Netgear WNDAP660 Reference Manual - Page 122

Table 36., Point-to-point bridge profile and authentication settings continued

Page 122 highlights

ProSafe Premium 3 x 3 Dual-Band Wireless-N Access Point WNDAP660 Table 36. Point-to-point bridge profile and authentication settings (continued) Setting Network Authentication and Data Encryption (continued) Description Open System Although you can use the bridge communication without any authentication and encryption, NETGEAR recommends that you use WEP if you do select an open system. From the Data Encryption drop-down list, select one of the following: • None. No authentication and encryption. • 64-bit WEP. Standard WEP encryption, using 40/64-bit encryption. • 128-bit WEP. Standard WEP encryption, using 104/128-bit encryption. • 152-bit WEP. Proprietary WEP encryption mode, using 128+24 bit encryption. This mode functions only with other wireless stations that support this mode. WPA-PSK TKIP (Temporal Key Integrity Protocol) is the standard encryption method used with WPA-PSK and the only selection possible from the Data Encryption drop-down list. In the WPA Passphrase (Network Key) field, enter a passphrase. The passphrase length needs to be between 8 and 63 characters (inclusive). WPA2-PSK AES (Advanced Encryption Standard) is the standard encryption method used with WPA2-PSK and the only selection possible from the Data Encryption drop-down list. In the WPA Passphrase (Network Key) field, enter a passphrase. The passphrase length needs to be between 8 and 63 characters (inclusive). Note: NETGEAR recommends WPA2-PSK authentication with AES encryption if you want to use the 11n rates and speed. h. Click Apply to save your security profile settings. The Bridging screen displays again. i. If the correct profile name and security option are displayed in the table, select the check box in the Enable column. j. Click Apply on the Bridging screen to save your point-to-point bridge settings. 2. Configure a second wireless access point (AP2) on LAN Segment 2 (see Figure 67 on page 120) in point-to-point bridge mode. AP1 needs to have AP2's MAC address in its Remote MAC Address field, and AP2 needs to have AP1's MAC address in its Remote MAC Address field. 3. Verify the following settings for both wireless access points: • Both wireless access points are configured to operate in the same LAN network address range as the LAN devices. • Both wireless access points use the same channel, authentication mode, and security settings. 4. Verify connectivity across the LAN 1 and LAN 2. Advanced Configuration 122

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174

Advanced Configuration
122
ProSafe Premium 3 x 3 Dual-Band Wireless-N Access Point WNDAP660
h.
Click
Apply
to save your security profile settings. The Bridging screen displays
again.
i.
If the correct profile name and security option are displayed in the table, select the
check box in the Enable column.
j.
Click
Apply
on the Bridging screen to save your point-to-point bridge settings.
2.
Configure a second wireless access point (AP2) on LAN Segment 2 (see
Figure 67
on
page 120) in point-to-point bridge mode.
AP1 needs to have AP2’s MAC address in its Remote MAC Address field, and AP2 needs
to have AP1’s MAC address in its Remote MAC Address field.
3.
Verify the following settings for both wireless access points:
Both wireless access points are configured to operate in the same LAN network
address range as the LAN devices.
Both wireless access points use the same channel, authentication mode, and security
settings.
4.
Verify connectivity across the LAN 1 and LAN 2.
Network
Authentication and
Data Encryption
(continued)
Open System
Although you can use the bridge communication without any
authentication and encryption, NETGEAR recommends that
you use WEP if you do select an open system. From the Data
Encryption drop-down list, select one of the following:
None
. No authentication and encryption.
64-bit WEP
. Standard WEP encryption, using 40/64-bit
encryption.
128-bit WEP
. Standard WEP encryption, using
104/128-bit encryption.
152-bit WEP
. Proprietary WEP encryption mode, using
128+24 bit encryption. This mode functions only with
other wireless stations that support this mode.
WPA-PSK
TKIP
(Temporal Key Integrity Protocol) is the standard
encryption method used with WPA-PSK and the only
selection possible from the Data Encryption drop-down list.
In the WPA Passphrase (Network Key) field, enter a
passphrase. The passphrase length needs to be between
8 and 63 characters (inclusive).
WPA2-PSK
AES
(Advanced Encryption Standard) is the standard
encryption method used with WPA2-PSK and the only
selection possible from the Data Encryption drop-down list.
In the WPA Passphrase (Network Key) field, enter a
passphrase. The passphrase length needs to be between
8 and 63 characters (inclusive).
Note:
NETGEAR recommends WPA2-PSK authentication
with AES encryption if you want to use the 11n rates and
speed.
Table 36.
Point-to-point bridge profile and authentication settings (continued)
Setting
Description