User Guide
Page 2
... trademarks or trademarks of Cisco Systems, Inc. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are listed without http://...; 2008 Cisco Systems, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders. Wireless-G Ethernet Bridge About This Guide i and certain other countries. About This Guide Icon Descriptions While reading through the User Guide you...
... trademarks or trademarks of Cisco Systems, Inc. Resource Website Linksys www.linksys.com Linksys International www.linksys.com/international Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are listed without http://...; 2008 Cisco Systems, Inc. Other brands and product names are trademarks or registered trademarks of their respective holders. Wireless-G Ethernet Bridge About This Guide i and certain other countries. About This Guide Icon Descriptions While reading through the User Guide you...
User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based...D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15 Safety Notices 15 Industry Canada Statement 15 Avis d'Industrie Canada 16 Wireless Disclaimer 16 Avis de non-responsabilité concernant les appareils sans fil 16 User Information for Consumer Products Covered by EU Directive 2002...
User Guide
Page 4
... traffic. The LED will flash when there is where you will erase all of your wireless network. Wireless-G Ethernet Bridge Reset When pressed, the Reset button resets the Bridge to the wireless network. The LED will flash when there is connected to the wired network. Ethernet (Green) ...This LED will connect the Ethernet network cable. NOTE: If you reset the Wireless-G Ethernet Bridge, you will be lit steadily when the Bridge is wired network traffic. LAN The LAN port is connected to its shared high-speed Internet connection. In ...
... traffic. The LED will flash when there is where you will erase all of your wireless network. Wireless-G Ethernet Bridge Reset When pressed, the Reset button resets the Bridge to the wireless network. The LED will flash when there is connected to the wired network. Ethernet (Green) ...This LED will connect the Ethernet network cable. NOTE: If you reset the Wireless-G Ethernet Bridge, you will be lit steadily when the Bridge is wired network traffic. LAN The LAN port is connected to its shared high-speed Internet connection. In ...
User Guide
Page 5
... Disable file sharing (peer-to-peer). Wireless-G Ethernet Bridge Wireless Security Checklist 4. WEP is an older encryption standard and may be the only option available on wireless security, visit www.linksys.com/security 2 Change the default wireless network name or SSID Wireless devices have a default password set by ...sharing without your network secure. 1. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless network, you want to use linksys as it can be found in your home so that do not use personal...
... Disable file sharing (peer-to-peer). Wireless-G Ethernet Bridge Wireless Security Checklist 4. WEP is an older encryption standard and may be the only option available on wireless security, visit www.linksys.com/security 2 Change the default wireless network name or SSID Wireless devices have a default password set by ...sharing without your network secure. 1. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless network, you want to use linksys as it can be found in your home so that do not use personal...
User Guide
Page 6
...basic settings or make advanced configuration changes, use your wireless network. For added security, Linksys recommends that you would like to change the default SSID (linksys) to a name of your web browser, and enter the IP address of the Bridge's firmware is displayed here. Setup Firmware The version ...number of the Wireless-G Ethernet Bridge (the default is 192.168.1.226) in the Password field. ...
...basic settings or make advanced configuration changes, use your wireless network. For added security, Linksys recommends that you would like to change the default SSID (linksys) to a name of your web browser, and enter the IP address of the Bridge's firmware is displayed here. Setup Firmware The version ...number of the Wireless-G Ethernet Bridge (the default is 192.168.1.226) in the Password field. ...
User Guide
Page 7
...or click Cancel to -date data. Enable Security Settings If you have only Wireless-G devices in your wired network using the Web-based Utility Site Survey To search for the Bridge. To join a wireless network, click its SSID. •• MAC Address The MAC address of...network name. Security To enable security, select Enable, then click Edit Security Settings. Wireless Site Survey For each other devices on configuring wireless security for additional onscreen information. Click Help for the Bridge, refer to enable security settings; Keep the default, Mixed, if you have not...
...or click Cancel to -date data. Enable Security Settings If you have only Wireless-G devices in your wired network using the Web-based Utility Site Survey To search for the Bridge. To join a wireless network, click its SSID. •• MAC Address The MAC address of...network name. Security To enable security, select Enable, then click Edit Security Settings. Wireless Site Survey For each other devices on configuring wireless security for additional onscreen information. Click Help for the Bridge, refer to enable security settings; Keep the default, Mixed, if you have not...
