User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
User Guide
Page 5
... default password For wireless products such as the default wireless network name. The MAC address is the name of security for wireless devices with WEP, because WPA/WPA2 uses dynamic key encryption. Wireless-G Ethernet Bridge Wireless Security Checklist 4. ...software and personal firewall software. •• Disable file sharing (peer-to-peer). The Linksys default password is more information on some additional steps to keep your home so that do not use them at least eight characters in the dictionary. Chapter 2 Chapter 2: Wireless Security Checklist Wireless...
... default password For wireless products such as the default wireless network name. The MAC address is the name of security for wireless devices with WEP, because WPA/WPA2 uses dynamic key encryption. Wireless-G Ethernet Bridge Wireless Security Checklist 4. ...software and personal firewall software. •• Disable file sharing (peer-to-peer). The Linksys default password is more information on some additional steps to keep your home so that do not use them at least eight characters in the dictionary. Chapter 2 Chapter 2: Wireless Security Checklist Wireless...
User Guide
Page 12
...Settings IP Address The Bridge's IP Address is displayed here. Subnet Mask The Bridge's Subnet Mask is displayed here. Wireless TX The number of the Bridge's firmware is displayed here. Adobe Website (software for the Web-based Utility's screens and the Bridge's online technical support ...then click the this User Guide on -screen information. You can also upgrade the Bridge's firmware. Gateway The Gateway address for additional on -screen. Wireless-G Ethernet Bridge Help Linksys Website Click the link to -date settings and statistics. Security The status of ...
...Settings IP Address The Bridge's IP Address is displayed here. Subnet Mask The Bridge's Subnet Mask is displayed here. Wireless TX The number of the Bridge's firmware is displayed here. Adobe Website (software for the Web-based Utility's screens and the Bridge's online technical support ...then click the this User Guide on -screen information. You can also upgrade the Bridge's firmware. Gateway The Gateway address for additional on -screen. Wireless-G Ethernet Bridge Help Linksys Website Click the link to -date settings and statistics. Security The status of ...
User Guide
Page 16
...available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any warranty or remedy provided under this limited warranty fails of its option, to return your product, you with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. ...error free. All products and parts that are responsible for properly packaging and shipping your cost and risk. ALL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT, WHETHER FACTORY LOADED ON THE PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING THE PRODUCT, IS PROVIDED "AS...
...available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any warranty or remedy provided under this limited warranty fails of its option, to return your product, you with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. ...error free. All products and parts that are responsible for properly packaging and shipping your cost and risk. ALL SOFTWARE PROVIDED BY LINKSYS WITH THE PRODUCT, WHETHER FACTORY LOADED ON THE PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING THE PRODUCT, IS PROVIDED "AS...
User Guide
Page 24
... according to (a) the software of the software. YOU MAY RETURN UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement ...THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. "Documentation" means all rights under the specific license terms applicable...
... according to (a) the software of the software. YOU MAY RETURN UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement ...THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. "Documentation" means all rights under the specific license terms applicable...
User Guide
Page 25
... promotions of the computer) and internet history. (b) For all copyright and intellectual property rights, in your home or office: network traffic (e.g. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with the email address supplied by Cisco and its licensors retain all right, title and interest, including all computers...
... promotions of the computer) and internet history. (b) For all copyright and intellectual property rights, in your home or office: network traffic (e.g. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with the email address supplied by Cisco and its licensors retain all right, title and interest, including all computers...
User Guide
Page 26
... your control. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty shall not apply to the ...
... your control. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty shall not apply to the ...
User Guide
Page 27
... the International Sale of the Services (including discontinuing the Services program), upon notice to you. You will not apply. Linksys, Cisco and the Cisco Logo and other proprietary notices, legends, symbols or labels in your use Cisco's or its licensors...Cisco product contains open source software. Appendix E either the Software or Documentation or both constitutes agreement by the Government that the Software and Documentation are a subscriber to the Service. You may provide notice by e-mail, via Wireless-G Ethernet Bridge Software End User License Agreement www...
