Take Control of Your 802.11n AirPort Extreme Network (1.2)

Web Extras:
Help | Catalog | Feedback | Print | Check for Updates
Take Control
Your 802.11n AirPort
Extreme Network
of
by
Glenn Fleishman
Table of Contents (1.2)
Read Me First ...................................................... 2
Introduction ........................................................ 5
AirPort Networking Quick Start .............................. 6
Quick Troubleshooting Guide ................................. 8
Key Glossary Terms ........................................... 10
Learn Wireless and AirPort Basics......................... 13
Put Your Base Station into Action ......................... 25
Set Up Your Network .......................................... 54
Connect Your Computers .................................... 70
Connect Multiple Base Stations ............................ 86
Mix Legacy, New N Networks............................... 97
Reach Your Network Remotely........................... 101
Set Up a Shared USB Printer ............................. 113
Set Up a Shared USB Disk................................. 121
Secure Your Network........................................ 132
Overcome Interference ..................................... 146
Appendix A: Stream Media with AirPort............... 150
Appendix B: Setting up a Software Base Station .. 158
Appendix C: Advanced Extreme Features ............ 161
Appendix D: What’s New in Leopard ................... 167
About This Book............................................... 179
10
$
READ ME FIRST
Welcome to Take Control of Your 802.11n AirPort Extreme Network,
version 1.2. This book helps you install and get the most out of an
802.11n Wi-Fi network. This book was written by Glenn Fleishman,
edited by Tonya Engst, and published by TidBITS Publishing Inc.
Copyright © 2008 Glenn Fleishman. All rights reserved.
The price of this ebook is $10. If you want to share it with a friend,
please do so as you would a physical book. Click here to give your
friend a discount coupon. Discounted classroom copies are also
available.
Updates
You may not have the latest version of this PDF. To find out if there’s
a new version, click the Check for Updates link on the cover. Once you
click the link, you’ll be taken to a Web page where you can learn about
any available or planned updates, and sign up to be notified about
updates to the PDF via email. You may also find minor update information directly on that Web page.
Who Needs This Book
I wrote this book for people who have purchased or are considering
buying the thoroughly overhauled, 802.11n AirPort Extreme Base
Station, released in January 2007 with new software, and updated
with new hardware and revised software in August 2007. My goal is
to help you configure this base station model to meet your needs, and
to use it with existing and new networking equipment and computers.
Who Doesn’t Need This Book
If you’re not yet using a 2007-or-later, 802.11n AirPort Extreme Base
Station, this book would be worthwhile only for background research
if you are considering buying that new base station. If you use earlier
networking hardware on a Mac, consider purchasing Take Control
of Your AirPort Network, which covers gear released before 2007.
Basics
In reading this book, you may get stuck if you don’t know certain
basic facts about Mac OS X or if you don’t understand Take Control
Page 2
syntax for things like working with menus or finding items in the
Finder. Please note the following:
• Path syntax: I occasionally use a path to show the location of a
file or folder in your file system. Path text is formatted in bold type.
For example, the Airport Utility gets installed into the Utility folder,
which is located inside the Applications folder. The path to AirPort
Utility is: /Applications/Utilities/AirPort Utility.
• Menus: When I describe choosing a command from a menu in
the menu bar, I use an abbreviated description. For example, the
abbreviated description for the menu command that creates a new
folder in the Mac OS X Finder is “File > New Folder.”
• Finding preference panes: I sometimes refer to Mac OS X
preferences that you may want to adjust, such as the Network
preference pane. To reach this pane, open System Preferences
by clicking its icon in the Dock or choosing System Preferences
from the  menu. You access a particular preference pane by way
of its icon, or the View menu. For example, to see “the Network
preference pane,” you would launch System Preferences and
then click the Network icon or choose View > Network. To see
“the AirPort view of the Network preference pane,” you would
do the same thing, and then click AirPort.
• Configuring a base station: Throughout the book, I refer to
using a program called AirPort Utility to configure a base station.
To configure a base station in almost all cases, you launch or
switch to AirPort Utility, select the base station in a left-hand list
of base stations, and then choose Base Station > Manual Setup
(Command-L) to proceed.
What’s New in Version 1.2
Leopard shipped several weeks after the 1.1 version of this book, and
there was nothing to be done but wait to see what shook out—and boy
did a lot shake out, including Apple’s release of Time Capsule, an
updated AirPort Express, and another overhaul of their AirPort
Utility. As a result, this updated version 1.2 features an extensive
appendix documenting changes in Leopard. An upcoming new book,
tentatively titled Take Control of Your Draft N AirPort Network in
Leopard, will thoroughly address all the new backup and network
options separately.
Page 3
See Appendix D: What’s New in Leopard (p. 167) for the rundown
on how the Network preference pane changed, how the new AirPort
menu works, and how to configure a host of small tweaks that have
moved since Tiger.
Also, in areas of the book where the new appendix has important
information about Leopard, I’ve added a leopard spot ( ) in the
margin. If you see the spot, you can click it to view the appendix. If
you find yourself moving around a lot due to clicking the spots, you
may find it handy to use a keyboard shortcut to quickly return to the
previous location. Look in the menus to find the shortcut for your
PDF software.
What Was New in Version 1.1
At first, this revision was intended to be a 1.0.1 update, to cover the
changes in the AirPort Extreme Base Station with 802.11n that Apple
introduced in August 2007. After reviewing reader mail and spending
many hours working with the gigabit model, I wound up making a
number of changes and additions that should help with setting up
regular networks and those with multiple base stations.
In this update, I added the following:
• An updated discussion of the state of 802.11n. See Extreme N
Details (p. 18).
• More information about Third-party adapters for 802.11n (p. 22).
• A new section, Connect Multiple Base Stations (p. 86), which
explains in detail how to use Ethernet and Wi-Fi links to build
a network of two or more base stations to cover a greater area
or increase the speed of the network.
• For mixed networks using older 802.11 standards with 802.11n,
I recommend that you attach USB printers to an Extreme N Base
Station. See Put Printers in the Right Place (p. 99).
• Updated information about NAT-PMP and wide-area Bonjour,
Apple technologies for extending access to local network resources.
• To the section on coping with interference, I added more specific
advice. See Eliminate Conflicting Signals (p. 146).
Page 4
INTRODUCTION
Apple introduced integrated wireless networking to the world with
AirPort in 1999. Although corporations had already been using forms
of wireless networking for warehouse tracking and to connect buildings in a large campus, the cost was high, speeds were low, and complexity was manifest. Other companies were selling similar wireless
hardware in 1999, but Apple’s products shot off the shelves due to
their relatively low initial price, simple configuration interface, and
excellent performance.
AirPort came out of the same approach that allowed Apple to ship
the iMac the year before: combining available, standard parts in a
unique package that provided more value as a whole.
The AirPort Card fit into a special slot in Macintoshes; its standalone, central coordinating hub was called the AirPort Base Station.
Apple replaced the original AirPort line with AirPort Extreme: first,
in 2003 with a somewhat faster flavor (known as 802.11g), then again
in 2007, with a substantially faster version (802.11n). Today, AirPort
Extreme is built into every Mac, except the Mac Pro, for which it is an
add-on option, and the Xserve, which is designed for server rooms.
Despite Apple’s 8-year history with wireless networking and the
general excellence of their software and support, setting up a wireless
network isn’t always a snap. This book helps you set up a wireless
network and offers tips to help save time, improve security, extend
range, and enjoy a technical edge when working with AirPort.
Although the title of this book references 802.11n AirPort Extreme
networks, I also cover compatibility and connections with older
hardware, as well as connecting to a new network using Mac OS X,
Windows XP, and Windows Vista.
I start with wireless basics, move through installation and configuration, explain how to share printers and hard disks, tell you how
to connect to a Wi-Fi network, give advice on extending a network’s
range and quality, look at adding devices like an Apple TV or AirPort
Express, and finish with how-to information on security for those who
want their AirPort networks safe from freeloaders and intruders.
Page 5
AIRPORT NETWORKING QUICK START
If you read this book in order, you’ll be guided through the steps
shown below—unpacking an 802.11n AirPort Extreme Base Station,
configuring the gateway, and getting on the Internet. The book also
guides you through adding devices like printers, hard disks, and
Apple TV, and securing the network.
Need a quick solution? If you are reading this book in order
to solve a particular problem, flip ahead two pages to the Quick
Troubleshooting Guide, also, you may especially wish to consult
Eliminate Conflicting Signals (p. 146).
Learn wireless basics:
• Get a quick grounding in wireless terminology and technology.
See Key Glossary Terms (p. 10) and Learn Wireless and AirPort
Basics (p. 13).
Set up your network:
• Unpack and power your base station (p. 25), and Install new
software (p. 27).
• Handle initial setup (p. 32) for the base station. This might be all
you need to get on the Internet.
• Learn about options and tradeoffs for which frequency band and
channel to use, in Configure the Spectrum and Channel (p. 47).
• Place your gateway in the right place for optimum coverage. See
Pick the Right Place for Your Base Station (p. 49).
• Hook your AirPort Extreme into the Internet or a larger network,
while learning the difference between public and private network
addresses, and static and dynamic addresses in Get a WAN
Address (p. 55).
• Set up your local network connections for computers to connect
wirelessly and via Ethernet to the base station. Read Hand Out
LAN Addresses (p. 61).
Page 6
• Control how your computers connect to the network with Connect
Your Computers (p. 70), which covers Mac OS X, Windows XP
Service Pack 2, and Windows Vista.
• Open your local network up to the wider world in limited ways
for gaming, remote control, and Web servers. See Reach Your
Network Remotely (p. 101).
• Add printers and external drives to your base station to share
across the network—or the Internet. See Set Up a Shared USB
Printer (p. 113) and Set Up a Shared USB Disk (p. 121).
• Stream media on your network through an Apple TV (p. 150) or
with AirPort Express and AirTunes (p. 154).
Extend your network with more routers:
• Add access points to your network with the right settings to create
seamless roaming. See Connect Multiple Base Stations (p. 86).
• Don’t throw away your old gear: combine old and new for the best
of both worlds. See Mix Legacy, New N Networks (p. 97).
• Extend your network over your home electrical system. Read the
sidebar Extend with HomePlug (p. 90).
• Bridge Wirelessly among access points, in order to avoid wiring
(p. 91).
Secure your network:
• Decide if you need encryption. Read Likelihood, Liability, and Lost
Opportunity (p. 132).
• Avoid security tricks that don’t work, while using a new method
that does. See Simple Tricks That Don’t Work (p. 134).
• Apply encryption using the best—and often simplest—method.
See Use Built-In Encryption (p. 137).
Page 7
QUICK TROUBLESHOOTING GUIDE
If you need quick help, here’s the starting point.
Reset the Base Station from a Lock-Up
If your AirPort Extreme Base Station can’t be seen over the network
via AirPort Utility (see Install new software, p. 27), and you cannot
connect to the base station or the Internet via a Wi-Fi-enabled
computer, try these steps in order:
1. Check a local connection: Make sure that the computer
running AirPort Utility is on the same local network as the base
station. Try connecting the computer via Ethernet to one of the
base station’s LAN ports. Try AirPort Utility again.
2. Failing a direct Ethernet connection, try power cycling:
Pull the power adapter’s plug out of the wall socket or remove the
end that plugs into the base station. Wait 10 seconds. Plug it back
in, and try to connect via AirPort Utility. Everything may be back
to normal.
3. Failing power cycling, try a factory reset: This step erases
any the custom settings you’ve made (I recommend backing up
settings using AirPort Utility; see Create and manage profiles,
p. 38). To reset the base station, straighten one end of a paperclip,
and with the base station plugged into power, hold down the base
station’s reset button with the paperclip end. The reset button is
recessed in the rear right of the base station below the reset
symbol: a white arrow reversed out of a gray circle.
4. Failing power cycling, try to reset another way: Unplug
the base station from power, push in the reset button and hold it
down, plug the base station into power, and keep the reset button
pressed for at least 20 seconds.
5. Failing factory reset: Call Apple for return instructions.
Page 8
Printer Problems
Printer on 802.11g part of network won’t print
You’ll need to connect it to your Extreme N base station. Put Printers
in the Right Place explains how (p. 99).
Can’t print to a USB-connected printer
See Troubleshoot an Unavailable Shared USB Printer (p. 120).
Other Troubleshooting
Can’t see base station’s network from all computers
Did you set the base station to the 5 gigahertz (GHz) band? Only
newer Macs with 802.11n built in can connect. See Configure the
Spectrum and Channel (p. 42).
Can’t connect to base station’s network; get an error instead
If you can see its network name, try these fixes:
• Did you inadvertently set the base station to allow 802.11n only
connections in the 2.4 GHz band? See Connect Your Computers
(first Warning, page 70). It’s also possible that access control is
preventing access. See Mac address filtering (p. 135).
• It’s possible that interference in your area from other networks is
preventing you from connecting. You may need to change the base
station’s channel. See Eliminate Conflicting Signals (p. 146).
Error occurs after connecting to the base
station with the correct encryption key
Are you using a Mac with the older AirPort Card with your base
station set up with WPA2 encryption? See Turning on WPA/WPA2
with AirPort Extreme (p. 141).
Firmware update makes base station act erratically
Try to Revert to Older Firmware (p. 161).
Network works erratically
Another network might be interfering with yours. See Eliminate
Conflicting Signals (p. 146).
Conflicting signals seem to cause network problems
See Eliminate Conflicting Signals (p. 146).
Page 9
KEY GLOSSARY TERMS
In this section, I’ve defined a few terms that you’ll encounter over
and over in this book. Read the list below to become familiar with any
new terms and refresh your memory on the rest. I also define these
terms where they occur. I’ve presented the concepts below in the
order you need to understand them, building one on top of the other.
Wi-Fi: The set of wireless networking standards that encompasses
all of Apple’s AirPort products, and thousands of wireless networking
products made by other firms. The in-progress 802.11n standard used
in the latest AirPort Extreme Base Station is slated to become part of
Wi-Fi in third quarter 2007.
Ethernet: A set of standards for connecting computers by wire,
typically at speeds of 10 megabits per second (Mbps), 100 Mbps,
and 1,000 Mbps. 1,000 Mbps Ethernet is commonly called gigabit
Ethernet.
Local Area Network (LAN): A LAN comprises computers
connected via Ethernet and/or Wi-Fi into a small or large group.
A LAN’s computers are in close physical proximity, usually in an
area as small as a home office or as large as an entire office building.
A LAN is typically thought of as a single network, especially when
considering local network resources like fileservers.
Wide Area Network (WAN): A router, like the AirPort Extreme
Base Station, connects its own LAN to a wider network that’s known
as a WAN. A WAN, from the perspective of a base station, is often
simply the Internet; or it might be a network connecting several
offices run by the same company in different cities.
Access point: A wireless networking device that accepts connections
from clients or other access points in order to move network traffic
over the air.
Base station, router, gateway: These three terms are used
somewhat interchangeably to refer to the central Wi-Fi hub that
connects a LAN to a WAN. Routers, often called gateways, connect
different kinds of networks and allow devices on each network
to communicate with each other. Apple calls its combination of an
access point and gateway a base station; other companies call these
Wi-Fi gateways or Wi-Fi routers.
Page 10
MAC (Media Access Control) address: The MAC address is a
unique number assigned by a manufacturer to each network adapter,
including Ethernet adapters and Wi-Fi adapters. The MAC address
is used to identify an adapter on a LAN. (Media here is the plural
of medium, as in the access medium: the physical means over which
data flows.) To learn how to find a device’s MAC address, see the
sidebar What and Where is a MAC Address? (p. 59).
Larger LAN: A base station often creates a LAN for computers
connected to it. But in larger networks, the base station is connected
via its WAN port to a “larger LAN”—despite the name of the port, this
is a local network, but it typically has services that are passed through
to the base station-connected computers. The larger LAN handles
functions that an Internet service provider (ISP) would.
Often, the settings for an Apple base station are different when you
connect it to a broadband modem and the Internet—a simple WAN
connection—than when you connect the base station to a larger LAN.
Internet Protocol (IP) address: An IP address is a number
assigned to a network interface, like an Ethernet card or a Wi-Fi
radio, that allows it to be identified uniquely on a local network or
the Internet. A device needs an IP address in order to interact with
Internet services such as an email server or a Web site.
Private IP addresses: Private IP addresses, also called simply
private addresses, are assigned in LANs from a pool of globally
reserved IP address prefixes. Private addresses are not reachable
or routable from outside the LAN without extra work: Internetconnected computers can’t directly address private IP addresses,
and require an intermediary to help (see Network Address
Translation, below).
Public IP addresses: Public IP addresses, also frequently called
public addresses, are drawn from the global pool of IP addresses that
can be routed, or reached, from any other computer on the Internet.
These are colloquially called real IPs. (Public addresses access can
be restricted through firewalls, however.)
Network Address Translation (NAT): NAT provides a workaround that lets computers outside a LAN reach privately addressed
computers inside a LAN. NAT maps outgoing connections from
computers within the LAN to an address on the WAN side of a router,
Page 11
allowing a response to that outgoing connection, like a Web page
being requested and retrieved. NAT can also map in the other direction. I discuss how this mapping can be safely controlled in Map Ports
for Remote Access. A NAT gateway is not a firewall, although it’s
often marketed as one.
Dynamic Host Configuration Protocol (DHCP): DHCP is
used to assign IP addresses to computers and other equipment on a
network. Any device that can connect to a network has a DHCP client
built in, and that client can request and retrieve an address from the
network gateway.
The AirPort base station has a DHCP server to provide this function.
The base station also has a DHCP client that operates on its WAN
port to request an address—if necessary—from the higher-level
network to which it is connected.
In some cases, the DHCP server in the base station is redundant
and needs to be turned off to avoid interfering with other elements
of a network. In other cases, you might disable a computer’s DHCP
client so that you could enter a fixed IP address. DHCP and NAT
are often used together: NAT allows a private address to reach the
Internet; DHCP assigns that private address to a computer or other
networked device.
Page 12
LEARN WIRELESS AND AIRPORT BASICS
Let’s quickly run through some wireless basics to set the stage for
what follows.
Access Points and Adapters
AirPort and Wi-Fi networks need two connected parts: a wireless
adapter and an access point. The wireless adapter is part of a computer or mobile device, while the access point, in many ways, works
just like an Ethernet switch. An access point that’s coupled with
a router is called a wireless gateway; Apple’s wireless gateway is
called a base station.
NOTE You might have heard of AirPort Extreme by the name Wi-Fi, which
is a certification guarantee for which The Wi-Fi Alliance trade group
owns the rights and controls the testing. Wi-Fi loosely connotes
wireless fidelity, in the sense of faithfulness: devices with Wi-Fi
stamped on them work with other Wi-Fi devices, or are faithful to
one another.
NOTE An AirPort network is a Wi-Fi network with some Apple extras that
may work only with Apple software—under Mac OS X, or Windows
XP or Vista—or in conjunction with other AirPort equipment.
Examples of such features include streaming audio, hard-drive
sharing, and base-station-to-base-station connections.
The wireless adapter uses client software on the computer or handheld device to connect to a specific base station (or set of affiliate base
stations) after a user selects a network name from a list or manually
enters the network’s name. Mac OS X allows network selection from
the AirPort menu in the menu bar, the AirPort pane of the Internet
Connect program (located in the Applications folder), and the AirPort
view in the Network preference pane.
When a wireless adapter connects—technically, associates—with
a base station, the device to which the adapter is attached can send
data to and from the base station. If the base station has encryption
enabled, then an encryption key must be provided before the base
station allows the device access to any networks to which it connects.
Page 13
Depending on your setup, the key, a series of characters, must be
entered exactly as it was entered on the base station. A stored key
can be sent without a person having to re-enter it.
Avoid entering an encryption key manually: The AirPort
Extreme also now supports a simpler method that avoids key
entry altogether. See Use WPS.
Once an adapter connects to a base station and the encryption key
is accepted, the computer’s operating system can carry out the next
steps, such as automatically requesting an Internet protocol (IP)
address using DHCP and sending data over the wireless network.
The Spectrum Part of Wi-Fi
Wi-Fi networks use unlicensed spectrum, so called because regulatory
agencies don’t require users to obtain a license to use those airwaves,
and everyone may use that spectrum; cellular telephone companies,
by contrast, pay huge amounts for the exclusive geographic rights to
certain frequencies.
Unlicensed bands—specified ranges of frequencies—are divided into
smaller upper and lower bounds called channels, which allow many
devices to use the same band within “hearing” distance of each other,
but without overlapping any or all the frequencies they employ. However, unlicensed bands are intended for broad use by individuals and
businesses, and there’s no guarantee that you and other people won’t
produce interfering signals, reducing the speeds you can achieve.
The rule is that in these unlicensed bands, devices use extremely low
signal power, but they also must be quite robust in order to cope with
lots of interference while still functioning.
In the United States and in most countries, the 2.4 GHz (gigahertz)
and 5 GHz bands are available for use. (The 900 MHz [megahertz]
band is also unlicensed in the United States, but it is not employed
for wireless LANs.) The precise frequencies and channels vary enormously by country. Older AirPort equipment could work only in
the 2.4 GHz band; the 2007 version of the AirPort Extreme and
the 802.11n protocol can use either the 2.4 or 5 GHz band.
Page 14
Warning! Apple and other manufacturers limit the usable channels and power output levels of Wi-Fi devices to what’s legal in the
country in which the gear is sold. Using that equipment outside the
country of purchase without first checking on what’s legal could
result in fines or jail time.
NOTE In some countries, the 4.9 GHz band is used instead of the 5 GHz
band; in the United States, 4.9 GHz is a restricted band, partly
devoted to fire, emergency, and police digital communications.
Wi-Fi and AirPort Flavors
AirPort hardware has gone through many transformations since
its original 1999 introduction. Each major flavor of Wi-Fi that Apple
has built into AirPort gear relies on industry standards created by the
IEEE, the Institute of Electrical and Electronics Engineers. The IEEE
has groups that work on many different kinds of standards. Their 802
group handles local area networks (LANs), and a working group in
that area, numbered 11, covers wireless LANs (WLANs). This is called
the 802.11 Working Group.
Each successive update to the standard produced by the 802.11 group
is lettered and defines a particular set of codified ideas. For instance,
the original popular flavor of Wi-Fi was known as 802.11b or just “B”
for short. The current fastest generation is known as 802.11n or “N,”
and is still being finalized even as Apple and others have released
equipment that uses a draft of the standard, often called “Draft N”
(see Not yet finished, for more detail).
The Wi-Fi Alliance takes those IEEE standards and builds tests that
allow different makers to ensure that they are creating equipment
that works with all the other manufacturers’ equipment and that
carries out a common set of tasks in the same way.
Since the original AirPort in 1999, Apple has released three major
versions of AirPort hardware, which correspond to three major revisions of the IEEE 802.11 standards (Table 1, next page). Every older
version can be used with even the newest flavors. Let’s look at those
older flavors, briefly, and then focus on Apple’s newer 802.11n gear.
Page 15
Table 1: Wi-Fi Standards in Apple Hardware
Standard
Apple Equipment
(introduced, discontinued)
Raw
Speed
Maximum
Throughput
802.11b (B)
• AirPort (1999, discontinued 2003)
11 Mbps
5.5 Mbps
54 Mbps
25 Mbps
300 Mbps
90 Mbps
(with Feb.
2007 base
station)
• AirPort Card (1999, discontinued 2004)
802.11g (G)
• AirPort Extreme
(2003, discontinued 2007)
• AirPort Extreme Card
(2003, superceded by built-in adapters,
but not discontinued at this writing)
• AirPort Express (2004)
• Built-in 802.11g adapter in Macs (2005)
• iPhone (June 2007)
802.11n*
• AirPort Extreme (Feb. 2007)
(N or Draft N)
• Apple TV (Feb. 2007)
• AirPort Extreme with gigabit Ethernet
(Aug. 2007)
• Built-in 802.11n adapter in all current
model desktop, laptop Macs (late
2006)**
140 Mbps
(with gigabit
model)
* Current draft became a tested part of Wi-Fi in June 2007; final version is due in September
2008 in a very similar form.
** Intel Core 2 Duo Macs except discontinued 1.83 GHz iMac and all Mac minis; optional
adapter for the Mac Pro.
Original AirPort (1999)
The original AirPort system uses 802.11b, and it comprises an AirPort
Card, which fits into a card slot in all AirPort-capable Macs released
through 2002; and an AirPort Base Station, which resembles a small,
gray (“graphite” original) or white (“snow” revision) flying saucer.
The graphite base station has a single Ethernet port and a built-in
modem; you couldn’t connect the graphite model to an Ethernet LAN
and WAN at the same time. The snow base station added a second
Ethernet port, which increased security and flexibility by allowing
Page 16
you to separate a LAN from a broadband or wide area network
(WAN) connection via a cable or DSL modem.
AirPort Extreme (2003)
AirPort Extreme 2003 uses the 802.11g standard. AirPort Extreme
originally appeared in two components: the AirPort Extreme Card
that fit into a new kind of internal card slot, and the AirPort Extreme
Base Station. The Base Station has the previous generation’s spaceship shape, is translucent white, and has three white LEDs for status
on the front.
Apple started adding the Extreme card slot to Macs released starting
in January 2003, and completed the transition by September 2003.
By 2006, all Macs included AirPort Extreme as a built-in feature
except for the Intel Xeon Mac Pro, which has the option to be factory
equipped with Wi-Fi, and the Xserve, which is designed for server
rooms. (Bluetooth came to be included in all but those two models,
too, by 2006.)
Apple quietly added 802.11a—which uses a different frequency band
and is explained later—to the Intel line of Macintoshes, but never
explicitly advertised this fact or offered support. See Apple’s version
of 802.11n for why this is useful.
Card or built-in? Apple moved from offering Macintoshes with
an AirPort Extreme card slot to including Wi-Fi onboard—but
they still call the technology AirPort Extreme, and they still sell
the standalone card for older Macs.
AirPort Express (2004)
The AirPort Express Base Station, which started shipping in July
2004, is similar to the AirPort Extreme Base Station, but it supports
fewer users and can stream music to a stereo. A single yellow/green
LED shows the unit’s status. The Express is still sold as this book
goes into production.
AirPort Extreme (2007)
At Macworld Expo 2007, Apple quietly moved the AirPort Extreme
Base Station from 802.11g to 802.11n. They announced that most
current Macs could have 802.11n enabled through a firmware update,
and they revealed a new AirPort Extreme that started shipping in
February 2007. This unit had just 10/100 Mbps Ethernet built in.
Page 17
In August 2007, Apple released an updated unit, keeping the same
name but adding gigabit Ethernet.
Because Apple has unfortunately kept the name the same for both of
these new units, to avoid confusion, I call the new base station models
collectively “Extreme N” where Ethernet speed doesn’t matter. When
Ethernet makes a difference in performance or features, I call the
February 2007 model “Extreme N (original)” and the August 2007
model “Extreme N (gigabit).”
This new base station has a square footprint, is squat, and is designed
to be stacked, making it easy to distinguish visually from the spaceship shape of previous base stations.
Extreme N Details
Let’s learn more about the new Extreme N base station and Extreme
N AirPort adapters.
802.11n technology
802.11n is up to seven times faster than G in typical circumstances
when measuring real data passed over a network. N uses several
antennas, with at least two receiving and two transmitting data, as
well as multiple radios. Each radio can transmit data while varying
the amount of power on each transmitting antenna, thus steering
the radio beam. This allows signals to go farther, and allows multiple
simultaneous data streams—each radio sending a unique set of data
at the same time over the same frequencies!
Each incoming signal is “heard” by two or more antennas, making
it easier to pick up more distant transmissions and to tease out
the wheat (data) from lots of chaff (other, interfering signals and
background noise).
These techniques allow 802.11n to have a raw data rate of 300 Mbps
in a basic version and up to 600 Mbps in advanced versions. The
Extreme N and other consumer gateways will almost all use the
300 Mbps speed, which can pass as much as 150 Mbps in real data.
The speed drops when other Wi-Fi networks are in use in the vicinity,
when older 802.11 devices are used on the same network, or when N
adapters are far enough away from the base station to require slower
transmission rates.
Page 18
Not yet finished
An important proviso when discussing 802.11n is that the standard
isn’t finished. As with some earlier 802.11 standards, the work has
taken so long in the IEEE 802.11n task group that companies and the
Wi-Fi Alliance have moved forward while the details are being settled.
That led to a lot of equipment working at its best speeds only when
exchanging data with other devices made by the same company and
using the same Wi-Fi chips.
Draft N, as it’s known, spent 2006 in limbo, while companies and
engineers engaged in horse trading in order come up with something
the whole industry liked. Draft 2.0 was accepted by the IEEE’s
wireless networking group in March 2007, and the Wi-Fi Alliance
developed a set of interim interoperability tests in June 2007 to
certify equipment as complying with Draft 2.0.
Most major hardware vendors have had pre-production versions
of their Draft N hardware approved by the Wi-Fi Alliance to carry
their Draft N seal of approval. However, the testing happens on
engineering models; firmware still must move into production
and then be released as updates by hardware makers.