User Guide
Page 8
... Passphrase. Passphrase Instead of the authentication process. If you want to communicate with Linksys wireless products only. If you will be longer than 16 alphanumeric characters. (The Passphrase function is used when the Bridge sends data. Log Table Click Refresh to use ), and a level of 8-... blank, and do not enter all zeroes. Valid hexadecimal characters are "0"-"9" and "A"-"F". Then either generate a WEP Key using 128-bit Wireless-G Ethernet Bridge Security > WPA Pre-Shared Key WPA Shared Key Enter a WPA Shared Key of WEP Encryption, 64 bits (10 hex digits) or...
... Passphrase. Passphrase Instead of the authentication process. If you want to communicate with Linksys wireless products only. If you will be longer than 16 alphanumeric characters. (The Passphrase function is used when the Bridge sends data. Log Table Click Refresh to use ), and a level of 8-... blank, and do not enter all zeroes. Valid hexadecimal characters are "0"-"9" and "A"-"F". Then either generate a WEP Key using 128-bit Wireless-G Ethernet Bridge Security > WPA Pre-Shared Key WPA Shared Key Enter a WPA Shared Key of WEP Encryption, 64 bits (10 hex digits) or...
User Guide
Page 9
... field. MD5 should only be used when a RADIUS server is connected to create WEP keys. If you want to communicate with Linksys wireless products only and cannot be used to create an encryption scheme for your changes. If your page does not automatically refresh itself, ...then click Refresh on the selection. TLS TLS is a mutual authentication method that the receiving device (wireless client) is used when the Bridge sends data. Click Apply to protect your wireless data communications. Then either generate a WEP key using the same key. This passphrase is using a Passphrase...
... field. MD5 should only be used when a RADIUS server is connected to create WEP keys. If you want to communicate with Linksys wireless products only and cannot be used to create an encryption scheme for your changes. If your page does not automatically refresh itself, ...then click Refresh on the selection. TLS TLS is a mutual authentication method that the receiving device (wireless client) is used when the Bridge sends data. Click Apply to protect your wireless data communications. Then either generate a WEP key using the same key. This passphrase is using a Passphrase...
User Guide
Page 10
... your page does not automatically refresh itself , then click Refresh on -screen information. 7 Wireless-G Ethernet Bridge Password Administrative Password It is the password used for additional on your wireless network in the User ID field. Click the Upload button to upload the certificate. Click ...spaces. Security > RADIUS-TTLS Enter the Login name of the Bridge from the drop-down menu. NOTE: Any settings you have installed to authenticate you change the factory default password of your wireless network or click the Browse button to browse for it . To...
... your page does not automatically refresh itself , then click Refresh on -screen information. 7 Wireless-G Ethernet Bridge Password Administrative Password It is the password used for additional on your wireless network in the User ID field. Click the Upload button to upload the certificate. Click ...spaces. Security > RADIUS-TTLS Enter the Login name of the Bridge from the drop-down menu. NOTE: Any settings you have installed to authenticate you change the factory default password of your wireless network or click the Browse button to browse for it . To...
User Guide
Page 11
... choices are Auto, Open, and Shared. Using the Auto setting, the Bridge will automatically detect whether a wireless device uses shared key or open system authentication, and then it will Wireless-G Ethernet Bridge not be cloned whenever you want to clone the MAC address of transmission ...speeds, or you may result in your wireless network. The Bridge will negotiate the best possible connection speed between the Bridge and another wireless-equipped device. RTS Threshold This value should remain at its default setting of a data...
... choices are Auto, Open, and Shared. Using the Auto setting, the Bridge will automatically detect whether a wireless device uses shared key or open system authentication, and then it will Wireless-G Ethernet Bridge not be cloned whenever you want to clone the MAC address of transmission ...speeds, or you may result in your wireless network. The Bridge will negotiate the best possible connection speed between the Bridge and another wireless-equipped device. RTS Threshold This value should remain at its default setting of a data...
User Guide
Page 12
...If you have the Reader, click the Adobe Website link to visit Linksys's website, www.linksys.com. Wireless-G Ethernet Bridge Help Linksys Website Click the link to download it. Firmware Version The version number of the Bridge's firmware is displayed here. Firmware updates are posted 9 MAC Address ...Firmware updates are posted at www.linksys.com. Click Refresh to obtain the most up-to the Bridge is read -only. Wireless Settings SSID The Bridge's SSID is displayed here. Click Help for the Web-based Utility's screens and the Bridge's online technical support resources (all...
