Netgear WG302v1 WG302v1 Reference Manual - Page 19

Secure Telnet Command Line Interface., Rogue Access Point detection. - firmware

Page 19 highlights

NETGEAR ProSafe 802.11g Wireless Access Point WG302 Reference Manual - Point-to-Point Bridge - In this mode, the WG302 only communicates with another bridgemode wireless station. You must enter the MAC address (physical address) of the other bridge-mode wireless station in the field provided. WEP should be used to protect this communication. - Point-to-Multi-Point Bridge - Select this only if this WG302 is the "Master" for a group of bridge-mode wireless stations. The other bridge-mode wireless stations must be set to Point-to-Point Bridge mode, using this WG302's MAC address. They then send all traffic to this "Master", rather than communicate directly with each other. WEP should be used to protect this traffic. - Wireless Repeater - In this half-duplex mode, the WG302 only communicates with another repeater-mode wireless station. You must enter the MAC address of both adjacent repeater-mode wireless stations in the fields provided. WEP should be used to protect this communication. • Wireless Multimedia (WMM) support. WMM is a subset of the 802.11e standard. WMM allows wireless traffic to have a range of priorities, depending on the kind of data. Timedependent information such as video or audio will have a higher priority than normal traffic. For WMM to function correctly, wireless clients must also support WMM. • Rogue Access Point detection. For enhanced security, you can scan the wireless network to detect rogue access points. • Hotspot settings. You can allow all HTTP (TCP, port 80) requests to be captured and redirected to the URL you specify. • Upgradeable Firmware. Firmware is stored in a flash memory and can be upgraded easily, using only your Web browser, and can be upgraded remotely. • Access Control. The Access Control MAC address filtering feature can ensure that only trusted wireless stations can use the WG302 to gain access to your LAN. • Simple Configuration. If the default settings are unsuitable, they are easy to change. • Hidden Mode. The SSID is not broadcast, assuring only clients configured with the correct SSID can connect. • Secure Telnet Command Line Interface. The Telnet command line interface enables direct access over the serial port and easy scripting of configuration of multiple WG302 across an extensive network via the Ethernet interface. An SSH client is required. • Configuration Backup. Configuration settings can be backed up to a file and restored. • Secure and Economical Operation. Adjustable power output allows more secure or economical operation. Introduction 1-3 v4.0, April 2006

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98

NETGEAR ProSafe 802.11g Wireless Access Point WG302 Reference Manual
Introduction
1-3
v4.0, April 2006
Point-to-Point Bridge – In this mode, the WG302 only communicates with another bridge-
mode wireless station. You must enter the MAC address (physical address) of the other
bridge-mode wireless station in the field provided. WEP should be used to protect this
communication.
Point-to-Multi-Point Bridge – Select this only if this WG302 is the “Master” for a group of
bridge-mode wireless stations. The other bridge-mode wireless stations must be set to
Point-to-Point Bridge mode, using this WG302's MAC address. They then send all traffic
to this “Master”, rather than communicate directly with each other. WEP should be used to
protect this traffic.
Wireless Repeater – In this half-duplex mode, the WG302 only communicates with
another repeater-mode wireless station. You must enter the MAC address of both adjacent
repeater-mode wireless stations in the fields provided. WEP should be used to protect this
communication.
Wireless Multimedia (WMM) support.
WMM is a subset of the 802.11e standard. WMM
allows wireless traffic to have a range of priorities, depending on the kind of data. Time-
dependent information such as video or audio will have a higher priority than normal traffic.
For WMM to function correctly, wireless clients must also support WMM.
Rogue Access Point detection.
For enhanced security, you can scan the wireless network to
detect rogue access points.
Hotspot settings
. You can allow all HTTP (TCP, port 80) requests to be captured and re-
directed to the URL you specify.
Upgradeable Firmware.
Firmware is stored in a flash memory and can be upgraded easily,
using only your Web browser, and can be upgraded remotely.
Access Control.
The Access Control MAC address filtering feature can ensure that only
trusted wireless stations can use the WG302 to gain access to your LAN.
Simple Configuration.
If the default settings are unsuitable, they are easy to change.
Hidden Mode.
The SSID is not broadcast, assuring only clients configured with the correct
SSID can connect.
Secure Telnet Command Line Interface.
The Telnet command line interface enables direct
access over the serial port and easy scripting of configuration of multiple WG302 across an
extensive network via the Ethernet interface. An SSH client is required.
Configuration Backup.
Configuration settings can be backed up to a file and restored.
Secure and Economical Operation.
Adjustable power output allows more secure or
economical operation.