection: ñ Infrastructure If set to Client (Infrastructure) mode, the device is configured to work as a wireless client of an existing AP that creates an Infrastructure Network. The AP is directly connected to a PC (wired connection) and provides connectivity to an existing WLAN created by another AP. 9
If the AP has Internet connection, then the AP1 as well as its' wired client will have access to the Internet. This mode, essentially transforms the device into a Wireless Ethernet Adapter set to connect to an Infrastructure Network. ñ Ad-hoc If set to Client (Ad-Hoc) mode, the device is configured to work as a wireless client of an existing Ad-Hoc Network. The AP is directly connected to a PC (wired connection) and provides connectivity to an existing Ad-Hoc WLAN created by other wireless clients. If the clients have Internet connection, then the AP as well as its' wired client will have access to the Internet. This mode, essentially transforms the device into a Wireless Ethernet Adapter set to connect to an Ad-Hoc Network. 10
3.3.4 Repeater Mode You can use this feature to build up a large wireless network in large spaces like airports, hotels, schools etc. This feature is also useful when users want to bridge networks between buildings where it is impossible to deploy network cable connections between these buildings. Note: To enable the Client, Bridge and Repeater modes, all APs related must have WDS enabled and must add each other as WDS Access Point. (e.g. Add AP2's MAC address to AP1's "WDS AP List" and vice versa). 4 Hardware Installation Procedure ñ Attach the Antenna at the Rear Panel of your Access Point. ñ Plug the Access Point to a power supply socket. ñ Connect to the Access Point There are two ways to connect to the Access Point: Wireless Connection: Install a Wireless Ethernet Adapter such as the Crypto WP 100E Wireless PCI Card. Configure the WP 100E and connect to the Access Point wirelessly. Wired Connection: Connect the Access Point to the Ethernet Adapter of your PC, using an RJ-45 Ethernet Cable. 11
5 Configuring the Access Point The Configuration Utility allows you to create a wireless network and configure the connection settings. It provides important information on the connection quality and the behaviour of the wireless channel and allows you to fully optimise the performance of your Access Point. You can access the WA 100 Wireless Access Point through any Web Browser. To access the configuration menu open a web browser window and type the IP address of the access point. The default IP is 192.168.1.254 Enter the user name and password. Default username: "admin", and no password is required. The main page will appear. 12
5.1 Status This page provides important information on the status of your WA 100 Wireless Access Point and the entire wireless network. 5.1.1 System You can have a complete view of the status of your machine: Uptime: Shows the time period that the device is powered and working. Firmware Version: Shows the current firmware version. Wireless Mode: There are four modes supported: Access Point, Client (Ad-hoc and Infrastructure), Bridge and Repeater. The default mode is Access Point. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each client and node in the wireless network. This means that all computers using the same SSID belong to the same network. Channel: The channel that the Access Point will operate in. For European Countries, you can select the channel from the range of 1 to 13. Encryption: Encryption is a way to achieve data security. You can see which encryption method is currently used by the device. Associated Clients: Displays the total number of clients associated to this AP. You can have up to 64 clients to associate to this Access Point. BSSID: Displays the ID of the current Service Set. In AP mode, this value is the MAC address of this Access Point. IP Protocol: Displays the method that this access point uses, in order to provide IP to its' clients. It is either Fixed-IP or DHCP-client. You can also see the IP address, subnet mask, default gateway value and MAC address of your WA 100. 13
5.1.2 Statistics This page provides information on the sent and received packets, both at the Ethernet as well as the Wireless interface. 5.1.3 Active Clients This page shows the clients associated with the Access Point. When the device is set to DHCP server, the clients' IPs are visible. If DHCP server is disabled, then the MAC addresses are only available. The page also provides information on the connection with each client. 5.2 Wireless This is a set of pages that give you access to the Wireless settings of the AP. You can configure every little detail of the device in order to adjust it to your needs and preferences. All the settings are described and explained below. For additional information, you can refer to the Glossary. 14