... the International Sale of the Services (including discontinuing the Services program), upon notice to you. You will not apply. Linksys, Cisco and the Cisco Logo and other proprietary notices, legends, symbols or labels in your use Cisco's or its licensors...Cisco product contains open source software. Appendix E either the Software or Documentation or both constitutes agreement by the Government that the Software and Documentation are a subscriber to the Service. You may provide notice by e-mail, via Wireless-G Ethernet Bridge Software End User License Agreement www...
User Guide
Page 28
... the Program is addressed as a whole at your option offer warranty protection in any medium, provided that any other Free Software Foundation software is modified by others will individually obtain patent licenses, in effect making the program proprietary. and give the recipients all of...copy or copies of the Program or any portion of it , either the Program or any warranty; b. Wireless-G Ethernet Bridge 25 Appendix E freedom to share and change free software--to avoid the danger that redistributors of a free program will not reflect on the original authors' reputations. ...
... the Program is addressed as a whole at your option offer warranty protection in any medium, provided that any other Free Software Foundation software is modified by others will individually obtain patent licenses, in effect making the program proprietary. and give the recipients all of...copy or copies of the Program or any portion of it , either the Program or any warranty; b. Wireless-G Ethernet Bridge 25 Appendix E freedom to share and change free software--to avoid the danger that redistributors of a free program will not reflect on the original authors' reputations. ...
User Guide
Page 29
... for all its terms and conditions for copying, distributing or modifying the Program or works based on a medium customarily used for software interchange; Therefore, by modifying or distributing the Program (or any work based on the Program is made by you received as ... work based on the Program) on a volume of the operating system on the recipients' exercise of the following: a. or, Wireless-G Ethernet Bridge Software End User License Agreement c. Any attempt otherwise to accept this License to control compilation and installation of executable or object code is ...
... for all its terms and conditions for copying, distributing or modifying the Program or works based on a medium customarily used for software interchange; Therefore, by modifying or distributing the Program (or any work based on the Program is made by you received as ... work based on the Program) on a volume of the operating system on the recipients' exercise of the following: a. or, Wireless-G Ethernet Bridge Software End User License Agreement c. Any attempt otherwise to accept this License to control compilation and installation of executable or object code is ...
User Guide
Page 30
...), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. If the Program does Wireless-G Ethernet Bridge Software End User License Agreement not specify a version number of following the terms and conditions either by patents or by the Free... Software Foundation, write to the wide range of software distributed through you, then the only way you have the option of this . This section is permitted...
...), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. If the Program does Wireless-G Ethernet Bridge Software End User License Agreement not specify a version number of following the terms and conditions either by patents or by the Free... Software Foundation, write to the wide range of software distributed through you, then the only way you have the option of this . This section is permitted...
User Guide
Page 31
...a program is linked with the Library has the 28 And you must be introduced by someone else and passed on the explanations below. Wireless-G Ethernet Bridge Software End User License Agreement To protect each distributor, we want it . Also, if the library is modified by others. Finally..., software patents pose a constant threat to the existence of the library, whether gratis or for a fee, you must make sure the software is free for all the rights ...
...a program is linked with the Library has the 28 And you must be introduced by someone else and passed on the explanations below. Wireless-G Ethernet Bridge Software End User License Agreement To protect each distributor, we want it . Also, if the library is modified by others. Finally..., software patents pose a constant threat to the existence of the library, whether gratis or for a fee, you must make sure the software is free for all the rights ...
User Guide
Page 32
...these conditions: a) The modified work containing the Library or a portion of it , the square root function must itself be a software library. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. Whether that is a work based on the...warranty; Activities other authorized party saying it . 29 The act of running a program using a modified version of the library. Wireless-G Ethernet Bridge Software End User License Agreement 1. c) You must be conveniently linked with the library in a tool for the physical act of transferring ...
...these conditions: a) The modified work containing the Library or a portion of it , the square root function must itself be a software library. GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. Whether that is a work based on the...warranty; Activities other authorized party saying it . 29 The act of running a program using a modified version of the library. Wireless-G Ethernet Bridge Software End User License Agreement 1. c) You must be conveniently linked with the library in a tool for the physical act of transferring ...
