WNDAP660 Firmware Version 2.0.4
New Features & Enhancements
- Updated Firmware for compliance to the new regulatory EN300 328 V1.8.1.
- Changed the settings to meet the Japan DFS requirement.
- Enabled protection for EAPOL packets during the EAPOL handshake.
- Changed the EAPOL default timeout from 1s to 2s for wireless station to get associated to the Access Point.
Bug Fixes
- Fixed the issue that Stations are not able to get DHCP IP address when in WDS link.
- Fixed the defect of unable to get DHCP IP address over the WDS link.
- Fixed the security problem to validate both username and password for recreate.php.
- Fixed the issue that Access Point can’t login from 2nd system.
- Fixed the authentication error when clients connect-disconnect frequently.
- Fixed GUI no response problem when wrong DNS server address is configured.
Known Issues:
- Some times when neighbor Access Points available nearby are more than 64 then the Access Point won’t scan neighbour Access Points.
- The data traffic over WDS will not happen with WPA-PSK and WPA2-PSK authentication when “Enable Client association” option is disabled
- AP goes to inaccessible state and wireless stations will experience disconnection when there is around more than 400Mbps of traffic (Unicast, multicast) from wired to wireless and vice versa together ran for 8 – 10hrs continuously.
NOTES:
- The default IP address of the AP is 192.168.0.100
- In the following scenarios, AP is expected to reboot automatically for the configuration to take affect.
- Change of Country/Region
- After Firmware upgrade
- After Restore Configuration Settings
- Reset factory defaults
In all the other conditions AP is not supposed to reboot automatically.
- With Rogue AP and more than 2 VAPs (security profiles) enabled, the beacon interval of the AP will be automatically updated for better performance of the Rogue AP algorithm. We recommend not to reconfigure the beacon interval below the suggested value. Anything above the suggested value is fine.
- 1 or 2 VAPs enabled, beacon interval is 100ms
- 3 VAPs enabled, beacon interval is 41ms x 3 = 123ms
- 4 VAPs enabled, beacon interval is 41ms x 4 = 164ms
- 5 VAPs enabled, beacon interval is 41ms x 5 = 205ms
- 6 VAPs enabled, beacon interval is 41ms x 6 = 246ms
- 7 VAPs enabled, beacon interval is 41ms x 7 = 287ms
- 8 VAPs enabled, beacon interval is 41ms x 8 = 328ms
To Install
- Write down all the settings which you changed from the default values, since you may need to reenter them manually.
- Download and extract the new firmware to a convenient place such as your desktop.
- Login to Web Administration interface of the Access Point -
By default, http://192.168.0.100 is the Administration URL to the Web GUI. Enter admin for the user name and password for the password.
- Click Maintenance > Upgrade > Firmware Upgrade.
- Click Browse and select the firmware image you just downloaded.
- Click Upload.
Do NOT interrupt or power off the computer until the upgrade process is completed. Wait for the AP to reboot.
- After the access point boots up, log in the access point again.
You MUST Reset the router to default settings after upgrading the firmware
- Click Maintenance > Upgrade > Restore Settings.
- Click Restore. The AP reboots when the Erase operation is done.
- If you would like to check that the upgrade was successful, log in to the router again at http://192.168.0.100, and check the firmware version.
This product includes software code developed by third parties, including software code subject to the GNU General Public License ("GPL") or GNU Lesser General Public License ("LGPL"). As applicable, the terms of the GPL and LGPL, and information on obtaining access to the GPL Code and LGPL Code used in this product, are available to you at NETGEAR's Open Source Code Web page. The GPL Code and LGPL Code used in this product is distributed WITHOUT ANY WARRANTY and is subject to the copyrights of one or more authors. For details, see the GPL Code and LGPL Code for this product and the terms of the GPL and LGPL.