WNDAP620 Firmware Version 2.0.8
Bug Fixes
- Fixed issue that passwords are stored in clear text format.
- Fixed issue that missing authentication for critical functions. Affected functions include clearing the log file, or start/stop a packet capture.
- Fixed issue that authentication bypass for in some cases. When session check fails by PHP script "downloadFile.php", contents of the device configuration/log files may be allowed to download without authentication.
- Fixed issue that it’s unable to set shared Key as network authentication and passphrase other than alphabets are not allowed.
- Fixed issue that reset password is not taking effect if some special characters are used.
Known Issues
- Some times when neighbours Access Points available nearby are more than 64 then the Access Point won’t scan neighbours Access Points.
- The data traffic over WDS will not happen with WPA-PSK and WPA2-PSK authentication when “Enable Client association” option is disabled.
Notes
- The default IP address of the AP is 192.168.0.100
- In the following scenarios AP is expected to reboot automatically for the configuration to take affect:
- Change Country/Region
- After Firmware upgrade
- After Restore Configuration Settings
- Reset factory defaults
In all the other conditions AP is not supposed to reboot automatically
- With Rogue AP and more than 2 VAPs (security profiles) enabled, the beacon interval of the AP will be automatically updated for better performance of the Rogue AP algorithm. We recommend not to reconfigure the beacon interval below the suggested value. Anything above the suggested value is fine.
- 1 or 2 VAPs enabled, beacon interval is 100ms
- 3 VAPs enabled, beacon interval is 41ms x 3 = 123ms
- 4 VAPs enabled, beacon interval is 41ms x 4 = 164ms
- 5 VAPs enabled, beacon interval is 41ms x 5 = 205ms
- 6 VAPs enabled, beacon interval is 41ms x 6 = 246ms
- 7 VAPs enabled, beacon interval is 41ms x 7 = 287ms
- 8 VAPs enabled, beacon interval is 41ms x 8 = 328ms
To Install
- Write down all the settings which you changed from the default values, since you may need to reenter them manually.
- Download and extract the new firmware to a convenient place such as your desktop.
- Login to Web Administration interface of the Access Point -
By default, http://192.168.0.100 is the Administration URL to the Web GUI. Enter admin for the user name and password for the password.
- Click Maintenance > Upgrade > Firmware Upgrade.
- Click Browse and select the firmware image you just downloaded.
- Click Upload.
Do NOT interrupt or power off the computer until the upgrade process is completed. Wait for the AP to reboot.
- After the access point boots up, log in the access point again.
You MUST Reset the router to default settings after upgrading the firmware
- Click Maintenance > Upgrade > Restore Settings.
- Click Restore. The AP reboots when the Erase operation is done.
- If you would like to check that the upgrade was successful, log in to the router again at http://192.168.0.100, and check the firmware version.
This product includes software code developed by third parties, including software code subject to the GNU General Public License ("GPL") or GNU Lesser General Public License ("LGPL"). As applicable, the terms of the GPL and LGPL, and information on obtaining access to the GPL Code and LGPL Code used in this product, are available to you at NETGEAR's Open Source Code Web page. The GPL Code and LGPL Code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the copyrights of one or more authors. For details, see the GPL Code and LGPL Code for this product and the terms of the GPL and LGPL.