User Guide
Page 2
... product names are registered trademarks or trademarks of Cisco Systems, Inc. Wireless-G Ethernet Bridge About This Guide i All rights reserved. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of their...
... product names are registered trademarks or trademarks of Cisco Systems, Inc. Wireless-G Ethernet Bridge About This Guide i All rights reserved. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of their...
User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
User Guide
Page 4
... and its factory default settings. NOTE: If you reset the Wireless-G Ethernet Bridge, you want to your Ethernet-wired printer, camera, notebook or desktop into a wireless networked device. The LED flashes while the Bridge is where you for choosing theWireless-G Ethernet Bridge.The versatile Wireless-G Ethernet Bridge can make any wired Ethernet-equipped device a part of your...
... and its factory default settings. NOTE: If you reset the Wireless-G Ethernet Bridge, you want to your Ethernet-wired printer, camera, notebook or desktop into a wireless networked device. The LED flashes while the Bridge is where you for choosing theWireless-G Ethernet Bridge.The versatile Wireless-G Ethernet Bridge can make any wired Ethernet-equipped device a part of your...
User Guide
Page 5
...only option available on some additional steps to enable Media Access Control (MAC) address filtering. The Linksys default password is provided solely for wireless devices with specific MAC addresses. To thwart any unauthorized changes, customize the device's password so it ...sending information over radio waves, it passes over a wireless network. Wireless-G Ethernet Bridge Wireless Security Checklist 4. Enable encryption Encryption protects data transmitted over the airwaves, you can specify the MAC address of your wireless network, and can be found in length. With ...
...only option available on some additional steps to enable Media Access Control (MAC) address filtering. The Linksys default password is provided solely for wireless devices with specific MAC addresses. To thwart any unauthorized changes, customize the device's password so it ...sending information over radio waves, it passes over a wireless network. Wireless-G Ethernet Bridge Wireless Security Checklist 4. Enable encryption Encryption protects data transmitted over the airwaves, you can specify the MAC address of your wireless network, and can be found in length. With ...
User Guide
Page 6
...names are helpful, especially if you are assigning the Bridge a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the wireless network. If you are posted at www.linksys.com. The SSID must not exceed 32 alphanumeric characters...settings or make advanced configuration changes, use the Utility. Enables you change the default SSID (linksys) to a name of the Bridge's firmware is displayed here. do not use spaces). Wireless SSID The SSID is the network name shared among all settings to factory defaults. ••...
...names are helpful, especially if you are assigning the Bridge a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the wireless network. If you are posted at www.linksys.com. The SSID must not exceed 32 alphanumeric characters...settings or make advanced configuration changes, use the Utility. Enables you change the default SSID (linksys) to a name of the Bridge's firmware is displayed here. do not use spaces). Wireless SSID The SSID is the network name shared among all settings to factory defaults. ••...
User Guide
Page 7
... Enable Security Settings If you want to enable security settings; This should match the channel setting of the four wireless security modes supported by the Bridge and their general information. Click Refresh to obtain the most up-to cancel. Keep the default setting, Infrastructure,... if you chose Ad-Hoc mode, then select the correct operating channel for additional onscreen information. This screen shows all the wireless networks detected by the Bridge: •• WPA (Wi-Fi Protected Access) Pre-Shared Key •• WPA RADIUS •• RADIUS (...
... Enable Security Settings If you want to enable security settings; This should match the channel setting of the four wireless security modes supported by the Bridge and their general information. Click Refresh to obtain the most up-to cancel. Keep the default setting, Infrastructure,... if you chose Ad-Hoc mode, then select the correct operating channel for additional onscreen information. This screen shows all the wireless networks detected by the Bridge: •• WPA (Wi-Fi Protected Access) Pre-Shared Key •• WPA RADIUS •• RADIUS (...
User Guide
Page 8
...16 alphanumeric characters. (The Passphrase function is used when the Bridge sends data. Security > WEP Select a Default Transmit Key (choose which WEP key (1-4) will need to create WEP key(s). WEP Encryption In order to communicate with Linksys wireless products only. If you want to use ), and a ... then click Refresh on your web browser. This Passphrase is compatible with non-Linksys wireless products, you are using a Passphrase or enter the WEP key manually. It is a key shared between the Bridge and the server. WEP encryption, then each key must consist of exactly 10 ...
