User Guide
Page 2
... it . Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of their respective holders. Copyright © 2008 Cisco Systems, Inc. and certain other countries. Wireless-G Ethernet Bridge About This Guide i Other...
... it . Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of their respective holders. Copyright © 2008 Cisco Systems, Inc. and certain other countries. Wireless-G Ethernet Bridge About This Guide i Other...
User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
User Guide
Page 4
... and performing a self-test, and remains lit after the self-test has ended. NOTE: If you reset the Wireless-G Ethernet Bridge, you will erase all of your Wireless-G network and its factory default settings. Chapter 1 Product Overview Chapter 1: Product Overview Thank you for choosing theWireless-G ...to the wired network. Ethernet (Green) This LED will be lit steadily when the Bridge is connected to your wireless network. Do not reset the Wireless-G Ethernet Bridge if you want to the wireless network. The LED will connect the Ethernet network cable. LAN The LAN port is...
... and performing a self-test, and remains lit after the self-test has ended. NOTE: If you reset the Wireless-G Ethernet Bridge, you will erase all of your Wireless-G network and its factory default settings. Chapter 1 Product Overview Chapter 1: Product Overview Thank you for choosing theWireless-G ...to the wired network. Ethernet (Green) This LED will be lit steadily when the Bridge is connected to your wireless network. Do not reset the Wireless-G Ethernet Bridge if you want to the wireless network. The LED will connect the Ethernet network cable. LAN The LAN port is...
User Guide
Page 5
... take some additional steps to enable Media Access Control (MAC) address filtering. Wireless-G Ethernet Bridge Wireless Security Checklist 4. General Network Security Guidelines Wireless network security is useless if the underlying network is more information on some older devices that do not use linksys as access points, routers, and gateways, you should change their settings. Additional...
... take some additional steps to enable Media Access Control (MAC) address filtering. Wireless-G Ethernet Bridge Wireless Security Checklist 4. General Network Security Guidelines Wireless network security is useless if the underlying network is more information on some older devices that do not use linksys as access points, routers, and gateways, you should change their settings. Additional...
User Guide
Page 6
... for all devices in the Password field. do not use the Utility. For added security, Linksys recommends that you would like to change the default SSID (linksys) to change the advanced wireless settings and clone a MAC address onto the Bridge. •• Status - Make sure this setting is displayed here. Chapter 3 Configuration using the...
... for all devices in the Password field. do not use the Utility. For added security, Linksys recommends that you would like to change the default SSID (linksys) to change the advanced wireless settings and clone a MAC address onto the Bridge. •• Status - Make sure this setting is displayed here. Chapter 3 Configuration using the...
User Guide
Page 7
...onscreen information. If you chose Ad-Hoc mode, then select the correct operating channel for the Bridge. The four security modes are briefly discussed here. The Wireless Site Survey screen will appear. This should match the channel setting of these networks. Security To ...instructions on your network from the Mode drop-down menu, select one of the other devices on configuring wireless security for the Bridge, refer to communicate with each wireless network detected, the following information is a security standard stronger than WEP encryption. Enable Security Settings If...
...onscreen information. If you chose Ad-Hoc mode, then select the correct operating channel for the Bridge. The four security modes are briefly discussed here. The Wireless Site Survey screen will appear. This should match the channel setting of these networks. Security To ...instructions on your network from the Mode drop-down menu, select one of the other devices on configuring wireless security for the Bridge, refer to communicate with each wireless network detected, the following information is a security standard stronger than WEP encryption. Enable Security Settings If...
User Guide
Page 8
...changes. Passphrase Instead of manually entering WEP keys, you TKIP for the Bridge. It is case-sensitive and should not be longer than 16 alphanumeric characters. (The Passphrase function is compatible with non-Linksys wireless products, you will be used to save your web browser. View Log... Click View Log to refresh the Log Table screen. This Passphrase is a key shared between the Bridge and the server. These are not valid key...
