[. . . ] RangeMax NEXT Wireless-N Access Point WN802T Reference Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA 202-10204-03 v1. 0 August 2007 © 2007 by NETGEAR, Inc. All rights reserved. . Trademarks NETGEAR, the NETGEAR logo, RangeMax and Auto Uplink are trademarks or registered trademarks of NETGEAR, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. [. . . ] Using a Remote Authentication Dial In User Service (RADIUS) authentication server allows centralized authentication management with individual user names and passwords. · WEP/WPA Settings The WN802T Access Point is set by default "None" or no authentication. When setting up Network Authentication, bear in mind the following: Not all wireless adapters support WPA or WPA2. Windows XP and Windows 2000 with Service Pack 3 do include the client software that supports WPA. Consult the product documentation for your wireless adapter and WPA or WPA2 client software for instructions on configuring WPA2 settings. You can configure the RangeMax NEXT to use the types of network authentication shown in the table below. Table 3-1. Network Authentication Types Type None WEP WPA-PSK (TKIP) WPA2-PSK (AES) Description No data encryption Wired Equivalent Privacy using either 64-bit or 128-bit data encryption. Wi-FI Protected Access with Pre-Shared Key, uses WPA-PSK standard encryption with TKIP encryption type. Wi-FI Protected Access with Pre-Shared Key, uses WPA-PSK standard encryption with AES encryption type. This selection allows clients to use either WPA-PSK (TKIP) or WPA2-PSK (AES). If selected, you must use AES encryption, and configure the Radius Server Settings Screen. If selected, you must configure the Radius Server Settings Screen. WPA-PSK (TKIP) + WPA2-PSK (AES) WPA with Radius WPA2 with Radius WPA and WPA2 with Radius 3-2 v1. 0, August 2007 Wireless Security Settings RangeMax NEXT Wireless-N Access Point WN802T Reference Manual · Data Encryption. The available options depend on the Network Authentication setting selected (see Table 3-1 above); otherwise, the default is None. The Data Encryption settings are explained in the table below: Table 3-1. Data Encryption Settings Data Encryption Type None 64 bits WEP 128 bits WEP TKIP AES Description No encryption is used. Automatic encryption with WPA-PSK; requires passphrase Automatic encryption with WPA2-PSK; requires passphrase · WEP Authentication Type. If set to Open System, clients can only associate to the wireless access point by using the Open System option. If set to Automatic, clients can associate to the wireless access point using both Open System and Shared Key. Setting the Authentication Type to Automatic will detect which WEP authentication method is being used. To use the Passphrase to generate the WEP keys, enter a passphrase and click the Generate Keys button. If using WPA-PSK, WPA2-PSK or WPA-PSK + WPA2-PSK, enter the passphrase here. The network key must be from 8 to 63 characters in length. · ­ ­ Wireless Security Settings v1. 0, August 2007 3-3 RangeMax NEXT Wireless-N Access Point WN802T Reference Manual SSID and WEP/WPA Settings Setup Form For a new wireless network, print or copy this form and fill in the configuration parameters. For an existing wireless network, the person who set up or is responsible for the network will be able to provide this information. [. . . ] The usual setting for Windows on the Network Properties is set to "Obtain an IP address automatically. " The wireless access point's default values may not work with your network. Check the wireless access point's default configuration against the configuration of other devices in your network. For full instructions on changing the wireless access point's default values, see Chapter 2, "Installation and Configuration" and Chapter 3, "Wireless Security Settings". · · When I enter a URL or IP address I get a timeout error. A number of things could be causing this. If they do, ensure that your computer's IP Address, Subnet Mask and Default Gateway settings are correct. [. . . ]