...If you have the Reader, click the Adobe Website link to visit Linksys's website, www.linksys.com. Wireless-G Ethernet Bridge Help Linksys Website Click the link to download it. Firmware Version The version number of the Bridge's firmware is displayed here. Firmware updates are posted 9 MAC Address ...Firmware updates are posted at www.linksys.com. Click Refresh to obtain the most up-to the Bridge is read -only. Wireless Settings SSID The Bridge's SSID is displayed here. Click Help for the Web-based Utility's screens and the Bridge's online technical support resources (all...
User Guide
Page 13
... extracted firmware upgrade file, or click Browse to locate the file on -screen instructions. Wireless-G Ethernet Bridge 10 After you experience problems with the Bridge. To upgrade the firmware, follow the on your computer. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. Chapter 3 Configuration using the Web-based Utility at www...
... extracted firmware upgrade file, or click Browse to locate the file on -screen instructions. Wireless-G Ethernet Bridge 10 After you experience problems with the Bridge. To upgrade the firmware, follow the on your computer. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. Chapter 3 Configuration using the Web-based Utility at www...
User Guide
Page 14
...MAC address. •• Repeat steps 1-5 for each Xbox. however, all the Wireless-G Ethernet Bridges on -screen. Click Refresh in the Status box. WEB: If your questions are not sure what the Bridge's IP address is case-sensitive. Click the Auto radio button. 5. You have two ... I don't know how to change the Bridge's IP address. The Web-based Utility won 't communicate. If you can 't connect to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 Open the Web-based Utility. If you encounter problems, power the Bridge off and on again, or push the ...
...MAC address. •• Repeat steps 1-5 for each Xbox. however, all the Wireless-G Ethernet Bridges on -screen. Click Refresh in the Status box. WEB: If your questions are not sure what the Bridge's IP address is case-sensitive. Click the Auto radio button. 5. You have two ... I don't know how to change the Bridge's IP address. The Web-based Utility won 't communicate. If you can 't connect to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 Open the Web-based Utility. If you encounter problems, power the Bridge off and on again, or push the ...
User Guide
Page 15
Wireless-G Ethernet Bridge Specifications 12 Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM WEP Encryption, WPA 64/128-bit...
Wireless-G Ethernet Bridge Specifications 12 Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM WEP Encryption, WPA 64/128-bit...
User Guide
Page 16
... vulnerability to (a) repair the product with new or refurbished parts, (b) replace the product with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which this product's use...
... vulnerability to (a) repair the product with new or refurbished parts, (b) replace the product with third party software or Wireless-G Ethernet Bridge Warranty Information service offerings. Appendix C Appendix C: Warranty Information Limited Warranty Linksys warrants this Linksys hardware product against defects in materials and workmanship under normal use for the Warranty Period, which this product's use...
User Guide
Page 17
... handling charges, custom duties, VAT and other items with the product you . Warranty Information Wireless-G Ethernet Bridge 14 Repairs or replacements not covered under this limited warranty will be found at Linksys' then-current rates. Appendix C rejected. Information about Linksys' current technical support offerings and policies (including any other associated taxes and charges. Technical...
... handling charges, custom duties, VAT and other items with the product you . Warranty Information Wireless-G Ethernet Bridge 14 Repairs or replacements not covered under this limited warranty will be found at Linksys' then-current rates. Appendix C rejected. Information about Linksys' current technical support offerings and policies (including any other associated taxes and charges. Technical...
User Guide
Page 18
... encouraged to try to correct the interference by the party responsible for an uncontrolled environment. This device has been designed to the following two conditions: 1. Wireless-G Ethernet Bridge 15 Regulatory Information Safety Notices •• Caution: To reduce the risk of the FCC Rules. Operation is no guarantee that may not cause...
... encouraged to try to correct the interference by the party responsible for an uncontrolled environment. This device has been designed to the following two conditions: 1. Wireless-G Ethernet Bridge 15 Regulatory Information Safety Notices •• Caution: To reduce the risk of the FCC Rules. Operation is no guarantee that may not cause...
User Guide
Page 24
... THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. Separate terms and features...
... THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software End User License Agreement THE RETURN PROCESS AND POLICIES OF THE PARTY FROM WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE. Separate terms and features...
User Guide
Page 25
... Software tracks and monitors the following components and activities in this Agreement will not disclose or make a backup copy of Information. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with any third parties regarding the status and health of the network, including network traffic and application usage...
... Software tracks and monitors the following components and activities in this Agreement will not disclose or make a backup copy of Information. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with any third parties regarding the status and health of the network, including network traffic and application usage...
User Guide
Page 26
... EEA. Limited Warranty. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty shall not apply...
... EEA. Limited Warranty. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS" WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. This limited warranty shall not apply...