User Guide
Page 5
...to keep your network secure. 1. Like signals from your cellular or cordless phones, signals from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •... protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys.com/security 2 Wireless-G Ethernet Bridge Wireless Security Checklist 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels...
...to keep your network secure. 1. Like signals from your cellular or cordless phones, signals from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •... protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security, visit www.linksys.com/security 2 Wireless-G Ethernet Bridge Wireless Security Checklist 4. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels...
User Guide
Page 9
... with a RADIUS server. (This should not be longer than 32 alphanumeric characters. (This Passphrase function is compatible with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in the... Type Select the authentication method: MD5, TLS, or TTLS. TLS TLS is a mutual authentication method that the receiving device (wireless client) is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of the encryption, they are not valid key values.) If you can enter a...
... with a RADIUS server. (This should not be longer than 32 alphanumeric characters. (This Passphrase function is compatible with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in the... Type Select the authentication method: MD5, TLS, or TTLS. TLS TLS is a mutual authentication method that the receiving device (wireless client) is case-sensitive and Wireless-G Ethernet Bridge Security > RADIUS-TLS Enter the Login name of the encryption, they are not valid key values.) If you can enter a...
User Guide
Page 25
.... Cisco may have against Cisco with such dealings, are reserved by you when you and such advertiser. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with, or participation in which time you in any third parties regarding the status ...to generate reports. Appendix E of the Software or its licensors. Links and Advertising. megabytes per hour), application usage (the foreground window is tracked and the time each time the Software is started the user of that particular computer will not disclose or make a backup...
.... Cisco may have against Cisco with such dealings, are reserved by you when you and such advertiser. Your correspondence or Wireless-G Ethernet Bridge Software End User License Agreement business dealings with, or participation in which time you in any third parties regarding the status ...to generate reports. Appendix E of the Software or its licensors. Links and Advertising. megabytes per hour), application usage (the foreground window is tracked and the time each time the Software is started the user of that particular computer will not disclose or make a backup...
User Guide
Page 27
... Service related email messages as long as the case may send you to Cisco via Wireless-G Ethernet Bridge Software End User License Agreement www.networkmagic.com/support of such cancellation and uninstalling the ...or execute the Network Magic Software on any non-personal computer product, including, but changing it . Linksys, Cisco and the Cisco Logo and other proprietary notices, legends, symbols or labels in accordance with ... below in any device running the Microsoft Windows CE operating system. This Agreement constitutes the entire agreement between the parties with Cisco. 2.
... Service related email messages as long as the case may send you to Cisco via Wireless-G Ethernet Bridge Software End User License Agreement www.networkmagic.com/support of such cancellation and uninstalling the ...or execute the Network Magic Software on any non-personal computer product, including, but changing it . Linksys, Cisco and the Cisco Logo and other proprietary notices, legends, symbols or labels in accordance with ... below in any device running the Microsoft Windows CE operating system. This Agreement constitutes the entire agreement between the parties with Cisco. 2.