...16 alphanumeric characters. (The Passphrase function is used when the Bridge sends data. Security > WEP Select a Default Transmit Key (choose which WEP key (1-4) will need to create WEP key(s). WEP Encryption In order to communicate with Linksys wireless products only. If you want to use ), and a ... then click Refresh on your web browser. This Passphrase is compatible with non-Linksys wireless products, you are using a Passphrase or enter the WEP key manually. It is a key shared between the Bridge and the server. WEP encryption, then each key must consist of exactly 10 ...
User Guide
Page 9
... when a RADIUS server is using a Passphrase or enter the WEP key manually. TLS TLS is used with Linksys wireless products only and cannot be used to save your wireless data communications. Make sure that uses digital certificates. Passphrase Instead of the WEP key generated in the Key 1...with Windows XP Zero Configuration. Click View Log to your network and encryption security for Wired Equivalent Privacy, WEP is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of your security. Enter the ID in the User ID field, then the password ...
... when a RADIUS server is using a Passphrase or enter the WEP key manually. TLS TLS is used with Linksys wireless products only and cannot be used to save your wireless data communications. Make sure that uses digital certificates. Passphrase Instead of the WEP key generated in the Key 1...with Windows XP Zero Configuration. Click View Log to your network and encryption security for Wired Equivalent Privacy, WEP is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of your security. Enter the ID in the User ID field, then the password ...
User Guide
Page 10
...new password that uses digital certificates. Password Tab The Password screen lets you have installed to save your wireless network. If you change the Bridge's Password and restore the factory default settings. Click Apply to authenticate you create. Password This is a... mutual authentication method that you on -screen information. 7 Wireless-G Ethernet Bridge Password Administrative Password It is strongly recommended that your changes. If your page does not automatically refresh itself , then ...
...new password that uses digital certificates. Password Tab The Password screen lets you have installed to save your wireless network. If you change the Bridge's Password and restore the factory default settings. Click Apply to authenticate you create. Password This is a... mutual authentication method that you on -screen information. 7 Wireless-G Ethernet Bridge Password Administrative Password It is strongly recommended that your changes. If your page does not automatically refresh itself , then ...
User Guide
Page 11
...than the preset RTS threshold size, the RTS/CTS mechanism will negotiate the best possible connection speed between the Bridge and another wireless-equipped device. This setting allows the Bridge to authenticate communication with a Clear to Send (CTS) frame to acknowledge the right to a particular receiving ... uses shared key or open system authentication, and then it will actively scan for additional on your wireless network. Auto-Fallback will Wireless-G Ethernet Bridge not be cloned whenever you can clone the MAC address of a data frame. The range is connected to ...
...than the preset RTS threshold size, the RTS/CTS mechanism will negotiate the best possible connection speed between the Bridge and another wireless-equipped device. This setting allows the Bridge to authenticate communication with a Clear to Send (CTS) frame to acknowledge the right to a particular receiving ... uses shared key or open system authentication, and then it will actively scan for additional on your wireless network. Auto-Fallback will Wireless-G Ethernet Bridge not be cloned whenever you can clone the MAC address of a data frame. The range is connected to ...
User Guide
Page 12
... is displayed here. Adobe Website (software for additional on -screen. Network Type The Bridge's mode is displayed here. Firmware updates are posted 9 Wireless-G Ethernet Bridge Help Linksys Website Click the link to -date settings and statistics. Firmware Version The version number of ... displayed here. Firmware updates are posted at www.linksys.com. You can also upgrade the Bridge's firmware. Wireless RX The number of the Bridge is displayed here. Security The status of the help information for the Bridge is displayed here. Chapter 3 Configuration using the ...
... is displayed here. Adobe Website (software for additional on -screen. Network Type The Bridge's mode is displayed here. Firmware updates are posted 9 Wireless-G Ethernet Bridge Help Linksys Website Click the link to -date settings and statistics. Firmware Version The version number of ... displayed here. Firmware updates are posted at www.linksys.com. You can also upgrade the Bridge's firmware. Wireless RX The number of the Bridge is displayed here. Security The status of the help information for the Bridge is displayed here. Chapter 3 Configuration using the ...