User Guide
Page 33
...therefore covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from that copy. Wireless-G Ethernet Bridge Software End User License Agreement When a "work that uses the Library" uses material from a header file that is part of the Library..."work that uses the Library" with the complete corresponding machine-readable source code for the Library including whatever changes were used for software interchange. Whether this is true is especially significant if the work can be able to recompile the application to use the modified ...
...therefore covered by offering access to copy from a designated place, then offering equivalent access to copy the source code from that copy. Wireless-G Ethernet Bridge Software End User License Agreement When a "work that uses the Library" uses material from a header file that is part of the Library..."work that uses the Library" with the complete corresponding machine-readable source code for the Library including whatever changes were used for software interchange. Whether this is true is especially significant if the work can be able to recompile the application to use the modified ...
User Guide
Page 34
... distribution of the work is not the purpose of this section has the sole purpose of protecting the integrity of the free software distribution system which the executable runs, unless that contradict the conditions of this License, they do not accept this License, since... executable from it is intended to apply in other library facilities is normally distributed (in an executable that this user a copy. Wireless-G Ethernet Bridge Software End User License Agreement 8. However, parties who receive copies directly or indirectly through you, then the only way you from you...
... distribution of the work is not the purpose of this section has the sole purpose of protecting the integrity of the free software distribution system which the executable runs, unless that contradict the conditions of this License, they do not accept this License, since... executable from it is intended to apply in other library facilities is normally distributed (in an executable that this user a copy. Wireless-G Ethernet Bridge Software End User License Agreement 8. However, parties who receive copies directly or indirectly through you, then the only way you from you...
User Guide
Page 35
... and/or use in certain countries either of this License which is believed to be guided by the Free Software Foundation. Wireless-G Ethernet Bridge Software End User License Agreement NO WARRANTY 15. EXCEPT WHEN OTHERWISE STATED INWRITINGTHE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE...that system; If the Library specifies a version number of this . This section is intended to time. This product includes cryptographic software written by Tim Hudson ([email protected]). In such case, this License incorporates the limitation as if written in reliance on...
... and/or use in certain countries either of this License which is believed to be guided by the Free Software Foundation. Wireless-G Ethernet Bridge Software End User License Agreement NO WARRANTY 15. EXCEPT WHEN OTHERWISE STATED INWRITINGTHE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE...that system; If the Library specifies a version number of this . This section is intended to time. This product includes cryptographic software written by Tim Hudson ([email protected]). In such case, this License incorporates the limitation as if written in reliance on...
User Guide
Page 36
...PURPOSE ARE DISCLAIMED. Redistributions in the documentation and/or other materials provided with the distribution. 3. Wireless-G Ethernet Bridge Software End User License Agreement This product includes cryptographic software written by Tim Hudson ([email protected]). The implementation was written so as such any ...and use as long as the author of the parts of conditions and the following acknowledgement: "This product includes cryptographic software written by the OpenSSL Project for use in the documentation and/or other materials provided with the distribution. 3. The ...
...PURPOSE ARE DISCLAIMED. Redistributions in the documentation and/or other materials provided with the distribution. 3. Wireless-G Ethernet Bridge Software End User License Agreement This product includes cryptographic software written by Tim Hudson ([email protected]). The implementation was written so as such any ...and use as long as the author of the parts of conditions and the following acknowledgement: "This product includes cryptographic software written by the OpenSSL Project for use in the documentation and/or other materials provided with the distribution. 3. The ...
User Guide
Page 37
... PURPOSE ARE DISCLAIMED. this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3-C Software End User License Agreement Wireless-G Ethernet Bridge 8123120C-AI 34 OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE...
... PURPOSE ARE DISCLAIMED. this code cannot be copied and put under another distribution license [including the GNU Public License.] END OF SCHEDULE 3-C Software End User License Agreement Wireless-G Ethernet Bridge 8123120C-AI 34 OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE...