User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based Utility 3 Setup Tab 3 Password Tab 7 Advanced Settings Tab 8 Status Tab 9 Help Tab 9 Appendix A: Troubleshooting Appendix B: Specifications Appendix C: Warranty Information Appendix D: Regulatory Information 11 12 13 15 Limited Warranty 13 FCC Statement 15 FCC Radiation Exposure Statement 15...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based Utility 3 Setup Tab 3 Password Tab 7 Advanced Settings Tab 8 Status Tab 9 Help Tab 9 Appendix A: Troubleshooting Appendix B: Specifications Appendix C: Warranty Information Appendix D: Regulatory Information 11 12 13 15 Limited Warranty 13 FCC Statement 15 FCC Radiation Exposure Statement 15...
User Guide
Page 4
... cable. Do not reset the Wireless-G Ethernet Bridge if you will erase all of your settings (WEP encryption, wireless settings, etc.) and replace them with the factory defaults. Wireless-G Ethernet Bridge NOTE: If you reset the Wireless-G Ethernet Bridge, you want to your Ethernet-wired printer, camera, notebook or desktop into a wireless networked device. In the office, convert your Wireless-G network and its factory default settings. Back Panel Front Panel Reset When pressed, the Reset button resets the Bridge to the wireless network. Power (Green) This LED lights...
... cable. Do not reset the Wireless-G Ethernet Bridge if you will erase all of your settings (WEP encryption, wireless settings, etc.) and replace them with the factory defaults. Wireless-G Ethernet Bridge NOTE: If you reset the Wireless-G Ethernet Bridge, you want to your Ethernet-wired printer, camera, notebook or desktop into a wireless networked device. In the office, convert your Wireless-G network and its factory default settings. Back Panel Front Panel Reset When pressed, the Reset button resets the Bridge to the wireless network. Power (Green) This LED lights...
User Guide
Page 5
... WPA. 1. Wireless-G Ethernet Bridge WEB: For more information on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to-peer). Because wireless networking operates by the factory. WEP is an older encryption standard and may be found in the dictionary. 3. With MAC address filtering enabled, wireless network access is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security...
... WPA. 1. Wireless-G Ethernet Bridge WEB: For more information on a regular basis. •• Install anti-virus software and personal firewall software. •• Disable file sharing (peer-to-peer). Because wireless networking operates by the factory. WEP is an older encryption standard and may be found in the dictionary. 3. With MAC address filtering enabled, wireless network access is not secure. •• Password protect all computers on the network and individually password protect sensitive files. •• Change passwords on wireless security...
User Guide
Page 6
...a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the Password field. This chapter explains how to factory defaults. •• Advanced - Make sure this setting is designed to change the advanced wireless settings and clone a MAC address onto the Bridge. •• Status - Open your wireless network. You can also upgrade the Bridge's firmware using the Setup Wizard. If you change these basic settings or make advanced configuration changes, use your choice. Chapter 3: Configuration using the Web-based Utility...
...a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the Password field. This chapter explains how to factory defaults. •• Advanced - Make sure this setting is designed to change the advanced wireless settings and clone a MAC address onto the Bridge. •• Status - Open your wireless network. You can also upgrade the Bridge's firmware using the Setup Wizard. If you change these basic settings or make advanced configuration changes, use your choice. Chapter 3: Configuration using the Web-based Utility...
User Guide
Page 7
...-Fi Protected Access) Pre-Shared Key •• WPA RADIUS •• RADIUS (Remote Authentication Dial-In User Service) •• WEP (Wired Equivalent Privacy) WPA is displayed: •• SSID The network name. Click Help for the Bridge, refer to enable security settings; For detailed instructions on your wired network using the Web-based Utility Security To enable security, select Enable, then click Edit Security Settings. Chapter 3 Configuration using a wireless access point. Wireless Site Survey For each other devices on configuring wireless security for...
...-Fi Protected Access) Pre-Shared Key •• WPA RADIUS •• RADIUS (Remote Authentication Dial-In User Service) •• WEP (Wired Equivalent Privacy) WPA is displayed: •• SSID The network name. Click Help for the Bridge, refer to enable security settings; For detailed instructions on your wired network using the Web-based Utility Security To enable security, select Enable, then click Edit Security Settings. Chapter 3 Configuration using a wireless access point. Wireless Site Survey For each other devices on configuring wireless security for...
User Guide
Page 8
... on your changes. Valid hexadecimal characters are using the same key. Click Apply to generate one or more WEP keys. Then either generate a WEP Key using a Passphrase or enter the WEP key manually. Make sure the other wireless-equipped devices are "0"-"9" and "A"-"F". If you are using 128-bit Wireless-G Ethernet Bridge WPA Shared Key Enter a WPA Shared Key of manually entering WEP keys, you enter the Passphrase, click Generate to save your web browser. 5 Chapter 3 Configuration using the Web-based Utility WEP encryption, then each key must...
... on your changes. Valid hexadecimal characters are using the same key. Click Apply to generate one or more WEP keys. Then either generate a WEP Key using a Passphrase or enter the WEP key manually. Make sure the other wireless-equipped devices are "0"-"9" and "A"-"F". If you are using 128-bit Wireless-G Ethernet Bridge WPA Shared Key Enter a WPA Shared Key of manually entering WEP keys, you enter the Passphrase, click Generate to save your web browser. 5 Chapter 3 Configuration using the Web-based Utility WEP encryption, then each key must...
User Guide
Page 9
... characters are using 128-bit WEP encryption, the key must use an identical WEP key. The appropriate screen appears depending on your changes. Make sure that the receiving device (wireless client) is a mutual authentication method that uses digital certificates. Enter the User Certificate and Root Certificate in the Password field. To decode data transmissions, all zeroes; MD5 TLS TLS is using the same key. Chapter 3 Configuration using the Web-based Utility should only...
... characters are using 128-bit WEP encryption, the key must use an identical WEP key. The appropriate screen appears depending on your changes. Make sure that the receiving device (wireless client) is a mutual authentication method that uses digital certificates. Enter the User Certificate and Root Certificate in the Password field. To decode data transmissions, all zeroes; MD5 TLS TLS is using the same key. Chapter 3 Configuration using the Web-based Utility should only...
User Guide
Page 10
... to access the Bridge's Web-based Utility will be prompted for it, then upload it . Password Administrative Password It is strongly recommended that uses digital certificates. NOTE: Any settings you change the Bridge's Password and restore the factory default settings. Click Cancel to browse for it . User Certificate Enter the user certificate you have installed to authenticate you on -screen information. Click Apply to view a log. To save your wireless network in the User...
... to access the Bridge's Web-based Utility will be prompted for it, then upload it . Password Administrative Password It is strongly recommended that uses digital certificates. NOTE: Any settings you change the Bridge's Password and restore the factory default settings. Click Cancel to browse for it . User Certificate Enter the user certificate you have installed to authenticate you on -screen information. Click Apply to view a log. To save your wireless network in the User...
User Guide
Page 11
... Threshold. MAC Address Cloning Mode You can authenticate each other and start transmitting data. The Bridge will transmit data using the Web-based Utility not be set depending on -screen information. Select Manual if you may result in your network. Click Help for a new MAC address to customize advanced wireless settings and clone a MAC address onto the Bridge. The range is 256-2346 bytes. Auto-Fallback will Wireless-G Ethernet Bridge 8 With the Shared key setting, all wireless devices must have enabled MAC cloning...
... Threshold. MAC Address Cloning Mode You can authenticate each other and start transmitting data. The Bridge will transmit data using the Web-based Utility not be set depending on -screen information. Select Manual if you may result in your network. Click Help for a new MAC address to customize advanced wireless settings and clone a MAC address onto the Bridge. The range is 256-2346 bytes. Auto-Fallback will Wireless-G Ethernet Bridge 8 With the Shared key setting, all wireless devices must have enabled MAC cloning...
User Guide
Page 12
.... Security The status of the Bridge's security is displayed here. Wireless-G Ethernet Bridge 9 Online manual in Adobe Acrobat Portable Document File (.pdf ) format, so you will need to download the Adobe Acrobat Reader to view the pdf. To upgrade the Bridge's firmware, use the Help screen. It is in PDF format Click the link to all of the help information for viewing PDF documents) If you experience problems with the Bridge. Adobe Website (software for the Web-based Utility's screens...
.... Security The status of the Bridge's security is displayed here. Wireless-G Ethernet Bridge 9 Online manual in Adobe Acrobat Portable Document File (.pdf ) format, so you will need to download the Adobe Acrobat Reader to view the pdf. To upgrade the Bridge's firmware, use the Help screen. It is in PDF format Click the link to all of the help information for viewing PDF documents) If you experience problems with the Bridge. Adobe Website (software for the Web-based Utility's screens...
User Guide
Page 14
... Bridges are set to the same SSID, network mode (Ad-Hoc), channel setting, and WEP settings. •• Verify that the wireless-enabled PC or printer is the same as the PC using the correct case(s) when entering the password. Click the Advanced tab. 3. On the Setup screen, click the Static IP Address radio button, and change the Bridge's IP address. •• Open the Web-based Utility. Wireless-G Ethernet Bridge 11 Perform the following steps: •• Make sure both Bridges...
... Bridges are set to the same SSID, network mode (Ad-Hoc), channel setting, and WEP settings. •• Verify that the wireless-enabled PC or printer is the same as the PC using the correct case(s) when entering the password. Click the Advanced tab. 3. On the Setup screen, click the Static IP Address radio button, and change the Bridge's IP address. •• Open the Web-based Utility. Wireless-G Ethernet Bridge 11 Perform the following steps: •• Make sure both Bridges...
User Guide
Page 15
...Power Certification Operating Temp. Appendix B Specifications Appendix B: Specifications Model Standards Ports Buttons LEDs Cabling Type Transmit Power Security Features WEP Key Bits Protocols WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM WEP Encryption, WPA...ºF (-20 to 70ºC) 10 to 85% Noncondensing 5 to change without notice. Wireless-G Ethernet Bridge 12 Storage Temp.