User Guide
Page 13
...Upgrade screen will appear. Wireless-G Ethernet Bridge 10 In the field provided, enter the name of the extracted firmware upgrade file, or click Browse to locate the file on -screen instructions. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. On the ...Help screen, click Firmware Upgrade. 3. After you experience problems with the Bridge. Then extract the file. 2. Chapter 3 Configuration using the Web...
...Upgrade screen will appear. Wireless-G Ethernet Bridge 10 In the field provided, enter the name of the extracted firmware upgrade file, or click Browse to locate the file on -screen instructions. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. On the ...Help screen, click Firmware Upgrade. 3. After you experience problems with the Bridge. Then extract the file. 2. Chapter 3 Configuration using the Web...
User Guide
Page 14
.... Click the Advanced tab. 3. You have two ways to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 Perform the following steps: •• Verify that all other Bridge settings will automatically clone the Xbox's MAC address. •• Repeat steps 1-5 for the other Bridge. The Web-based Utility won 't communicate. If you encounter problems...
.... Click the Advanced tab. 3. You have two ways to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 Perform the following steps: •• Verify that all other Bridge settings will automatically clone the Xbox's MAC address. •• Repeat steps 1-5 for the other Bridge. The Web-based Utility won 't communicate. If you encounter problems...
User Guide
Page 15
...Cabling Type Transmit Power Security Features WEP Key Bits Protocols Environmental Dimensions Weight Power Certification Operating Temp. Wireless-G Ethernet Bridge Specifications 12 Storage Temp. Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-...Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ±...
...Cabling Type Transmit Power Security Features WEP Key Bits Protocols Environmental Dimensions Weight Power Certification Operating Temp. Wireless-G Ethernet Bridge Specifications 12 Storage Temp. Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-...Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ±...
User Guide
Page 16
... at your product to (a) repair the product with new or refurbished parts, (b) replace the product with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under this limited warranty fails of its option, to...
... at your product to (a) repair the product with new or refurbished parts, (b) replace the product with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under this limited warranty fails of its option, to...
User Guide
Page 17
...-current rates. Please direct all shipping and handling charges, custom duties, VAT and other items with the product you . Warranty Information Wireless-G Ethernet Bridge 14 Appendix C rejected. Information about Linksys' current technical support offerings and policies (including any other associated taxes and charges. Box 18558, Irvine, CA 92623. Defective product covered by you...
...-current rates. Please direct all shipping and handling charges, custom duties, VAT and other items with the product you . Warranty Information Wireless-G Ethernet Bridge 14 Appendix C rejected. Information about Linksys' current technical support offerings and policies (including any other associated taxes and charges. Box 18558, Irvine, CA 92623. Defective product covered by you...
User Guide
Page 18
... accept any interference received, including interference that may not cause harmful interference, and (2) this equipment. Operation is subject to Part 15 of the device. Wireless-G Ethernet Bridge 15 This device must not be installed and operated with Canadian ICES-003 and RSS210. Appendix D Appendix D: Regulatory Information FCC Statement This device complies with...
... accept any interference received, including interference that may not cause harmful interference, and (2) this equipment. Operation is subject to Part 15 of the device. Wireless-G Ethernet Bridge 15 This device must not be installed and operated with Canadian ICES-003 and RSS210. Appendix D Appendix D: Regulatory Information FCC Statement This device complies with...
User Guide
Page 24
... THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. Subject to the terms...
... THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. Subject to the terms...
User Guide
Page 25
... feature is enabled, the above information is transmitted to you by Cisco and the relevant third parties set forth in Schedule 3. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with the email address supplied by you when you activated the reports feature. megabytes per hour), application usage...
... feature is enabled, the above information is transmitted to you by Cisco and the relevant third parties set forth in Schedule 3. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with the email address supplied by you when you activated the reports feature. megabytes per hour), application usage...
User Guide
Page 26
... updates to it. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty shall not apply...
... updates to it. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty shall not apply...