In early September 2007, Apple released its certified Draft N firmware update for Extreme N. By the time you read this book, many
other companies’ products should also have certified Draft 2.0
firmware available for download. That new firmware should, in
turn, allow the highest possible speeds among all Draft 2.0 gear.
Apple’s version of 802.11n
The Extreme N is the first base station released by Apple that
supports both major frequency bands for Wi-Fi: 2.4 gigahertz (GHz)
and 5 GHz. While 2.4 GHz is better known, and has been used by
the original plain 802.11 spec, as well as B and G, the 5 GHz band
has been available for some time, waiting for the right technology
to make use of its wide-open spectrum.
Page 19
NOTE A little-used 802.11 protocol known as 802.11a, or “A,” was
famously declared dead by Steve Jobs in January 2003. The A
protocol never took off because while it had the advantage of using
the 5 GHz band, it wasn’t backward compatible with the popular B
protocol, which is still in wide use. Some organizations chose to use
A for voice over IP (VoIP) for that very reason: they could use the
5 GHz band with little interference.
Apple slipped 802.11a into the Intel versions of its Macs without
advertising the fact because the Intel chips Apple used included
802.11a at essentially no additional cost. Since there were so few
802.11a base stations available—almost none for consumers—the
fact seemed unimportant.
The 5 GHz band in the United States offers 23 non-overlapping
channels for 802.11a/n; whereas the 2.4 GHz band offers only 11
staggered, overlapping channels for 802.11b/g. Further, the 5 GHz
band has many fewer users.
Tune in tomorrow: Apple has chosen to allow use of just eight
of those 5 GHz channels at present, but future firmware could
easily up the total to 23. The company told me in August 2007
that they are investigating adding more channels but had no
specific plans nor timetable. When and if that happens, I’ll post
information on this book’s update page; click the Check for
Updates link on the cover to visit that page.
Warning! Apple sells specifically tailored versions of its Extreme
N for different parts of the world. This is especially significant due
to how the 5 GHz band is regulated in each country. If you buy a
North American Extreme N and take it to, say, France, as one of
my colleagues did, when you power it up, you’re likely in violation
of local law. If you happened to tread on local uses, including
military purposes, you could be found (via triangulation) and
spend some years in jail.
Apple could have supported just 2.4 GHz in the new 802.11n gear
for backward compatibility, but instead the new gear supports both
bands, which offers a lot of potential for maximizing the speed of
a network, even in the home. (See Mix Legacy, New N Networks.)
Page 20
Physical features
The latest base station (Figure 1) is square, designed for stacking,
with the same footprint as a Mac mini (6.5 inches/16.5 cm square),
and a smaller footprint than the Apple TV (7.7 inches/19.7 cm
square). (The Apple TV is 1.1 inches/2.8 cm tall; the Mac mini,
2 inches/5.1 cm; and the Extreme N, 1.3 inches/3.4 cm.)
FIGURE 1
The tilted front view (left) and straight-on back view (right) of the
AirPort Extreme Base Station introduced in 2007. The back ports are,
left to right, power, USB, one WAN Ethernet jack, three LAN Ethernet
jacks, and a security slot for physical lock-down.
The Extreme N base station is the first to offer an Ethernet switch;
Apple included four Ethernet ports, three of which are used for the
LAN and one for the WAN. The Extreme N (original) included 10/100
Mbps Ethernet. The N standard can outstrip 100 Mbps Ethernet,
which achieves somewhere over 90 Mbps of real throughput. That’s
the reason why in August 2007, Apple released the Extreme N
(gigabit) with 1,000 Mbps Ethernet on all four ports. In the process,
Apple improved throughput in nearly every configuration I tested.
Hardware, not software: Before you ask, the earlier Extreme
Ns can’t be upgraded to support gigabit Ethernet. Okay, it’s a
reasonable question, given that Apple’s 802.11n was included but
not turned on, in some Macs. To add gigabit Ethernet, Apple used
different chips in the second model of the Extreme N.
Fastest method: If you really need speed, gigabit Ethernet is
far faster and simpler than Wi-Fi, with the only downside being
the requirement for wires. Ethernet switches can deliver nearly
seven times the throughput of N between any two connected
gigabit Ethernet devices in both directions. In contrast, Wi-Fi
is limited to half its maximum speed when transmitting data
between two Wi-Fi devices on the same network.
Page 21
Adapters in Macs
Starting around the end of the third quarter of 2006, Apple began
introducing new Mac models that secretly included 802.11n wireless
chips. Apple didn’t tell customers or enable the faster N mode, so the
Macs behaved like they had a G card inside. Apple was apparently
waiting for the standard’s progress to be clear before switching on the
new 802.11n capabilities. (Clever buyers who cracked their Macs open
figured this out long before Apple made it official.)
This set of computers comprises:
• All Macs with Wi-Fi adapters and Intel Core 2 Duo processors—
except the 17-inch, 1.83 GHz iMac , which was discontinued in
August 2007, and the Mac mini. (Those exceptions have 802.11a,
however.)
• The Xeon Mac Pro, if you chose the wireless add-on option.
Enable your Mac! Apple didn’t start enabling 802.11n on Macs
until as late as third-quarter 2007. So, depending on when your
Mac entered the retail channel, it may, or may not, need you to
enable 802.11n. (Find out if you Mac needs to be enabled in the
sidebar Do You Need the 802.11n Enabler?)
To enable a Mac, you must install the AirPort Extreme 802.11n
Enabler for Mac. You can install it from the CD that ships with the
Extreme N, as I describe in Install new software. You can also buy
it from the Apple Store separately for $1.99. Once you own a copy
of the enabler, you can use it on “all computers under your ownership or control,” as Apple’s licensing terms put it.
Third-party adapters
Apple didn’t offer—and never will offer—N on the separately
installable AirPort Extreme Card. About 3 years ago, Apple began
including the 802.11g AirPort Extreme as a basic design feature on
new Macs. Without Wi-Fi being on a separate card, Apple had little
motivation to provide an upgrade. They’d rather you buy a newer
computer, if you really need 802.11n.
Third parties are starting to step up to the plate, however, with
QuickerTek the first out of the gate and Other World Computing
following at their heels.
Page 22
QuickerTek
The company has released several adapters in its nQuicky series
and under other names (http://www.quickertek.com/). Some options
remain expensive (at this writing) because of the higher engineering
cost and higher chip costs associated with N right now. Expect prices
to drop. The nQuicky models and the nNano all support just 2.4 GHz,
which reduces potential throughput.
The nNano is a $59.95 USB adapter that works with all Macs running
Mac OS X 10.3 or higher; they’re also offering the $49.95 Nano,
which is 802.11g only, useful for Macs that could otherwise operate
only at 802.11b speeds with a hard-to-obtain original AirPort Card.
The nQuicky USB ($149.95), nQuicky PCI ($99.95), and nQuicky
CardBus ($64.95) all require Mac OS X 10.3.9 or later. The USB
model works with any Mac, and it has a much higher-gain antenna
than the nNano; the PCI works with all Power Macs (G3, G4, and G5)
except the G5 models that use DDR2 (double data rate, 2nd version)
memory; and the CardBus adapter supports any PowerBook.
For Intel Macs issued without Draft N hardware, QuickerTek offers
hardware updates that require opening a case and messing about.
They’ll also perform the upgrade for you. Prices for the kit and the
mail-in install (exclusive of return shipping) are: MacBook or
MacBook Pro, $99.95/$149.95; Mac mini or iMac, $179.95/$199.95.
Finally, if you have a Mac mini, QuickerTek offers a kit and mail-in
install ($149.95/$199.95) that swaps in 802.11a for 5 GHz and
802.11n for 2.4 GHz. It’s an odd option, but could be useful.
Other World Computing
Other World Computing has also released a set of 802.11n adapters
that work in the 2.4 GHz band: a PCI Card for Power Macs, a PC
Card for PowerBooks, and a USB adapter for any Mac that can run
Mac OS X 10.3 or later (http://eshop.macsales.com/shop/wireless/).
All three adapters in their Edimax nMax series cost $67.99, and work
with Windows XP/2000 and later, too.
A unique aspect to the Edimax adapters is that they support wide
channels in 2.4 GHz. Because Apple doesn't offer wide 2.4 GHz
channels, you would need a Wi-Fi gateway from another company
to take advantage of that option, which isn't considered particularly
advantageous in 2.4 GHz, anyway.
Page 23
More coming soon
I expect that other vendors will add Mac OS X drivers, too, as many
have with each previous generation of Wi-Fi hardware. Belkin, a
stalwart provider of Wi-Fi and other peripherals with Mac OS X
drivers, told me fairly strongly that Mac OS X drivers are coming for
their equipment. Ralink is likely, too, as are firms that resell products
using Atheros chips (Atheros is Apple’s chip supplier for Wi-Fi).
Compatibility among AirPort Generations
Each AirPort generation is backward compatible with all previous
generations, although backward compatibility can be turned off.
While the original AirPort handled just 802.11b, AirPort Extreme
2003 added 802.11g, which incorporates B with full support. Likewise, Extreme N’s 802.11n handles the older A, B, and G standards.
However, transfer speeds between an adapter and a base station
running different 802.11 standards can’t exceed the speed supported
by the slower of the two 802.11 flavors that both devices share. A B
device connecting to an N base station communicates at B speeds,
meaning that each packet of data a B device pushes through the
network occupies the equivalent of 10 to 20 N packets.
While most of the loss in throughput happens only while older
devices are taking up airtime (and newer devices are cooling their
heels), simply enabling backward compatibility shaves at least
10 percent off the maximum throughput of the network. This overhead comes from the fact that every computer on the network must
send extra traffic that’s designed for older devices to interpret.
NOTE Wi-Fi gateways can force older adapters to talk less. In one method,
an 802.11n gateway would use an existing mechanism that all the
standards understand to grab an equal amount of time as a B
device, rather than an equal amount of data. These mechanisms
aren’t standardized yet, and it’s unclear if Apple has implemented
any of them. In the future, it’s likely that we’ll see this kind of
protection against older devices hogging a network.
One way to avoid bogging down an N network is to set the N network
up as a new, separate entity, leaving an older, slower B or G network in
place. I discuss how to set this up in Mix Legacy, New N Networks.
Page 24
PUT YOUR BASE STATION INTO ACTION
You’re ready to set up your network, so let’s get unpacking! This
section focuses on initial setup, and in many cases it will take you
to a working Wi-Fi network. But, if you need to go beyond the basics,
you can keep reading beyond this section to learn about special cases
in configuring your local and wider network connections. Also, note
that Connect Your Computers, later, explains how to connect via WiFi from any computer in the vicinity to the newly set up base station.
TIP MULTIPLE HOPS TO THE INTERNET
Although one base station must be connected with Ethernet to
your Internet connection, you can connect AirPort Extreme—both
G and N models—and AirPort Express Base Stations wirelessly back
to that main base station. For setting up these satellites, see Bridge
Wirelessly for step-by-step details.
Set Up Your Base Station
Let’s get that base station out of its box, plugged in, and ready to
connect to the Internet.
Unpack and power your base station
The Extreme N comes with fewer parts than any previous Apple base
station. Unpack the base station to determine what you have and if
you need any additional hardware:
• Remove your base station from its box and check the
parts. The Extreme N box includes just a few necessary parts:
The square base station, a CD containing utility and enabler
software, and a power adapter and its corresponding AC power
cord. The base station no longer comes with a wall-mounting
bracket; it’s designed to work horizontally.
• Is the power cord long enough? The power cord’s length—
17 feet/5.2 m—should aid in placement; in the American version,
the AC end of the cord terminates in a non-polarized two-prong
plug—both prongs are the same width—which can work in any
outlet in either orientation. That still may not be long enough,
so plan on purchasing a lightweight extension cord if you need
to place the base station more than 17 feet/5.2 m from an outlet.
Page 25
This model doesn’t have a wall-mounting bracket because it works
best level on a table or floor. (For now, your goal is to plug the base
station in where you can set it up, though you may wish to skip
ahead and read Pick the Right Place for Your Base Station before
you continue.)
• Get Ethernet cables. The Extreme N, unlike its predecessors,
comes with no network cables. Configuring your base station
may be simpler if you hook it to your computer or existing LAN
with an Ethernet cable, and you need at least one Ethernet cable
in the likely case that you plan to connect the base station to a
broadband router or other network. The Extreme N has autosensing, auto-switching Ethernet, which means you needn’t buy
particular kinds of Ethernet cables. I recommend Cyberguys.com
as a good online source for cables (http://www.cyberguys.com/).
Configuration Computer: You’ll be using AirPort Utility to
configure your base station, and the steps I give shortly show
screenshots taken on a Macintosh. To configure from a Mac, you
must be running Mac OS X 10.4.8 or later. However, AirPort
Utility can also be installed under Windows XP or Vista, and the
steps are the same.
Now it’s time to power up. Plug your base station into an electrical
outlet, and plug an Ethernet cable from your computer into any of the
three LAN ports. If you’d rather have mobility while configuring, you
can also set up the base station via Wi-Fi, but you will have to keep
reconnecting after each configuration change if you change password
and naming options.
Flashy: In a neat addition, all the Ethernet ports on an Extreme
N have a tiny green LED that lights up when an Ethernet cable is
connected to the port and there is a live connection on the other
end of the cable; the LED flashes to indicate activity. A front
green/amber LED shows the status of the base station, including
activity (green) or trouble (amber).
I recommend not connecting your base station via the WAN (Wide
Area Network) port to a broadband modem or the rest of your network until you’ve carried out more of the setup, especially the very
next part.
Page 26
Install new software
The Extreme N comes with a CD full of software: AirPort Utility,
AirPort Disk Utility, and the 802.11n enabler for appropriately
equipped Macs. The software isn’t—at this writing—available for
download from Apple’s Web site. AirPort Utility replaces the hoary
AirPort Admin Utility, which dates back to 1999; the new AirPort
Utility combines a set of assistants with advanced configuration
options (Figure 2). It can configure any AirPort Extreme or AirPort
Express base station.
No advantage for older base stations: AirPort Utility is
different, not better, than the older AirPort Admin Utility. There’s
no particular reason for those of you without an Extreme N to use
the newer software.
TIP If you’re still using an old graphite or snow base station, the AirPort
Admin Utility isn’t deleted; it’s renamed AirPort Admin Utility for
Graphite and Snow (find it in /Applications/Utilities).
FIGURE 2
The main screen of the new AirPort Utility.
Page 27
On a Mac running Mac OS X 10.4.8 or later, or with Windows XP
or Vista, run the installer on the CD.
While installing, on the Installation Type screen, you can click the
Customize button to install individual utilities or components. The
full installation includes:
• AirPort Utility, which you need to configure your Extreme N base
station.
• AirPort Disk Utility (called AirPort Disk on the Custom Install
screen), which lets you mount hard disks and partitions that are
connected via USB to an Extreme N.
• AirPort Base Station Agent, a monitoring program that can alert
you when there’s a problem with an Extreme N on the local
network.
• The 802.11n enabler, (it’s called AirPort Extreme Drivers on the
Custom Install Screen), which turns on the N support in Macs that
have the correct chips. It’s installed only on computers that need
it. All newly purchased Macs that were described as including
802.11n are already enabled for that flavor of Wi-Fi; if you bought
a Mac before August 2007, see the sidebar Do You need the
802.11n Enabler?, next page.
The last step of the installation is to restart the computer.
Page 28
DO YOU NEED THE 802.11N ENABLER?
You can check if you need to install the enabler on your Mac by
launching Network Utility from /Applications/Utilities
and choosing the appropriate interface from the pop-up menu at
the top of the Info pane, usually “Network Interface (en1)”. If the
computer doesn’t require the update, “(802.11a/b/g/n)” appears
under Wireless Network Adapter at the bottom (Figure 3).
If only “(802.11a/b/g) is shown, run the enabler and restart, and
then check Network Utility again.
FIGURE 3
Network Utility shows that the 802.11n enabler
isn’t needed.
After restarting, you can find AirPort Utility and AirPort Disk Utility
in /Applications/Utilities.
Run the installer on every computer on your network that has an
802.11n adapter that needs to be upgraded, from which you want
to mount hard disks connected to the base station, or with which
you want to configure the base station.
Launch AirPort Utility and let’s get this AirPort on the air!
Keep up to date
The first time you run AirPort Utility, it prompts you to choose
whether or not to check for updates automatically. Although Mac
OS X’s Software Update feature (Apple > Software Update) will also
alert you to install AirPort software and firmware releases, Apple set
Page 29
up this separate update conduit to make it more likely that you would
apply security, stability, and compatibility upgrades that you might
otherwise ignore for a while in Software Update.
This update notification works whether or not you have AirPort
Utility launched. The AirPort Base Station Agent, added as part of
the AirPort Base Station Update 2007-002 (for Mac and Windows)
in August 2007, monitors at the frequency you specify for updates,
and then launches AirPort Utility if an update is available.
You can adjust the frequency for which updates are checked in
AirPort Utility’s Preferences dialog (Figure 4).
FIGURE 4
AirPort Utility
can check
for AirPortspecific software releases
independently
from Software
Update (top).
The Summary
view also alerts
you when an
upgrade is
available
(bottom).
Connect to your base station
AirPort Utility is your one-stop shop for setting up the base station’s
parameters. But, first, you need to make a network connection to your
base station so that AirPort Utility can access it. With AirPort Utility
launched, use one of these three methods to find your base station;
the methods are listed in order of simplicity:
• Connect via LAN: In the simplest case, you use an Ethernet
cable to plug your computer into one of the three LAN Ethernet
ports on the Extreme N. The unconfigured base station should
appear in the left column of AirPort utility (Figure 5), confirming
that you’ve made the connection.
Page 30
FIGURE 5
An unconfigured base station appears
in AirPort Utility’s base station list
named uniquely with the last six digits
of its AirPort ID (see the note, “Default
Network Names,” below). (Dig the
subtle reflection!)
• Connect via a larger network: For larger LANs, in which the
base station is just a piece of the network, you can connect the base
station to your larger LAN through the base station’s WAN port,
connecting an Ethernet cable from it to any port on an Ethernet
switch on your network. Because the base station uses Apple’s
Bonjour, a way for devices to advertise their availability across a
network, you should be able to spot the new base station in AirPort
Utility even though it hasn’t been configured. Failing that, try
configuring with Wi-Fi.
• Connect via Wi-Fi: Slightly trickier is connecting via Wi-Fi,
because many configuration changes require that you apply new
settings by clicking Update in AirPort Utility. This restarts the base
station and thus you have to reconnect to it.
From the factory, Extreme N is set to 2.4 GHz, so you can initially
configure it via Wi-Fi from any computer. An unconfigured base
station shows up with a default Wi-Fi network name in the AirPort
menu (see “Default Network Names,” below).
NOTE DEFAULT NETWORK NAMES
The default Wi-Fi network name for Extreme N base stations—
as well as previous base station models—is AirPort Network
0033FF where 0033FF is replaced with the last six digits of the
AirPort ID of the wireless adapter in the Extreme N. The default
Ethernet network name is Base Station plus a space and then
the last six digits of the AirPort ID. That ID is printed on the
underside of an Extreme N.
The AirPort ID is a MAC (Media Access Control) address. See What
and Where Is a MAC Address? (p. 59) for more information about
MAC addresses.
Page 31
Handle initial setup
The simplest way to configure a base station is to use AirPort Utility’s
built-in assistant, which walks you through assigning a name to the
base station, changing its administrative password, and turning on
encryption. (If you are reconfiguring a base station, see Reconfiguring
a base station, ahead.)
Follow these steps to configure your base station:
1. In AirPort Utility, select the base station from the list of base
stations at the left.
2. On the “Welcome to AirPort Utility” screen, click Continue to open
the first Network Setup screen (Figure 6).
FIGURE 6
Enter a
network and
base station
name.
Screen names: The assistant screens lack unique names; look in
the title bar of each window for the name of the screen. I’ll give
you other cues, too.
3. Enter a network name and base station name:
• The network name will be “advertised” to Wi-Fi adapters that
scan for networks to connect to; for instance, on a Macintosh
the network name will appear in the AirPort status menu at the
right of the menu bar. Multiple base stations may share the
same network name to create a network with a larger area
or more available bandwidth.
• The base station name will be used to identify the base station
in AirPort Utility.
Page 32
Once you’ve entered both names, click Continue.
4. On the second Network Setup screen (Figure 7), choose the
country in which the base station will operate and the backward
compatibility you need, and click Continue.
FIGURE 7
Choose your
country and
compatibility.
Almost anyone reading this book will want to choose United States
or Puerto Rico, and leave the radio button next to Radio Mode set
to “802.11n (802.11b/g compatible)”. (For more about spectrum
and country choices, see Configure the Spectrum and Channel.)
Warning! Do not use the AirPort Extreme in a country that’s
not listed in the Country pop-up menu. It’s not just a suggestion;
national regulators monitor for misuse and you could wind up
in the pokey, or worse.
5. On the third Network Setup screen (Figure 8), select the level
of security you want to use:
• WEP allows the oldest Wi-Fi adapters to connect to a network.
• WPA2 is actually mixed WPA/WPA2 security, which allows
Macs running Mac OS 10.3 Panther or later and computers with
Windows XP SP2 or later to connect.
• No security allows all connections.
Warning! Apple’s explanation on this screen about how WPA
and WPA2 work is a little breezy, and it could frustrate you
when trying to connect some older Macs to the network. The
Use Built-In Encryption section can help you avoid that
frustration.
Page 33
Select your security option, and click Continue.
FIGURE 8
Set
security
to prevent
unwanted
users.
6. The first Internet Setup screen lets you choose how addresses are
assigned on your network (Figure 9). The four options cover the
major scenarios, which you then configure in the next step:
• DSL or cable modem with static IP address or DHCP:
This is the right choice in almost every case.
Most broadband providers use DHCP to assign your base station
an address automatically. (DHCP and the corresponding NAT
feature are explained in detail in Hand Out LAN Addresses.)
A static IP address requires additional manual entry. (A static
IP address is a fixed IP address that your service provider
provides to you.)
• DSL or cable modem with PPPoE: This option works with
ISPs that use a special log in that the base station has to handle.
The login process lets an ISP server assign an address (static or
dynamic) to your base station.
• LAN: For larger networks, this is the right option, because
you’ll set up networking values based on what you chose
yourself or use those provided by a network administrator.
Page 34
• Not ready: Apple provides this choice so you can configure
the rest of the settings without having to gather details for the
Internet setup.
• Modem: A modem option appears but is dimmed for Extreme
N base stations. If you’re configuring an older Extreme G with a
modem, that option’s available.
Confirm your selection and click Continue.
FIGURE 9
Choose
the kind of
connection
that’s
exactly or
close to your
set up.
7. In the second Internet Setup screen, configure the TCP/IP
connection that allows your base station to access the Internet:
• If you chose the first (DSL/cable with static or DHCP address)
or third (LAN) option in the previous step, you have two
choices:
◊
If you aren’t sure, or your ISP told you to, choose Using
DHCP from the Configure IPv4 pop-up menu. This option
is what most people choose.
◊
If your base station is assigned a static address, with details
provided by your ISP or network administrator, choose
Manually from the Configure IPv4 pop-up menu.
Page 35
• If your provider uses PPPoE, enter the account name, password,
and optionally the service provider’s name, while choosing to
have the connection always on (default), automatic (connects
when needed), or manual (connects when you choose).
For more details, see Set Up Your Network. Click Continue.
8. The USB Peripherals Setup screen lets you set your initial password configuration for attached hard disks that can be shared via
the Extreme N. For details on these choices, see Set Up a Shared
USB Disk. The preselected options are fine; click Continue.
9. On the AirPort Extreme Setup screen, set up a base-station password. This password is unrelated to network data encryption and
protection, but it’s vital to set the password to prevent unwanted
access by others to the base station. The default base station passwords for all Wi-Fi routers are well known. Use a password that
is simple, but hard to guess.
I recommend checking the Remember the Password in My
Keychain option so that you can invent a password here and have
the system store it.
Click Continue when you are ready to move to the next screen.
10. The Summary screen shows all your choices (Figure 10). You
can click Go Back repeatedly to change options, or Update to store
your options and restart the base station with those new settings.
If you’ve forgotten the passwords you entered, click the Show
Passwords button first to see them in plain text so you can copy
them or write them down.
NOTE Whenever you click Update in AirPort Utility, the program sends
your configuration changes to the base station, which burns those
changes into non-volatile memory. Removing power from the base
station doesn’t cause it to lose these settings.
Page 36
FIGURE 10
A summary
appears,
showing
the choices
you made
during
setup.
Reconfiguring a base station
You can reconfigure a base station that’s already set up by selecting
the base station in AirPort Utility and choosing Base Station > Assist
Me.
NOTE HOW TO RETURN TO THE FACTORY DEFAULTS
You can reset an Extreme N to its factory settings at any time
through software or hardware. Resetting the Extreme loses all
settings you’ve applied, including passwords. If you save a configuration (see Export and import configuration profiles), you
can load that configuration after resetting the base station.
Via software, launch AirPort Utility, select your base station, and
choose Manual Setup or press Command-L. From the Base Station
menu, choose Restore Default Settings. Click Restore in the dialog
that appears and wait for the base station to restart.
If you can’t connect to the base station or prefer the hardware
approach, use a ballpoint pen or the tip of a straightened end of a
paperclip to press the reset button for at least 5 seconds. The tiny
reset button is on the Ethernet connection end of the Extreme,
beneath a white right-pointing arrow in a field of gray.
Page 37
Create and manage profiles
The Extreme N carries over a feature, first found in the AirPort
Express, which allows you to define and store multiple profiles. A
profile is a complete set of configuration parameters; each profile
resides on the base station in non-volatile memory.
Stored versus exported profile: I call this form of profile
a “stored” profile to distinguish it from the “exported” profile
described just below.
These profiles can be useful when you’re sorting out precisely what
options you want for your network and want to create different
scenarios to test. Stored profiles are also useful if you take the base
station to different locations.
I suggest starting with a base profile that you can duplicate to test
other options, and then you can simply revert to it whenever you like.
Since you created the equivalent of a profile in following the steps
(just previously) for initial setup of an Extreme N, you can rename
that first profile to something descriptive and then duplicate it:
1. Select the base station in AirPort Utility, and then choose Base
Station > Manual Setup (Command-L).
2. Choose Base Station > Manage Profiles.
The screen that appears lets you create, activate, and delete
profiles.
3. Click the
profile.
button to copy the current configuration to a new
You should now see another profile in the list. The AirPort Utility
also adds a Profile pop-up menu at the bottom of the screen.
4. Name the new profile: double-click the profile name to activate
the edit field, and then type a new name. Press Return to accept
the new name.
You can switch among profiles by choosing them from the Profiles
pop-up menu at the bottom of the manage profiles screen (Figure 11).
You must click Update to activate a given profile, or to save changes
that you make to the active profile.
Page 38
FIGURE 11
AirPort Utility lists stored profiles for a base station. To switch to a
different profile, choose the profile’s name from the Profiles pop-up
menu and click Update to restart the base station and load that
profile’s settings.
Export and import configuration profiles
There’s one more way you can work with profiles that you set up in
AirPort Utility: you can export current settings to a file that can be
imported later, for the same base station or for a different one. This
is useful when you want to create a model configuration with the
same network name, password, and other details, and then use it
to configure many base stations.
Page 39
Warning! Unlike stored profiles, these exported profiles do not
reside on the base station. However, profiles can be exported and
imported from any AirPort Extreme or AirPort Express base
station; stored profiles are available only with the Extreme N and
AirPort Express.
Management utilities will return: AirPort Management
Tools lets you manage several base stations at once, including
applying a model configuration file to them. However, it hasn’t
been updated at this writing for Extreme N. Apple told me it will
be updated at some point—although they told me that in February
2007, and the tools hadn’t returned when we published this
edition in September 2007.
To export a profile:
1. In AirPort Utility, select the base station from the list at the left,
and choose Base Station > Manual Setup (Command-L).
2. Choose File > Save a Copy As, and name the file descriptively, as
there will be few other clues that help you identify the file. (Apple
should have named this option Export Profile, since that’s the
action the menu item carries out.)
After you’ve exported a configuration file, you can open it within
AirPort Utility to examine the file’s list of settings without applying
those settings to an active base station. The settings appear in what
looks like a standalone AirPort Utility configuration window, but you
can’t apply the settings against a base station from that window.
If you want to restore a base station to the settings in a file or
configure a different base station in the same way, follow these steps
to import the exported profile:
1. In AirPort Utility, select the base station from the list at the left,
and choose Base Station > Manual Setup.
2. Choose File > Import. (See? For symmetry’s sake, you’d like Apple
to call the opposite operation Export!)
3. Select the configuration file and click Open.
4. Choose which options you want to import and click OK.
Page 40
Extreme N includes timed settings, which can restrict access to
given computers at given times of the day or week, and you can
choose to import just those restrictions, all settings, or all settings
except restrictions (Figure 12).