5.2.1 Basic Settings Disable Wireless LAN Interface: Check the box to disable the Wireless LAN Interface. If you do this, the device will not be visible by any wireless station. Band: You can choose one mode from the following: ñ 2.4GHz (B): 802.11b supported rate only. ñ 2.4GHz (G): 802.11g supported rate only. ñ 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate. Mode: The Wireless Access Point can support four modes: AP, Client, Bridge and Repeater Network Type When in Client mode, you can select between Ad-Hoc and Infrastructure. SSID: Service Set Identifier, which is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for each client and node in the wireless network. This means that all computers using the same SSID belong to the same network. It is case-sensitive and must not exceed 32 characters. Region Domain: The AP's domain determines the number of available channels. Channel Number: Allows you to set the wireless channel manually or automatically. All stations communicating with the Access Point must use the same channel. Enable Mac Clone (Single Ethernet Client): If your ISP restricts service to PCs only, use the MAC Clone feature to copy a PC Media Access Control (MAC) address to your router. This procedure will cause the router to appear as a single PC, while allowing online access to multiple computers on your network. 15
Click "Apply Changes" to save the new settings on the screen. Click "Reset" to discard the data you have entered since the last time you pressed "Apply Changes". 5.2.2 Advanced Settings This page contains a set of settings mainly focused on advanced users. You can use this page to modify these settings for network performance fine-tuning. Authentication Type: The authentication type is set to Open System by default. There are three options: Open System, Shared Key and Auto. All the nodes and hosts on the network must use the same authentication type. Open System authentication is a null authentication algorithm. Any station that requests authentication receives it. When Shared Key authentication is enabled, the Access Point / Router sends a packet to the client. If the packet is correctly encoded then the client is authenticated. Fragmentation Threshold: To set the number of bytes that constitute the fragmentation boundary of packets. The use of the appropriate fragmentation threshold can increase the quality of the wireless network, because by sending smaller frames, you can reduce the possibility of packet collisions due to network traffic. However, if the threshold is set too low, then the throughput may be reduced. High fragmentation threshold has the opposite effect. Default value: 2346 bytes. RTS Threshold: To set the size of RTS packet size. Request To Send is a signal sent from the transmitting station to the receiving station requesting permission to transmit. If the packet that the Access Point is transmitting is larger than the threshold, it will initiate the RTS function. If the packet size is equal to or less than the threshold, the access point will not enable RTS. You can use a threshold of around 500. If it is set too high, then packet collisions can affect connection quality. If it set too low, then the throughput may be reduced. Default value: 2347 bytes. 16
Beacon Interval: To set the period of time in milliseconds that the Access Point sends out a beacon. Default value: 100msec. Data Rate: When Auto is enabled the device will select the optimal transmission rate. If obstacles or interference are present, the system will automatically fall back to a lower rate. You can also, select a data rate value manually. Preamble: A preamble is a signal used in a wireless environment for synchronization purposes. In a "noisy" network environment, the Preamble Type should be set to Long. Short is intended for applications where minimum overhead is desired Broadcast SSID: While SSID Broadcast is enabled, any potential wireless clients will be able to communicate with the access point. For security reasons, you may want to disable the SSID broadcast option in order to allow only those wireless clients that know the SSID value to communicate with the access point. IAPP: The IAPP (Inter Access Point Protocol) is an extension of the IEEE 802.11 standard and it is designed to support interoperability, mobility, handover and coordination among WLAN APs. It provides a means to make APs communicate with each other. 802.11g Protection: The 802.11g standard includes a protection mechanism to ensure mixed 802.11b and 802.11g operation. If no such kind of mechanism exists, the two standards may mutually interfere and decrease network's performance. Click "Apply Changes" to save the new settings on the screen. Click "Reset" to discard the data you have entered since the last time you pressed "Apply Changes". 5.2.3 Security This page allows you to configure the security features supported by your Access Point. 17
Encryption: If WEP is selected, users will have to Set WEP keys either manually, or select to Use 802.1x Authentication, in order to make the RADIUS server issue the WEP key dynamically. WEP Key: You may want to set a WEP Key when you want all the clients in the wireless network to use a secret key in order to connect to the network. A WEP Key can be entered in both Open System and Shared Key authentication modes (in both cases a secret key is used but the authentication procedure is different). To disable WEP security, click on the "Disable" option. To enable WEP security, select the key length to be 64bits or 128 bits. When the key length is selected, the key value must be entered in either ASCII or HEX format. Example: WEP Key format HEX 64bits: WEP Key format ASCII 64bits: 1234AC9E01 PG7+A Note: When WEP security is enabled, all the wireless clients that wish to connect to the Access Point must also have WEP enabled with the identical WEP Key value entered. Click "Apply Changes" to save the new settings on the screen. Click "Reset" to discard the data you have entered since last time you pressed "Apply Changes". 18
