User Guide
Page 2
... there is a caution or warning and it . Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of Cisco Systems, Inc. Wireless-G Ethernet Bridge About This Guide i WEB: This globe icon indicates a noteworthy...
... there is a caution or warning and it . Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are trademarks or registered trademarks of Cisco Systems, Inc. Wireless-G Ethernet Bridge About This Guide i WEB: This globe icon indicates a noteworthy...
User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to ...Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 17 Appendix E: Software End User License Agreement 21 Cisco Products 21 Software Licenses 21 Wireless-G Ethernet Bridge...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to ...Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 17 Appendix E: Software End User License Agreement 21 Cisco Products 21 Software Licenses 21 Wireless-G Ethernet Bridge...
User Guide
Page 4
...) This LED will be lit steadily when the Bridge is connected to the wireless network. The LED will connect the power adapter. Wireless-G Ethernet Bridge Reset When pressed, the Reset button resets the Bridge to the wired network. Do not reset the Wireless-G Ethernet Bridge if you want to your Wireless-G network and its factory default settings. Power The Power...
...) This LED will be lit steadily when the Bridge is connected to the wireless network. The LED will connect the power adapter. Wireless-G Ethernet Bridge Reset When pressed, the Reset button resets the Bridge to the wired network. Do not reset the Wireless-G Ethernet Bridge if you want to your Wireless-G network and its factory default settings. Power The Power...
User Guide
Page 5
...asked for a password when you the ability to change their settings. Linksys wireless products use linksys as access points, routers, and gateways, you will be available for wireless devices with high-speed Internet access are adopting them to intruders than... that do not use them at least eight characters in length. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to every networking device. Wireless-G Ethernet Bridge Wireless Security Checklist 4. Enable encryption Encryption protects data transmitted over the airwaves, you , but do...
...asked for a password when you the ability to change their settings. Linksys wireless products use linksys as access points, routers, and gateways, you will be available for wireless devices with high-speed Internet access are adopting them to intruders than... that do not use them at least eight characters in length. Chapter 2 Chapter 2: Wireless Security Checklist Wireless networks are convenient and easy to every networking device. Wireless-G Ethernet Bridge Wireless Security Checklist 4. Enable encryption Encryption protects data transmitted over the airwaves, you , but do...
User Guide
Page 6
...to use your web browser and the Wireless-G Ethernet Bridge Web-based Utility. Then press Enter. The utility's Setup screen will appear. Enables you to the Bridge. Wireless-G Ethernet Bridge Setup Tab The Setup screen lets you configure the wired and wireless network settings for all devices in the ... and links to a name of the Wireless-G Ethernet Bridge (the default is displayed here. LAN Device Name You may assign any name to configure the IP address and wireless settings. •• Password - For added security, Linksys recommends that you change the password or ...
...to use your web browser and the Wireless-G Ethernet Bridge Web-based Utility. Then press Enter. The utility's Setup screen will appear. Enables you to the Bridge. Wireless-G Ethernet Bridge Setup Tab The Setup screen lets you configure the wired and wireless network settings for all devices in the ... and links to a name of the Wireless-G Ethernet Bridge (the default is displayed here. LAN Device Name You may assign any name to configure the IP address and wireless settings. •• Password - For added security, Linksys recommends that you change the password or ...
User Guide
Page 7
... network from the Mode drop-down menu. For detailed instructions on your network Wireless-G Ethernet Bridge Security From the Security Mode drop-down menu. The Wireless Site Survey screen will appear. Wireless Site Survey For each other. Click Refresh to obtain the most up-to...network mode from the Channel drop-down menu, select one of the other devices on configuring wireless security for the Bridge. Click Help for your wireless-equipped device to the "Wireless Security" chapter. 4 The four security modes are briefly discussed here. Security To enable security...
... network from the Mode drop-down menu. For detailed instructions on your network Wireless-G Ethernet Bridge Security From the Security Mode drop-down menu. The Wireless Site Survey screen will appear. Wireless Site Survey For each other. Click Refresh to obtain the most up-to...network mode from the Channel drop-down menu, select one of the other devices on configuring wireless security for the Bridge. Click Help for your wireless-equipped device to the "Wireless Security" chapter. 4 The four security modes are briefly discussed here. Security To enable security...