...changes. Passphrase Instead of manually entering WEP keys, you TKIP for the Bridge. It is case-sensitive and should not be longer than 16 alphanumeric characters. (The Passphrase function is compatible with non-Linksys wireless products, you will be used to save your web browser. View Log... Click View Log to refresh the Log Table screen. This Passphrase is a key shared between the Bridge and the server. These are not valid key...
User Guide
Page 9
...using 64-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Click Apply to save your wireless data communications. It is compatible with Linksys wireless products only and cannot be used to generate one or more WEP keys. Enter the ID in the User ID ...used in coordination with a RADIUS server. (This should not be longer than 32 alphanumeric characters. (This Passphrase function is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of the encryption, they are not valid key values.) If you enter the Passphrase, click ...
...using 64-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Click Apply to save your wireless data communications. It is compatible with Linksys wireless products only and cannot be used to generate one or more WEP keys. Enter the ID in the User ID ...used in coordination with a RADIUS server. (This should not be longer than 32 alphanumeric characters. (This Passphrase function is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of the encryption, they are not valid key values.) If you enter the Passphrase, click ...
User Guide
Page 10
...then click Refresh on your changes, click Apply. Click Cancel to cancel your changes. Password Tab The Password screen lets you create. Wireless-G Ethernet Bridge Password Administrative Password It is the password used for your changes. Click Cancel to cancel your changes. If your page does not ...-based Utility will be prompted for the Bridge's Password. The new Password must not include any spaces. Root Certificate Enter the root certificate you have installed to authenticate you on your wireless network in the User ID field and the password in the User ID field....
...then click Refresh on your changes, click Apply. Click Cancel to cancel your changes. Password Tab The Password screen lets you create. Wireless-G Ethernet Bridge Password Administrative Password It is the password used for your changes. Click Cancel to cancel your changes. If your page does not ...-based Utility will be prompted for the Bridge's Password. The new Password must not include any spaces. Root Certificate Enter the root certificate you have installed to authenticate you on your wireless network in the User ID field and the password in the User ID field....
User Guide
Page 11
...a particular receiving station and negotiates the sending of a data frame. With the Shared key setting, all wireless devices must have the same WEP keys so that the Bridge and the client can clone the MAC address of this value are Auto, Open, and Shared. The range... frame to acknowledge the right to cancel your network. Using the Auto setting, the Bridge will automatically detect whether a wireless device uses shared key or open system authentication, and then it will Wireless-G Ethernet Bridge not be cloned whenever you can keep the default setting, Disable. You can join...
...a particular receiving station and negotiates the sending of a data frame. With the Shared key setting, all wireless devices must have the same WEP keys so that the Bridge and the client can clone the MAC address of this value are Auto, Open, and Shared. The range... frame to acknowledge the right to cancel your network. Using the Auto setting, the Bridge will automatically detect whether a wireless device uses shared key or open system authentication, and then it will Wireless-G Ethernet Bridge not be cloned whenever you can keep the default setting, Disable. You can join...
User Guide
Page 12
... Guide pdf, then click the this User Guide on -screen information. LAN Settings IP Address The Bridge's IP Address is displayed here. Statistics Ethernet TX The number of the Bridge's security is displayed here. Wireless-G Ethernet Bridge Help Linksys Website Click the link to the Ethernet network is displayed here. Chapter 3 Configuration using the Web...
... Guide pdf, then click the this User Guide on -screen information. LAN Settings IP Address The Bridge's IP Address is displayed here. Statistics Ethernet TX The number of the Bridge's security is displayed here. Wireless-G Ethernet Bridge Help Linksys Website Click the link to the Ethernet network is displayed here. Chapter 3 Configuration using the Web...
User Guide
Page 13
... Chapter 3 Configuration using the Web-based Utility at www.linksys.com. Firmware should be upgraded ONLY if you have selected the appropriate file, click Upgrade, and follow these instructions: 1. Wireless-G Ethernet Bridge 10 To upgrade the firmware, follow the on your computer.... Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. The Firmware Upgrade screen will appear. After you ...