WPA (TKIP/AES/Mixed): If WPA is selected, you can select the Authentication mode between Enterprise (RADIUS) and Personal (Pre-shared Key). You can use a 1 to 63 characters string to set the password or you can leave it blank. In this case, the 802.1x Authentication will be activated. Make sure that the same password is used on the client's end. Group Key Life Time: Enter the number of seconds that will elapse before the group key changes automatically. The default value is 86400 seconds. Port: Enter the RADIUS Server's port number provided by your ISP. The default is 1812. IP Address: Enter the RADIUS Server's IP Address provided by your ISP. Password: Enter the password that the AP shares with the RADIUS Server. Click "Apply Changes" to save the new settings on the screen. Click "Reset" to discard the data you have entered since the last time you pressed "Apply Changes". 5.2.4 Access Control When Wireless Access Control Mode is enabled, only those clients whose wireless MAC addresses are listed in the access control list can access this Access Point. This MAC Filter function is an additional security feature. If the list contains no entries with this function being enabled, then no clients will be able to access this Access Point. You can press "Delete Selected" or "Delete All" to delete MAC addresses from the table. Comment: You may also enter up to 20 characters as a remark to the previous MAC Address. 19
5.2.5 Site Survey Site survey displays all the active Access Points in the neighborhood. When you are in the client mode, you can select one AP to associate with. Press "Refresh" to get the latest information. Press "Connect" to connect to another AP in the area. 5.2.6 WDS Settings This page allows you to configure the various connection modes, alternative to AP mode, supported by the WA 100. In order to be able to access this page, you must select a mode different to AP in the Basic Settings page. Enable WDS: Check the checkbox to enable WDS. Add WDS AP MAC Address: Enter the MAC Address for the Access Point you wish to establish WDS connection with. Comment: You may enter up to 20 characters as a remark to the previous MAC Address. 20
Current WDS AP List The added Access Points for participating to the WDS are shown. Click "Apply Changes" to save the new settings on the screen. Click "Reset" to discard the data you have entered since last time you pressed "Apply Changes". Set Security Click to set the WDS security. Refer to the Wireless Security Setup page. Show Statistics Click to show the detailed information for each WDS AP. 21
5.3 TCP/IP This page allows you to configure the IP and DHCP settings of your Access Point: The default IP address of the access point is 192.168.1.254 (subnet mask: 255.255.255.0). You can type in other values for the IP Address, Subnet Mask and Gateway. Click "Apply Changes" for the changes to take effect. Click "Reset" to discard the data you have entered since last time you pressed "Apply Changes". DHCP: You can enable the DHCP server function by selecting the option "Enable", and enter the IP range. Click "Apply" for the changes to take effect. You can also specify the IP address of your DNS server. Note: It is not recommended to disable the DHCP Server if you already have a DHCP server running in your LAN network because it will probably cause IP conflicts. 802.1d Spanning Tree: 802.1d Spanning Tree will prevent the network from infinite loops. Infinite loops occur when WDS is enabled and there are multiple active paths between stations. 22
Clone MAC Address: You can specify the MAC address of your Access Point if you wish to replace the default value. 5.4 Other Settings This page provides you with a few very important tools. You can Update the Firmware of the device, save your current settings, upload saved configurations and setup your administrator password. In addition, you can view the log files of your WLAN/LAN sessions. 5.4.1 Upgrade Firmware Firmware Upgrade: Click on the "Browse" button to open a FileOpen Dialog box, where you get to select the firmware file, which you have downloaded from the Crypto website. Select the firmware file, click "Upload". Click "Reset" if you want to discard the data you have entered. 23
5.4.2 Save/Reload Settings Save Settings to File: Click on the "Save" button, which will open a FileSave Dialog box, where you get to save all the current settings and configurations to a file. Load Settings to File: Click on the "Browse" button to open a FileOpen Dialog box, where you get to select the file, where you have saved the previous settings and configurations. Select the saved file and click "Upload". Restore Settings to Default: Click on the "Reset" button to restore the access point back to its' factory default settings. 5.4.3 Password Password Setup: Allows you to change the new login password. Here are the necessary steps: 1. Enter the new password in the "New Password:" field. 2. Enter the new password again in the "Confirm" field. 3. Click "Apply Change". 4. You can also click "Reset" if you want to discard the data you have entered since last time you pressed "Apply Change". 24