User Guide
Page 8
...(10 hex digits) or 128 bits (26 hex digits). WPA Pre-Shared Key WPA gives you TKIP for the Bridge. WEP Encryption In order to communicate with Linksys wireless products only. If you want to use ), and a level of values. (Do not leave a key field ...non-Linksys wireless products.) After you enter the Passphrase, click Generate to generate one or more WEP keys. Chapter 3 Configuration using a Passphrase, then you can enter a Passphrase. This Passphrase is a key shared between the Bridge and the server. Valid hexadecimal characters are using 128-bit Wireless-G Ethernet Bridge ...
...(10 hex digits) or 128 bits (26 hex digits). WPA Pre-Shared Key WPA gives you TKIP for the Bridge. WEP Encryption In order to communicate with Linksys wireless products only. If you want to use ), and a level of values. (Do not leave a key field ...non-Linksys wireless products.) After you enter the Passphrase, click Generate to generate one or more WEP keys. Chapter 3 Configuration using a Passphrase, then you can enter a Passphrase. This Passphrase is a key shared between the Bridge and the server. Valid hexadecimal characters are using 128-bit Wireless-G Ethernet Bridge ...
User Guide
Page 9
...want to create an encryption scheme for Wired Equivalent Privacy, WEP is an encryption method used when a RADIUS server is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Passphrase ... the Key 1 field, and enter it manually in length. MD5 should only be exactly 10 hexadecimal characters in the wireless client.) After you to communicate with Linksys wireless products only and cannot be used to view a log. Click View Log to generate one or more WEP keys. ...
...want to create an encryption scheme for Wired Equivalent Privacy, WEP is an encryption method used when a RADIUS server is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Passphrase ... the Key 1 field, and enter it manually in length. MD5 should only be exactly 10 hexadecimal characters in the wireless client.) After you to communicate with Linksys wireless products only and cannot be used to view a log. Click View Log to generate one or more WEP keys. ...
User Guide
Page 10
... additional on -screen information. User ID Your User ID is the password used for your wireless network. Root Certificate Enter the root certificate you on your wireless network. Wireless-G Ethernet Bridge Password Administrative Password It is the Login name of your wireless network or click Browse to browse for it . Restore Factory Defaults Click Yes to...
... additional on -screen information. User ID Your User ID is the password used for your wireless network. Root Certificate Enter the root certificate you on your wireless network. Wireless-G Ethernet Bridge Password Administrative Password It is the Login name of your wireless network or click Browse to browse for it . Restore Factory Defaults Click Yes to...
User Guide
Page 11
...the fastest possible data rate and enable the Auto-Fallback feature. If you want to clone the MAC address of a data frame. The Bridge will Wireless-G Ethernet Bridge not be enabled. Click Help for a packet before data is smaller than the preset RTS threshold size, the RTS/CTS mechanism will ...actively scan for a new MAC address to the Bridge's LAN port. With the Open system setting, any device can clone the MAC address of ...
...the fastest possible data rate and enable the Auto-Fallback feature. If you want to clone the MAC address of a data frame. The Bridge will Wireless-G Ethernet Bridge not be enabled. Click Help for a packet before data is smaller than the preset RTS threshold size, the RTS/CTS mechanism will ...actively scan for a new MAC address to the Bridge's LAN port. With the Open system setting, any device can clone the MAC address of ...
User Guide
Page 12
...have the Reader, click the Adobe Website link to all of packets received from the wireless network is displayed here. Gateway The Gateway address for additional on -screen. Wireless-G Ethernet Bridge Help Linksys Website Click the link to view the pdf. It is in PDF format Click ...the link to the Bridge is displayed here. Adobe Website (software for the Web-based Utility's screens and the Bridge's online technical support resources (all...
...have the Reader, click the Adobe Website link to all of packets received from the wireless network is displayed here. Gateway The Gateway address for additional on -screen. Wireless-G Ethernet Bridge Help Linksys Website Click the link to view the pdf. It is in PDF format Click ...the link to the Bridge is displayed here. Adobe Website (software for the Web-based Utility's screens and the Bridge's online technical support resources (all...
