WNDAP360 Firmware Version 2.1.12
Fixed issues :
- Fixed issue where the passwords are stored in clear text format
- Fixed issue where the missing authentication for critical functions. Affected functions include clearing the log file or start/stop a packet capture
- Fixed issue where the authentication bypass in some cases, when session check fails by PHP script "downloadFile.php", contents of the device configuration/log files may be allowed to download without authentication
- Fixed issue where it is unable to set shared Key as network authentication and passphrase other than alphabets are not allowed
- Fixed issue where the reset password is not taking effect
- Rogue AP's are getting displayed even when Rogue AP functionality is disabled
- Rogue AP logging stops in syslog after a while when Rogue AP is enabled
- GUI issue showing Rogue AP's of 2.4 GHz in 5 GHz
- Rogue AP detecting only in home channel AP's
Known Issues & Limitations
- Traps are not received for 5 GHz in the dual mode when Rogue AP is enabled with any policy Mild, Moderate and Aggressive
- All the tabs are visible when you login to the AP user inferface for first time instead of change password- IE specific
NOTES :
- The default IP address of the AP is 192.168.0.100
- In the following scenarios AP is expected to reboot automatically for the configuration to take affect:
- Change Country/Region
- After Firmware upgrade
- After Restore Configuration Settings
- Reset factory defaults
In all the other conditions AP is not supposed to reboot automatically.
- With Rogue AP and more than 2 VAPs (security profiles) enabled, the beacon interval of the AP will be automatically updated for better performance of the Rogue AP algorithm. We recommend not to reconfigure the beacon interval below the suggested value. Anything above the suggested value is fine.
- 1 or 2 VAPs enabled, beacon interval is 100ms
- 3 VAPs enabled, beacon interval is 41ms x 3 = 123ms
- 4 VAPs enabled, beacon interval is 41ms x 4 = 164ms
- 5 VAPs enabled, beacon interval is 41ms x 5 = 205ms
- 6 VAPs enabled, beacon interval is 41ms x 6 = 246ms
- 7 VAPs enabled, beacon interval is 41ms x 7 = 287ms
- 8 VAPs enabled, beacon interval is 41ms x 8 = 328ms
To Install
- Write down all the settings which you changed from the default values, since you may need to reenter them manually.
- Login to Web Administration interface of the Access Point -
By default, http://192.168.0.100 is the Administration URL to the Web GUI. Enter admin for the user name and password for the password.
- Click Maintenance > Upgrade > Firmware Upgrade.
- Click Browse and select the firmware image you just downloaded.
- Click Upload.
Do NOT interrupt or power off the computer until the upgrade process is completed. Wait for the AP to reboot.
This product includes software code developed by third parties, including software code subject to the GNU General Public License ("GPL") or GNU Lesser General Public License ("LGPL"). As applicable, the terms of the GPL and LGPL, and information on obtaining access to the GPL Code and LGPL Code used in this product, are available to you at NETGEAR's Open Source Code Web page. The GPL Code and LGPL Code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the copyrights of one or more authors. For details, see the GPL Code and LGPL Code for this product and the terms of the GPL and LGPL.