5.4.4 Log Enable Log: Click on the "Enable Log" button to view the log information. The log page records every event within the wireless network and the time that it takes place. You can setup the log to record every system event, or you can limit the log entries to the wireless interface only. Click on the "Clear" button to clear the entries recorded in the log and click on the "Refresh" button if you want to view the latest log entries. This page allows you to change the basic access point settings: 6 Technical Support For technical information and support please contact us: Web Site: www.crypto.gr E-mail: support@crypto.gr 25
7 Technical Specifications Standards ñieee 802.11b ñieee 802.11g Modulation Technique ñ802.11b: Direct Sequence Spread Spectrum (PBCC, CCK, DQPSK, DBPSK) ñ802.11g: Orthogonal Frequency Division Multiplexing Media Access Protocol ñcsma / CA (Collision Avoidance) with ACK Receiver Sensitivity Weight ñ147g 802.11g (PER 10%) ñ54mbps: -70dBm ñ48mbps: -73dBm ñ36mbps: -78dBm ñ24mbps: -82dBm ñ18mbps: -84dBm ñ12mbps: -86dBm ñ9mbps: -87dBm ñ6mbps: -87dBm 802.11b (PER 8%) ñ11mbps: -86dBm ñ5.5mbps: -86dBm ñ2mbps: -86dBm ñ1mbps: -86dBm Output Power ñ802.11b: 16dBm ñ802.11g: 12dBm Interface ñ wo 10/100Mbps RJ-45 port Physical Dimensions ñ128 x 89 x 27 (L x W x H) Data Rates ñ802.11g: Up to 54Mbps (6/9/12/18/24/36/48/54) ñ802.11b: Up to 11Mbps (1/2/5.5/11) Data Modulation Type ñ802.11b: Direct Sequence Spread Spectrum 11/5,5Mbps: CCK ñ802.11g: Orthogonal Frequency Division Multiplexing (OFDM) 54/48Mbps: 64QAM 36/24Mbps: 16QAM 18/12Mbps: QPSK 9/6Mbps: BPSK Power ñ12volt Power Consumption ñ802.11b: TX 335mA, RX 303mA ñ802.11g: TX 325mA, RX 303mA Regulation Compliance Europe ETSI EN 300 328, ETSI EN 301 489 17 ETSI EN 6950-01, ETSI EN 55022-024 ETSI EN 61000-3-2, ETSI EN 61000-3-3 US FCC Part 15.247 26
8 Glossary 802.1x: The IEEE 802.1x is a standard for user authentication on networks. Access Point: A hardware device or a computer's software that seamlessly connects wired and wireless networks. Ad-Hoc: An independent wireless LAN network formed by a group of computers equipped with wireless network adapters. ADSL: Asymmetric Digital Subscriber Line is a new technology that allows more data to be sent over existing copper telephone lines. ADSL supports data rates from 1.5 to 8 Mbps downstream and from 16 to 640 Kbps upstream. AES: Advanced Encryption System is an encryption technique that utilizes a symmetric 128-Bit block data encryption. ASCII: American Standard Code for Information Interchange is a code for representing characters as numbers. Each letter is represented as a number from 0 to 127. ASCII was originally developed for communications and uses only seven bits per character. Since computers use 8-bit byte (256 character combinations) and ASCII uses only the first 128 (0-127), the second set of 128 characters (128-255) are technically not ASCII, but are typically used for different language and math symbols representation. Authentication: The process of identifying a network client usually based on a username and password. Beacon: A beacon is a packet broadcasted by the Access Point / Router in order to keep the network synchronized. CCX: The Cisco Compatible extensions Program for WLAN devices, is a program that provides compatibility testing for compliance with proprietary Cisco wireless features. Channel: A channel is a separate path through which signals can flow. CTS: Clear To Send is a confirmation message sent from the receiving station to the transmitting station granting permission to transmit. DHCP: Dynamic Host Configuration Protocol is a protocol that automatically assigns dynamic IP addresses to devices on a network. DSSS: Direct Sequence Spread Spectrum is a transmission technology where a data signal is combined with a higher data rate bit sequence. The additional bits increase the signal's resistance to interference. DTIM: Delivery Traffic Indication Message is a message informing clients about the next time window for listening to broadcast and multicast messages. It is essentially a count of the number of beacon frames that must occur before the access point sends the buffered multicast frames. EAP: Extensive Authentication Protocol is a framework for extending authentication techniques in PPP (Point-to-Point Protocol) a protocol that is commonly used for dialup connections. EAP opens up the possibilities to use a range of new authentication protocols, including token cards, one-time passwords etc. Encryption: The modification of data using a secret code. Encryption is an effective way to achieve data security. Ethernet: A local-area network (LAN) architecture developed by Xerox Corporation in cooperation with DEC and Intel in 1976. The most common Ethernet systems are called 10BASE-T and provide transmission speeds up to 10 Mbps. Fast Ethernet (100BASE-T) provides transmission speeds up to 100 megabits per second. Gigabit and 10-Gigabit 27