FIGURE 12
Select settings
to import.
5. Click Update to apply the imported profile’s settings.
Once the profile is imported, the settings replace your current base
station settings. This could confuse you if you’re also using stored
profiles: the imported profile modifies the active stored profile. These
changes take effect when you click Update.
TIP Importing just Timed Access Control settings lets you apply the
same restrictions for use across all base stations on a network, while
just setting those restrictions on a single base station.
Connecting remotely
You may want to set up remote access to your AirPort, so that you
can configure it via its WAN port—either from a larger network to
which the gateway is connected or elsewhere on the Internet. While
there are some risks associated with that, remote connections also
mean you can help, say, relatives, friends, or remote offices keep
their networks running.
To allow remote access, follow these steps:
1. In AirPort Utility, select the base station from the list at the left,
and choose Base Station > Manual Setup.
2. Click the Base Station button in the AirPort pane.
3. Check Allow Configuration over Ethernet WAN Port.
Page 41
With remote access on, AirPort Utility can now access a remote
Extreme N via its IP address or through a domain name if you’ve
assigned that name through DNS (Domain Name Service). To make
the connection, choose File > Configure Other and enter the IP
address or domain name.
Secure connection: I didn’t know if AirPort Utility creates
a secure, encrypted connection when you configure locally or
remotely. I looked at a packet dump of raw data while configuring a unit, and saw nothing intelligible, which typically means
that encryption is employed. I asked Apple, and they assured me
that they did the right thing: you can enter a base-station password and configure over a local or remote network without fear
of interception.
Configure the Spectrum and Channel
With the Extreme N, you’re faced with a choice: 2.4 GHz or 5 GHz?
That choice makes a huge difference in the overall performance of
your network, and how well it works with older machines.
Warning! With all the talk of Extreme N supporting two frequency bands, you might have thought that the base station could
work in both bands simultaneously. Not so; that would require
duplicating the whole radio function. Instead, you could set up
two separate, connected networks, one on each band; see Mix
Legacy, New N Networks.
Consider your spectrum choices
The 2.4 GHz band is crowded with other Wi-Fi networks, Bluetooth
devices, and other uses; 5 GHz is relatively empty—in the United
States, the band has almost seven times the amount of frequency
available in the 2.4 GHz band. Further, Apple restricts the use of socalled wide channels to the 5 GHz band. Wide channels use twice the
standard amount of spectrum and thus can achieve twice the data
throughput. Apple does this in order to avoid treading on older
networks in 2.4 GHz.
Page 42
In my tests comparing the two bands’ throughput—the net amount of
data passed over a network—I found that the 5 GHz band offered very
consistent throughput as high as 140 Mbps (N to Ethernet LAN) and
90 Mbps (N to N) because there were few other variables to control,
like other users or uses of the channels I tested. With 2.4 GHz,
however, throughput was all over the place. I could test the same
network setup over and over again, and sometimes see the highest
rates (about 70 Mbps, N to Ethernet LAN), and other times see rates
drop to 10–30 Mbps. See Table 2 for specifics.
Higher Wi-Fi rates require Extreme N (gigabit): To achieve
the highest speeds from the Extreme N, you must have the newer
gigabit Ethernet model.
Table 2: Throughput Based on Band Choice (Best Speeds)
Connection
2.4 GHz (regular channel)
5 GHz (wide channel)
Draft N to Draft N
(same Extreme N)
Up to 35 Mbps (from one
computer to another), but
varies enormously
Up to 90 Mbps (from one
computer to another); up to
50 Mbps with two computers
transmitting to each other
Draft N to wired 100
Mbps Ethernet (LAN)
Up to 70 Mbps, but varies
enormously
Over 90 Mbps
Draft N to gigabit
Ethernet (LAN)
Over 140 Mbps
Draft N to any Ethernet Up to 50 Mbps*
(WAN) with NAT
Any Ethernet (LAN) to
any Ethernet (WAN)
Up to 70 Mbps*
100 Mbps Ethernet
LAN to same LAN
94 Mbps
Gigabit Ethernet LAN
to same LAN
900 Mbps
* With NAT turned off, speeds are the same as Ethernet LAN.
Page 43
OTHER USES OF THE 2.4
AND
5 GHZ BANDS
The 2.4 GHz and 5 GHz bands weren’t empty before Wi-Fi
networking came along. 2.4 GHz is known as a “junk band”
because it’s full of other approved uses that can conflict at times.
Industrial sealers, for instance, use heating processes that emit
2.4 GHz radiation. Home microwave ovens use the principle that
water molecules are dipolar (have two oppositely charged ends),
and they switch the fields 2.45 billion times a second to cause
friction which heats the food. (If your friends think microwaves
“leak” radiation, create ionizing radiation, or “irradiate” food,
please have them read this excellent Q&A page:
http://rabi.phys.virginia.edu/HTW/microwave_ovens.html.)
Problems with AirPort networks often stem from your own or
neighbors’ use of conflicting technology, which can include
2.4 GHz cordless phones, the above-mentioned microwave ovens,
nearby industrial sites, or wireless cameras. The 5 GHz band has
many fewer approved uses; primarily, 5.8 GHz cordless phones
will be your enemy.
The rising interest in a new wireless standard called WiMax could
be problematic. While WiMax will largely use licensed spectrum,
there’s plenty of interest and many early deployments that use
the 5.8 GHz band to carry data from one central transmitter to
many roof-mounted antennas.
You would think that the choice of using 5 GHz is obvious, right?
Not so fast. If you have any 802.11b or g devices on your network—
like Macs with the original AirPort Extreme built in—they can’t
connect. Or if a visitor were to show up with an older adapter, she
would be out of luck. On the other hand, if you have all Intel Macs,
you could use 5 GHz and mix A and N, which would provide much
better performance than mixing G and N in the 2.4 GHz band. See
Table 3 (next page) for a comparison of the tradeoffs.
You can get the best of both worlds if you have an existing 802.11b/g
network and want to add to the network, rather than replace it. See
Mix Legacy, New N Networks.
Page 44
Table 3: Comparing the 2.4 GHz and 5 GHz Bands
Band
Pros
Cons
2.4 GHz
• Backward compatible with
802.11b/g devices
• Relatively crowded with other
users, purposes, including 2.4
GHz cordless phones, Bluetooth
• Longer range than 5 GHz
• Best for a network with a mix
of B or G, and N Wi-Fi adapters
• Third-party N adapters already
available for Macs, but only in
2.4 GHz
5 GHz
• Maximum data rate is about
70 Mbps (Wi-Fi to wired) or
50 Mbps (Wi-Fi to Wi-Fi) only in
the best conditions
• Throughput can be very poor,
connection erratic
• Allows wide channels for higher
throughput
• Can’t work with 802.11b/g
devices
• Maximum data rate is 140
Mbps (Wi-Fi to wired) or 90
Mbps (Wi-Fi to Wi-Fi) in normal
conditions
• Higher attenuation than 2.4 GHz
means signal strength drops
faster when passing through
walls, floors, even people
• Relatively uncrowded, very
large band, with lots of room to
move to other channels
• 5.8 GHz cordless phones and
some unlicensed WiMax
networks can interfere, reducing
the number of possible channels
• Backward compatible with
802.11a found in Intel Macs
and some Windows laptops
• No need to slow down for B
devices
• Best for all-new network with
no visitors expected
Second to choosing your spectrum is choosing a channel. The regular
and wide channels I mentioned earlier are schemes to allow many
networks to work together in overlapping locations. Regular channels
use 20 MHz of spectrum; wide channels use 40 MHz.
Page 45
MHz and Mb: Megahertz does, in fact, correlate to megabits
per second. Shannon’s Law, a bit of information theory, says that
there’s a direct relationship that ties the width of a channel and
the ratio of signal to noise to the achievable data rate. Twice the
channel width means up to twice the raw data.
In case you were wondering, the formula is: maximum bit rate
equals channel width in hertz multiplied by log2 multiplied by the
sum of 1 + signal divided by noise.
In the United States, 802.11 standards can use any of 11 numbered,
staggered channels in the 2.4 GHz band (Figure 13). Because these
channels are staggered and overlap, only channels 1, 6, and 11 in the
United States can be used in networks that overlap their coverage area
when you want the least interference. (In some countries, the 2.4 GHz
band is slightly wider, allowing for four non-overlapping channels.)
Also, due to the overlapping, staggered nature of the channels, there
is room for only a single unique 40 MHz channel and a single 20 MHz
channel to be used at the same time—and then only in ideal cases.
This is why Apple didn’t want wide channels in 2.4 GHz.
FIGURE 13
2.4 GHz 802.11 channels are staggered, with channels 1, 6, and 11
having the least overlap. 5 GHz 802.11 channels are meant to have
little overlap; only the four lowest channels of 23 are shown.
By contrast, the 5 GHz band can be divided into 23 channels for
802.11a or n. The regular-width channels are the same 20 MHz width
as 2.4 GHz band channels; or you can use 11 wide channels that are
Page 46
40 MHz wide. These channels overlap only at the fringes, and thus
allow many different networks to work in the same space with little
interference.
NOTE Unlike the 2.4 GHz channels, which are numbered sequentially—
1 to 11 in the United States—5 GHz channels jump by an increment
of four and don’t proceed sequentially. Why? Two reasons:
• First, 802.11 channels—for A, B, G, and N—increment by 1 for
each unit of 5 MHz. Because 802.11a/n channels don’t overlap,
you get four numbers (20 MHz) between each regular-width
channel.
• Second, there are four separate hunks of allotted unlicensed
5 GHz bandwidth. The first two (which comprise channels 36
through 64) are contiguous; we then jump to channels 100 to
136, and finish in 149 to 161. There’s a 24th channel, 165, that’s
not supported in 802.11a or n.
Unfortunately, for reasons that are still not publicly stated, Apple
has chosen to offer only 8 of the 23 possible 5 GHz 802.11a/n
channels for use. The 15 that they aren’t supporting have specific
restrictions on use.
A few years ago, the IEEE developed 802.11h to allow the A spec
to work in Europe. This 802.11h addition allows better co-existence
between some existing uses of 5 GHz, like military radar, and it’s
become a necessary part of N as well. More recently, a compromise
between the electronics industry and the military opened up 255 MHz
of additional spectrum in the 5 GHz band—11 A/N regular channels—
but using the additional spectrum requires that you use 802.11h not
only for those new channels but also for four of the existing ones.
Between European restrictions and the availability of more channels,
it’s even more peculiar that Apple has released a worldwide product
without fully taking advantage of all the possible channels.
Apple’s Wi-Fi chip suppliers support this co-existence. One chip
vendor told me that Apple could add the missing channels through
a simple firmware upgrade. Apple told me in August 2007 that they
were actively investigating adding additional channels, but had no
timetable or specific plan to do so.
Page 47
Set a band and a channel
To configure which band you use, and what backward compatibility
your base station offers, launch AirPort Utility, connect to your base
station, and choose Base Station > Manual Setup. Click the AirPort
icon to open the AirPort pane, and then click the Wireless button.
The Radio Mode pop-up menu offers four choices:
• 802.11n (802.11b/g compatible): This mode allows full
backward compatibility in 2.4 GHz, while allowing N to work at
about 70 percent of its full speed in regular-width channels.
• 802.11n (2.4 GHz): With this choice, your base station supports
only N devices, and B and G devices can’t connect to it.
• 802.11n (802.11a compatible): This 5 GHz mode could be
useful if you have all Intel Macs on your network and you want
the advantages of 5 GHz’s free-and-clear spectrum. You lose
some speed when mixing A and N, but if you have the right set
of machines, it’s the best choice, unless you want to operate two
networks. (See Mix Legacy, New N Networks.)
• 802.11n only (5 GHz): The best choice for 5 GHz networks.
Additional options: If you hold down the Option key while
choosing from Radio Mode, you see four additional options:
802.11b only, 802.11b/g compatible, 802.11g only, and 802.11a.
These are provided in the interest of providing the most complete
support for older networking gear, I’ll wager.
The Channel pop-up menu lets you choose a channel based on the
band you selected. You are best off setting it to Automatic when you
use the 2.4 GHz band. The Automatic option is the only apparent
choice for 5 GHz. Choosing Automatic causes the base station to pick
the least occupied channel when the base station starts up or restarts,
but the base station doesn’t change the channel while running—only
after it has been restarted. To bypass Apple’s Automatic mode for
5 GHz channels, hold down the Option key as you pop up the Channel
menu.
Page 48
Warning! “Least occupied” (previous paragraph) means least
occupied by other Wi-Fi networks. In testing, even apparently
“empty” channels were sometimes full of interference from other
causes. While I couldn’t determine the cause, switching channels
alleviated problems, but it required choosing a channel rather
than relying on the Automatic setting.
Pick the Right Place for Your Base Station
When you walk around with a cell phone, the number of bars showing
signal strength varies with the quality of the signal that the phone
receives. These bars reflect the strength of signals received from
nearby cellular network transmitters on towers and roofs. It’s the
same issue over a much smaller space when you connect a computer
to a Wi-Fi gateway. Depending on where you place the base station,
its signal may or may not penetrate with enough strength to be useful.
First, decide where you want service. Do you want to work in your
backyard? Upstairs and downstairs?
Second, think about the obstacles in the places you want to work.
Walls, ceiling, floors, and even metal exercise bikes can all absorb
and reflect Wi-Fi signals, reducing their range and quality.
While the Extreme N uses MIMO technology—multiple sets of
receiving and transmitting antennas—to cover a much greater area
than its predecessors, the base station still has its limits. It’s just
much closer to covering the area of a typical home than earlier units.
Pick a spot that is near the middle of where you want your signal to
reach and test to see if it’s a good location for your base station. You
want to get the best average signal in all the places from which you
want to connect. To run the test, just power up the base station: its
default settings provide a name and a signal.
General testing advice
Here are some general tips for finding your ideal location:
• Leave the base station in one place while you try all the areas you
want to use it in.
• Spend up to 30 seconds in one spot to see if the signal strength
varies.
Page 49
• Use sticky notes to mark signal strengths at the locations where
you want to provide network access (see Testing from base station
to client, below). Also write down the current location of the base
station and the signal strength you’re seeing at that location so it’s
easy to sort out the ideal placement of the base station later.
TIP The AirPort menu lists networks alphabetically. Hold down the
Option key and select the menu, and Mac OS X re-orders the list by
signal strength, from strongest at the top to weakest at the bottom.
• When you move the base station, make sure to keep its orientation
the same. The antenna in a base station is omnidirectional—all
directions, but Apple designed the base station to have its strongest performance parallel to the horizon. It doesn’t come with a
mounting bracket, perhaps Apple’s way of emphasizing that you
should keep it in a horizontal orientation.
NOTE All flavors of Wi-Fi work at speeds below their maximum rates as an
adapter becomes more distant from the access point.
Testing from base station to client
AirPort Utility now incorporates what was a separate Apple utility
to monitor the performance of wireless adapters connected to a
base station.
To view this monitoring tool:
1. Launch AirPort Utility, connect to your base station, and choose
Base Station > Manual Setup.
2. At the top of the window, click the Advanced icon.
3. In the Advanced pane, on the Logging & SNMP view, click the Logs
and Statistics button (located near the bottom).
4. Click the Wireless Clients button.
You can now check the performance of any devices connected to
your base station (Figure 14). This nifty readout provides ongoing
monitoring of the signal rate for each connected device. Each device
is assigned a different color in the Client list beneath the graph, and
that color corresponds to a line that tracks signal strength over time.
Page 50
FIGURE 14
The graph at top shows the signal strength for each client. The bottom
lists each client by MAC address, with the actual measurements for
signal and noise, and the raw data rate.
The Client list shows connected devices by their unique adapter
number. (For more on adapter numbers, see What and Where Is a
MAC Address? on p. 59.)
For each client, the utility shows the signal and noise rates. The
signal-to-noise ratio is an absolute measure of potential throughput.
Signal and noise levels are measured in such a way that a negative
number means below a certain threshold, rather than an absence of a
signal or noise. Noise has a large absolute value, like -100; the larger
the absolute value, the less noise. The signal should be negative, too,
but have a lower absolute value, approaching 0; the closer to 0, the
better the signal.
NOTE The label dBm on the left of the graph means decibels below one
milliwatt (mW). Decibels are a logarithmic measure of power, and
dBm defines how much signal strength was received below the
nominal strength of 1 mW, a useful starting point for these kinds
of signals.
Page 51
The Rate column, however, has the most useful information: It shows
the raw data rate, in Mbps, at which the client is connected. This is
useful to know because you can have decent signal strength but be
connected at a lower speed than the raw 54 or 300 Mbps maximum
for 802.11g or 802.11n, respectively. The lower the connection speed,
the more likely you need to tweak the base station’s—or the
computer’s—position.
Testing from client to base station
The flip side when testing connections is measuring how strong
your base station is from the computer you’re trying to connect from.
iStumbler (http://www.istumbler.com/) is my detector of preference.
iStumbler provides a continuous scan with information about signal
and noise for all the networks in your vicinity (Figure 15).
FIGURE 15
iStumbler shows nearby networks. I made this scan in my office,
which is in the middle of a building in Seattle with a window off to
one side. Imagine a scan made in Manhattan.
If you’re truly frustrated with finding a good connection, you could
make an expensive purchase—or perhaps pool your dollars with
friends or colleagues—and get a spectrum analyzer. The Wi-Spy and
Wi-Spy 2.4x from MetaGeek run $199 and $399, respectively, and
provide a live analysis of the signals passing in the air around you.
Page 52
A spectrum analyzer constantly measures the strength of signals in
hunks of frequency, and produces an output that software can read
and display (Figure 16). The more energy or more spikes in a given
channel, the more likelihood that Wi-Fi won’t work there.
FIGURE 16
Wi-Spy and Wi-Spy 2.4x capture signal strength over time at
frequencies in the 2.4 GHz band and relay them to software like
EaKiu, which displays the results graphically. (Wi-Spy 2.4x data
pictured.)
Page 53
SET UP YOUR NETWORK
The next steps in setting up your AirPort network involve configuring
the LAN (local area network) and WAN (wide area network). For
many of us, this configuration is as simple as plugging in a couple of
cables—or maybe even one cable. But for more complicated networks,
a few more steps are involved to make sure the computers connecting
via the Extreme N can access the Internet, or the rest of a local
network, without you pulling out your hair.
More than one base station: If you’re building or re-building
a network with more than one base station, read this section first
for how to set up the base station that connects directly to your
broadband service provider. Then read Connect Multiple Base
Stations.
Simplest Case: Plug and Go
Before getting into more exotic scenarios, let me give you the
rundown on the simplest possible case, which has two parts:
• You have a broadband cable or DSL modem that doesn’t require
any special login or restrictions in order to access the Internet.
(If you’re not sure, see Log in via PPPoE over broadband DSL
and Deal with MAC-address-restricted cable broadband.)
• You plan to share the Internet connection coming in from the
broadband connection among computers and devices that connect
to the Extreme N via Wi-Fi or Ethernet.
Here’s how to get your connection up and running:
1. Plug an Ethernet cable from the LAN port of your broadband
modem into the WAN port of the Extreme N.
2. Connect the computers on your network via Wi-Fi or Ethernet to
the Extreme N.
That’s it! This setup relies on the factory settings that an Extreme N
has when it’s first powered up. If this simplified setup appears to be
working, and you have no reason to think that it shouldn’t do the job,
then skip ahead to Connect Your Computers.
Page 54
If this simplified setup doesn’t work, or you know you have a more
complicated situation, read through the rest of this section to find
your scenario.
Get a WAN address
The more complicated scenarios start with getting a WAN address
for your base station; you’ll then move to LAN configuration.
To communicate with the rest of the world, you need to hook the wide
area network (WAN) port of your Extreme N into either a broadband
modem; or, if you have an existing Ethernet LAN to which you are
connecting the base station, into that larger network.
In either case, start with an Ethernet cable and plug the cable into
the Extreme N’s WAN port. Next, plug the other end into the LAN
port of your broadband modem, or into a port on an Ethernet switch
for a larger network.
Auto-sensing: Extreme N has auto-sensing, auto-switching
Ethernet, which means you can use either type of Ethernet cable—
straight-through or crossover—successfully. The Ethernet ports
also automatically adjust speed to the highest available rate.
Now that you’ve made the physical connection, you can configure
your base station to handle the connection. The many different possible configurations can be broken down into two categories: those
that use dynamic addressing and those that use static addressing:
• If your Internet connection is a home broadband connection, you’ll
probably use dynamic addressing; you may need to ask your ISP
for more information if you’re not sure whether they provide you
with a dynamic address or not.
• A static address is more typical for small and large offices.
Dynamic addressing
A dynamic address is an Internet protocol (IP) address that is
assigned through Dynamic Host Configuration Protocol (DHCP),
a relatively old Internet technology. With DHCP, your Extreme N
requests an IP address via its WAN port, acting as a DHCP client.
A DHCP server on the other end of the Internet connection (typically
at your service provider) receives the requests and provides an
address. And that’s as complex as it has to be.
Page 55
A dynamically assigned address can be a private address, one that’s
restricted to the ISP’s own network; that network is hard for anyone
to reach making your network even more inaccessible; or a publicly
routable address, which is part of the global numbering system for
IP addresses.
The Extreme N is set to act as a DHCP Client if back in Step 7 of
Handle initial setup, you chose Using DHCP. No additional steps
should be needed (Figure 17).
FIGURE 17
The simplest way to get an Extreme N on the Internet.
In some limited cases, you might need to enter the DNS (Domain
Name Service) IP addresses manually. Your ISP should tell you those
addresses if you need them. DNS IP addresses are entered in the DNS
Server(s) fields (Figure 17, above).
Page 56
TIP HANDLE DNS RESOLUTION WITH OPENDNS
I recommend using OpenDNS to handle your DNS resolution
instead of DNS server information provided by an ISP. OpenDNS
has a few neat features that improve on normal DNS resolution.
First, they’re much faster than most ISPs, making the Web seem
snappier. Second, they can fix typos, for instance, when you enter
an address that doesn’t exist—flickr.cmo becomes flickr.com.
Third, they offer a custom account that lets you set DNS shortcuts
so that when you type a word into a browser’s Location field, you
control what domain name is looked up.
See http://www.opendns.com/ for more details, including their two
nameservers’ IP addresses.
Some ISPs require you to jump through additional hoops to connect
to their networks: a login process or a way to restrict access to a single
computer. The former is used mostly by DSL providers; the latter, by
cable firms.
Log in via PPPoE over broadband DSL
For security and tracking purposes, many DSL providers require
you to use a technology called PPPoE (PPP over Ethernet) when
connecting to their network. With PPPoE, you log in with a user name
and password to your ISP over your DSL connection, at which time
you are automatically assigned an address and the connection works
just like any other broadband connection.
If you need PPPoE, configure it in the Internet pane of AirPort Utility
in the Internet Connection and PPPoE views (Figure 18). The base
station connects per the setting you choose in the Connection pop-up
menu in the PPPoE view: Always On is the most likely choice.
Page 57
FIGURE 18
PPP over
Ethernet
connects
using a login
name and
password.
Deal with MAC-address-restricted cable broadband
To prevent multiple machines from accessing a single cable-modem
connection, some providers restrict access to a single MAC address
(see What and Where Is a MAC Address? next page). ISPs use two
common methods for restricting access by MAC address:
• In the less annoying method, the cable modem powers up and
locks on to the MAC address of the device connected to it. You can
switch between devices by unplugging and reconnecting the cable
modem after you connect your Extreme N.
• In the more annoying method, you register the MAC address with
the ISP manually or through an automatic process. You may need
to call your cable provider—which may want to charge an additional monthly fee—to register the MAC address of your Extreme
N’s WAN port. (The WAN port’s MAC address is printed on the
underside of the Extreme N, as the Ethernet ID.)
Warning! A feature in non-Apple Wi-Fi gateways, called MAC cloning or spoofing, lets you enter any MAC address for the WAN port. No
AirPort base station firmware version has this common feature.
Page 58
WHAT AND WHERE IS A MAC ADDRESS?
The MAC, or Media Access Control, address is a unique, factoryassigned address for every network device, including Ethernet and
Wi-Fi adapters. A MAC address consists of six two-digit hexadecimal numbers separated by colons, such as 0C:F2:33:01:02:FC.
(Hexadecimal, or hex, is the base 16 number system, with values
running from 0 to 9, and then from A to F for 10 to 15.)
The first three numbers are assigned to a manufacturer; Apple
has at least two common ranges, which begin with 00:0a:95
and 00:03:93. MAC addresses are frequently used for filtering,
authentication, and WDS, often without requiring direct entry.
Here’s how to find MAC addresses for Apple’s devices:
• Extreme N: Look on the bottom of the base station to find
the MAC addresses of the WAN Ethernet port and the Wi-Fi
adapter. Or, in AirPort Utility, select a base station at the left
to see its MAC addresses on the right:
◊ The AirPort ID is the device’s wireless MAC address.
The Ethernet ID is the WAN port’s MAC address.
• Computers connected to an Extreme N: In AirPort
Utility, select the base station and choose Base Station >
Manual Setup. Click the Advanced icon, and then—on
the Logging and SNMP view—click the Logs and Statistics
button. Click the DHCP Client button and a list of MAC
addresses appears. You can turn your computer’s Wi-Fi
adapter off and on to see which MAC address corresponds
to your computer.
◊
• Wi-Fi adapter in a Mac: In Mac OS X, open the Network
preference pane in System Preferences and choose AirPort
from the Show pop-up menu. The MAC number is listed as the
AirPort ID. (Ethernet MAC addresses are labeled as Ethernet
ID in the Ethernet view.)
• Wi-Fi adapter under Windows: In Windows XP or Vista,
view the connection status of the adapter and click Details
below the Connection Status section. The Physical Address is
the MAC address.
Page 59
Static addressing
A static address is an IP address that is entered manually and is fixed
over time. A static address could be private or public. To enter a static
address, you need details provided either by your ISP or, for an office
network, by a network administrator. You need:
• The static IP address: This address could be from an internal
private range or a public address reachable from the Internet.
• The subnet mask: A number full of mystery, the subnet mask
merely defines the size of the local network in which the static
address comes from, with “size” expressed as the number of
addresses in that local range.
• The router address or gateway: This is the address to which
any traffic that’s not bound for other machines on the local network is sent, to be routed to higher-level networks, such as a larger
office LAN or the Internet.
• DNS server or servers: You need at least one DNS server,
which handles turning domain names into IP addresses. Two is
better; that avoids slowdowns if the first DNS server is unavailable
or overloaded.
To enter these values, click the Internet icon at the top of the AirPort
Utility window; click the Internet Connection button, and choose
Manually from the Configure IPv4 pop-up menu (Figure 19).
FIGURE 19
Configure
the Internet
connection
manually by
entering the
static values
provided by
your ISP or
network
administrator.
Page 60
NOTE WHAT’S IPV4?
The other element of mystery in setting an IP address is what,
exactly, is IPv4? IP stands for Internet Protocol, but v4 means
“version 4,” the form of IP used in Internet networking for decades.
That distinction has become important with the availability of IPv6
(version 6), which Apple supports in Mac OS X and Extreme N,
among other products. IPv6 isn’t widely available, but it is out there
and will become increasingly embedded in our lives and devices.
See IPv6 settings for more details.
Hand Out LAN Addresses
With the WAN configured, it’s time to look at your own network—
the LAN. The LAN can be configured to assign IP addresses to client
computers in one of four ways:
• Dynamic private addresses: In this common mode, the Extreme N
shares one incoming Internet address with all the machines on
LAN. The base station assigns addresses to computers on the LAN
from a private range; you can modify what that range is. The
addresses are typically transient for any given computer. The
Extreme N coordinates traffic between the LAN and the greater
Internet so that all packets end up in the right place.
• Dynamic public addresses: With this setup, the Extreme N shares
multiple, publicly routable Internet addresses with computers on
the LAN.
• Reserved addresses: With this feature, you can assign specific
private or public addresses to individual computers on the LAN.
• Passthrough and bridging: you can set up an Extreme N to let
another device on a larger network dynamically assign addresses
or allow static addresses. With this set up, the Extreme N doesn’t
manage addressing.
The first option is by far the most common, in which computers on
the LAN receive addresses that can change from time to time, and
which exist solely to give the computers access to the Internet. The
other options are typically used when computers on the LAN side of
Page 61
the network need to be reached by computers on the Internet or by
computers on another LAN to which your Extreme N is connected.
Let’s look through each of these in turn.
Warning! In testing the Extreme N, I discovered performance
issues in one particular configuration. A NAT-enabled Extreme N
bogs down when you send data between devices on the base
station’s LAN (via Ethernet or Wi-Fi) and devices on a network
connected to the base station’s WAN. In this rare configuration,
Ethernet tops out at 70 Mbps; Wi-Fi at 50 Mbps. Fortunately, you
would almost never use NAT on a base station that connects its
WAN port to an office or a larger LAN network—see Passthrough
and Bridging.
Apple is aware of this problem (I reported it), and they improved
the speed by 25 percent from the Extreme N (original) to Extreme
N (gigabit) model.
NOTE DHCP works by having a computer or other device send out a
message over a network asking for an address. A DHCP server hears
this message and provides an address. The DHCP client pulls the
address that the DHCP server provides.
Dynamic private addresses
As with the WAN side of the equation, if you set up your network
using the straightforward assistant in AirPort Utility, you should
have no changes to make, so you don’t need to proceed further in
this section to set up the base station; you can skip ahead to the
next section, Connect Your Computers.
However, should you want to control which addresses are assigned
or manage other details of NAT and DHCP, read on.
Set up the base station
In AirPort Utility, click the Internet icon at the top of the window,
click the Internet Connection button, and choose Share a Public IP
Address from the Connection Sharing pop-up menu.
Page 62
Set up client computers
With an Extreme N set to use dynamic addressing, each of your
computers needs to be set to receive an address via DHCP. This is
the default setting for any network adapter.
In Mac OS X:
1. Open the Network preference pane.
2. Switch to the TCP/IP view for any adapter—Wi-Fi or Ethernet.
3. Choose Using DHCP from the Configure IPv4 pop-up menu
(Figure 20).
FIGURE 20
With TCP/IP
set to use
DHCP, Mac
OS X automatically obtains
a dynamically
assigned IP
address, in this
case from a
private range.
Your Mac should now be set up to receive an IP address via DHCP.
In Windows XP and Vista:
1. Choose Control Panel from the Windows menu.
2. Access network connections:
• In XP, open Network Connections.
• In Vista, open the Network and Sharing Center, and then in
the left-hand Tasks list, click Manage Network Connections.
Page 63
3. Right-click the adapter you want to view settings for, such as
Wireless Network Connection, and select Properties. (In Vista, you
should be prompted to approve that action; click Continue, if so.)
4. In the Networking tab that appears, select Internet Protocol
(TCP/IP) in XP or Internet Protocol Version 4 (TCP/IPv4) in Vista,
and click Properties. TCP/IP settings are configured in the General
tab; the default settings are the correct ones (Figure 21).
FIGURE 21
In Windows Vista,
selecting Obtain an IP
Address Automatically—
the default setting for
an adapter—allows the
operating system to get
a dynamic address.
(In Windows XP, the
interface for making
this selection looks
quite similar.)
Your Windows system should now be configured to receive an IP
address via DHCP.
Refining base station DHCP settings
You have two additional views in the Internet pane in AirPort Utility
for configuring the LAN. These allow you to control how private
addresses are generated.
The DHCP view offers a DHCP Range pop-up menu where you
choose one of three reserved ranges of private addresses—10.0.*.*,
192.168.*.*, or 172.16.*.*—as the two-number prefix to your private
network numbers. (The prefixes in the pop-up menu are reserved by
the global numbering authority, and they are guaranteed to not be in
use on any public Internet network.)
Page 64
You enter the third number, any number from 1 to 254, in the field
to the right of the pop-up menu. The fourth number is generated by
DHCP in a range limited to the starting and ending values shown in
the DHCP Beginning and Ending Address fields.
The only reason to change the range of numbers is if you want to
create and assign static private addresses. These would be addresses
that start with the first three numbers in the base station’s private
network range, but which you enter manually on each computer. This
used to be the only way to create a fixed private address, but I now
suggest you avoid this method by using reserved addresses; see
Reserved addresses, next page.
28-2: The lowest legitimate number in the fourth number position
of an IP address is 1; the highest is 254; 0 and 255 have particular
reserved network purposes.
Limited addresses: The range you assign must start with the
same prefix you defined in the DHCP Range pop-up menu. AirPort
Utility prevents you from modifying the first three numbers in the
four-number IP address in the range fields. This is also true
anywhere you can enter a LAN address in AirPort Utility.
In the DHCP view, you can also set the length of a time of a DHCP
lease, which is the association of a given computer with an address
that’s been handed out, and you can set the DHCP Message, which
will pop up in a dialog box on a computer when the computer receives
its DHCP address. (The LDAP Server field is relevant only for networks that use that directory protocol.)
The DHCP Reservations list is in Reserved addresses (next page).
Also on the Internet pane, the NAT (Network Address Translation)
view has two settings relevant for remotely accessing programs
running on one or more computers on the LAN. I discuss how NAT
works and what these settings offer in Reach Your Network Remotely.
Dynamic public addresses
Some people need to assign public addresses to their LAN computers
so that each computer can be reachable from the Internet. In this
case, you usually want to use a static public address, in which you
must configure each computer manually, and DHCP isn’t involved.
Page 65
However, some networks use only public addresses for all connected
devices, while also not requiring that each device have a static address
over time. In that case, you configure an Extreme N to hand out
public addresses from a defined range using DHCP.
To configure an Extreme N to assign dynamic public address, follow
these steps:
1. In AirPort Utility, select the base station at the left, and then click
the Internet icon at the top of the window.
2. Now, on the Internet Connection view, from the Connection
Sharing pop-up menu, choose Distribute a Range of IP Addresses.
In this mode, the NAT button disappears because there’s no
translation going on.
3. In the DHCP view, enter values for DHCP Beginning and Ending
Address. The range you specify is limited to the same IP network
that the Extreme N uses for its Internet Connection IP address. For
instance, if your Extreme N is 218.23.1.200, your range has to be
within 218.23.1.1 and 218.23.1.255.
Warning! Using public routable addresses means your entire
base station LAN is fully exposed to the higher-level network
through its WAN port, which usually means that all the computers
can be reached via the Internet.
Reserved addresses
Reserving an IP address using DHCP is a new feature in the Extreme
N—new to Apple, as it’s been available in other devices for years.
Reservation allows a given computer on a network to obtain the same
IP address, whether public or private, each time it joins the network.
This works whether or not you share the Extreme’s connection or
distribute a range of addresses, but does require DHCP service to
be turned on.
The reserved address is never assigned to another computer, and if
the computer in question has to restart or is shut down, the next time
the computer powers up and its network adapter is active, that computer still receives its reserved address.
Page 66
Reserved addresses work well if you want to connect from the WAN
side of a base station to computers, printers, and other devices that
are connected via the LAN side.
Follow these steps to set up a reserved address:
1. In AirPort Utility, in the DHCP view of the Internet pane, click the
button.
The DHCP Reservation Setup Assistant (Figure 22) appears.
FIGURE 22
The assistant
lets you set
up a reserved
DHCP address
by MAC
address or by
DHCP client ID.
2. Enter a description, which will later appear in the DHCP
Reservations list.
3. Select whether to reserve an IP address by a Wi-Fi adapter’s MAC
address or by its DHCP Client ID, and click Continue. DHCP Client
ID is easier to set up, but works only with Mac OS X (and earlier).
4. Now:
• If you reserved by MAC address: enter the MAC address
(AirPort Utility fills in the colons as you type two-digit hexadecimal numbers), choose the last number in the IP range that
you want to reserve, and click Done (Figure 23). If you need
help locating the MAC address, see What and Where Is a MAC
Address? (p. 59).
Page 67
FIGURE 23
Enter the MAC
address and
your reserved IP
address, and then
click Done.
• If you selected Reserve by DHCP Client ID: The DHCP
Client ID is a text tag that you assign when configuring a Wi-Fi or
Ethernet adapter. This text is transmitted when an adapter requests
a dynamic address (Windows XP and Vista don’t support this),
and the base station uses that tag to assign a reserved IP address:
a. First set the DHCP Client ID on a client computer running Mac
OS X: Open the Network preference pane, click TCP/IP, choose
Using DHCP from the Configure IPv4 pop-up menu, and enter
the DHCP Client ID in the field at the right. Figure 24 shows
the DHCP Client ID set to GlennDualMac.
FIGURE 24
The DHCP Client ID
field is found in the
TCP/IP view when
the Configure IPv4
pop-up menu is set
to Using DHCP.
Page 68
Warning! To avoid confusing the Extreme N, make sure that
DHCP Client IDs are unique.
b. In AirPort Utility, enter that DHCP Client ID in the DHCP
Reservation Setup Assistant and click Done (Figure 25).
FIGURE 25
Enter the same
DHCP Client ID in
AirPort Utility.
5. When you’ve entered all the reservations, click Update.
After restarting, the DHCP Reservations list shows the entries you
made and any computers listed will have retrieved their new addresses.
Passthrough and bridging
For networks in which the Extreme N is connected to a larger LAN,
you may already have a DHCP server running that handles address
distribution. In that case, you need to turn off Connection Sharing:
1. In AirPort Utility, click the Internet icon at the top of the window.
2. In the Internet Connection view, choose Off (Bridge Mode)
from the Connection Sharing menu. The DHCP and NAT buttons
disappear in the Internet pane when that option is selected.
3. Click Update to restart the base station.
With bridge mode, the Extreme N simply passes through any DHCP
messages or other traffic, and isn’t involved in assigning addresses.
NOTE If you connect base stations wirelessly using Wireless Distribution
System, all the base stations other than the “main” unit, which acts
as the Internet or LAN conduit, are turned into bridges. See Bridge
Wirelessly for details on setting up a WDS connection.
Page 69
CONNECT YOUR COMPUTERS
Once you’ve set up your Wi-Fi network and connected it to the
Internet, you’ll want to configure your computers to connect to
the network properly, whether you’re working with a few desktop
computers or helping customers use a public hotspot. Making a
connection is quite simple, but configuring how your computers
connect may take a little thought. You might choose to connect
automatically to unknown networks, or need to connect to a network
that doesn’t advertise its name. You may also reconnect to networks
that you’ve visited before.
Read this section to learn how to use Tiger (below), Windows XP,
and Windows Vista to connect to networks, modify stored profiles for
networks, and choose when to connect to unknown networks.
NOTE Leopard hasn’t shipped as the book goes into production. To learn
about the Leopard update to this book, click Check for Updates on
the cover and sign up for the update mailing list. If you have only
the printed version of the book, send us an email message.
Warning! Remember that if you set up your network as 802.11nonly in the 2.4 GHz band, or if you set the base station to use the
5 GHz band, neither an 802.11b nor a 802.11g adapter found in an
older computer will be able to connect. If you can’t see your network
on a given computer or can’t connect to a network that shows up
in a list of available networks, check your base station setup (see
Consider your spectrum choices for more details).
Connection problems: Just because a network is visible doesn’t
mean you can connect to it. MAC address access control and other
restrictions could keep you from joining. See Secure Your Network.
Connect in Tiger
Connecting to a Wi-Fi network with Mac OS X involves two phases:
discovering, or finding, a network, and connecting to it. Separately,
you can create stored profiles for Wi-Fi networks that you wish to
connect with automatically in the future.
Page 70
Warning! If the AirPort status menu on your menu bar displays
an icon like an open fan (shown at left), your network adapter is
turned off. To turn it on, choose Turn AirPort On from the menu.
If the AirPort icon still looks like a fan or you get an error saying
that there’s no card or it can’t be turned on, you may have a
hardware problem. If you have a model with a removable Wi-Fi
card, check that the car is seated properly: power the computer
down, open the case, and check the card; start up the machine
and see if AirPort is now available. If you don’t have a serviceable
card or this doesn’t help, bring the computer in for service.
Discovery
Mac OS X constantly looks for networks when the Wi-Fi adapter is
turned on, and a list of them appears in the AirPort status menu at
the right of the menu bar (If you don’t see the menu, you can turn it
on by opening Internet Connect from /Applications. A checkbox
for the menu is on the AirPort pane.)
You can also use software like iStumbler to get more information
about your own and other networks in the vicinity (see Testing from
client to base station).
If a Wi-Fi network appears in your vicinity and you aren’t already
connected to one (for instance, if a neighbor turns on a new network
or if you open your laptop in a coffee shop), Mac OS X alerts you
(Figure 26). From that alert, you can then choose whether you wish
to connect to the network, and if you want Mac OS X to remember the
network so that you always connect to it again in the future.
FIGURE 26
Mac OS X
alerts you to
a new network
and lets you
choose to
always join it
in the future.
Page 71
You can configure a Mac running Tiger so that it automatically
picks which network it connects to: Mac OS X can recognize a new
connection when you wake up or turn on the Mac, when you turn
AirPort off and back on, when a network is turned on near you, or
even when a Wi-Fi network disappears and reappears while you’re
actively using your computer.
Warning! The fact that Mac OS X and other operating systems
constantly scan for networks is a security problem. Many patches
were released in 2006 that dealt with flaws in Wi-Fi drivers that
could be exploited with maliciously crafted data designed to crash
an operating system when it is scanning for networks. This is one
reason why it’s critical to keep your software up to date, especially if you use Wi-Fi networks that aren’t in your home or office.
Connecting
To connect to a network, you typically select its name from a list,
and then enter an encryption key if it is secured. In some cases, you
might have set up your network to be “closed” (invisible to casual
passers-by). Let’s walk through these options for connecting.
Connect to a named network
To connect to an AirPort network in Tiger when the network broadcasts its name—as most do—choose the network name from the
AirPort status menu (Figure 27). The AirPort menu’s icon should
go from gray to black, with the number of black waves indicating
signal strength by their quantity.
FIGURE 27
Choose a network from the list or choose
Other to join a closed network by name.
At hotspot networks and other open networks, before you can do
anything else on your connection, you may need to open a Web
Page 72
browser window and try to visit any site. Instead of going to that site,
the network will redirect you to a gateway page at which you may be
asked to agree to terms of service, or enter account information or a
credit card number to proceed. You typically have no Internet access
until you’ve passed the gateway page.
If the network is secured with a key, see just below for the next steps,
or look on the next page for WPS information.
Enter an encryption key (WEP, WPA/WPA2 Personal)
If encryption is active on the network, after you select the network
name, you are prompted by a dialog to enter an encryption key.
Typically, the AirPort software on a Mac automatically chooses the
correct encryption type, and you simply enter the encryption key that
you have been given or that you set yourself for the network.
Save the key, save time: You can choose to store the key in the
Keychain to avoid having to retype it in the future.
If the encryption type is incorrect, you can choose the correct type
from the pop-up menu. Click OK to join the network.
You enter an encryption key or passphrase differently depending on
how the network was configured. Extreme N networks can always be
joined with either a WPA or a WPA2 password, but WEP keys may be
needed to join older networks:
• Apple WEP Password: If you created a WEP key on an original
AirPort Base Station, the 2003 Extreme, or an AirPort Express,
enter the password exactly as you entered it in setting up the base
station or as it was provided to you.
• WEP hexadecimal key: If you are joining a non-AirPort
network, you need to enter a $ (the dollar sign character) followed
by 10 to 26 hexadecimals digits. Whoever set up that network
needs to provide those hex numbers to you.
• WEP ASCII key: If the network was set up with WEP using an
ASCII (text) key, you must enter that password between quotation
marks, like "fishy". WEP ASCII keys are 5 or 13 characters long.
Page 73
Extract WEP key: AirPort Utility lets you extract a WEP key
when using WEP Transitional in case you have older Windows
computers or other devices that need to join. Connect via the
utility to your base station, choose Base Station > Manual Setup,
and then choose Base Station > Equivalent Network Password.
The ASCII and hex WEP keys are identical, just expressed in
different forms.
• WPA/WPA2 passphrase: Enter the passphrase exactly as it
was entered on the Extreme N or other base station. All computers
handle WPA/WPA2 passphrases the same way. Some networks
may be configured to accept either a WPA or a WPA2 password;
others may require only a WPA2 password.
Warning! Macs with the original AirPort Card cannot connect
to WPA2 Personal protected networks, but won’t provide an error
to explain that. If you are using an AirPort Card on an older
machine, make sure via AirPort Utility that the network is
configured with WPA/WPA2 Personal, not WPA2 Personal.
• WPA/WPA2 hex key: In rare cases with WPA or WPA2, you
may need to enter the 64-digit hexadecimal encryption key. To
enter this in Tiger, hold down the Option key while selecting WPA
Personal or WPA2 Personal from the Wireless Security pop-up
menu, and an extra large field appears allowing entry. Yes, it’s a
pain to enter 64 hex digits.
Connect to a simplified secured network with WPS
Wi-Fi Protected Setup (WPS) lets you join a secured network without
entering an encryption key. But this method requires access to the
base station via AirPort Utility at the time you want a computer to
join the network. To read the full procedure, skip ahead to Use WPS.
Connect to a closed (hidden) network
For a closed network, choose Other from the AirPort status menu. In
the resulting dialog, enter the network’s precise name (close doesn’t
count), and choose the form of encryption and enter the password.
If there’s no encryption, leave the option set to WEP Password and
enter no password. Click OK to join. (For more on closed networks,
see Closed network.)
Page 74
Saved locations
Tiger can automatically connect to networks that you’ve joined
previously, including password-protected networks for which you’ve
saved the password in your Keychain.
But you can also create custom settings for different locations where
a computer might be used (perhaps at the office, at a relative’s house,
and at a local coffee shop), and you can set up multiple profiles at
each location.
To create a new location, in the Network preference pane, choose
New Location from the Location pop-up menu, enter a name, and
click OK.
Managing profiles
You can manage profiles for connected networks and create new
profiles from scratch. To show those profiles, and to create and edit
them:
1. In the Network preference pane, choose your AirPort adapter from
the Show pop-up menu and click the AirPort button.
2. Choose Preferred Networks from the By Default, Join pop-up menu.
A list of networks appears, ordered from top to bottom by the most
preferred to least preferred network to join.
Warning! Even though you can create different profiles for your
other network settings through the Location pop-up menu, Wi-Fi
networks in this profiles list are shared in all locations.
Warning! I discovered a bug some time ago with location profiles
created in Panther and used in Tiger. I was unable to get Preferred
Networks to appear in the pop-up menu with a Panther-created
location; instead an option that’s not supposed to appear in Tiger
shows up: A Specific Network! When I created a new location in
Tiger, the correct menu commands appeared. This bug has never
been fixed.
Page 75
3. To work with these profiles:
• Add a profile manually by clicking the
button.
• Delete a profile you no longer need by selecting the profile and
clicking the
button.
• To edit an existing profile, select it and click Edit; you can
change the password or type of password, too.
• To change the preferred order in which the Mac connects to
networks if more than one is available, drag a network name
to a new position in the list.
4. Click Apply Now when you’re done.
Advanced connection options
For more control over how a Mac connects via AirPort at a particular
location, in the Network preference pane, choose a location, click the
AirPort button, and then click Options at the lower left. Now you can:
• Set whether you want to add profiles for new networks that you
connect to by checking or unchecking the “Automatically add new
networks to the…” box. (If, instead, you chose Automatic from the
By Default, Join pop-up menu, that box is checked and cannot be
disabled. In Automatic mode, you manage networks entirely via
the AirPort status menu.)
• You can also choose one of three items from the If No Preferred
Networks Are Found pop-up menu:
◊
Ask Before Joining an Open Network lets you join any network
that’s within your Mac’s range, but first prompts you.
◊
Automatically Join an Open Network is ill advised: it’s rare that
every open network will be acceptable to you, or even intended
for use by outsiders.
◊
Keep Looking for Recent Networks prevents your Mac from
joining, or asking to join, networks that you haven’t agreed to
connect to before.
• In Tiger, Apple added the checkbox Disconnect from Wireless
Networks When I Log Out, which disconnects the Mac when no
user is active. This makes sense for users who routinely log out
of Mac OS X, or on computers with multiple users.
Page 76
TIP If you can’t get your AirPort interface to connect to a network, Tiger
has a troubleshooting feature called Network Diagnostics that’s
available when you click Assist Me at the bottom of the Network
preference pane.
TIP WHERE YOUR MAC STORES PASSWORDS
When you enter a WEP, WPA, or other encryption key in Mac OS X,
it’s stored in the Keychain. You can run Keychain Access (located in
/Applications/Utilities) to delete entries you no longer wish
to store or to retrieve passwords that you have forgotten.
Keychain passwords are secured with your Mac OS X user
password, unless you specifically set a special Keychain password,
which you can do in Keychain by choosing Edit > Change Password
for Keychain “keychain name”. For more advice on Keychain, see
Take Control of Passwords in Mac OS X.
Connect in Windows XP
In this subsection, I first look at how to make a basic connection. I
then cover a few more advanced options, and look at how to create a
preferred network profile. In all cases, my steps apply specifically to
Windows XP Service Pack 2 (SP2).
Discovery and connecting
To start setting up a Windows computer to connect to a wireless
network under Windows XP Service Pack 2, right-click the wireless
network icon in the System Tray and choose View Available Wireless
Networks.
Windows responds by showing any networks that it can see, along
with info about the status and nature of each one (Figure 28). This
is an enormous improvement in SP2 over previous XP releases, which
left you guessing.
Page 77
TIP WATCH OUT FOR WIRELESS ZERO CONFIGURATION
If Windows XP says that another program is controlling wireless
access or that it can’t use the wireless adapter, Wireless Zero
Configuration may be at fault. Despite its name, it needs handholding: Go to Control Panels, open Administrative Tools, then
open Services, and finally select Wireless Zero Configuration. Click
the square stop button at the top of the Services window; after
you’ve been told that the service has stopped, click the triangular
start button.
That typically takes care of the problem.
FIGURE 28
Windows shows you all the networks that it can see in the vicinity,
as well as their security parameters and signal strength.
Now, select a desired network and click Connect, at which point
you’re prompted for any encryption keys needed to join.
Page 78
Advanced connection options
Now that you’ve established a connection, you can tweak aspects of
that connection. To see more options, at the left, in the Related Tasks
list, click Change the Order of Preferred Networks. That brings up
the Wireless Networks tab of the Wireless Network Connection
Properties dialog (Figure 29).
FIGURE 29
You can use this tab
for many tasks, such as
setting which networks
you prefer to connect to
in which order when more
than one is available (use
the Move Up and Move
Down buttons).
The
symbol at the top
of the Preferred networks
list marks the currently
connected network.
A red x ( ) marks any
networks that are not
visible.
An icon by itself ( )
means the network is
available in the vicinity.
This dialog box is a bit of a powerhouse despite its demure
appearance. Using it as a launching pad, you can:
• Re-order your preference for which network your machine
automatically connects to. Select a network name and click
the Move Up or Move Down button to rearrange it.
• Add new Wi-Fi connections. Click Add.
• Delete a preferred network. Select a network and click Remove.
Your computer no longer automatically joins that network.
• Set advanced connection properties: Click the Advanced button
and then choose whether to connect to any available network,
only to base station Wi-Fi networks (access point or infrastructure
Page 79
networks), or only to ad hoc (computer-to-computer) networks
(Figure 30). You can also choose whether to connect automatically to non-preferred networks—ones that you haven’t already
set up profiles for. I recommend leaving that box unchecked.
FIGURE 30
The Advanced dialog
box controls how your
computer connects to
available networks that
it finds.
Creating a preferred network profile (WPA/WPA2)
To set up a stored preferred network profile with WPA/WPA2, follow
these steps:
(I don’t describe how to use WEP encryption here because you are
unlikely to be limited to WEP on a Windows XP SP2 system when
connecting to an Extreme N!)
1. Navigate to the Wireless Networks tab for a Wi-Fi adapter as
shown in Figure 29 (previous page).
2. Now, either:
• Add a new profile by clicking Add.
or
• Select an existing profile, and click Properties.
3. If you don’t already have one filled in, enter the network name
(SSID).
Page 80
4. Set network authentication to WPA-PSK, and set data encryption
to TKIP for WPA, or to AES for WPA2 (Figure 31).
FIGURE 31
Choose WPA-PSK and
TKIP in order to enter
your WPA key; choose
AES from the Data
Encryption pop-up
menu for WPA2.
5. Enter your WPA or WPA2 passphrase in Network Key and again
in Confirm Network Key. Since you can’t see the key as you type it,
you can’t verify visually that you have typed it correctly. Retyping
the key helps ensure that you’ve entered it correctly.
6. Click OK.
Windows stores the profile. You can then drag the profile to make it
more or less preferred than other networks already listed.
Connect in Windows Vista
Windows Vista streamlines connecting to a Wi-Fi network by providing much clearer information than Windows XP’s process along
with a better designed interface for working with wireless networks.
Page 81
Warning! Because Draft N is in flux, a Windows computer with
an 802.11n adapter might have trouble making a connection to
the Extreme N. In testing, I found I couldn’t get the highest speed
connection rates using an Intel Draft N card that had been released
at the same time as Apple’s N enabler and Extreme N (original).
Firmware updates due in late 2007 should improve this situation
enormously.
Discovery
To see what Wi-Fi networks are available in Vista, right-click the
Network icon in the System Tray and select Network and Sharing
Center. Click Connect to a Network from the left-hand Tasks list.
This reveals a list of wireless networks (Figure 32). If you hover
the pointer over a network, more detail is revealed, such as the type
of network encryption.
FIGURE 32
View available
networks.
Connecting
Let’s connect to a Wi-Fi network with Vista. You can double click
a network in the browser shown above in Figure 32, or select a
network and click the Connect button to start:
• Open network: If the network is open, Vista warns you that
there’s no protection with an exclamation point in a shield.
Page 82
• Secure network: A secure network appears in the list as
a “Security-enabled network,” and when you select it and click
Connect, Vista prompts you for an encryption password
(Figure 33). Unlike in XP, you need only enter the key once—
I mean, if it’s wrong, it’s going to tell you, right? Vista, like Mac
OS X, handles the password type automatically, but doesn’t tell
you what kind of encryption is being used. You can also select
the Display Characters checkbox to see what you’re typing.
FIGURE 33
Enter the
security key
to connect to
the network.
Next, Vista shows a dialog while it’s trying to connect, and even
warns you if the connection is taking longer than usual to hook up
(Figure 34).
FIGURE 34
The progress
bar shows
that something is
happening
while the
connection
is set up.
Page 83
Managing profiles
Vista offers a new profile manager to help store information about
networks you’ll connect to on an ongoing basis. In the Networking
and Sharing Center, click Manage Wireless Networks in the left-hand
Tasks list. The resulting dialog is shown in Figure 35.
FIGURE 35
You can add
and configure
networks that
you connect
to regularly in
Vista’s profile
manager.
To add a profile, follow these steps:
1. Click the Add button.
2. Make one of the following choices:
• Choose Add a Network That is in Range of This Computer
(scan for networks).
Now enter an encryption key when prompted. Vista will store
the key along with your other network details.
Page 84
• Choose Manually Create a Network Profile (enter the network
name).
Now, you can enter your network’s name, encryption type, and
security key (Figure 36):
◊
For WPA, choose WPA-Personal from the Security Type popup menu, and TKIP from the Encryption Type pop-up menu.
◊
For WPA2, choose WPA2-Personal from the Security Type
pop-up menu and either TKIP or AES from the Encryption
Type pop-up menu.
FIGURE 36
Set up a
manual profile
for a network
you connect
to more than
once.
3. Click Next and then Close.
The profile appears in the networks list.
Page 85
CONNECT MULTIPLE BASE STATIONS
Wi-Fi is described as reaching “only” about 150 feet, which is a very
rough estimate of the radius of older 802.11b and g devices. With an
Extreme N, the distance is much farther. But you can also extend the
covered area by adding more base stations with overlapping signals.
As a Wi-Fi adapter in a laptop or handheld moves across overlapping
areas, it can automatically switch base stations while maintaining
a continuous network connection—as long as you’ve set the network
up right.
While it’s always critical to follow instructions exactly when setting
up any kind of network gear—or almost anything computer related—
extending a network with more base stations is particularly rough
because a failure to check one box or enter exactly the right text could
result in a network problem that none of the base stations can
accurately report.
If, in following the steps below, you find yourself stymied, retrace
your steps from the start and see what went wrong.
When you extend a network, the additional base stations tend to
be dumb; that is, they don’t assign out addresses or handle other
features you think of as belonging to a base station’s set of options.
Rather, one base station remains smart, offering DHCP and NAT (if
needed), among other network choices. The rest pass through traffic
from that main unit. Dumb base stations are typically called access
points to distinguish them from routers.
Because dumb base stations (access points) simply pass traffic
through, an adapter retains the same IP address as it switches from
one base station to another, thus maintaining a continuous connection in most cases.
There are two mix-and-match methods of extending your network:
• Add base stations via Ethernet
• Add base stations wirelessly via Wireless Distribution System
(WDS)
Page 86
I write “mix and match,” because you can use any combination of
Ethernet and WDS to build a network. Let’s start with the simpler
case, which is extending a network via Ethernet.
Add Access Points via Ethernet
When you add access points, they must each have the same network
name, known as an SSID (service set identifier). This enables computers to move around without changing their network settings,
because their Wi-Fi cards automatically and seamlessly switch from
one access point to another as needed to maintain a constant connection. If you have encryption enabled, each access point must be set
up with the same options and keys.
Different names for seamless networks: In Mix Legacy, New
N Networks, I will advise you to set different network names for
the old and new networks. That advice is designed to keep the
networks separate. However, when adding access points to grow
a single network, you keep the same name so that the connecting
computers see the network as a single entity.
When adding access points to create a network that allows roaming,
you need a network backbone that connects all the access points.
Typically, you use Ethernet cabling to connect the access points
(Figure 37). However, you can also use wireless connections or
electrical connections to form that network backbone, as I describe
ahead in Bridge Wirelessly and Extend with HomePlug.
FIGURE 37
A common
Ethernet
backbone
connects one
base station
in the living
room, another
upstairs, and
a third in the
basement.
Page 87
The most important part of adding access points is choosing the
Wi-Fi channels for them wisely. Because each access point can communicate over a unique hunk of spectrum, you can avoid interference
by making sure that no adjacent APs use the same frequencies. See
Configure the Spectrum and Channel for more details on how to pick
channels. Typically, all the base stations on an extended network will
use either the 2.4 GHz or 5 GHz band for simplicity, but it’s not
strictly necessary (see Mix Legacy, New N Networks).
Set up a main wired base station
Your main base station should be plugged into your broadband connection, and configured as discussed in Set Up Your Network for
setting up a base station to share addresses.
Where you deviate from those instructions is in choosing the channel
for the base station to operate on. You need to select the 2.4 GHz or
5 GHz channel manually, rather than using the Automatic setting, so
that you can set additional base stations that overlap to use different
channels. Instead of following the procedure detailed in Set a band
and channel, follow these steps:
1. Launch AirPort Utility, connect to your base station, and choose
Base Station > Manual Setup.
2. In the AirPort pane’s Wireless view, choose a numbered channel
from the Channel pop-up menu.
• If you chose from the Radio Mode pop-up menu either “802.11n
(802.11b/g compatible)” or “802.11n only (2.4 GHz),” select
channel 1, 6, or 11. These are the “clearest” channels that can be
used in overlapping areas.
• If you chose from the Radio Mode pop-up menu either “802.11n
(802.11a compatible)” or “802.11n only (5 GHz),” hold down the
Option key to select a 5 GHz channel manually, such as 36.
3. Click Update to restart the base station with these changes.
Page 88
Set up additional wired base stations
Adding additional access points is straightforward:
1. Launch AirPort Utility, connect to your base station, and choose
Base Station > Manual Setup.
2. In the AirPort pane, choose the Wireless view.
3. Enter the same Network Name as your main base station (this
enables seamless roaming).
4. Choose a channel that won’t interfere with your main base station
or other base station’s choices:
• In 2.4 GHz (B, G, or N), any three base stations can uniquely
use channels 1, 6, and 11 with the least interference. If you set
your main to 1, set an additional one to 6, for instance.
• In 5 GHz (A or N), all channels are nonoverlapping. But if you
use the “wide” channel mode, an Extreme N uses the equivalent
of channels 36 and 40 at the same time. Choosing channels
eight numbers apart for base stations that have overlapping
signals produces the best results; those would be 36, 44, 149,
and 157.
5. Choose the same Wireless Security option and enter the same
Wireless Password as on your main base station.
6. Click Update to restart your base station with the new settings.
7. Plug your additional access point into your main base station
via Ethernet, connecting the cable from the WAN port on the
additional access point either to a LAN port or to an Ethernet
switch connected to a LAN port on the main base station.
Page 89
EXTEND WITH HOMEPLUG
What’s the most robust and ubiquitous wired network in your
home? The electrical system! We don’t think of data transmitting
over power, but all wired networks use electricity to encode data.
In the case of powerline networking, small adapters plugged into
outlets modulate data over the 60-hertz (Hz) frequency used in
U.S. power. At least three incompatible versions of powerline
networking now exist, operating at speeds up to 200 Mbps.
Powerline networks have no central hub in most cases. Mac users
should purchase Ethernet bridges, which offer a single Ethernet
jack. You plug a cable from a Mac into this bridge, plug the bridge
into a wall socket, and you’re done. The powerline system
handles communication among all the adapters on your electrical
network.
When I say “wall socket,” I do mean wall socket: powerline networking typically cannot work when an adapter is plugged into a
power strip.
To extend a wireless network, simply place your access points
in appropriate locations, configure them as described above for
Ethernet network extension, and then plug them into HomePlug
Ethernet bridges (Figure 38). And that’s it.
FIGURE 38
A powerline
network
works like
Ethernet over
electrical
outlets.
Page 90
Bridge Wirelessly
Wireless Distribution Service (WDS) is a neat way to extend an
AirPort network without running wires between locations. As I noted
previously, if you want to extend a network by adding access points,
you might connect them via Ethernet—which means more wires.
Instead, WDS can connect an access point to other access points
as easily as wireless clients connect to an access point.
TIP You can mix and match WDS with Ethernet-extended networks,
too. Each cluster of WDS machines can work together, and then
the “main” base station in that group—see below—can hook into
a larger network via Ethernet as an additional base station.
You can also set a main base station to be both a WDS base station
and to handle serving DHCP to computers over Ethernet, which
allows it to be the root of both kinds of networks without additional
configuration.
How it works
WDS works much like plugging an Ethernet hub into an Ethernet
switch. An Ethernet hub interconnects devices to each other as a
single segment, just like wireless clients connecting to a wireless base
station. An Ethernet switch, by contrast, isolates each port as a separate segment. A computer connected to a hub connected to a switch’s
port can reach computers on other ports’ hubs because the switch has
information about which computers (by MAC address) are on other
segments; this info allows the switch to transfer data across segments.
Likewise, WDS allows access points to exchange information about
where computers and other devices are located on a physical network.
One access point can then route data to another or to a series of other
access points to reach the destination computer (Figure 39).
NOTE The biggest downside in WDS is that on a busy network, you
effectively halve, quarter, or even eighth, your available bandwidth:
All the network traffic that travels among access points over WDS
reduces the overall throughput of the network. But with an effective
network throughput of nearly 100 Mbps on an 802.11n network, even
splitting that into pieces still provides plenty of usable bandwidth.
Page 91
FIGURE 39
The same
basic setup for
an Ethernetconnected
network can
work with
WDS.
Here, each
base station
is set to WDS
and also to
serve access
to local
computers
wirelessly.
Distribute wirelessly
In general, to set up WDS you need to know the MAC address for each
of the wireless gateways you want to connect (see What and Where Is
a MAC Address?, earlier, p. 59).
Mix and match: You can mix and match an older or newer
Extreme and the AirPort Express, as long as you recall that the
802.11g devices slow down overall network performance both by
the general backward compatibility overhead hit (about 10 percent
loss there), and when they’re actively sending or receiving.
Resolved bug—Extremes didn’t mix: In testing for this first
edition of the book, I found WDS would not work between an
Extreme N (original) and an Extreme 2003. When I tested the
Extreme N (gigabit), I had no such troubles.
Apple requires that you configure one device as the main base
station; you should choose the one best positioned to connect to
an Internet feed. Base stations that connect to the main are called
remotes, and they relay traffic via the main to and from their clients,
whether to other clients on the local network or the Internet. Finally,
Apple defined a relay, which a remote can connect to and which is
in turn connected to a main. Relays can’t connect to relays; remotes
can’t connect to remotes. You could have 4 remotes on each relay
Page 92
and 4 relays connected to a main for a total of 21 base stations
(Figure 40), although bandwidth would be enormously reduced.
FIGURE 40
If one main
base station
tells four
friends, and
they tell four
friends… well,
this is what
happens.
THE HIDDEN NODE PROBLEM
In a wireless network in which more than two access points
connect among themselves in any manner, the “hidden node”
problem occurs when one node has at least two access points that
can see the node but can’t see each other. Wi-Fi relies on collision
detection that requires that every device on a segment can spot
when other devices start transmitting and then back off.
With a hidden node, some devices can’t tell when other devices
are transmitting, resulting in crosstalk, interference, and other
problems. When designing a network to use WDS with more than
a few access points, you may have to give this issue some consideration, keeping all base stations within at least weak reception
range of each other. In some cases, you’ll experience reduced
performance if you ignore it; in others, the network might
mysteriously vary in its quality and reliability.
To set up a WDS network, follow these steps, repeating for each base
station you need to configure. There are two separate methods: one
for all-Extreme-N networks (next page); another for a Mix of Extreme
N and older Extreme/Express units, ahead.
Page 93
All Extreme N
Apple rather oddly added a way for Extreme-N base stations to
configure themselves via WDS without providing enough cues for
most of us—myself included—to figure it out. You have to read
page 46 of their ebook on designing 802.11n networks to find this out!
And even then, it’s a bit obscure. (See Designing AirPort Networks
Using AirPort Utility, a free download from http://www.apple.com/
support/manuals/airport/.)
Warning! This option works only with Extreme-N base
stations. If you set up an Extreme N as your main and try to
connect with 802.11g Extreme or Express models, AirPort Utility
doesn’t list the necessary Wireless Mode option. If you set up an
802.11g AirPort as your main, and try to connect via Extreme N,
AirPort Utility tells you after you restart that the base station
you’re trying to connect to lacks the proper checked option.
Configure the main base station
1. In the AirPort Utility, in the toolbar, click AirPort.
2. In the Wireless view, choose Create a Wireless Network from the
Wireless Mode pop-up menu (Figure 41).
3. In the same view, check Allow This Network To Be Extended.
4. Click Update to restart the base station with that setting.
FIGURE 41
Check Allow
This Network
To Be
Extended
to make an
Extreme N
the main base
station in a
WDS network.
Page 94
Configure additional base stations
1. In AirPort Utility, in the toolbar, click AirPort.
2. In the Wireless View, select Extend a Wireless Network from the
Wireless Mode pop-up menu.
3. Check Allow Wireless Clients if you want the remote base station
to be available via Wi-Fi, not just to Ethernet-attached computers.
4. In the same view, set your Wireless Security choice and Wireless
Password to be identical with your main base station.
5. Click Update, and you should be prompted after the base station
restarts for the base station password of the main unit. (If the
password is the same for the main and additional base station,
you may not be prompted.)
Mix of Extreme N and older Extreme/Express units
1. Launch AirPort Utility, select a base station to configure, and
choose Base Station > Manual Setup (Command-L).
2. In the AirPort pane, click the Wireless button.
3. From the Wireless Mode pop-up menu, choose Participate in a
WDS Network
A WDS button appears in the AirPort pane.
4. Click the WDS button.
5. If you want this unit to act just as an Ethernet extender or a bridge
between a main and a remote, uncheck Allow Wireless Clients. In
this mode, wireless clients can’t connect to a base station, but the
Ethernet port is active and a main, remote, or relay could connect
to other base stations via WDS.
6. Set radio mode, channel, base station password, wireless security
method, and wireless password identically:
• In the AirPort pane, in Base Station view, set the Base Station
Password.
• In the AirPort pane, in the Wireless view, set the remaining
items: Radio Mode, Channel, Wireless Security, and Wireless
Password.
Page 95
7. In the WDS view, enter the AirPort ID (Apple’s name for the “air”
interface’s MAC address on a base station; see What and Where Is
a MAC Address? (p. 59) as follows:
• Main base station: Click the
button at the bottom of the
WDS Remotes list to enter the AirPort ID of the base station(s)
that you want to add, up to four total (Figure 42).
• Remote base station: Enter the AirPort ID of the main base
station in the WDS Main field.
• Relay base station: Enter the AirPort ID of the main base
station in the WDS Main field and use the
to enter WDS
remote base stations.
FIGURE 42
When configuring a main
base station,
click the
button to enter
each base
station in a WDS
network in turn.
8. I recommend testing each base station as you add it by clicking
Update (at the lower right), waiting for the base station to reboot,
and then making sure clients can connect (if enabled) and bridge
on all attached units.
If WDS has failed to work, AirPort Utility will flash the light on the
front of an Extreme N amber while displaying an amber icon next
to the base station’s icon.
Troubleshooting by double-checking or re-entering: If
you have problems after following these directions, remember that
the frequency, channel, base-station password, wireless security
method, and wireless password must all be identical on every
WDS base station (Step 6). Failing that, ensure that the MAC
addresses were entered correctly on each base station, (Step 7).
Page 96
MIX LEGACY, NEW N NETWORKS
I expect that many readers of this book already have an AirPort
Extreme from 2003 to 2006, or another 802.11g gateway. If that’s
the case for you, you may be thinking of shutting down that network
in favor of a new one. But to achieve your greatest efficiency, I’d like
to suggest that you run two networks: one operating in 2.4 GHz and
handling computers and devices with 802.11b or 802.11g built in; the
other, an Extreme N using 5 GHz and handling only newer adapters.
This is especially worthwhile if you expect to move lots of files across
your network, or use Apple TV wirelessly, where you’ll need a lot of
unimpeded bandwidth to have video stream at its best quality.
Setting up a two-band network isn’t hard, particularly because the
Extreme N has an Ethernet switch built in. The goal state for the
network is shown in Figure 43.
FIGURE 43
The finished mixed network: The Extreme G and desktop Mac are
connected to the Extreme N’s LAN Ethernet ports. A PowerBook
connects via 802.11g to the older base station; a MacBook connects
using 802.11n to the newer base station. The Extreme N’s WAN port
is connected to the broadband modem, which is in turn a conduit to
the Internet.
Page 97
Update Your Older Base Station
Your older base station needs to have three specific settings changed
in order to work in this configuration:
• Its network name should make clear that it’s a distinct network.
• Connection Sharing must be set to Off (Bridging), so that the
existing base station doesn’t create a nested set of private network
addresses.
• The base station needs to obtain its address via DHCP from the
new 5 GHz base station.
NOTE If you already have a DHCP server running on a LAN, you can skip
connecting your existing base station to your new Extreme N base
station. The existing base station can obtain an Internet address
from your network’s DHCP server instead by being plugged into
any Ethernet switch on the network.
To configure and connect your old base station:
1. Launch AirPort Utility, select your existing base station, and
choose Base Station > Manual Setup (Command-L).
2. At the top of the window, click the AirPort icon, and then click the
Wireless button.
3. Change the Network Name to something descriptive, like Home
2.4 GHz or Old Slow Network.
4. Click the Internet icon.
5. From the Configure IPv4 pop-up menu, choose Using DHCP.
6. Select Off (Bridging) from the Connection Sharing pop-up menu.
7. Click Update to restart the base station with the new settings.
8. Now, plug an Ethernet cable from the WAN port of your 2.4 GHz
base station into any of the three LAN ports of the Extreme N.
Page 98
Wireless base station connections won’t work: While you
can connect two or more Apple base stations together via Wi-Fi
using Wireless Distribution System, that works only when the
base stations are using the same frequency band, channel, base
station password, and wireless security method and password.
See Bridge Wirelessly.
Configure Your New Extreme N
Next, you need to set up your Extreme N to use the 5 GHz band:
1. Launch AirPort Utility, connect to your Extreme N, and switch to
Manual Setup (Command-L).
2. Click the AirPort icon and then the Wireless button.
3. Enter a unique and descriptive name in the Network Name field,
like 5 GHz or Bust or Fast New Network.
4. From the Radio Mode pop-up menu, choose 802.11n only (5 GHz).
5. Click the Wireless Options button and check Use Wide Channels.
(This option is available only in certain countries, including the
United States.)
6. Click the Internet icon.
7. Make sure that Connection Sharing is set to Share a Public IP
Address (bottom pop-up menu).
8. Click Update to restart the base station.
Now you have two independent Wi-Fi networks operating at peak
performance without contention between them.
Put Printers in the Right Place
A number of readers of the first edition of this book wrote in after
reconfiguring their networks as described above because their printers stopped working. After some troubleshooting, we collectively
discovered that printers needed to be moved from the old 802.11g
network to the new Extreme N network to work reliably.
Page 99
A setting change was also needed. Follow these steps:
1. Unplug your USB printer from the old base station; you needn’t
power down the printer unless you also plan to move it.
2. Plug the USB printer either directly into the new Extreme N base
station, or into a USB hub that’s plugged into the base station.
3. Launch AirPort Utility, connect to your Extreme N, and switch to
Manual Setup (Command-L).
4. Click Printers on the toolbar, and confirm that the printer appears
in the list of printers shown.
5. If you are plugging the Extreme N into a larger LAN, check the
Share Printers over Ethernet WAN Port box so that computers on
that larger network can access the printer, too.
Page 100
REACH YOUR NETWORK REMOTELY
When you share an Internet connection among one or more computers on a local network using private addresses, you give up an easy
way to connect from the outside world to a service, like a Web server
or fileserver, that’s located on one of those local computers. Public IP
addresses allow anyone on the Internet to connect directly to a computer, barring any firewalls or other blocks in place, but private IP
addresses are specifically non-routable without a bit of extra work.
Extreme N and AirPort Utility mark a major breakthrough for Apple,
finally adding features that have been found in other gateways for
years, but adding the usual Apple twists: their products are later than
similar ones from competitors, but they are easier to use. You can
choose from three different methods of reaching your network from
the outside world:
• Basic port mapping and reserved addressing: While earlier
Apple base stations offered port mapping, a way to connect a public port on a routable address on the base station with a private
port on a locally connected computer, the Extreme N also lets you
assign addresses to local computers on a persistent basis—these
reserved addresses don’t change over time. When the base station
is restarted, or when the computer is restarted, the same address
is assigned to the computer once again.
This reservation system makes the whole mapping system work
consistently with less effort. I cover these options beginning on
the next page.
• Punch through from certain programs: A protocol from
Apple just starting to become more widely used, called NAT-PMP
(NAT plus Port Mapping Protocol), helps with port mapping
without requiring any special configuration on a computer or
a base station. You can find out more in Punch Through from
Certain Programs.
• Use one computer as your default host: There’s a coarser
way to make NAT work, too, allowing a single computer behind
the NAT gateway to act as if it’s directly connected to the Internet.
I describe the default host option in Set a Default Host for Full
Access.
Page 101
Map Ports for Remote Access
Port mapping relies on network address translation (NAT), which
I’ve noted only in passing previously in this book. NAT acts as a
gateway between a WAN IP address for a router reachable from a
larger LAN or the public Internet, and the private addresses hidden
behind NAT on the base station’s LAN.
NAT maps private to public connections
When a computer within the LAN wants to connect to the Internet,
the NAT software creates an association between that computer’s
outgoing connection and a public port on the WAN IP address of the
base station. (I talk more about Ports in a sidebar on the next page.)
When, for instance, a LAN-connected computer wants to retrieve
a Web page, that computer might send a request from its IP address
(192.168.1.100) using port 5509. (Ports for outbound connections
are arbitrarily numbered above 1024.) The NAT server receives that
connection and creates a request over the Internet using the WAN IP
address and typically a different port. So the NAT gateway’s request
might originate from a public address such as 36.44.0.6 with a port
of 12087.
The Web server receiving the request doesn’t know about the original
computer behind the NAT. Rather, the Web server responds by sending HTML for the requested Web page to port 12087 on IP 36.44.0.6.
The NAT server retains a list of associations between public and private ports and addresses, and hands that Web connection over to the
machine that originally requested it. This process is ugly, but it works
reliably, almost all the time.
Port mapping maps public to private connections
With port mapping, you create a persistent connection that allows
computers outside the LAN to connect to computers inside the LAN.
This port mapping lets you expose very limited services in a way that
you fully control.
When you map a port, you make the gateway connect one of its
Internet-accessible ports to the same (or a different) port on a
computer on the otherwise-private inside network.
Page 102
PORTS
Every kind of network server you might run, including a personal
Web server and your side of a multi-player online game, uses a
port to communicate with the rest of the machine, network, or
world. A port number in Internet networking can be compared to
an apartment number in a typical postal mail addressing system:
a computer has an IP address just like an apartment building has
a street address, and each kind of service used by a computer has
a port number, just like each apartment has its own number
within the building.
With ports, it’s as if every apartment building had the manager in
unit 1, the mailroom in unit 25, a lounge in unit 80, and so forth.
Ports are consistent for the same services on whatever machines
those services are running on.
Taking it one step further, if you have a static IP addresses, that’s
like having a street-front address. In contrast, NAT-provided
private addresses are like buildings within a gated compound,
where nobody on the outside knows the building numbers on the
inside.
If you were inside the compound, you might carry a letter to
be mailed to the outside world to the compound’s mailroom, and
the mail carrier would pick up your letter from there. Return mail,
addressed to a mailbox number in the mailroom, is delivered only
to that outer mailroom, where you can receive it without leaving
the compound.
Warning! Anything you do to punch through ports or computers
from the private network to the outside world reduces your
security. Be careful about what you leave open. You may want
to provide better security on computers that you expose in this
fashion by installing active firewall and intrusion-monitoring
software.
Page 103
INSTANT MESSAGING WITH NAT
You might wonder how software like iChat and Skype works
behind a NAT gateway, because it seems like they have two-way
communication where it shouldn’t be possible. Both systems hide
the fact that central servers are involved in connecting chatters:
• iChat: In iChat, the central server is run by AOL, as iChat is
part of the AOL Instant Messenger network. Each person using
iChat connects to the AIM server, which maintains a persistent
connection to iChat using the channel that iChat opened up.
The server coordinates among everyone chatting to move
messages among all those connections.
• Skype: Skype uses a different method, because it’s
decentralized. Instead of using one central server, Skype uses
what it calls supernodes, or Skype clients on publicly reachable
IP addresses that can coordinate connections among NATconnected Skype users. Your computer can be picked as a
supernode without you ever knowing it, but because the system
is so distributed, that shouldn’t affect any given user unduly.
This is also how services like GoToMyPC and LogMeIn work,
where you can remotely connect to a Windows computer when
on the road: the software on the computer maintains an open
connection to the remote-control firm’s servers.
Once you’ve created a mapping, the gateway listens for traffic on the
specific port on its public, WAN interface. When traffic arrives and a
connection needs to be opened, the gateway reroutes the traffic from
that public interface port to the appropriate private address on its LAN
interface, whether that’s a Wi-Fi LAN or a wired LAN (Figure 44). In
the figure, I show the example of operating a Web server and playing
Half Life behind a NAT gateway.
Using port mapping reliably has two parts: set a persistent private
IP address for a computer on the LAN, and then set a persistent port
mapping between a port on the base station and a port on the LAN
computer.
Page 104
FIGURE 44
One user on a laptop is playing Half Life over the Internet; another
computer on the network is running a Web server. When a user in
Kuala Lumpur requests a Web page, the gateway maps the incoming
request on port 80, the standard port for Web servers, from its public
address to the Web server’s private address. Likewise, when traffic
needs to run over port 27015, the standard port for Half Life, the
gateway connects traffic from a player at Indiana University with
our network’s laptop user.
Set a reserved address
Before the Extreme N, you had to use a variety of complicated workarounds to maintain a private NAT-enabled address on an AirPort
network. Now, you can create this with just a few keystrokes and
clicks.
For each computer with which you want to use port mapping, you
should create a DHCP reservation, which I describe fully in Reserved
addresses, earlier.
Page 105
I recommend creating a text file or other simple list that contains
a list of your computers in some descriptive way—the owner or its
unique name—and the corresponding reserved addresses.
Once you’ve reserved addresses, you can set up effective port
mapping.
Dynamic addresses don’t cut it: Port mapping ties a public
port to a specific private IP address, so if you don’t use a DHCP
reservation, you can’t easily keep port mapping working without
constantly making changes to the Extreme N configuration and
restarting—which changes the IP addresses assigned
dynamically!
Set base-station-to-computer port mapping
To use port mapping, you need to know which ports to map! This
can be trivial. You could map port 80 on the public side to port 80
on a given computer on the private LAN, and establish a Web server
connection, for instance. For games, streaming media, and other
purposes, you might need to set up a bunch of ports.
Let’s look first at the simple example of setting up that Web server,
along with setting up ports for other services. First, we need to configure the firewall on the computer that’s acting as a Web server. The
firewall protects the computer from unwanted inbound connections,
and must be set to allow the ones you do want. Second, we need to set
up the base station to pass traffic to the newly configured port.
Running a Web server in non-server versions of Tiger:
1. Open the Sharing preference pane, and click the Firewall button.
2. Look at the upper left corner of the Firewall view. If you see
Firewall Off, click the Start button.
3. To allow inbound Web server requests, make sure Personal Web
Sharing is checked. (If you’re using Apple’s built-in Web server,
the firewall On box for Personal Web Sharing is checked
automatically.)
4. To allow requests for other ports or for a non-Apple Web server,
click the New button, choose Other from the Port Name menu,
and fill out the entries for ports as discussed a few pages ahead in
Configure the Extreme N for other ports.
Page 106
Running a Web server in Windows XP and Vista:
Typically, you use third-party firewall software for added security,
and these packages allow you to enter exceptions for particular ports,
such as port 80; read their instructions for details. But Windows XP
and Vista each come with a built-in firewall package that you can
configure quite simply:
1. Open Control Panel from the Windows menu.
2. Open Windows Firewall.
3. In Windows Vista, click Change Settings to the right of the
Windows Firewall text, and then click Continue when prompted.
4. In the General pane, make sure the firewall is set to On, and Don’t
Allow Exceptions should be unchecked.
5. In the Exceptions pane, click Add Port.
6. Enter Web Server in the Name field, and 80 in the Port field.
7. Click OK, and then OK again.
Configure the Extreme N to pass through to the Web server:
With the server set up to accept connections, we now can configure
the Extreme N in this fashion:
1. Launch AirPort Utility, select your Extreme N, and choose Base
Station > Manual Setup (Command-L).
2. Click the Advanced icon at the top of the window, and then click
the Port Mapping button.
3. Click the
button to bring up the Port Mapping Setup Assistant
(Figure 45).
Page 107
FIGURE 45
After you
choose
Personal
Web Sharing
from the
Service popup menu,
the correct
ports are
entered.
4. From the Service pop-up menu, choose Personal Web Sharing
(really, this means any kind of Web server). (For a more advanced
network setup, described on the next page, enter all the necessary
ports in this step.)
5. Enter the reserved IP address in the Private IP Address field. (You
can edit only the last number of the IP address, as the first three
numbers are set in DHCP configuration.)
6. Click Continue.
7. In the next screen, enter a description for the entry so you can
recall later what you meant by it.
8. Click Done.
9. Click Update to restart your base station with this setting.
After restarting the base station, you should attempt to make a connection from outside your network to the service you enabled, or have
a friend or colleague initiate the connection. If the connection doesn’t
work, make sure the firewall on the computer running the service is
configured correctly.
Page 108
TIP ONE PER PORT
Here’s the tricky part. If you want to run Web servers on different
computers on your private LAN, you can’t simply map public TCP
port 80 to several computers. It won’t fly. Instead, you can use
different public ports; however, then visitors who type in a domain
name as the Web address can’t reach your alternate-port servers.
You should reserve using alternate-port servers to special purposes
or servers available only by clicking a link.
All Web browsers can specify a Web server not just by domain name,
but also by port, in the form http://serveraddress.com:0, such
as http://tidbits.com:8001.
Say you have two private Web servers, both receiving connections
on port 80. Using port mapping, you would set one’s public port
to be port 80, and the other to be something like 8000 (a typical
alternative Web server port). In port mapping, you would map port
80 to one private IP address’s port 80, and port 8000 to the other
Web server’s private IP address at port 80. This avoids having
to make any changes on the Web server, and renders the sites
completely reachable.
Configure the Extreme N for other ports:
We won’t all run Web servers on our private networks, however,
so let’s look at the options in the Port Mapping Setup Assistant more
closely (Figure 45, previous page); these settings are nearly identical
to those used when adding new ports to Tiger’s firewall, too:
• Service: This pop-up menu is prefilled with the ports needed for
many common services, like FTP for file transfer and SMB/CIFS
(Windows File Sharing). If what you need isn’t in that list, you
have to look further.
For games and other more complex services, read the documentation for the game or program, which typically describes the portmapping settings needed. You can also consult this extensive list:
http://www.practicallynetworked.com/sharing/app_port_list.htm.
• UDP and TCP: These two different kinds of packets can be carried
over an IP network. UDP (User Datagram Protocol) is often used
for streaming media, while TCP (Transmission Control Protocol)
Page 109
handles Web and other kinds of connections. Any service you might
want to use could have a combination of UDP and TCP ports.
• Port(s): Each field for entering ports can handle a single number
or a range as two numbers separated by a hyphen. You can have
multiple numbers or ranges separated by commas. For instance
407, 1216-1300, 6000-7000 would be a legitimate entry.
• Bonjour advertising and service type: You can use Bonjour
network discovery to allow access to various services by name
via the WAN port. Typically, this means that in a program that
supports Bonjour, like Safari, any Web site that you offered up
via port mapping would appear in the browser’s list of Bonjouradvertised Web sites. (In Safari, choose Bookmarks > Bonjour,
and the program lists any Web sites available in this fashion.)
Punch Through from Certain Programs
Apple has developed a new protocol to help with port mapping
without requiring special configuration on a computer or a base
station: NAT-PMP (NAT plus Port Mapping Protocol) lets properly
enabled programs on a computer on the LAN part of a base station’s
network ask the base station for the base station’s public address.
This new service can then be available remotely via Bonjour or
through the WAN IP address.
NOTE Stuart Cheshire, an Apple employee, created both Bonjour (also
known as zeroconf for zero configuration, in the wider Internet world)
and NAT-PMP. I knew of him back when he was a grad student,
writing about latency for TidBITS: http://db.tidbits.com/series/1014.
You can read his Internet Engineering Task Force (IETF) draft of the
NAT-PMP spec at http://files.dns-sd.org/draft-cheshire-nat-pmp.txt.
To enable this feature, select your base station in AirPort Utility,
select the Internet pane, and, in the NAT view, check Enable NAT
Port Mapping Protocol. Click Update.
The downside to the NAT-PMP protocol is that each program must
have built-in support built in to work with the protocol. With regular
port mapping, software can be entirely unaware that it’s not exposed
to the Internet.
Page 110
Apple notes that for Macs behind NAT gateways, .Mac can sync its
mountable iDisk more easily with NAT-PMP turned on, because that
lets .Mac initiate remote connections to those Macs. With iChat AV,
Apple told me that NAT-PMP enables more reliable initiation of file
transfers when the feature is enabled on base stations on both ends.
There’s not yet widespread use of NAT-PMP, because it’s not found
in routers outside Apple’s. However, as Apple continues to sell its
routers in great numbers, it’s more likely that applications will enable
the feature.
Set a Default Host for Full Access
The alternative to creating reserved addresses and port mapping for
each service on each computer you want to expose from your private
network is to appoint a single computer as your public machine. This
exposed machine could serve any kind of service over any port without the necessity of adding port mapping rules. If one computer runs
FTP, Web, and Samba servers, and no other computers on the LAN
have any public services, this might be the right option.
Apple calls this machine the default host; other gateway makers call it
the DMZ host. You must share an IP address over DHCP and NAT for
this option to be available.
Warning! If your Extreme N has a public IP address, your
default host is as exposed as if it were on the public Internet.
You should still use DHCP reservation to maintain the computer’s
private address over time; see Reserved addresses.
To set up a default host, follow these steps:
1. Launch AirPort Utility, select your base station, and choose Base
Station > Manual Setup (Command-L).
2. Click the Internet icon at the top of the window, and click the NAT
button.
3. Check the Enable Default Host At box and enter the last number in
the IP address for your default host (Figure 46).
Page 111
FIGURE 46
To set up
an exposed
computer,
check Enable
Default Host
At and enter
the private
IP address’s
last number.
4. Click Update to restart the base station with these settings.
Page 112
SET UP A SHARED USB PRINTER
With a base station set up to handle local computers and hooked into
the Internet, your next step may be to attach a USB printer to the
base station so that it can be shared among all the local computers.
TIP ADDING TWO USB DEVICES
To attach more than one USB device to the base station, such as a
USB printer and a hard disk, or more than one of either, you need
to attach a USB hub to the base station, and then attach the devices
to the hub. I recommend a Hi-Speed powered hub that uses external
AC power; this ensures greater reliability.
Add a Printer
For each printer you want to attach to the Extreme N:
1. Plug the printer into the base station or USB hub. You should not
need to reboot your base station for it to recognize the printer.
2. Give the printer a custom name and share it over a larger LAN or
the Internet; see “Rename and Widely Share a USB Printer,”
(below).
3. As needed, configure recent Macintoshes to connect to the printer;
Add a Shared Printer in Mac OS X explains how.
4. As needed, configure Windows XP and Vista machines to connect
to the printer; Add a Shared Printer in Windows XP and Vista has
instructions.
Rename and Widely Share a USB Printer
Your first task in setting up a printer is to get it working with respect
to your base station. You can assign the printer a custom name that
appears on the network during set up. Follow these steps:
1. Launch AirPort Utility and connect to your base station, and
choose Base Station > Manual Setup (Command-L).
2. At the top of the window, click the Printers icon to open the
Printers pane (Figure 47).
Page 113
FIGURE 47
You can
change a
printer’s
name as it
appears on
the network.
3. Enter a name for the printer in place of the default name, or leave
the name that AirPort Utility prefilled in place. This name will
appear in the Print dialog when you select a printer or print.
4. Check Share Printers over Ethernet WAN Port to make the printer
available to other computers on a larger LAN (and even over the
Internet if the Extreme N has a public IP address).
5. Check Advertise Printers Globally Using Bonjour to make the
printer browsable over a larger LAN (outside the base station’s
private network) from all Mac OS X machines, and from Windows
machines with Bonjour installed.
6. Click Update to save this change and restart the base station.
NOTE Apple briefly offered a list of supported USB printers when this
shared capability first appeared, but they withdrew this list years
ago when it became, in their words, “unwieldy” to maintain. If the
steps above don’t work, your printer may be unsupported—for more
info, read the last suggestion in Troubleshoot an Unavailable Shared
USB Printer (ahead about six pages).
You should also consult iFelix’s unofficial list of USB printers
that work with an AirPort Extreme or Express base station at
http://www.ifelix.co.uk/tech/1013.html for the Extreme 2003
and at http://www.ifelix.co.uk/tech/8013.html for the Extreme N.
It contains the original Apple list supplemented with details from
readers of the page and tested by iFelix’s maintainer.
Page 114
Add a Shared Printer in Mac OS X
Follow these steps to set up printing from a Macintosh running
Jaguar (you need at least Mac OS X 10.2.7), Mac OS X 10.3 Panther,
or Mac OS X 10.4 Tiger to a shared USB printer:
1. Open your printer utility from the /Applications/Utilities
folder. In Jaguar, it’s called Print Center. In Panther and Tiger, it’s
called Printer Setup Utility.
2. Click the Add icon.
3. Now:
• In Jaguar and Panther, choose Rendezvous from the top pop-up
menu. Then, find your printer in the resulting list, select it, and
click Add.
• In Tiger, click the Default Browser icon at the top, if it’s not
selected already.
Your printer should appear in the list. However, if your printer
doesn’t show up, try the suggestions offered ahead in Troubleshoot an
Unavailable Shared USB Printer.
Now, your printer connection is set up. You can print from any
application offering a Print command—just choose the printer from
the Printer pop-up menu in the Print dialog.
NOTE You can also add a printer from the Print dialog. From the Printer
pop-up menu choose the printer from the Shared Printers submenu,
if it’s there. If not, then choose Edit Printers or Add Printer (which
command you see depends on the version of your operating system).
After you add the printer, it shows up in the list of printers in the
Print pop-up menu.
Warning! Don’t choose the printer from the Shared Printers
submenu again, or you may create yet another instance of the
printer!
Page 115
Add a Shared Printer in Windows XP and Vista
We can do it the hard way or the easy way. Let’s try easy first: Bonjour
for Windows! (I recommend Bonjour because it is easy to set up, but
if you prefer to not install additional software, I also give directions
for setting up a printer without Bonjour in Windows XP and Vista,
ahead.)
Apple lets you add Bonjour network resource discovery in Windows
XP and Vista with the free, downloadable Bonjour for Windows
package from Apple at http://www.apple.com/support/downloads/
bonjourforwindows.html.
Once you’ve installed the package, make sure your printer is turned
on and follow these steps to add printers shared by the base station:
1. Launch the Bonjour Printer Wizard and click Next.
2. Select a printer and click Next.
3. Choose a printer driver if one hasn’t been selected automatically
for you, and click Next.
4. Click Finish to install the printer.
The printer is now available to all applications.
Add a shared printer in Windows XP
The following advice comes in general form from Mac OS X Hints
(http://www.macosxhints.com/), a great Web site for technical
advice. I was initially stymied in my attempt to convince my Windows
XP box to print to a shared USB printer, and the advice on Mac OS X
Hints was of great help in getting started. Here are the steps, which
you should follow after making sure your printer is on:
1. From the Control Panel, open Printers and Faxes.
2. From Printer Tasks in the list of tasks in the left navigation bar,
click Add a Printer.
3. The Add Printer Wizard appears. Click Next.
4. Select Local Printer Attached to This Computer. Uncheck Automatically Detect and Install My Plug and Play Printer. Click Next.
Page 116
5. Select Create a New Port (near the bottom of the screen). Choose
Standard TCP/IP Port from the pop-up menu, and click Next
to launch the Add Standard TCP/IP Printer Port Wizard.
6. Click Next again to show the Add Port screen.
7. For Printer Name or IP Address you have two choices, depending
on whether the Windows machine is connected via Wi-Fi or
Ethernet to the base station LAN, or is outside that LAN (either
on a larger LAN or remotely printing over the Internet):
• Within the base station LAN: Enter your base station’s
LAN network address—this is the first three numbers in your
DHCP address range with a 1 in the fourth number’s position,
like 10.0.1.1.
• Outside the base station LAN: Enter the base station’s
WAN IP address.
Leave Port Name alone; Windows will fill it in for you. Click Next.
8. On the next screen, choose Hewlett Packard Jet Direct from the
pop-up menu next to the Standard radio button. I don’t know why,
but Mac OS X Hints found that it works. We obey. Click Next.
9. Click Finish to return to the first wizard. From the list of manufacturers and printers, select your precise model. Click Next.
10. The final screen has you name your printer. By default, it uses
the name from the model type in the previous screen. You can
enter a new name if you’d like, however. Select whether or not
you want this printer to be your default by clicking the Yes or
the No radio button. Click Next.
11. Leave the Do Not Share This Printer radio button selected unless
you want this computer to share the printer to other computers,
which makes no sense given that it’s already a shared printer,
right? (If you must be contrary, click the Share Name radio button
and enter a name.) Click Next.
12. Choose to print a test page by leaving the Yes radio button
selected, which is the default, and click Next.
13. Finally, click Finish.
Page 117
14. Walk over to your printer, and see if a test page was printed.
If the page printed, you’re ready to go. If not, check through the
preceding steps to make sure you configured everything correctly
or try the suggestions in Troubleshoot an Unavailable Shared USB
Printer, two pages ahead.
Add a shared printer in Windows Vista
Vista streamlines the process of adding a shared USB printer to a
Windows setup, though not as much as Bonjour (covered a few pages
earlier). Here are the steps, after making sure your printer is on:
1. From the Windows menu (the icon in the lower left of the screen),
click Control Panels.
2. Double-click Printers.
3. From the menu bar at the top, click Add a Printer.
4. Click Add a Network, Wireless, or Bluetooth Printer.
5. After a moment, the printer should appear in the list of available
printers. Select it and click Next.
(If the printer doesn’t appear, skip ahead to “Additional Steps,”
next page.)
6. Vista now contacts the printer to obtain the printer’s information,
such as its name. If all is well, Vista will suggest you use a currently
installed driver for the printer. Click Next.
7. If you want the printer to appear in Vista with a different name,
enter that name. Click Next.
8. Click Print a Test Page. Then click Close in the test page window
and Finish in the Add Printer wizard.
If the page printed, you’re all set. If not, go through the preceding
steps again to make sure you configured everything correctly or try
the suggestions in Troubleshoot an Unavailable Shared USB Printer,
two pages ahead.
Page 118
Additional Steps
If your printer didn’t show up in Step 5, continue with these steps:
1. Click The Printer That I Want Isn’t Listed.
2. Select Add a Printer Using a TCP/IP Address or Hostname, and
click Next.
3. In the “Hostname or IP Address” field, enter an address based on
your Vista computer’s position in the network: connected via Wi-Fi
or Ethernet to the base station LAN, or outside that LAN (either on
a larger LAN or remotely printing over the Internet):
• Within the base station LAN: Enter your base station’s LAN
network address—this is the first three numbers in your DHCP
address range with a 1 in the fourth number’s position, like
10.0.1.1.
• Outside the base station LAN: Enter the base station’s
WAN IP address.
Leave Port Name alone, as Vista prefills it as you type. Click Next.
Vista tries to find the appropriate printer driver. In my testing, it
fails at this stage, and requires manual selection. If Vista succeeds
in finding the right driver, resume at Step 7 on the previous page.
4. Otherwise, in the screen that results—Additional Port Information
Required—choose Hewlett Packard Jet Direct from the Standard
pop-up menu. (Don’t ask why; just do it!) Click Next.
5. Now:
• If your printer maker and model show up in the list, first select
the maker on the left and second the model on the right; then
click Next. Leave Use the Driver That Is Currently Installed
unchecked, and click Next.
• If you don’t see your printer maker and model listed, insert a
disk that came with the printer and click Have Disk to install a
driver that way. Click Next and follow the resulting directions.
6. Resume at Step 7 on the previous page!
Page 119
Troubleshoot an Unavailable Shared USB Printer
If you followed the directions earlier in this section and you can’t
print to your shared USB printer, one of the following suggestions
should shed light on the problem:
• Make certain that the printer is powered up and not in an error
condition (such as out of paper or out of ink).
• Make sure your computer is on the same network as the base
station (on the computer, launch AirPort Utility and make sure
the base station appears in AirPort Utility’s left-hand list of base
stations).
• Make certain the base station recognizes the printer: use the
instructions in Rename and Widely Share a USB Printer.
• Using AirPort Utility, restart the base station and try again.
• Consult the suggestions from Apple at http://docs.info.apple.com/
article.html?artnum=107418. Note that the last suggestion, under
“Still not working?” is to confirm that your printer is able to work
with AirPort printer sharing. Apple has linked to Lexmark and
HP’s list of compatible printers.
Page 120
SET UP A SHARED USB DISK
Extreme N adds an interesting option for sharing disks across a
network without attaching them to a computer. The base station can
share attached drives over a network both via the standard Apple
Filing Protocol (AFP) format, the same format used with Personal
File Sharing and Mac OS X Server share files, and via Samba, a
network file-sharing service compatible with Mac OS X, Windows,
and Linux.
Warning! There’s no way to share volumes via either only AFP
or only Samba; you have to share through both.
You can connect a single drive to the USB port on the Extreme N, or
connect a USB hub and then a series of drives to the hub. The drives
may be hard drives or USB thumb (flash) drives, but you cannot use
CD/DVD drives with removable media.
You must format mountable disks before you attach them to the base
station, using either the Mac HFS+ format, or the FAT16 or FAT32
(MS-DOS) formats. Each partition on a disk becomes a separately
available shared volume. (FAT16 supports smaller maximum partition sizes than FAT32; you’re unlikely to see FAT16 except on disks
formatted by very old computers.)
Warning! Before you format anything, read Grant Access,
ahead, to learn the quirks that can arise with different formats
and different types of access.
Warning! Unix, Microsoft NTFS, and other partition formats
are not supported.
Once one or more drives are connected, you can access them and let
others access them, too. You handle all the configuration in AirPort
Utility in the Disks pane.
Page 121
Slow Speeds Ahead! The performance of base-stationconnected drives is slow to creeping, when compared to network
throughput and to the speed of reading and writing to a drive
connected to a computer.
In my tests of the Extreme N (gigabit), I saw speeds about onethird that of directly connected USB drives when transferring
larger files. When I copied 8,000 tiny HTML files—documentation
for a program, the transfer speed dropped to below 10 percent
of directly connected USB. This is partly due to inefficiencies
in copying many small files in AppleShare File Protocol (AFP),
and partly due to the low-power, but adequate, processor in the
Extreme N (both models). For networks in which speed is an issue,
use a computer-based fileserver or dedicated network-attached
storage (NAS) device.
DISKS, PARTITIONS, VOLUMES, FILES & FOLDERS
Here’s a guide to file-sharing concepts that you need to understand in
order to make sense of this section:
• Hard disk: A hard disk is a physical piece of hardware that
contains data.
• Partition: A partition is a division of a disk’s available storage
into a separate logical compartment—part of the physical disk is
written with certain kinds of data, and a disk-wide partition map
is updated to reflect that partition information. Many disks have
a single partition that spans the entire disk’s storage capacity.
The partition’s format—like HFS+, FAT16/32, or NTFS—
determines how data is written to the disk; each operating system
supports a different set of formats.
• Volume: While volume is a synonym for any partition on a disk,
I like to use shared volume to mean a shared partition that can be
mounted over a network in the context of file sharing. A fileserver
is a device that has one or more volumes available to share.
• Files and folders: Any format you deal with stores files inside
folders, the latter also known as directories. With some systems,
you can share folders as volumes. In some cases, Extreme N makes
folders into volumes, so that you can control access more finely, as
described ahead.
Page 122
Viewing Connected Volumes
In AirPort Utility, the Disks view in the Disks pane offers a little
information and one option. Each disk connected to the base station
is noted in a list on the left, and each partition on that disk is found
by clicking the triangle next to the disk name (Figure 48). Selecting
a partition reveals the capacity of that partition, the used and remaining storage, and how many users have mounted the partition.
FIGURE 48
In this example, AirPort Utility shows two partitions for the drive
attached to the base station. Selecting the partition shows storage
information and connected users.
Clicking Disconnect All Users shuts down all file service, forcing
connected users’ computers to lose a connection with mounted
volumes no matter whether they have open files or transfers in
progress, so click it with care. It’s better to have each user (or you)
unmount each connected volume first. If you do disconnect users
by clicking the button, Mac OS X warns you in AirPort Utility and
informs each user with an alert message (Figure 49). This button
appears even if no users are connected.
When no users are connected, the drive is in a standby state that lets
you unplug it from the Extreme N without harm.
Page 123
FIGURE 49
Clicking
Disconnect All
Users brings
up the warning
(top) about the
consequences
to users still
working on data
stored on those
drives.
If you want to
bump working
users off,
however,
AirPort Utility
obliges and Mac
OS X complains
(bottom).
Grant Access
Apple offers relatively little granularity in setting up security and
access for hard disks you connect to an Extreme N. You can choose
only one of three methods for setting passwords, and you can’t set
permissions individually for folders or files on each hard disk, nor set
permissions differently for different partitions or different hard disks.
Kinds of access
AirPort Utility has three ways to grant access, found in the Disks
pane, in the File Sharing view, in the Secure Shared Disks pop-up
menu (Figure 50).
Page 124
FIGURE 50
AirPort
Utility offers
three options
for securing
a shared
disk by
controlling
the level of
security.
The three ways to grant access are:
• With Base Station Password (default): This self-explanatory
option is the default method, and means that only a single password is used to secure the base station’s settings and any attached
hard disks. This option is good for home and small networks in
which you’re not concerned about someone changing the settings
on a base station.
• With a Disk Password: This sets a password that controls
access to all disks; this password is distinct from the base-station
password. All users accessing the disk have access to all files. This
works for a small network where you want to make sure those with
fileserver access can’t modify the base station, even unintentionally.
• With Accounts: On partitions formatted with HFS+, you can
set up individual user names and passwords, each with different
levels of access; these accounts are distinct from any Mac OS X or
Windows user accounts set up on the computer that’s configuring
the base station. An Accounts button appears, and you can click
it to add and edit users. User access options can be set to Read
and Write, Read Only, and Not Allowed. (That last option lets you
disable an account without removing it.)
Page 125
Accounts are useful for larger networks, but they are a new feature
and still have some quirks that I hope Apple will work out soon:
◊
No directory services: You can’t yet tie in network directory
services with this option, so accounts must be entered one at a
time and manually updated.
◊
Inconsistent partition-to-account matching: With
partitions formatted using HFS and named accounts, you can’t
choose which HFS+ partition winds up containing the userspecific account folder. In my testing, it seemed arbitrary, and
even moved from partition to partition after changing seemingly
unrelated settings and restarting the base station. All other
partitions formatted with HFS+ are served as single, wholepartition volumes, which is a related bug or missing option.
This could result in the strange circumstance in which you
attach a 1 terabyte (TB) disk drive and a 1 GB flash drive to
your Extreme N, and the unit puts user accounts on the smaller
drive. I expect Apple will add an option to select the volume
on which user accounts are created to solve this.
Single drive, no worries: With a single hard disk that’s
formatted in HFS+, you won’t see this problem.
Paired with each of the three ways to grant access is the Guest Access
pop-up menu. You can set those without a password to have full
access, read only, or no access.
Other network settings for file sharing
You can limit access to what network or part of a network is available
through two related checkboxes beneath Guest Access:
• If you check Share Disks over Ethernet WAN Port, other
computers on a larger network or the Internet can access your
base-station fileserver.
With the Share Disks box checked, you can also check Advertise
Disk Globally Using Bonjour. This option has risks, too, as it ties in
your fileserver access with a globally registered domain name that
could expose you more broadly than you intend.
Page 126
Warning! If you enable WAN access and the Extreme N has a
public IP address, you are exposing your files to a larger potential
audience of crackers and ne’er-do-wells, so it becomes critical to
set guest access appropriately. Or, you can use a firewall between
the Extreme N and the larger world to provide additional access
control, such as limited fileserver access to particular IP ranges
that represent other locations you work for or remote offices.
• The other option in this section lets you configure Windows
File Sharing—more frequently called Samba—by naming the
Workgroup and choosing a WINS Server. The Workgroup name
allows other Samba-capable computers to organize fileservers into
a group for display. The WINS server, if there’s one on your network, provides a separate name-based association for Windows
computers to the IP address on your base station.
Gain Access
You or users on your network can access disks connected to an
Extreme N in two ways:
• With the new AirPort Disk Utility, which can identify drives as they
appear using Bonjour
• With normal file-sharing connection options, such as Connect to
Server in the Mac OS X Finder
Before we look at methods of accessing shared disks, though, we need
to figure out precisely which volumes are mounted based on the
settings on a given base station, the disk’s format, and what kind of
access you’re attempting to gain. I lay out the options in Table 4,
because they’re too baroque to explain conversationally.
Page 127
Table 4: Comparing Methods of Serving Shared Disks
Access
Control
Access
Method
Base station
or disk
password
Password The entire volume is served. Users mount it as a volume
having the partition name.
Guest*
A folder named Shared** is served as a volume. Users mount
it as a volume having the partition name.
Accounts
Account
HFS+-formatted partition:
How Partitions Are Served
• A folder named with the account is created on only one
partition, no matter how many HFS+ partitions are
attached; users mount this folder as a volume having the
account name.
• A folder named Shared is also created on one partition,
and users mount it as a volume named with the partition
name.
• Any other partitions are served as volumes named with
the partition name.
FAT 16/32-formatted partition:
• A folder named Shared is served. Users mount it as a
volume having the partition name.
Guest*
A folder named Shared** is created on each partition, and
users mount it as a volume named with the partition name.
* If Guest Access is set either to Read and Write, or to Read Only.
** The shared folder appears on the disk, viewable as a folder only by users with a password,
only after the first guest accesses the volume.
AirPort Disk Utility
The AirPort Disk Utility program makes it convenient to identify
base stations that are sharing hard disks. That sounds great at first,
but the utility has few advantages over other ways of accessing shared
volumes. (Versions are available for both Mac and Windows; I cover
the interface for Mac OS X here.)
Page 128
When you install the utility (see Install new software, earlier), you
can turn on a status menu that lists each base-station fileserver
(Figure 51). You can also remove this menu, and turn off automatic
notification when new shared volumes are added to any base station
on the network (Figure 52).
FIGURE 51
The AirPort Disk menu shows all base
station fileservers.
FIGURE 52
AirPort Disk Utility lets you set notification and menu preferences,
as well as allowing you to change the way you connect to base
station fileservers.
If you don’t change the utility’s default, when a new volume is added,
you’re prompted to act on it; the same is true if you choose the basestation fileserver name from the AirPort Disk menu. A dialog appears
(Figure 53) that wants to know your action:
• Ignore: Don’t notice if this volume appears in the future.
• Connect as Guest: No password required, but you can view only
shared files. (This option doesn’t display if Guest Access is set to
Not Allowed in AirPort Utility.)
• Connect with Password: This option shows up with a Username
field if, on the base station, Secure Shared Disks is set to With
Accounts; or as just a Password field otherwise.
Page 129
FIGURE 53
AirPort Disk
Utility displays
these options
for mounting
all volumes
connected
to a base
station.
There’s no way to tell AirPort Disk Utility to mount a single volume,
which makes the tool less than ideal if you need only a single volume.
If you want to mount all volumes at once or have only a single partition, then the utility is fine. Otherwise, I recommend using normal
volume mounting, described next.
Normal volume mounting
Fortunately for us, the file sharing in the Extreme N uses standard
methods: AFP, commonly known as AppleShare, and Samba,
Windows’s default method.
Stick to their own kind: The Extreme N fileserver shares only
HFS+ volumes as AFP volumes, while Samba can share either
HFS+ or FAT32 (MS-DOS) formatted partitions as SMB/CIFS
volumes.
Mount in Mac OS X
You can mount volumes in Mac OS X by following these steps:
1. In a Finder window, click Network in the sidebar, or choose Go >
Network (Command-Shift-K).
A list of connected servers appears in the Finder window, and the
fileserver should appear in the list twice: first as an AppleShare
fileserver and second as a Samba fileserver.
2. Double-click the base station’s fileserver name to open an
authentication dialog.
Page 130
3. In the Name field:
• If you don’t have a user account because the base station is
using base-station or disk passwords enter any short bit of text
or leave the field blank.
• If you have a user account name, enter it.
4. In the Password field, enter the base station, disk, or account
password.
5. Select the volume or volumes you want to mount and click OK.
If you are mounting a volume remotely or it doesn’t appear in Step 1,
choose Go > Connect to Server and enter the IP address of the base
station or an associated domain name (for FAT16/32 volumes, enter
smb:// followed by the IP address.) Then, follow Steps 3 to 5 above.
Mount in Windows
With Windows XP and Vista, open the network browser by doubleclicking Network on the Desktop. The base station name should
appear in the Network browser. When you connect, enter the name
and password as in Steps 3 to 5 above.
Page 131
SECURE YOUR NETWORK
If you use a wired network in your home, someone would have to
break into your house, plug into your Ethernet switch, and then
crouch there in the dark to capture data passing over your network.
Wireless networks have no such protection: anyone with an antenna
sensitive enough to pick up your radio signals can eavesdrop on traffic
passing over your network. This could be a neighbor, someone in a
parked car, or a nearby business. Many free, easy-to-use programs
make this a simple task for only slightly sophisticated snoopers.
However, you’re not powerless to prevent such behavior. Depending
on what you want to protect and whom you’re protecting against, you
can close security holes with tools that range from a few settings up
to industrial-grade protection that requires separate servers elsewhere
on the Internet.
But before I delve into the details of protecting yourself from snoopers, let’s look at whether you even need to turn on security.
Likelihood, Liability, and Lost Opportunity
When Adam Engst and I were writing The Wireless Networking
Starter Kit, Second Edition, back in 2003, we disagreed over how
concerned the average home Wi-Fi networker should be about
security. Adam came up with a great formulation that I agreed with
and want to walk you through. He calls it the three L’s of security:
likelihood, liability, and lost opportunity. This framework lets you
evaluate how much security—if any—you need for your network.
NOTE If you’d like to know more about the topics in this section, read
Take Control of Your Wi-Fi Security, a companion book we wrote.
Likelihood
The first aspect of security to consider is likelihood: how likely is it
that someone will violate your privacy, steal your data, or otherwise
exploit you? If you live in a lightly populated area, and no one could
easily come within range of your network without sitting in your
driveway, you probably don’t have much to worry about.
Page 132
But if you live in an apartment building with neighbors who could
pick up your connection, the likelihood of someone connecting to
your network rises significantly, raising the question of whether you
want to allow others to share your Internet connection or not.
TIP Because Wi-Fi and public hotspots (free and fee) go together like
coffee and cream, it’s very likely that you’ll use a laptop on a network outside your home, too. There are a whole different set of
concerns about the likelihood of someone snarfing your data and
passwords on hotspot networks as opposed to networks you set up
yourself. We address those concerns and how to solve them in Take
Control of Your Wi-Fi Security.
The likelihood of attack increases significantly if you’re running a
business, since it’s plausible that your network would carry desirable
information such as credit card numbers, business plans, and so on.
Also, most businesses are located in areas or buildings where someone could easily sit and hack into a network without being noticed.
Liability
What is the realistic liability if someone were to record all the traffic
that passed across your wireless network? For most home networks,
the amount of network data that’s at all sensitive is extremely low;
perhaps a credit card number being sent to an ecommerce Web site
that unusually doesn’t use SSL/TLS (Secure Sockets Layer/Transport
Layer Security, a security standard for Web servers), maybe financial
data, possibly some bits that would be embarrassing if made public.
Simply allowing someone else to use your Internet connection
has a relatively low liability in most cases. However, you may think
differently if you pay per byte, if you have a slow dial-up connection
that would be impacted by someone else’s use (with high speed DSL
and cable modem connections, you’re unlikely to notice another
user), or if you’re concerned that allowing someone else to use your
connection would be violating your ISP’s terms of service in a way
that was likely to result in you being disconnected. A few scary stories
have surfaced of police obtaining a warrant, knocking down a door,
and finding an innocent person or family who had an open access
point. (For one such example, see http://www.washingtonpost.com/
wp-dyn/content/article/2007/02/10/AR2007021001457.html.)
