User Guide
Page 2
... but not limited to time without written permission from sustainable, managed forests; Ensuring that all operations. Regulated Materials Statement 3Com products do not contain any licensed program or documentation contained in, or delivered to make improvements or changes in the ... at private expense. Environmental Statement about the Documentation The documentation for a particular purpose. 3Com may not be environmentally-friendly in other countries, licensed exclusively through X/Open Company, Ltd. No part of safely. If you are associated. Ensuring that comply with...
... but not limited to time without written permission from sustainable, managed forests; Ensuring that all operations. Regulated Materials Statement 3Com products do not contain any licensed program or documentation contained in, or delivered to make improvements or changes in the ... at private expense. Environmental Statement about the Documentation The documentation for a particular purpose. 3Com may not be environmentally-friendly in other countries, licensed exclusively through X/Open Company, Ltd. No part of safely. If you are associated. Ensuring that comply with...
User Guide
Page 18
... the Bridge onto the cradle. To install the locking bar: 1 Insert the locking bar through the large opening in the side of the cradle, as shown in place. Figure 6 Inserting the Locking Bar .11a .11g .100 .10 Downloaded from www.Manualslib.com manuals search engine Use your own lock... to secure it in Figure 6. Installing the For additional security, install the locking bar in the cradle. 12 CHAPTER 2: INSTALLING THE BRIDGE 2 Route the power and Ethernet cables through the opening in ...
... the Bridge onto the cradle. To install the locking bar: 1 Insert the locking bar through the large opening in the side of the cradle, as shown in place. Figure 6 Inserting the Locking Bar .11a .11g .100 .10 Downloaded from www.Manualslib.com manuals search engine Use your own lock... to secure it in Figure 6. Installing the For additional security, install the locking bar in the cradle. 12 CHAPTER 2: INSTALLING THE BRIDGE 2 Route the power and Ethernet cables through the opening in ...
User Guide
Page 19
...in place, as a table or desktop. Remove the backing from www.Manualslib.com manuals search engine Figure 7 Securing the Locking Bar Placing the Bridge on The Bridge comes with four rubber feet that is exposed. 3 Insert a lock through the hole on the locking bar, and then close the lock ...used to the bottom of metal surface. After the rubber feet are installed, place the Bridge on a flat surface. .11a .11g .100 .10 Deciding Where to Place the Bridge 13 2 Push the locking bar through the opening until the hole on the locking bar is clear of obstructions and provides good reception.
...in place, as a table or desktop. Remove the backing from www.Manualslib.com manuals search engine Figure 7 Securing the Locking Bar Placing the Bridge on The Bridge comes with four rubber feet that is exposed. 3 Insert a lock through the hole on the locking bar, and then close the lock ...used to the bottom of metal surface. After the rubber feet are installed, place the Bridge on a flat surface. .11a .11g .100 .10 Deciding Where to Place the Bridge 13 2 Push the locking bar through the opening until the hole on the locking bar is clear of obstructions and provides good reception.
User Guide
Page 24
...Bridge is the 3Com 2.4/5 GHz Omnidirectional Workgroup Bridge Antenna (3CWE501). If the factory defaults meet your network has a DHCP server and no special security requirements, you can use the Bridge just as described in "Connecting the Bridge" on the network. You can manage the wireless LAN...can most likely use the 3Com Wireless Infrastructure Device Manager (Widman) included on the 3Com Installation CD to Configure the Bridge If your requirements, you can be attached to increase the range of the Bridge, you first open the Bridge's Configuration Management System. If ...
...Bridge is the 3Com 2.4/5 GHz Omnidirectional Workgroup Bridge Antenna (3CWE501). If the factory defaults meet your network has a DHCP server and no special security requirements, you can use the Bridge just as described in "Connecting the Bridge" on the network. You can manage the wireless LAN...can most likely use the 3Com Wireless Infrastructure Device Manager (Widman) included on the 3Com Installation CD to Configure the Bridge If your requirements, you can be attached to increase the range of the Bridge, you first open the Bridge's Configuration Management System. If ...
User Guide
Page 26
...For non-U.S. 20 CHAPTER 2: INSTALLING THE BRIDGE Bridge Default Settings Table 4 shows the Bridge configuration factory defaults. version, set by ...) Same as access point setting (if Network Mode is set to Wireless Client [Infrastructure]) Open System (no security) Disabled Enabled Disabled admin None (blank) None None...Wireless LAN Service Area Channel Selection Transmit Power Antenna Selection Data Preamble Security Setting 802.1x Authentication State SNMP Access Control List Administration Login Name Administration Password TFTP Server IP Address FTP Server IP Address Default Setting 3Com...
