Netgear WAC730 Reference Manual - Page 95

Configuration > Wireless Bridge, Wireless Point-to-Multi-Point Bridge

Page 95 highlights

ProSAFE Dual-Band Wireless AC Access Point WAC720 WAC730 wireless access point. You can configure up to four security profiles to enable the wireless access point to repeat the wireless signal for four remote wireless access points. Each security profile requires a unique name and needs to include the MAC address of the remote wireless access point. You can configure up to four such security profiles (NETGEAR-WDS-1, NETGEAR-WDS-2, and so on). The following figure shows an example in which AP1, AP2, and AP3 repeat the wireless signal in point-to-multipoint bridge mode. AP2 requires a security profile for AP1 and another one for AP3: Router Multipoint bridge mode repeating only Multipoint bridge mode repeating only Multipoint bridge mode repeating only Hub or switch Figure 7.  To configure the wireless access point to repeat the wireless signal: 1. Configure the security profiles on the wireless access point (AP2 in the previous figure): a. Select Configuration > Wireless Bridge. The Bridging page displays (see the following figure). b. Optional: To display the Bridging page for the 802.11a/na modes, click the 802.11a/na tab. c. Select the Enable Wireless Bridging check box. The Local MAC Address field is a nonconfigurable field that shows the MAC address of the wireless access point. d. Select the Wireless Point-to-Multi-Point Bridge radio button. The page adjusts. e. The profile table shows four security profiles. Choose a security profile to edit by selecting the corresponding radio button to the left of the profile. f. Click Edit to configure the selected security profile settings. The Edit Security Profile page displays for the selected security profile. (The following figure contains an example.) Advanced Configuration 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113

Advanced Configuration
95
ProSAFE Dual-Band Wireless AC Access Point WAC720 WAC730
wireless access point. You can configure up to four security profiles to enable the wireless
access point to repeat the wireless signal for four remote wireless access points. Each
security profile requires a unique name and needs to include the MAC address of the remote
wireless access point. You can configure up to four such security profiles
(NETGEAR-WDS-1, NETGEAR-WDS-2, and so on).
The following figure shows an example in which AP1, AP2, and AP3 repeat the wireless
signal in point-to-multipoint bridge mode. AP2 requires a security profile for AP1 and another
one for AP3:
Multipoint
Router
Hub or switch
bridge mode
repeating only
Multipoint
bridge mode
repeating only
Multipoint
bridge mode
repeating only
Figure 7.
To configure the wireless access point to repeat the wireless signal:
1.
Configure the security profiles on the wireless access point (AP2 in the previous figure):
a.
Select
Configuration > Wireless Bridge
. The Bridging page displays (see the
following figure).
b.
Optional: To display the Bridging page for the 802.11a/na modes, click the
802.11a/na
tab.
c.
Select the
Enable Wireless Bridging
check box. The Local MAC Address field is a
nonconfigurable field that shows the MAC address of the wireless access point.
d.
Select the
Wireless Point-to-Multi-Point Bridge
radio button. The page adjusts.
e.
The profile table shows four security profiles. Choose a security profile to edit by
selecting the corresponding radio button to the left of the profile.
f.
Click
Edit
to configure the selected security profile settings. The Edit Security Profile
page displays for the selected security profile. (The following figure contains an
example.)