User Guide
Page 13
... on your computer. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. After you experience problems with the Bridge. Firmware should be upgraded ONLY if you have selected the appropriate file, click Upgrade, and follow these instructions: 1. The Firmware Upgrade screen will appear. Firmware Upgrade 4. Wireless-G Ethernet Bridge 10 Then extract the file...
... on your computer. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. After you experience problems with the Bridge. Firmware should be upgraded ONLY if you have selected the appropriate file, click Upgrade, and follow these instructions: 1. The Firmware Upgrade screen will appear. Firmware Upgrade 4. Wireless-G Ethernet Bridge 10 Then extract the file...
User Guide
Page 14
... IP address again. I make sure that all the devices are set to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 You have two ways to -head (ad-hoc) gaming with a wireless-enabled PC or printer. WEB: If your network. Troubleshooting The Bridge-enabled PC won't communicate with two Xboxes, but they won 't open. Click the...
... IP address again. I make sure that all the devices are set to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 You have two ways to -head (ad-hoc) gaming with a wireless-enabled PC or printer. WEB: If your network. Troubleshooting The Bridge-enabled PC won't communicate with two Xboxes, but they won 't open. Click the...
User Guide
Page 15
Storage Temp. Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1...ºF (-20 to 70ºC) 10 to 85% Noncondensing 5 to 90% Noncondensing Specifications are subject to change without notice. Wireless-G Ethernet Bridge Specifications 12 Appendix B Appendix B: Specifications Model Standards Ports Buttons LEDs Cabling Type Transmit Power Security Features WEP Key Bits Protocols Environmental ...
Storage Temp. Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1...ºF (-20 to 70ºC) 10 to 85% Noncondensing 5 to 90% Noncondensing Specifications are subject to change without notice. Wireless-G Ethernet Bridge Specifications 12 Appendix B Appendix B: Specifications Model Standards Ports Buttons LEDs Cabling Type Transmit Power Security Features WEP Key Bits Protocols Environmental ...
User Guide
Page 16
... warranty or remedy provided under this limited warranty fails of purchase by use with non‑Linksys products, (d) the product has not been installed, operated, repaired, or maintained in accordance with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. Some jurisdictions do not allow limitations on which the product or software...
... warranty or remedy provided under this limited warranty fails of purchase by use with non‑Linksys products, (d) the product has not been installed, operated, repaired, or maintained in accordance with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. Some jurisdictions do not allow limitations on which the product or software...
User Guide
Page 17
...in which the Product was purchased by you. Information about Linksys' current technical support offerings and policies (including any other items with the product you without charge. Warranty Information Wireless-G Ethernet Bridge 14 Defective product covered by the laws of America and ...Canada are returning to you are responsible for support services) can be repaired or replaced and returned to Linksys. Box 18558, Irvine, CA 92623....
...in which the Product was purchased by you. Information about Linksys' current technical support offerings and policies (including any other items with the product you without charge. Warranty Information Wireless-G Ethernet Bridge 14 Defective product covered by the laws of America and ...Canada are returning to you are responsible for support services) can be repaired or replaced and returned to Linksys. Box 18558, Irvine, CA 92623....
User Guide
Page 18
... co-located or operating in the USA is not more of Industry Canada. The required antenna impedance is subject to Part 15 of the device. Wireless-G Ethernet Bridge 15 FCC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for successful communication. Antenna having a maximum gain of electric shock...
... co-located or operating in the USA is not more of Industry Canada. The required antenna impedance is subject to Part 15 of the device. Wireless-G Ethernet Bridge 15 FCC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for successful communication. Antenna having a maximum gain of electric shock...
User Guide
Page 24
..., IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. Appendix E Appendix E: Software End...
..., IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. Appendix E Appendix E: Software End...
User Guide
Page 25
... notices and any third party. Cisco and its related Documentation, or electronically transfer the Software or Documentation from the reports feature. 22 Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with, or participation in promotions of advertisers found on the network with this termination. If you activate the...
... notices and any third party. Cisco and its related Documentation, or electronically transfer the Software or Documentation from the reports feature. 22 Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with, or participation in promotions of advertisers found on the network with this termination. If you activate the...
User Guide
Page 26
... laws and regulations. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. The Software and Documentation qualify as "commercial...
... laws and regulations. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. The Software and Documentation qualify as "commercial...