User manual NETGEAR WMS105

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual NETGEAR WMS105. We hope that this NETGEAR WMS105 user guide will be useful to you.


NETGEAR WMS105 : Download the complete user guide (747 Ko)

Manual abstract: user guide NETGEAR WMS105

Detailed instructions for use are in the User's Guide.

[. . . ] ProSafe 5 AP Wireless Management Software WMS105 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA May 2010 202-10662-01 v1. 0 ProSafe 5 AP Wireless Management Software WMS105 © 2010 NETGEAR, Inc. © 2010 by NETGEAR, Inc. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of NETGEAR, Inc. P/N: Part Number TBD v1. 0 Technical Support When you register your product at http://www. netgear. com/register, we can provide you with faster expert technical support and timely notices of product and software upgrades. NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 USA E-mail: support@netgear. com Web site: http://www. netgear. com Phone: 1-888-NETGEAR, for US & Canada only. For other countries, see your Support information card. Trademarks NETGEAR, the NETGEAR logo, ProSafe, Smart Wizard, and Auto Uplink are trademarks or registered trademarks of NETGEAR, Inc. [. . . ] To change the settings of a security profile, select the profile and click the Edit button. Editing a Security Profile This lets you change the Security Profile settings of the profile that you selected on the Profile Settings page. · Name: A unique name for the Security Profile, up to 32 alphanumeric characters. Wireless Network Name (SSID): The name of the wireless network associated with this profile. If you disable broadcast of the SSID, only devices that have the correct SSID can connect to the access point. The options available for data encryption depend on the Network Authentication settings. Wireless Client Security Separation: If enabled, the associated wireless clients will not be able to communicate with each other. This feature is intended for hot spots and other public access situations. VLAN: The default VLAN ID to be associated with this security profile. This must match the VLAN ID used by other network devices. · · · · · · Chapter 4: Security Configuration | 19 ProSafe 5 AP Wireless Management Software WMS105 The following table shows the data encryption options based on network authentication. Table 2. Network Authentication and Data Encryption Network Authentication Data Encryption Open None WEP WEP Description No encryption. Shared Key · 64-bit WEP encryption uses 40/64 bit encryption. · 128-bit WEP encryption uses 104/128 bit encryption. · 152-bit WEP is a proprietary mode that will only work with other wireless devices that support this mode. Legacy 802. 1x WPA with RADIUS WPA2 with RADIUS · Select the WPA2 option only if all All require RADIUS configurations. WPA/WPA2 with RADIUS allows clients to use either WPA (with TKIP) or WPA2 (with AES). Standard encryption method for WPA2. WPA-PSK WPA2-PSK WPA2-PSK TKIP or TKIP +AES and a WPA passphrase (network key) AES and TKIP + AES Some clients might support AES with WPA, but this is not supported by this access point. For unicast (point-to-point) transmissions, and WPA clients use TKIP, and WPA2 clients use AES. WPA and WPA2 TKIP + AES encryption and enter the WPA passphrase (network key). TKIP + AE WPA-PSK/WPA2-PSK Rogue Access Points Unidentified access points that use the SSID of a legitimate network can present a serious security threat. Rogue Access Point Detection is enabled by default on managed access points. To detect rogue access points, the Wireless Management Software or access point scans the wireless environment on all available channels, looking for unidentified access points. 20 | Chapter 4: Security Configuration ProSafe 5 AP Wireless Management Software WMS105 1. On the Configuration tab select Security > Basic > Rogue Access Points: The Wireless Management Software can support up to 512 total rouge access points from the Known and Unknown lists combined. This field allows you to import a list of approved access points from a saved file. The current list is maintained and the access points in the imported list is added to the approved list and the Known AP List. To remove an access point from this list, select its checkbox and click Delete. · You can click Refresh to scan for other access points in the vicinity whose details are not in the Known AP List. · To move an access point from the Unknown AP list to the Known AP list, select its checkbox and click Move. 4. [. . . ] When the Test light turns off, wait a few more seconds before doing anything. Check the firmware version on the Upgrade page to verify that your access point now has the new software installed. Chapter 6: Maintenance | 33 ProSafe 5 AP Wireless Management Software WMS105 Backing up Configuration Settings Once you have the Wireless Management Software working properly, you should back up the information to have it available if something goes wrong. When you back up the settings, they are saved as a file on your computer. Click the Backup button to create a backup file of the current settings: 3. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE NETGEAR WMS105




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual NETGEAR WMS105 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.