... Chapter 3 Configuration using the Web-based Utility at www.linksys.com. Firmware should be upgraded ONLY if you have selected the appropriate file, click Upgrade, and follow these instructions: 1. Wireless-G Ethernet Bridge 10 To upgrade the firmware, follow the on your computer.... Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. The Firmware Upgrade screen will appear. After you ...
User Guide
Page 14
Open the Web-based Utility. Follow these instructions: 1. Click Apply to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 If you are using the Bridge. •• Make sure that the SSID and network mode are set to the access point. Follow the on-screen instructions...8226;• Verify that the SSID is on your password, you are not sure what the Bridge's IP address is case-sensitive. Make sure that lists all the Wireless-G Ethernet Bridges on the same wireless network as well. If you forget your network. To use the default setting, enter admin ...
Open the Web-based Utility. Follow these instructions: 1. Click Apply to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 If you are using the Bridge. •• Make sure that the SSID and network mode are set to the access point. Follow the on-screen instructions...8226;• Verify that the SSID is on your password, you are not sure what the Bridge's IP address is case-sensitive. Make sure that lists all the Wireless-G Ethernet Bridges on the same wireless network as well. If you forget your network. To use the default setting, enter admin ...
User Guide
Page 15
Wireless-G Ethernet Bridge Specifications 12 Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM WEP Encryption, WPA 64/128-bit...
Wireless-G Ethernet Bridge Specifications 12 Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM WEP Encryption, WPA 64/128-bit...
User Guide
Page 16
... incidental or consequential damages, so the above limitation may require. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the...or refurbished parts, (b) replace the product with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. If the product proves defective during the Warranty Period, contact Linksys Technical Support for which this limited warranty will be free of original ...
... incidental or consequential damages, so the above limitation may require. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which begins on the...or refurbished parts, (b) replace the product with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. If the product proves defective during the Warranty Period, contact Linksys Technical Support for which this limited warranty will be free of original ...
User Guide
Page 17
...under this limited warranty will be subject to you . Information about Linksys' current technical support offerings and policies (including any other associated taxes.... Technical Support This limited warranty is governed by the laws of America and Canada are returning to : Linksys, P.O. Appendix C rejected. Box 18558, Irvine, CA 92623. Defective product covered by you without charge.... support services) can be repaired or replaced and returned to charge at : www.linksys.com/support. Customers outside of the United States of the jurisdiction in which the Product...
...under this limited warranty will be subject to you . Information about Linksys' current technical support offerings and policies (including any other associated taxes.... Technical Support This limited warranty is governed by the laws of America and Canada are returning to : Linksys, P.O. Appendix C rejected. Box 18558, Irvine, CA 92623. Defective product covered by you without charge.... support services) can be repaired or replaced and returned to charge at : www.linksys.com/support. Customers outside of the United States of the jurisdiction in which the Product...
User Guide
Page 18
... installation. There may cause undesired operation of the following two conditions: 1. WARNING: This product contains lead, known to the State of the FCC Rules. Wireless-G Ethernet Bridge 15 However, there is not more of the device. Operation is firmware-limited to channels 1 through 11. This device has been designed to Part 15...
... installation. There may cause undesired operation of the following two conditions: 1. WARNING: This product contains lead, known to the State of the FCC Rules. Wireless-G Ethernet Bridge 15 However, there is not more of the device. Operation is firmware-limited to channels 1 through 11. This device has been designed to Part 15...
User Guide
Page 24
... THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. IN THE EVENT THAT...
... THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. IN THE EVENT THAT...
User Guide
Page 25
... and assistance with the terms of this termination. The Software and Documentation are reserved by such software product's end user license agreement. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with, or participation in order (i) to enable Cisco to offer you hereby waive any third party. You...
... and assistance with the terms of this termination. The Software and Documentation are reserved by such software product's end user license agreement. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with, or participation in order (i) to enable Cisco to offer you hereby waive any third party. You...
User Guide
Page 26
... collected by jurisdiction. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty does not guarantee...
... collected by jurisdiction. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty does not guarantee...