Page 133
Businesses are, once again, a different story. The likelihood of sensitive and confidential information passing through a business’s wireless network is much higher, of course, and the liability of an outsider
learning that information is significantly greater. For instance, rules
protecting patient information could lead to significant fines if
a medical office or hospital had its network compromised. And if
a competitor learned confidential business plans, the ramifications
could be catastrophic.
Lost opportunity
With home wireless networks, the opportunity cost for layering on
security comes mostly in the form of troubleshooting irritating problems, which is more necessary and harder when security is on, and
in the annoyance of dealing with passwords with new machines or
when you have visitors.
Companies, even small ones, may have fewer lost opportunities
because they might have a dedicated staffer or whole department
that deals with installing, maintaining, and supporting software to
promote overall security.
Your spot in the security spectrum
It’s up to you to determine the likelihood of someone breaking in
to your network and either using your Internet connection or eavesdropping on the data that flies by. Next, you must determine the
severity of the problems that could ensue from someone using your
bandwidth or using a network sniffer to record your data. Lastly,
you need to figure out what the lost opportunity of different levels
of security is: the higher the likelihood of attack and the higher the
liability if your network were to be invaded, the more you’re probably
willing to spend and the more annoyance you’re willing to endure.
Once you’ve worked through those three thought exercises, you can
determine just how much money and effort you should expend to
secure your wireless network. Now let’s look at how you might apply
such security precautions.
Simple Tricks That Don’t Work
You may have read suggestions for setting up basic security that
advise you to hide your network’s name and make it hard to connect
to, such as employing a closed network or using MAC address
filtering.
Page 134
Closed network
In a closed network, your base station stops broadcasting its network
name, or SSID (Service Set Identifier), as part of its beacon, an “I’m
here” message that access points regularly transmit in order to help
clients connect to them. However, the beacon continues to be sent
because it still includes information that is used for network data
synchronization.
An open network appears by name in the AirPort menu or in other
places in the Mac OS and Windows that show the names of networks
you can connect to. But closing the network makes it only slightly
obscure. A cracker can easily find out that the network exists, and by
monitoring for a connection or using a tool to create a disassociation
for a computer on the network—which forces that computer to reconnect—the cracker can grab the network’s name. So you cannot rely
on closing your network for any real security.
Although I discourage bothering with a closed network, here’s how
to set one up:
1. Launch AirPort Utility, connect to your base station, and choose
Base Station > Manual Setup (Command-L).
2. At the top of the window, click the AirPort icon. Then, click the
Wireless button.
3. Click the Wireless Options button.
4. Check Create a Closed Network.
5. Click Done, and then click Update to restart the base station.
MAC address filtering
MAC address filtering initially sounds more promising than a closed
network. With this method, you enter the MAC address of every
computer you want to allow to connect to your Wi-Fi network. If a
computer’s address isn’t in the list, then that computer can’t connect.
The flaw with MAC address filtering is that any cracker worth her
salt can easily monitor a network to see which MAC addresses are
able to access the network. She can then use simple software to
modify or clone the MAC address on her own network adapter,
thus gaining access.
Page 135
TIP If you use MAC address filtering and your network has multiple base
stations, each one must have the same list of allowed MAC addresses.
You can use AirPort Utility to save one base station’s configuration,
and then import just the MAC address controls, to your other base
stations. See Export and import configuration profiles.
If you don’t want to build a security fortress against crackers, but
you do want to mediate the access for kids in your house or you want
to clarify to outsiders that you’ve restricted access, MAC address
restriction works quite well. You can also combine encryption and
MAC address filtering for a pretty good overall solution.
The Extreme N adds another element to the mix: controlling access
by time of day and day of week for particular MAC addresses.
To restrict access, first note the MAC addresses for devices you want
to limit; see What and Where is a MAC Address? (p. 59). You can also
use AirPort Utility to extract the MAC address of a computer you’re
using to configure setup.
Warning! Don’t store the base station’s password in the
Keychain on a computer that you’re restricting via AirPort Utility.
Otherwise, later, someone on that computer could quite easily
reconfigure the base station to remove those restrictions!
NOTE If you use Wi-Fi Protected Setup (WPS) to allow computers to join
the network, but limit their access to 24 hours, an entry appears in
the access control client list with a special tag. See Use WPS for
more details.
To restrict access by MAC address on an Extreme N, follow these
steps:
1. Launch AirPort Utility, select your base station, and choose Base
Station > Manual Setup (Command-L).
2. Click the AirPort icon; then click Access Control and select Timed
Access.
3. Click the
button at the bottom of the access control client list.
Page 136
4. In the Timed Access Control Setup Assistant, repeat these steps for
each Wi-Fi device you want to restrict:
a. Enter the MAC address of the computer you want to add, or
click This Computer to fill the field with the MAC address of
the computer on which you are running AirPort Utility
b. Enter a description of the computer you are adding.
c. If you want to control access time, choose restrictions: Click
the
button to add an entry, or select an entry and click the
to delete it.
You can choose a day of the week, weekdays (Monday through
Friday), weekends (Saturday and Sunday), or Everyday. The
time of access is either All Day or a range in the current day.
You can’t set a range of time that spans two days; that requires
two separate entries. (The combination of Everday and All
Day would be an ineffective barrier to access!)
d. Click Done.
5. You should also edit the “(default)” entry in the access control
client list. It’s set at the factory to Unlimited. If you want to exclude
all computers that aren’t listed here from having any access, select
it, click Edit, and then choose No Access from the Day pop-up
menu. Click Done.
6. Click Update after you have added all the computers that you want
to restrict.
Now, only those computers on your network whose MAC addresses
you’ve entered may connect to the network. If one can’t connect,
check that you’ve set the access time restrictions correctly.
Use Built-In Encryption
Although MAC address filtering and a closed network will deter
casual passers-by, they don’t constitute a defense. If you want a better
defense, you need to step up to encryption and password protection.
Wi-Fi has always offered some form of built-in encryption to secure
the connection between a client computer or device and the base
station; this connection is the most vulnerable part of a wireless
network.
Page 137
Unsecured out to the Internet: The connection from the base
station to the rest of the network or the Internet has to be secured
separately from the Wi-Fi segment. Some people use virtual private
network (VPN) connections to secure a larger chunk of their traffic.
Encryption always requires a key. With Wi-Fi encryption, you don’t
enter the key directly, but instead enter a password that is used by the
system to generate or retrieve a key. Sharing the password reduces
security by allowing others to see the same network traffic.
Three different encryption methods have been offered since 802.11b
started appearing in hardware in 1999, each of which supersedes the
previous one. See Table 5 for side-by-side comparisons. I look at
each option in more detail next.
Table 5: Wi-Fi Security Compared
Name
What Can Use It?
Difficulties
WEP
Any Wi-Fi adapter using 802.11a,
b, or g, including the earliest
made
Encryption easily broken;
deprecated since 2003
WPA Personal
Works with original AirPort Card
(10.3 or later), and with many
early adapters with new firmware
Requires slightly newer computers
and operating systems; no Mac
OS 9 or earlier support
WPA2
Personal
Works only with gear shipped
starting in late 2002, including
AirPort Extreme, but requires
10.3 or later, or Windows XP SP2
or Vista
Older machines can’t connect,
including those with original
AirPort Card
WEP
Transitional
Allows mix of WEP and
WPA/WPA2 Personal
Doesn’t seem to work consistently;
doesn’t allow robust security
WPA/WPA2
Enterprise
Supported in Mac OS X 10.2 or
later, Windows XP SP2, and Vista
Requires back-end server to
handle account management
Page 138
WEP
WEP (Wired Equivalent Privacy) allows the use of a 40-bit or 104-bit
password, the equivalent of 10 or 26 hexadecimal digits, or 5 or 13
text characters, respectively. WEP was never designed to be very
strong, and cracks, or ways to retrieve the encryption key by watching
network data, started to appear in 2001. It’s acceptable for home use,
but I wouldn’t rely on it as a business.
You could use WEP to signal that your network is off limits. In some
U.S. states and in some countries that “no trespassing” intent could
result in an interloper between charged with a computer crime and
even convicted, as recent cases in Florida, Alaska, and Singapore
indicate.
WPA & WPA2 background
WPA (Wi-Fi Protected Access) was introduced by the Wi-Fi Alliance
as an interim measure when work by an IEEE committee—802.11i—
was taking too long. Released in 2003, WPA is considered to be quite
strong and was designed to allow even the earliest Wi-Fi gear to be
upgraded to support it. The original AirPort Card can use WPA with
Mac OS X 10.3 or later; see http://docs.info.apple.com/article.html?
artnum=107795 for Apple’s requirements and software links. (The
original 802.11b AirPort Base Station cannot be upgraded.)
WPA2 was the final version of WPA security that includes all the
work done in the 802.11i committee. WPA2 can use the weaker,
but still relatively secure form of encryption offered in WPA. But
WPA2 significantly adds a government-grade method favored by
corporations. Any equipment released in 2003 or later can handle
WPA2. The Extreme 2003 and 2007 and AirPort Express all handle
WPA2, but Mac OS X 10.3 or later is required to use it. The original
AirPort Card cannot access WPA2-protected networks.
Page 139
NOTE THE KEY TO KEYS
The difference between WPA and WPA2 is that the former offers
an encryption method that’s a repaired version of WEP, known as
TKIP (Temporal Key Integrity Protocol). WPA2 adds AES-CCMP
(Advanced Encryption System, Counter-mode CBC-MAC Protocol,
whew), which incorporates the U.S. government-backed AES
method limited to 128 bits. WPA2-enabled Wi-Fi adapters may
use either TKIP or AES-CCMP to connect.
The Extreme N can offer WPA/WPA2 protection, in which both older
and newer devices can join with either form of key; or it can offer a
WPA2-only network, in which only computers that support WPA2’s
advanced encryption key type can join.
NOTE On 802.11n networks that are set to use only 802.11n, WPA2 is the
minimum level of security. This makes sense because all 802.11n
devices must support WPA2.
Both WPA and WPA2 come in two versions: Personal and Enterprise.
The Personal versions allow the use of passphrases, long sequences
of text—minimum 8 characters, maximum 63 characters—that are
converted into the source material for generating an encryption key.
This makes a WPA/WPA2 passphrase memorable, and the length
adds entropy, the principle of adding greater disorder to make it
harder to use brute force to uncover a key. A key could look like my
d000gs have lite_brite_hair! I kid you not.
TIP Researchers believe that WPA and WPA2 keys are susceptible to
cracking through brute force if you choose passphrases that are
shorter than 20 characters and that contain only dictionary words.
Choosing short passphrases that combine a random assortment
of numbers, letters, and punctuation; or longer passphrases with
a few punctuation marks defeats this problem, as in the example
passphrase above.
The Enterprise flavor of WPA and WPA2 requires a server to manage
accounts, but simplifies access by letting people enter a user name
and password—one that might be shared for resources across a
Page 140
network, including fileservers—and receive a unique encryption key
that they never need to know about.
TIP Even small offices might like to use WPA/WPA2 Enterprise, and
a few companies offer affordable ways to add it to an Extreme N:
• You can buy server software from Periodik Labs
(http://www.periodiklabs.com/shop/, $750).
• You can use a hosted option in which the server is located outside
your network and you use a Web site to add and delete users.
I recommend WiTopia’s SecureMyWiFi (http://witopia.net/
securemore.html; $20 setup and $10 per month for up to five
users, $100 setup and $100 per year for up to 100 users).
Turning on WPA/WPA2 with AirPort Extreme
Here’s how to enable WPA/WPA2 or WPA2 only:
1. Run AirPort Utility and select your base station. Choose Base
Station > Manual Setup (Command-L).
2. Click the AirPort icon. Then, click the Wireless button.
3. From the Wireless Security pop-up menu, choose WPA/WPA2
Personal or WPA2 Personal.
Warning! Macs with the original AirPort Card can’t connect to
WPA2 Personal-configured networks.
4. Enter a key of 8 to 63 characters in the Wireless Password field
and the same key again in the Verify Password field.
5. Click Update and wait for the base station to reboot.
The next time someone tries to connect to the network, they’ll have
to enter a password to gain access; for details on entering a password,
see Connect Your Computers, earlier.
WEP Transitional
The Extreme N supports WEP Transitional, a rare and interesting
security mode that I and colleagues have found to be problematic and
buggy in actual usage. WEP Transitional lets you mix older WEP-only
Wi-Fi connections with newer WPA/WPA2 connections.
Page 141
The problematic part is conceptual: the network encryption is as
weak as the weakest link. Using WEP Transitional leaves you vulnerable to the same cracks that affect plain WEP. The buggy part is that
it’s seemingly erratic whether computers can connect via WEP, WPA,
or WPA2 in this mode. Apple will surely fix that—we hope.
If it’s necessary for you to mix modes, or occasionally allow WEP
clients on your network, here’s how to set this up, but I warn you
that it might not work at all:
1. Run AirPort Utility and select your base station. Choose Base
Station > Manual Setup (Command-L).
2. Click the AirPort icon. Then, click Wireless.
3. From the Wireless Security pop-up menu, choose WEP
(Transitional Security Network).
4. Your WEP password must be exactly 13 characters, although Apple
doesn’t note this until you try to update the configuration. Enter
the WEP key in the Wireless Password and Verify Password fields.
5. Choose Base Station > Equivalent Network Password.
A dialog appears, showing the WEP key you just entered, which
is also the key you use as a WPA passphrase to join the network
(Figure 54). The dialog shows the 26-digit hexadecimal WEP key
for older devices or those that can’t handle ASCII WEP keys.
You can select and then copy—Edit > Copy—either key from the
dialog. (This isn’t an error in this book: You can really select and
copy within this dialog.) Also, if you ever forget or misplace the
keys, you can also later follow these steps again to retrieve the key.
FIGURE 54
The Equivalent
Network
Password dialog
shows you the
passwords
needed to gain
access using
WEP or WPA.
Page 142
6. Click OK, and then click Update and wait for the base station to
reboot.
The next time you or another user tries to connect to the network,
whatever operating system you’re using will prompt you for a password to gain access. You can find details on connecting to a network
in Connect Your Computers, earlier.
Use WPS
WPS, Wi-Fi Protected Setup, lets a computer or other Wi-Fi device
join a WPA/WPA2 Personal protected network without entering a
key. Instead, in the two versions that Apple has implemented, you can
join without a password or via a simpler PIN (personal identification
number). Apple’s use of WPS requires that you connect to the base
station using AirPort Utility and, while connected, have the device
that wants to join the network attempt to join.
Warning! The only Macs that support WPS at the moment are
those that have 802.11n adapters in them with the latest software
installed. Windows XP SP2 and Vista don’t seem to yet have builtin support. As an industry-wide standard, WPS will appear in
more operating systems and more base stations during 2008.
For either kind of WPS, follow these steps to get set up:
1. Connect to your base station via AirPort Utility and choose Base
Station > Manual Setup.
2. Choose Base Station > Add Wireless Clients to open the Wireless
Client Setup Assistant (Figure 55).
FIGURE 55
The assistant allows
a client to join the
network without a
password.
Page 143
3. If you like, you can check Limit Client’s Access to 24 Hours, perhaps for a visitor. This will put a special restriction on the account
in its access control settings after you finish the configuration
(Figure 56). (See MAC address filtering for more detail.)
FIGURE 56
The special 24-hour
limit entry for timed
access can’t be
edited for time, only
by name and MAC
address.
4. Select PIN or First Attempt, and then click Done.
This puts AirPort Utility and the base station into a state of
watchful awareness! AirPort Utility notes that it’s waiting for
a connection.
5. On the client machine, look in the AirPort status menu on the
menu bar for the network name, which appears in bold. Choose
that network name (Figure 57).
FIGURE 57
The network with WPS standing by
appears in bold: Draft N Network.
Page 144
6. Now:
• If you’ve selected the First Attempt option, the first computer
that tries to connect to the network after this point is presented
with an encryption key automatically.
• If you’ve selected a PIN, the Mac OS X system that’s trying
to connect generates a code onscreen that you must enter in
AirPort Utility. A key is then exchanged between that computer
and the base station, and that computer joins the network.
7. AirPort Utility’s watchful-waiting dialog disappears, and AirPort
Utility confirms that the device has been added. This lone operation, out of all others on the base station, requires no Update to
complete.
The client is now connected.
Page 145
OVERCOME INTERFERENCE
Interference from other Wi-Fi and non-Wi-Fi devices using the
same spectrum is one of the most frustrating problems to deal with
in making your AirPort network work well. Let’s first look at eliminating sources of conflict, and then at a mysterious option Apple offers
that seems to help as well.
Eliminate Conflicting Signals
A frustrating part of Wi-Fi networking is that you can’t control your
“air space.” All too often, neighboring Wi-Fi networks and other
emitters cause reception problems in areas that otherwise would have
good reception. If your network’s performance varies by time of day
or even by the minute, these ideas may help you identify the problem.
Do some basic testing
What you test for varies by band. Keep reading after the tests for
some suggestions for how to fix found problems.
For 2.4 GHz:
• Run iStumbler (http://www.istumbler.com/) to determine whether
other networks are running in the vicinity. iStumbler scans for networks and can display their characteristics, such as signal strength
and whether security is enabled. It can’t tell you more general info
about signals being generated in the spectrum range, however.
• Investigate your cordless phones and microwave oven as culprits—
they can both create static on the Wi-Fi line; see Set Interference
Robustness (ahead). Do you have problems only when talking on
the phone or making popcorn? There you go.
• Also check if you have problems while Bluetooth devices are in use.
Older Bluetooth equipment can interfere with Wi-Fi networks.
• Do you live in an area near a hospital, or light or heavy industry?
Some medical and industrial devices use the 2.4 GHz band,
including microwave sealers that close bags of potato chips. You
might need to switch to 5 GHz to overcome that problem.
Page 146
• If you’re desperate for a solution, check out Wi-Spy, a relatively
inexpensive spectrum analyzer. It can show whether there’s interference beyond Wi-Fi. (See Testing from client to base station.)
For 5 GHz:
• Check whether you have 5.8 GHz cordless phones.
• See whether a wireless ISP might be broadcasting over 5 GHz in
your area. Most wISPs are using the 5.8 GHz section of the 5 GHz
band. (If that’s the case note the second bullet item in the solutions
for cordless phones, below)
Try a solution
Here are ideas for solving some of the problems noted just previously.
If cordless phones are the culprit:
• Buy new cordless phones using an unused band (swapping
2.4 GHz for 5.8 GHz or vice versa). Or swap your Wi-Fi from
2.4 GHz to 5 GHz, a potentially expensive proposition, but one
guaranteed to produce better results.
• In 5 GHz, use lower-numbered channels; 5.8 GHz is in the highest
range of channels supported by the Extreme N. (This also works
for wISP interference.)
• Try T-Mobile’s HotSpot@Home, which offers cordless calling from
a cell phone that also includes a Wi-Fi radio. You make and receive
unlimited U.S. calls for $20 per month (one line) or $30 per
month (2–5 lines) over your own Wi-Fi network or any T-Mobile
HotSpot.
If a neighboring network is causing the problem:
• Propose an informal channel usage agreement: if your neighbor
and you are both using 2.4 GHz’s channel 6, switch to 1 and 11
to increase the distance between signals. In 5 GHz, you have a
number of additional channels to choose from.
• You (and your neighbor) could move your access points farther
away from one another to reduce the signal conflict in the middle.
Page 147
TIP Another way to reduce network overlap is to engage in unilateral
or multilateral curtailment (you know, like the former Soviet Union
and the United States). You can cut the amount of transmit power
on many Wi-Fi gateways, which reduces the interference you cause.
If your neighbor backs off a little, too, both sets of network improve.
You know: the Prisoner’s Dilemma.
To reduce transmit power from an Extreme N, run AirPort Utility,
connect to the base station, and click Wireless Options in the
AirPort pane’s Wireless view. Set Transmitter Power to a level below
100 percent, click OK, click Update, and then re-test.
If Bluetooth is causing the problem:
• A Bluetooth headset from 2002 or earlier could cause terrible
interference. The standard was updated to version 1.2 in 2003,
but not all devices are upgradable. Check your equipment to see.
Set Interference Robustness
Why not use a setting labeled Interference Robustness to more
robustly resist interference and thus improve range? In short, the
setting won’t help with range but it might provide a more reliable
connection over short distances.
Apple offers Interference Robustness for 2.4 GHz use of the Extreme
N, but not for 5 GHz, which doesn’t need the additional “robustness,”
as there’s much less interference. Apple has offered the option for
years with little explanation. They describe it sketchily on their Web
site, saying that it provides better performance in the presence of
2.4 GHz cordless phones and near working microwave ovens. A writer
at Macinstruct says he figured it out: Interference Robustness
instructs the base station and Mac OS X to send packets of smaller
and smaller length to ensure that data gets through if interference
otherwise disrupts the transmission of longer sequences. Read
http://macinstruct.com/node/213 for more details.
Interference Robustness doesn’t seem to make much difference in
normal networks. One Web site documents testing that indicated that
the setting increases power while reducing reception sensitivity, thus
blasting through interference when sending data, while listening less
carefully (ignoring more noise) when receiving it.
Page 148
Turning Interference Robustness on is helpful only if you use Wi-Fi
at a short distance from a base station and if you believe that interference is causing problems. Interference Robustness reduces the range,
but can improve performance within that smaller area.
Better than using Interference Robustness, if you operate 2.4 GHz
cordless phones, you might consider switching to older 900 MHz
phones (lower quality but often better range) or newer 5.8 GHz
phones (higher price, and range is an issue); or using 5 GHz with
802.11n to avoid 2.4 GHz altogether.
You can turn on Interference Robustness in Mac OS X through the
AirPort menu in the menu bar: choose Use Interference Robustness.
Windows has no similar option in any version. For an Extreme N,
connect to your base station in AirPort Utility; click the AirPort icon,
and click Wireless; then click Wireless Options to see the checkbox.
Interference robustness can be a unilateral decision: If a single
computer or the base station has the option enabled, there could
be a performance improvement.
Page 149
APPENDIX A: STREAM MEDIA WITH AIRPORT
Apple continues to extend itself into the media world, and the AirPort
system hasn’t been left out of the mix. When Apple introduced the
AirPort Express, they made a big deal about AirTunes, Apple’s name
for streaming music over a wired or Wi-Fi network to an AirPort
Express, which could then dump that music out as analog or optical
digital audio via a standard stereo mini-jack. Strangely, AirTunes
never appeared in any other devices.
In late 2006, Apple revealed plans to offer the Apple TV, initially
codenamed the iTV, which would stream high-definition video and
digital audio over a wired or Wi-Fi network for output via HDMI
(the high-definition digital video standard), composite analog, and
both digital and analog audio. The Apple TV was unveiled in early
2007 and shipped in March 2007.
In this section, I cover how to best configure your Apple TV to stream
video, and how to work with an AirPort Express. The big difference
between the two devices, beyond video, is that Apple TV pulls content
from connected computers, while the AirPort Express allows audio
to be pushed to it from a copy of iTunes running on a computer on
the same network.
Cheap music: The AirPort Express is still being sold as I write
this, and at $99, it’s not a bad deal for transferring audio over
your network. You can connect an Express wirelessly or via
Ethernet on an Extreme N network with no problems, except the
previously mentioned network performance hit.
Apple TV
The Apple TV can receive content from a single computer via synchronization and store it on an internal hard disk. It can also stream
content live from up to five computers on the network. The Apple TV
has 802.11n built in and can use 2.4 GHz and 5 GHz bands just like
the Extreme N. It also has just 10/100 Mbps Ethernet, not gigabit
Ethernet, which is peculiar for a device intended to move a lot of data.
Page 150
TIP If you’re using Apple TV with an 802.11g network or in the 2.4 GHz
band, connecting via Ethernet lets you sync to that one enabled
computer at the fastest possible rate. You can then disconnect from
Ethernet and use Wi-Fi thereafter. Apple has a technical note about
this: http://docs.info.apple.com/article.html?artnum=305254.
TIP Reports from Apple TV users indicate that placing an object on
top of the Apple TV can dramatically decrease the range of its Wi-Fi
radio, if you’re using Wi-Fi as your connection method.
Choose a Band
The big consideration in adding an Apple TV to your network
is ensuring that you have enough bandwidth to stream video while
performing other tasks on the network. Also, if you sync content
regularly to the Apple TV, you’ll likely want a lot of speed in order
to move your movies and audio files quickly.
MPEG4-compressed video used for top-resolution (1,080p or 1,080
by 1,920 pixels) requires about 10 Mbps of throughput. Apple says the
maximum resolution for the Apple TV is 720p, and the iTunes Store
doesn’t yet sell video at even that resolution. Thus, you need to have
somewhere between 2 and 5 Mbps of solid throughput available for
each Apple TV on a network that’s streaming video.
An ideally configured 802.11g network should top 20 Mbps in
throughput, but it’s likely to actually work at much lower speeds
due to nearby networks, interference, and other factors described
earlier. In contrast, an Extreme N network with only N devices
connected can hit 90 Mbps.
You might choose, therefore, to set up an Extreme N in the 5 GHz
band. You can read Mix Legacy, New N Networks for how to best set
this up. But, keep in mind that the speeds demanded for good video
streaming by the Apple TV might be achievable on your network at
2.4 GHz. It depends on your particular environment—and it’s worth
testing before getting rid of an older base station.
Connect an Apple TV
The Apple TV uses a straightforward way to connect to a network.
If you plug the Apple TV into an Ethernet network with DHCP
Page 151
enabled, the device automatically obtains an address. If you don’t
have an Ethernet network, or are just using Ethernet for an initial
sync, connect your Apple TV to your TV, power up both devices,
grab your Apple Remote, and follow these steps:
1. On the TV, from the Apple TV main menu, choose Setup >
Network.
2. Select Configure Wireless.
3. From the Wireless Networks screen, select your network
(Figure 58), or if your network is closed (see Closed network),
choose Other and enter a network name
FIGURE 58
Choose your network from the list.
4. If your network has an encryption key or passphrase, use the
Wireless Password screen’s visual keyboard to enter that text
(Figure 59). The Apple Remote lets you select each letter one
at a time. Select Done when finished. (The password is displayed
on the TV screen as you type it.)
5. If your network uses static addresses or has other particular
network requirements, choose Configure TCP/IP from the
Network screen to enter an IP address, set DNS servers, or control
other details (Figure 60).
With the network connected, you now can proceed to use your
Apple TV by following the instructions to pair one computer’s iTunes
library. A code appears on the Apple TV, you enter that code in that
computer’s iTunes link to the Apple TV, and then syncing begins!
Page 152
Synchronization can take some time, as noted, over a slower network.
After or instead of synchronization, you can follow instructions to
set up streaming with up to five computers on the network, similarly
using the Apple TV code paired with iTunes entry.
FIGURE 59
Use the Apple Remote to navigate the visual keyboard and select the
letters in your network passphrase.
FIGURE 60
You can set TCP/IP details manually via the Network > Configure
TCP/IP command.
Page 153
AirPort Express and AirTunes
The AirPort Express features AirTunes, a method of streaming music
from iTunes (versions 4.6 and later) through the audio output port
on the base station. You control the settings in AirPort Utility and
then play the music via iTunes.
TIP The fine folks at Rogue Amoeba offer AirFoil, a program that lets
you take the sound output from any program—not just iTunes—
and play it over AirTunes (http://rogueamoeba.com/airfoil/; $25,
downloadable demo version).
Set up music features in Airport Utility
After connecting to your base station, use the Music pane in AirPort
Utility to control music streaming and speaker settings (Figure 61).
FIGURE 61
The Music pane
lets you set
AirTunes
options.
Here’s how the controls work:
• Enable AirTunes: Click this box to turn streaming on and off,
on the base station.
• Enable AirTunes over Ethernet: Check this box to let both
wired and wireless computers stream music. I can’t think of why
you might want to restrict this, but if you’re concerned about
Page 154
restricting streaming, don’t uncheck this box; instead, passwordprotect the remote speakers (see the last item in this list).
• iTunes Speaker Name: This name shows in the iTunes remote
speaker list.
• iTunes Speaker Password: Set a password to limit use of this
speaker set to people who have the password. The Verify Password
field requires you to enter the password a second time to make
sure you didn’t mistype it.
Play music with iTunes
Here are the steps for playing music via iTunes and AirPort Express:
1. In iTunes, choose File > Preferences, and then click the Advanced
icon (Figure 62).
FIGURE 62
Select Look
for Remote
Speakers
Connected
with AirTunes
to automatically discover
AirTunesequipped base
stations.
2. In the General view, verify that Look for Remote Speakers
Connected with AirTunes is checked (look near the middle of the
view). This option causes iTunes to be aware of AirPort Express
Base Stations that are plugged into stereos or powered speakers.
3. If you want to control volume only from your stereo (and not also
from iTunes), select Disable iTunes Volume Control for Remote
Speakers.
Page 155
4. A very limited number of devices can control iTunes volume
remotely, including the Apple HiFi when connected via the
AirTunes jack on the AirPort Express. If you care about this
behavior, you can check or uncheck Allow iTunes Control from
Remote Speakers.