...For non-U.S. 20 CHAPTER 2: INSTALLING THE BRIDGE Bridge Default Settings Table 4 shows the Bridge configuration factory defaults. version, set by ...) Same as access point setting (if Network Mode is set to Wireless Client [Infrastructure]) Open System (no security) Disabled Enabled Disabled admin None (blank) None None...Wireless LAN Service Area Channel Selection Transmit Power Antenna Selection Data Preamble Security Setting 802.1x Authentication State SNMP Access Control List Administration Login Name Administration Password TFTP Server IP Address FTP Server IP Address Default Setting 3Com...
User Guide
Page 33
... associated N/A access point. When you first open the Configuration Management System you configure the Bridge through your computer's web browser. ■ Start the 3Com Wireless Infrastructure Device Manager, locate the Bridge, and then click Configure. Using the Configuration Management System 27 Using the Configuration Management System The 3Com11a/b/g Wireless Workgroup Bridge Configuration Management System resides on the same...
... associated N/A access point. When you first open the Configuration Management System you configure the Bridge through your computer's web browser. ■ Start the 3Com Wireless Infrastructure Device Manager, locate the Bridge, and then click Configure. Using the Configuration Management System 27 Using the Configuration Management System The 3Com11a/b/g Wireless Workgroup Bridge Configuration Management System resides on the same...
User Guide
Page 34
...can see the changes on the System Summary page. Security The type of security for which the Bridge Varies is , the current data rate over which the Bridge is shown in Infrastructure mode only. Open System (no security) N/A Tx Data Rate (Mbps) The most recent data reception rate. ...Activity (Packets Rx) The number of the Bridge. Downloaded from www.Manualslib.com manuals search engine Rx Data Rate...
...can see the changes on the System Summary page. Security The type of security for which the Bridge Varies is , the current data rate over which the Bridge is shown in Infrastructure mode only. Open System (no security) N/A Tx Data Rate (Mbps) The most recent data reception rate. ...Activity (Packets Rx) The number of the Bridge. Downloaded from www.Manualslib.com manuals search engine Rx Data Rate...
User Guide
Page 40
... Bridge. Security settings default to share files apart from the wired LAN. To increase performance, select Short (Enhanced performance). Downloaded from the office, or if a group in the office needs to Open System (no security). 34 CHAPTER 3: CONFIGURING THE BRIDGE Setting...the 3Com Wireless Infrastructure Device Manager to select the Bridge and launch the Configuration Management System. 3 Under System Configuration, click Wireless Network. 4 In the Wireless Network page: a Locate the Network Mode field and select Ad-hoc (Peer-to the Bridges. b Specify the Wireless LAN Service...
... Bridge. Security settings default to share files apart from the wired LAN. To increase performance, select Short (Enhanced performance). Downloaded from the office, or if a group in the office needs to Open System (no security). 34 CHAPTER 3: CONFIGURING THE BRIDGE Setting...the 3Com Wireless Infrastructure Device Manager to select the Bridge and launch the Configuration Management System. 3 Under System Configuration, click Wireless Network. 4 In the Wireless Network page: a Locate the Network Mode field and select Ad-hoc (Peer-to the Bridges. b Specify the Wireless LAN Service...
User Guide
Page 41
...-hoc network) must match exactly. The Bridge can be configured to protect data, but still allows communication among compatible wireless LAN clients and access points from other members of... letters and numbers in one of characters between 6 and 30 characters long. No Security (Open System) No...wireless transmissions to support three types of encryption is used on clients and the access points they associate with equipment from third-party manufacturers that use only with other 3Com 11a/b/g wireless...
...-hoc network) must match exactly. The Bridge can be configured to protect data, but still allows communication among compatible wireless LAN clients and access points from other members of... letters and numbers in one of characters between 6 and 30 characters long. No Security (Open System) No...wireless transmissions to support three types of encryption is used on clients and the access points they associate with equipment from third-party manufacturers that use only with other 3Com 11a/b/g wireless...
User Guide
Page 46
... should be used in either infrastructure or ad-hoc mode. Applications utilizing a network serial port between an RS-232 interface and a wireless device use a TCP/IP socket connection. At the same time, any data written to be used if you to do data communication...computer. ■ Select Enable to a central server. Configuring Operation Mode Attach your system expects the Bridge to open a TCP/IP socket connection to disable the Network Serial Port. Once a socket is established to the Bridge, any data received by the network program with a remote computer in two modes: ■ ...
... should be used in either infrastructure or ad-hoc mode. Applications utilizing a network serial port between an RS-232 interface and a wireless device use a TCP/IP socket connection. At the same time, any data written to be used if you to do data communication...computer. ■ Select Enable to a central server. Configuring Operation Mode Attach your system expects the Bridge to open a TCP/IP socket connection to disable the Network Serial Port. Once a socket is established to the Bridge, any data received by the network program with a remote computer in two modes: ■ ...