Ethernet provide even higher transmission speeds of 1 gigabit per second and 10 gigabits per second respectively. Fragmentation: When the size of a transmitted packet exceeds a certain limit allowed by the network medium it is broken into several segments. The procedure is called fragmentation. Low fragmentation thresholds result in smaller frames and can tackle with packet collision problems due to network traffic. Setting the threshold too low can lead to, reducing throughput due to the additional headers applied to each. High fragmentation threshold has the opposite effect. Gateway: A device that interconnects networks. HEX: Hexadecimal is the base-16 number system. IAPP: The IAPP is an extension of the IEEE802.11 standard and it is designed to support interoperability, mobility, handover and coordination among WLAN APs. It provides a means to make APs communicate with each other. IEEE: Institute of Electrical and Electronics Engineers. The IEEE is an organization that is best known for developing standards for the computer and electronics industry. Infrastructure: A Wireless Infrastructure network configuration is essentially a WLAN that incorporates a Wireless Access Point / Router. ISM Band: Industrial, Scientific and Medical Band is the 2.4-2.483 GHz frequency band. LEAP: Lightweight Extensible Authentication Protocol is a part of the CCX features. It provides username / password-based authentication between a wireless client and a RADIUS server. LED: Light Emitting Diode, an electronic device that lights up when electricity is passed through it. MAC Address: Media Access Control Address is a unique HEX number assigned by the manufacturer to any Ethernet networking device. Node: A network junction or connection point, typically an Access Point / Router. OFDM: Orthogonal Frequency Division Multiplexing is a modulation scheme that works by dividing the communication channel into a number of sub-channels that are spaced apart at precise frequencies. This spacing provides the "orthogonality" in this technique which allows the transmitter and the receiver to communicate using a "dedicated" subchannel. The benefits of OFDM are high spectral efficiency and resiliency to interference. Open Authentication: Open System authentication is a null authentication algorithm. Any station that requests authentication receives it. If the key that the station is using is not correct, then further communication is not possible Packet: A set of data routed between an origin and a destination in a network. PEAP: Protected Extensible Authentication Protocol authenticates wireless LAN clients using only server-side digital certificates. It is a protocol developed jointly by Microsoft, RSA Security and Cisco for transmitting authentication data, including passwords, over 802.11 wireless networks. Preamble Type: A preamble is a signal used in network communications to synchronize the transmission timing between two or more systems. RADIUS: Remote Authentication Dial-In User Service is an authentication and accounting system used by many Internet Service Providers (ISPs). When you dial in to the ISP you must enter your username and password. This information is passed 28
to a RADIUS server, which checks that the information is correct, and then authorizes access to the ISP system. RTS: Request To Send is a signal sent from the transmitting station to the receiving station requesting permission to transmit. Shared Key Authentication: When Shared Key authentication is enabled, the Access Point / Router sends a packet to the client. The client uses a secret key in order to encode the packet and retransmits the encoded information back to the Access Point / Router. If the packet is correctly encoded then the client is authenticated. SSID: Service Set Identifier is a unique name shared among all clients and nodes in a wireless network. The SSID must be identical for all clients and nodes within a wireless network. Subnet Mask: The method used for splitting IP networks into a series of subgroups, or subnets. TKIP: Temporal Key Integrity Protocol. The TKIP works with a RADIUS server and changes the network keys every 10.000 packets, ensuring greater security. TLS: Transport Layer Security is a protocol that guarantees privacy and data integrity between client / server applications communicating over the Internet. It is application protocol-independent, allowing higher-level protocols to be setup on top of it transparently. Throughput: The amount of data transferred from one place to another or processed in a specified amount of time. WEP: Wired Equivalent Privacy is an encryption scheme that is used in wireless data communication and prevents stations that do not have the correct WEP key from linking to an Access Point / Router. WPA: Wi-Fi Protected Access is a standard designed to improve the WEP security feature on WLANs. It incorporates TKIP and EAP. WPA-PSK: Wi-Fi Protected Access Pre Shared Key is a variation of the WPA standard that is designed for small office - home use. It incorporates a Pre Shared Key, called passphrase to prevent unwanted stations from linking to an Access Point / Router. 29
.
.