5. Click OK.
Now that you have a configured AirPort Express on the network
and the Look for Remote Speakers Connected with AirTunes
checkbox is selected, iTunes should display a new pop-up menu
with a speaker icon next to it in the lower right of its main window
(Figure 63).
FIGURE 63
Choose the AirPort
Express to stream
through from the pop-up
menu at the lower right.
A lock appears next to
those that are password
protected.
6. In iTunes, select a base station from the new pop-up menu.
The menu lists all the AirPort Express base stations connected
to stereos; Computer means the audio output option you chose
on your own computer in the Sound preference pane. You can
select only one item from the menu, but you can choose Multiple
Speakers to play music through both your computer and other
AirPort Express base stations as well (Figure 64).
FIGURE 64
The Remote Speakers window lets
you choose one or more speaker
sets to stream through.
Page 156
Quiet! The AirPort Express knows if there are no speakers
attached and warns you.
Here are a few more things you might like to know about AirTunes:
• Two people playing music at once: If you try to play music
through an AirPort Express that someone else is actively playing
music through, iTunes notifies you when you press the Play button
(Figure 65). If that person clicks Pause, iTunes releases that
person’s control of the speakers, and within 2–3 seconds, another
iTunes user can start playing music through that AirPort Express.
FIGURE 65
This message
appears when
someone else is
already playing
music through a
particular AirPort
Express.
• Password protection: You can password-protect AirPort
Express music streaming (as noted a few pages earlier). For
instance, if you live in a dorm, you might want to prevent pranksters from blasting through your speakers. When you try to connect to protected base stations to play music, you must enter the
password (Figure 66).
FIGURE 66
Connect to
passwordprotected AirPort
Express speakers
by entering the
correct password
and clicking OK.
Page 157
APPENDIX B: SETTING UP
A SOFTWARE BASE STATION
You can use a computer equipped with a Wi-Fi adapter card not just
as a client on a Wi-Fi network, but also as a base station. This appendix explains how to set up a software base station under Mac OS X.
Apple’s software base station has two distinct problems:
• Security: You can use only WEP encryption, which I describe
back in Use Built-in Encryption as a last-resort method of security.
It’s definitely better than nothing, however.
• Frequency: Even though 802.11n allows the use of the uncrowded
5 GHz band for less interference and better throughput, Internet
sharing over AirPort works just with the busy 2.4 GHz band.
SOFTWARE BASE STATION VS. AD HOC NETWORKS
You needn’t create an ad hoc network (also known as a computerto-computer network, an informal network that you set up quickly,
perhaps to transfer a file or to chat during a keynote speech) before
setting up a software base station, and in fact, the two are mutually
exclusive. Use an ad hoc network for connecting with another
computer when you have no Internet connection to share.
When you set up an ad hoc network by choosing Create Network
from the AirPort menu, your Mac assigns itself an IP address in
the 169.254.x.x range; Macs that connect to your network pick up
addresses in that range so they can communicate. Bonjour services
in iChat should work fine over ad hoc networks.
The Software Base Station feature is found in the Sharing preference
pane. Before starting, make sure you have either an Ethernet or an
Internal Modem connection set up in the Network preference pane,
because you can’t create a software access point without one or the
other active.
Page 158
For this example, I assume your Internet connection comes via
Ethernet from a cable modem. Here’s what to do:
1. In System Preferences, open the Sharing pane and click the
Internet button (Figure 67).
FIGURE 67
In the Internet
view of the
Sharing
preference
pane in Tiger,
you can share
your wired
Internet
connection
as a software
base station by
choosing BuiltIn Ethernet
and checking
AirPort.
2. From the Share Your Connection From pop-up menu, pick either
Built-In Ethernet or Internal Modem (whichever matches how you
access the Internet), and then select AirPort in the To Computers
Using list.
3. If you want to also share a connection to wired computers
connected directly to your computer, select Built-In Ethernet from
the To Computers Using list.
Warning! Because most Macs have a single Ethernet port,
if you select Built-In Ethernet, you wind up pushing out DHCP
messages over the same network connection that you’re
retrieving your Internet feed from. This is generally not a good
idea, but might be required in some limited circumstances.
4. Click AirPort Options to set the network name, channel, and,
optionally, a WEP key (Figure 68).
Page 159
FIGURE 68
Set the wireless options you want for your software base station,
including a WEP password.
TIP If you turn on WEP and anticipate PCs or Macs without AirPort
cards ever wanting to access your network, I recommend you set
the WEP key using a dollar sign, followed by the 10-digit or 26-digit
hexadecimal key. When you type a dollar sign in a password field,
the WEP Key Length menu dims and the OK button won’t light
up until you type the correct number of matching digits in both
password fields.
5. Back in the Internet view of the Sharing preference pane, click
Start.
Page 160
APPENDIX C: ADVANCED EXTREME FEATURES
I tucked the kitchen sink here at the end, because only a few of you
may be interested in the advanced features found here and there
across the AirPort Utility.
Revert to Older Firmware
Apple isn’t perfect, although many Apple fans like to pretend they’re
close to it when compared to the rest of the computer industry. Sometimes, they release software that causes their products to work more
poorly than they previously performed.
This has often happened with AirPort base station firmware, the
software code that runs on the base station itself. Many firmware
releases have turned out to have minor defects, often quickly fixed,
that disable or render erratic critical features.
Apple has neatly provided a way to go backward in AirPort Utility:
choose Base Station > Upload Firmware (Figure 69). As long as the
base station is responsive, you should be able to use this command to
restore a previous firmware release.
FIGURE 69
You can choose
firmware that’s
stored in AirPort
Utility, or choose
a separate
firmware file.
If you already have previous versions of firmware downloaded, they
appear in the Upload Version pop-up menu. Otherwise, you can
retrieve older firmware via the AirPort Utility:
• On a Mac, hold down the Option key and choose AirPort Utility >
Check for Updates.
Page 161
• Under Windows, hold down the Control key and choose File >
Check for Updates. Windows also requires that you click Show
Details to proceed.
A list of all firmware releases appears with each entry comprising
a graphic of the model type and a description of that type along with
the firmware release number (Figure 70). Select the checkbox next
to each firmware release you'd like to retrieve, and click Download.
Entries that are already stored locally are grayed out.
FIGURE 70
AirPort Utility lets you retrieve any older versions of base station
firmware.
Page 162
You can also download these older firmware releases from Apple's
Web archives at http://docs.info.apple.com/article.html?
artnum=75422.
AirPort Pane
A handful of options in this view beg for additional explanation.
Base Station settings
The Set Time Automatically checkbox and field allow you to set
the time on your Extreme N (and previous models) via time servers
operated by Apple or that you specify yourself. You must choose your
time zone manually. Setting your time in this fashion can ensure that
any timed access rules you set function; see MAC address filtering.
Hardware tends to lose track of time without external correction.
Click the Base Station Options button to set blinking options. The
Status Light pop-up menu controls whether the amber/green light
on the front of the Extreme N is green when everything is situation
normal—Always On (Default)—or if it blinks with activity—Flash
On Activity.
Wireless settings
The Wireless view’s Wireless Option dialog hides several useful
controls for the built-in radio.
• Region: Choose the country in which you are operating your
Extreme N. With the Americas model, the menu lists only countries
that have approved the device. You could violate a number of laws
by setting the region to a regulatory domain in which you are not
using the base station!
• Multicast Rate: This option concerns a subset of networking
traffic that all connected computers can receive. It’s seldom used
without a particular purpose in mind, so you almost certainly
won’t need to change the value.
• WPA Group Key Timeout: On WPA-protected networks, each
connected device creates its own particular key material—based on
the WPA passphrase—in concert with an access point. Each device
also receives from the access point a group key that’s used for
broadcast traffic sent to all devices. The timeout value increases
Page 163
the entropy in encryption by ensuring that a group key doesn’t
persist for very long. It does not require that any computer log
in to the network again.
Access Control settings
The MAC Address Access Control pop-up menu lists RADIUS as
one option. If you use 802.1X or WPA/WPA2 Enterprise, here is
where you fill in server details provided by a network administrator
or a service provider you contract with.
Advanced Pane
The Advanced pane has, as you can imagine, less frequently used
options.
Logging & SNMP settings
The Extreme N can log, or note information about, many kinds
of events, from users logging in, to updates of its internal clock, to
specific encryption information. This view controls all those aspects.
The Syslog Destination Address and Syslog Level allow an existing
system logger (a server called syslog) on a Unix or Linux—or really
any—system to receive messages from the base station, and place
them in a text file that’s updated constantly as new messages come
in. (The syslog monitor is part of Mac OS X and every Unix and Linux
flavor I’m aware of; configuring it to accept these messages requires
system administrator experience.)
The SNMP options let the base station leverage a standard method
of receiving information with a bit more sophistication than syslog.
Many network management packages use SNMP for figuring out the
status of network components and the traffic passing over them; and
determining bad behavior by users or interlopers.
If you click the Logs and Statistics button, you see additional options:
• Click Logs to see a short list of the logging messages that can be
sent to a syslog or SNMP server.
• Wireless Clients and DHCP Clients show connections and their
quality.
Page 164
Bonjour settings
Apple likes to look to the future, and the advanced Bonjour settings
are part of that forward-looking detail. In these settings, Apple lets
you set up wide-area Bonjour, a way of pushing information about
services and hardware on your local network out to the global
Internet by using the domain name system (DNS). In this scenario,
a domain name’s DNS information, which normally contains IP
addresses and mail server records, would also keep an updated list
of file servers, printers, and other Bonjour-broadcasting information
that could be accessed by people outside your local network
The problem with that? Internet service providers and DNS hosts
must support wide-area Bonjour for that to happen.
Within a large local network, such as at a college, wide-area Bonjour
can be supported internally, allowing networks of all scales to share
resources across the campus’s wide-area network. Bonjour services
on the network served by the Extreme N get shared to the next network level. Any service that uses NAT-PMP publishes information
about itself via wide-area Bonjour, if that’s enabled.
For practical purposes, and Apple has confirmed this, presently,
home users don’t need wide-area Bonjour, and most corporations
don’t have it in place. However, settings for wide-area Bonjour appear
throughout AirPort Utility.
IPv6 settings
An explanation of IPv6 could fill pages and pages, and perhaps it will
in a future edition of this book. IPv6 is the next-generation Internet
protocol that will replace the current version, IPv4, which has been
in use for decades. IPv6 was designed in the 1990s, but because it
requires a reworking of the entire infrastructure of the Internet, it’s
been slow to catch on.
IPv6 has a much larger address space, allowing trillions of addresses
compared to billions in IPv4. And, it allows address mobility: an
address in IPv4 is usually fixed to a particular router or gateway
on the Internet. With IPv6, that router or gateway can provide
forwarding info so that a mobile device can be reached elsewhere,
if desired, with no special effort.
Page 165
Some corporate networks and some ISPs in Japan now use IPv6,
which explains Apple’s support. But there’s an additional interesting
option. In IPv6, you don’t need NAT, because IPv6 addresses and
ports can be used directly. And many organizations have set up IPv6
tunnels on the Internet that allow IPv6 traffic to pass over the current
IPv4 network. The Extreme N supports this tunneling.
By default, the Extreme N is set up to allow incoming IPv6 connections and to route IPv6 traffic through these public Internet tunnels.
Because Mac OS X also, by default, enables IPv6 traffic, you do face
some exposure, and may wish to set IPv6 Mode to Link-Local Only,
which restricts traffic to the local network, and check Block Incoming
IPv6 Connections to further restrict behavior.
For the Extreme N (gigabit) Apple enhanced security options, adding
a checkbox for blocking incoming connections to the IPv6 view, and
a new view called IPv6 Firewall with configuration choices for what
IPv6 tunnels and networks can pass through.
Page 166
APPENDIX D: WHAT’S NEW IN LEOPARD
Leopard didn’t change the face of AirPort networking, but it did
rework how AirPort and network settings appear throughout the
system, consolidating those settings and making them more accessible. (Some long-time irritations weren’t fixed, unfortunately.)
In this special appendix, I cover three primary areas:
• The new Network preference pane, which reorganizes how you
find and configure TCP/IP and other network settings for AirPort.
• The revised AirPort menu in the system menu bar, which now
offers live information about the networks around you.
• Miscellaneous changes, ranging from Web server and printer setup
changes, to updates in mounting shared AFP and Samba volumes
in the Finder.
Watch for spots! The occasional leopard spots ( ) in the margin of this ebook can be clicked to quickly jump to corresponding
Leopard-related material in this appendix.
Meet the New Network Preference Pane
Leopard reorganized the Network preference pane to consolidate
separate activities and information into one dashboard. The Internet
Connect program is gone, replaced by features now built into the
Network preference pane. A list at the left of the pane now shows all
adapters and their respective status, replacing the previous interface
where you used different menus from the top of the pane to access
active adapters and change overall adapter settings.
Set DHCP and DHCP Client ID for AirPort
(p. 63 and p. 68)
Here are the steps to set an AirPort adapter to use DHCP to obtain
an address:
1. Open the Network preference pane.
2. Select your AirPort adapter in the list at left.
3. Click the Advanced button.
Page 167
4. Click the TCP/IP button to open the TCP/IP view (Figure 71).
FIGURE 71
DHCP settings are now found nested in the Advanced options for the
AirPort adapter, in the TCP/IP view.
5. Now, do either or both:
• Choose Using DHCP from the Configure IPv4 pop-up menu.
• Enter a name into the DHCP Client ID field to use with DHCP
reservation in AirPort Utility.
Managing Profiles
(p. 75)
To create, edit, and delete profiles in Leopard, in the Network
preference pane, select the AirPort adapter and then click the
Advanced button to see the advanced options (Figure 72).
Profiles are managed much the same as in Tiger:
• Add a profile manually by clicking the
button.
• Delete a profile you no longer need by selecting the profile and
clicking the
button.
• To change the preferred order in which the Mac connects to networks if more than one is available, drag a network name to a new
position in the list.
Page 168
FIGURE 72
In the Advanced options for an AirPort adapter, you can easily add,
delete, edit, and rearrange networks with which you want to connect.
• To edit an existing profile, select it and click the
button; you can
change the password or type of password, too (Figure 73).
FIGURE 73
With the edit
option, you can
change the network
name, security
type, and password
without needing
to re-select the
network.
If you click the
button to reach the dialog shown in Figure 73,
above, you’re presented with a new option in Leopard: the Show
Networks button. This somewhat recursive seeming choice lets
you connect to a network within the edit feature, so you can change
details without exiting the nested dialog (Figure 74).
Page 169
FIGURE 74
Choose the
network from this
list, or click Other
to enter a network
from scratch.
Advanced connection options
(p. 76)
To control some aspects of how AirPort connects to networks, select
the AirPort adapter in the Network preference pane, and choose any
of the following options:
• Check Ask to Join New Networks if you want Mac OS X to alert
you when there’s no network you’ve stored a profile for in the
vicinity (Figure 75).
Warning! This feature seems to work erratically. I have never
been able to get it to work correctly and on request, but then,
out of nowhere, I’ll be prompted to join a network.
FIGURE 75
The checkbox would seem to indicate that Leopard would ask you
join networks; it rarely asks, though.
Page 170
• Click the Advanced button to reach three additional methods of
control:
◊
Remember Any Network This Computer Has Joined. Checked
by default, this option adds a profile for any network you join,
whether a password is required or not.
◊
Disconnect from Any Wireless Network When Logging Out does
just that.
◊
Require Administrator Password to Control AirPort allow you
to override someone’s attempt to switch networks or turn
AirPort off.
NOTE Apple has eliminated the set of three weird options that never
seemed to make much sense in Tiger, and that were hidden in an
Options dialog: Ask Before Joining an Open Network; Automatically
Join an Open Network; and Keep Looking for Recent Networks.
Now, the behavior is, by default, to join any network for which a
profile is stored; otherwise, Leopard asks to join a network if the
Ask To Join New Networks box is checked, which it is by default.
Joining any open network without asking is always a bad idea.
AirPort Menu
(p. 71)
The AirPort menu, a drop-down menu in the system menu bar, has
been refurbished slightly to improve how you find and connect to WiFi networks.
Dynamic network scanning
The AirPort menu is now dynamic, scanning for networks after
you hold down the mouse button to select a network (Figure 76).
Networks appear in alphabetical order, with the network that you’re
connected to coming first, if you’re connected. A lock icon appears to
the right of protected networks—ones using WEP or WPA/WPA2.
Page 171
FIGURE 76
The AirPort status line at the top
of the menu says it’s scanning
(and shows a progress spinner)
while it’s still looking for networks
after you initially hold down the
mouse button.
Network details via the Option key
In Tiger, you could hold down the Option key while clicking the
AirPort menu icon, and Mac OS X would sort the networks in order
of signal strength, from strongest to weakest.
In Leopard, however, Option-clicking the AirPort menu icon provides
details about the network (Figure 77) to which you are connected:
• The MAC address or AirPort ID of the network
• The channel the base station is using
• The signal strength measured as RSSI (Received Signal Strength
Indication), which is a relative measure of how good a signal is
• The transmit rate, which shows how fast the network link is, not
just how fast the base station can go
TIP RSSI is measured in decibels in such a fashion that a negative
number is used; -44 (minus 44), as in Figure 77 is typical. A higher
number for the RSSI therefore means less signal strength: -75 is less
power than -45.
Page 172
FIGURE 77
Option-click the Airport menu
bar icon to see network details
revealed right in the menu.
You can also reveal information about networks to which you aren’t
connected: Option-click to open the AirPort menu, and then hover
over any network in the list that you’re not connected to, in order to
see the RSSI and type of encryption, if any (Figure 78).
FIGURE 78
Option-click to
open the menu,
and then you can
hover to reveal
information about
Wi-Fi networks to
which you aren’t
connected.
Page 173
Miscellaneous
Leopard has a variety of other changes, which affect scattered
sections of the book noted below.
Finding the MAC address
(p. 59)
In Leopard, you find the MAC address of your Wi-Fi adapter by
following these steps:
1. Launch System Preferences and select the Network preference
pane.
2. Select your AirPort adapter in the list of adapters on the left side
of the pane.
3. Click the Advanced button.
The AirPort ID is found at the bottom of the AirPort view.
AirPort Utility
(p. 27)
AirPort Utility shipped as part of the Leopard set of utilities, so it no
longer needs to be installed separately from an installer disc. (Apple
also separately released a download for Tiger and for Windows
XP/Vista.)
Running a Web server in Leopard
(p. 106)
Leopard no longer includes a port-based firewall that would be a
problem for running a local Web server that’s port mapped to be
reached outside the network.
The Leopard firewall, configured in the Security preference pane in
the Firewall view, automatically opens the right connections if you
enable services, such as a Web server, through the Sharing preference
pane (Figure 79).
Page 174
FIGURE 79
The Leopard firewall automatically opens ports as needed for services
enabled through the Sharing preference pane.
Add a printer in Leopard
(p. 115)
To let Leopard see a shared printer attached to an AirPort Extreme
Base Station, an AirPort Express, or a Time Capsule, follow these
steps:
1. Launch System Preferences, and select the Print & Fax preference
pane (Figure 80).
Page 175
FIGURE 80
The Print & Fax
preference pane
lets you add
and manage
printers.
2. Click the
button.
3. Select the printer from the list that appears in the Default view
(Figure 81).
FIGURE 81
A new utility to add
printers is launched
from within the Print
& Fax preference pane.
Shared printers show
up in the Default view.
4. Click Add.
5. Optionally, choose that printer from the Default Printer list to
make it appears as the choice whenever you print.
Page 176
Accessing Shared Disks
(p. 127)
Apple seems to have abandoned the AirPort Disk Utility (p. 128–130),
part of the initial package of software that was installed with AirPort
Utility, for managing disks mounted via an AirPort Extreme Base
Station. Instead, Leopard manages the base station server and disks
through the Finder, just like any other network volume.
In any Finder window, you now see a list of servers in the new Shared
category in the sidebar (Figure 82). This list shows any servers on
the local network with AFP or Samba volumes available for mounting,
as well as FTP servers that use Bonjour to advertise their availability.
FIGURE 82
The Shared section of the sidebar shows available servers. If you
select a server and enter its password, volumes appear at the right.
The “Connected as” banner at the top shows the user name you’re
connected as. Click Disconnect to unmount all volumes for the
selected server.
To mount a volume from one of these servers, follow these steps:
1. Select the server name under Shared in the sidebar.
2. Now:
• To connect as a Guest user, you needn’t do anything for this
step. Leopard automatically tries to connect using the Guest
login, and it then shows any volumes that can be mounted in
that fashion.
Page 177
• To use a named account, click the Connect As button in the
upper right and enter your credentials. Leopard is clever
enough that for AirPort Extreme and Time Capsule shared
drives that use just a password for access—no user accounts
being defined—to prompt you just for that password.
3. Double click a volume that’s shown in the mounted server window
to mount it on your system.
By default, Leopard doesn’t show a mounted server on the actual
Desktop as an icon. This can be confusing! To fix this oversight,
follow these steps:
1. Choose Finder > Preferences
2. Click General.
3. Under “Show these items on the Desktop,” check Connected
Servers.
Interference robust enough
(p. 148)
The setting for Interference Robustness, a way to improve reception
for a wonky AirPort connection, is no longer available in Leopard.
This setting can still be set for 2.4 GHz networks via AirPort Utility
for AirPort Extreme, AirPort Express, and Time Capsule, but it’s gone
from Mac OS X. We were never sure if it helped much, anyway!
Software Base Station
(p. 158–160)
Much to everyone’s chagrin, Apple just moved the location of its software base station controls; they didn’t improve those controls at all.
Instead of being found in the Sharing preference pane’s Internet
view, which no longer exists, network sharing is a service listed in the
Sharing preference pane. Open the pane and click Internet Sharing
to see the option. If you choose AirPort from the Share Connect from
pop-up menu, you can then click the AirPort Options button to set
the same choices as the last two releases of Mac OS X: 2.4 GHz only
(despite 5 GHz networks being available, faster, and less in use), and
WEP encryption only (despite WPA’s far superior quality).
Page 178
ABOUT THIS BOOK
In contrast to traditional print books, Take Control books offer clickable links, full-text searching, and free minor updates. We hope you
find them both useful and enjoyable to read.
About the Author
Glenn Fleishman contributes
regularly to Macworld, the New
York Times, the Economist, Popular
Science, and the Seattle Times. He’s
the Macintosh columnist for the
Seattle Times, and a contributing
editor at TidBITS.
Glenn spends much of his time
writing about wireless networking.
He co-wrote Take Control of Your
Wi-Fi Security with Adam Engst,
and he edits the daily Web log
Wi-Fi Networking News
(http://www.wifinetnews.com/) and five related wireless blogs.
Glenn also appears weekly on KUOW-FM in Seattle to talk about
technology (http://kuow.org/).
He lives in Seattle in a bungalow with his wife and two sons. His
oldest’s first word was “book,” not “Mac.”
Acknowledgements
The new edition of this book happened fast—Apple shipped the
Extreme N, and I and the Take Control team was determined to get
out a fully revised edition of the previous book—fast!
I must thank Tonya Engst for her tireless and rapid work in editing;
Adam Engst, a long-time friend, colleague, and collaborator, also
deserves thanks for his role in fostering and perpetuating my work
on Wi-Fi and AirPort. More thanks to Dan Frakes for his feedback
and insight into early Extreme N troubles and fixes; the Take Control
authors who have been fantastically supportive; and to a host of Take
Page 179
Control pre-release technical reviewers, notably Criss Hyde, Chris
Pepper, and Rich Wolfson. Thanks to Jeff Carlson for the use of his
Apple TV screen photos.
Thanks are also due to Apple Computer’s Teresa Brewer for her help
in sorting out some early Extreme N quirks, and relaying my technical
quibbles and bug reports to the AirPort team, notably Jai Chulani and
John Richey.
Great thanks go to my wife, Lynn, who accepted a few weeks of me
sitting on a couch every night tapping away, while our second child
gestated. Sure, I’m working, honey, sure!
Thanks to Robert F. Unger for pointing us to the great tip on downloading older firmware releases for base stations.
About the Publisher
Publishers Adam and Tonya Engst have been
creating Mac-related content since they
started the online newsletter TidBITS, in
1990. In TidBITS, you can find the latest
Macintosh news, plus read reviews, opinions, and more
(http://www.tidbits.com/).
Adam and Tonya are known in the Mac world
as writers, editors, and speakers. They are also
parents to Tristan, who thinks ebooks about clipper
ships and castles would be cool.
Production Credits
Link-making AppleScript: Matt Neuburg
List macros and leopard spots ( ): Sharon Zardetto
Take Control logo: Jeff Tolbert
Editor in Chief: Tonya Engst
Publisher: Adam Engst
Special thanks this time go to Amelia and Oliver Habicht, for helping
with bicycles, and to Andrew and Monique Nielsen, for being fun and
relaxing guests.
Page 180
Take Control of Your
802.11n AirPort Extreme Network
ISBN 1-933671-28-9
April 2008. Version 1.2
Copyright © 2008 Glenn Fleishman. All rights reserved.
TidBITS Publishing Inc.
50 Hickory Road
Ithaca, NY 14850 USA
http://www.takecontrolbooks.com/
TAKE CONTROL books help readers regain a measure of control in an oftentimes out-ofcontrol universe. Take Control books also streamline the publication process so that
information about quickly changing technical topics can be published while it’s still relevant
and accurate.
The electronic version of this book does not use copy protection because copy protection
makes life harder for everyone. So we ask a favor of our readers. If you want to share your
copy of this ebook with a friend, please do so as you would a physical book, meaning that if
your friend uses it regularly, he or she should buy a copy. Your support makes it possible for
future Take Control ebooks to hit the Internet long before you’d find the same info in a
printed book. Plus, if you buy the ebook, you’re entitled to any free updates that become
available.
Although the author and TidBITS Publishing Inc. have made a reasonable effort to ensure
the accuracy of the information herein, they assume no responsibility for errors or
omissions. The information in this book is distributed “As Is,” without warranty of any
kind. Neither TidBITS Publishing Inc. nor the author shall be liable to any person or entity
for any special, indirect, incidental, or consequential damages, including without limitation
lost revenues or lost profits, that may result (or that are alleged to result) from the use of
these materials. In other words, use this information at your own risk.
Many of the designations used to distinguish products and services are claimed as
trademarks or service marks. Any trademarks, service marks, product names, or named
features that appear in this title are assumed to be the property of their respective owners.
All product names and services are used in an editorial fashion only, with no intention of
infringement of the trademark. No such use, or the use of any trade name, is meant to
convey endorsement or other affiliation with this title.
This title is an independent publication and has not been authorized, sponsored, or
otherwise approved by Apple Inc. Because of the nature of this title, it uses terms that are
trademarks or registered trademarks of Apple Inc.; to view a complete list of
trademarks and registered trademarks of Apple Inc., visit http://www.apple.com/legal/
trademark/appletmlist.html.
FEATURED TITLES
Now that you’ve seen this book, you know the Take Control books have an easy-to-read
layout, clickable links if you read online, and real-world info that puts you in control.
Click any book below or visit our Web catalog to add to your Take Control collection!
Take Control
of Your
Wi-Fi Security
Take Control
of Your
Domain Names
Take Control
of Passwords
in Mac OS X
by Engst & Fleishman
by Glenn Fleishman
by Joe Kissell
Learn how to keep
intruders out of your
wireless network and
protect your sensitive
communications!
$10
Get expert help with
registering, configuring,
and managing your
Internet domain names
like a pro!
$10
Create and manage
strong passwords that
keep your data safe
without taxing your
memory!
$10
Take Control
of Sharing Files
in Leopard
Take Control
of Permissions
in Leopard
by Glenn Fleishman
by Brian Tanaka
Share files the smart way!
Select the right hardware
and software, configure
your set up, and start
sharing files.
$10
Solve quirky problems,
increase privacy, and
share files better by
managing Leopard
permissions.
$10
More Titles!
Delve into even
more topics, including:
• Running your Mac—
upgrading the OS, understanding accounts, syncing,
backups, maintenance,
fonts, and more.
• Buying gear—Macs and
cameras.
• More topics—.Mac, Mail,
iWeb, spam, podcasting,
GarageBand, iPhone, and
more.
Exclusive coupon for
Take Control readers!
$5 off any Web order from
Small Dog Electronics!
Small Dog Electronics offers over 4000 Mac-compatible products, great prices,
and famously superior customer service. We’re also a 100% Mac-based company.
Every employee is a certified Apple Product Professional, who uses Macs at home
as well as on the job. Small Dog Electronics has been part of the Mac community for
more than 12 years. We’ve grown into one of the top Apple Specialists in the United
States - and had great time doing it.
Visit Smalldog.com and save $5 on any web order with this coupon!
Small Dog
Electronics
Always by your side.
www.smalldog.com 800-511-MACS
Redeem your coupon on-line at
www.smalldog.com. Limited to
one use per customer. Enter coupon
# bone80317339 at check out.
Download PDF
Similar pages