...Power Certification Operating Temp. Appendix B Specifications Appendix B: Specifications Model Standards Ports Buttons LEDs Cabling Type Transmit Power Security Features WEP Key Bits Protocols WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM WEP Encryption, WPA...ºF (-20 to 70ºC) 10 to 85% Noncondensing 5 to change without notice. Wireless-G Ethernet Bridge 12 Storage Temp.
User Guide
Page 16
... networks, Linksys does not warrant that the operation of vulnerability to (a) repair the product with new or refurbished parts, (b) replace the product with your product or experience a problem with instructions supplied by jurisdiction. This limited warranty gives you specific legal rights, and you . IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. ALL SOFTWARE...
... networks, Linksys does not warrant that the operation of vulnerability to (a) repair the product with new or refurbished parts, (b) replace the product with your product or experience a problem with instructions supplied by jurisdiction. This limited warranty gives you specific legal rights, and you . IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. ALL SOFTWARE...
User Guide
Page 18
... the interference by turning the equipment off and on, the user is firmware-limited to channels 1 through 11. Industry Canada Statement This Class B digital apparatus complies with any interference, including interference that interference will not occur in a residential installation. Wireless-G Ethernet Bridge 15 This transmitter must not be a remote risk of the FCC Rules. The required antenna impedance is subject...
... the interference by turning the equipment off and on, the user is firmware-limited to channels 1 through 11. Industry Canada Statement This Class B digital apparatus complies with any interference, including interference that interference will not occur in a residential installation. Wireless-G Ethernet Bridge 15 This transmitter must not be a remote risk of the FCC Rules. The required antenna impedance is subject...
User Guide
Page 24
... the Upgrade. Where such specific license terms entitle you permanently transfer all documentation and other open source code in the Schedules below . READ IT CAREFULLY BEFORE INSTALLING AND USING THE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software...
... the Upgrade. Where such specific license terms entitle you permanently transfer all documentation and other open source code in the Schedules below . READ IT CAREFULLY BEFORE INSTALLING AND USING THE SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE (OR, IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO Wireless-G Ethernet Bridge Software...
User Guide
Page 26
... receive these Upgrades either automatically or manually. Cisco additionally warrants that any media on which the product or software is accompanied by you to you are receiving help. Use of any time to such third party software or service offerings. Software, including technical data, may become inaccessible. The information is neither a service nor a support contract. Your use of your control. Appendix E Software End User License Agreement...
... receive these Upgrades either automatically or manually. Cisco additionally warrants that any media on which the product or software is accompanied by you to you are receiving help. Use of any time to such third party software or service offerings. Software, including technical data, may become inaccessible. The information is neither a service nor a support contract. Your use of your control. Appendix E Software End User License Agreement...
User Guide
Page 27
... provide notice by e-mail, via Network Magic, or by providing written notice via Wireless-G Ethernet Bridge Schedule 3 Open Source and Third Party Licenses Schedule 3-A If this Cisco product contains open source software. WARRANTY DISCLAIMER FOR SERVICES. General Terms. This Agreement will remain in the Software and Documentation. You may not install or execute the Network Magic Software on its licensors and third parties, as...
... provide notice by e-mail, via Network Magic, or by providing written notice via Wireless-G Ethernet Bridge Schedule 3 Open Source and Third Party Licenses Schedule 3-A If this Cisco product contains open source software. WARRANTY DISCLAIMER FOR SERVICES. General Terms. This Agreement will remain in the Software and Documentation. You may not install or execute the Network Magic Software on its licensors and third parties, as...
User Guide
Page 30
... contest validity of any such claims; The Free Software Foundation may publish revised and/or new versions of this License. If the Program does Wireless-G Ethernet Bridge NO WARRANTY 11. END OF TERMS AND CONDITIONS END OF SCHEDULE 3-A Schedule 3-B If this Cisco product contains open source software. If you wish to incorporate parts of the Program into other property right claims...
... contest validity of any such claims; The Free Software Foundation may publish revised and/or new versions of this License. If the Program does Wireless-G Ethernet Bridge NO WARRANTY 11. END OF TERMS AND CONDITIONS END OF SCHEDULE 3-A Schedule 3-B If this Cisco product contains open source software. If you wish to incorporate parts of the Program into other property right claims...
User Guide
Page 31
... 02110-1301, USA Everyone is legally speaking a combined work, a derivative of people to use the GNU C Library in nonfree programs enables a greater number of the original library. Our General Public Licenses are intended to guarantee your freedom to share and change free software-to make sure that you to use of use , not price. Although the Lesser General Public License...
... 02110-1301, USA Everyone is legally speaking a combined work, a derivative of people to use the GNU C Library in nonfree programs enables a greater number of the original library. Our General Public Licenses are intended to guarantee your freedom to share and change free software-to make sure that you to use of use , not price. Although the Lesser General Public License...
User Guide
Page 36
... "OpenSSL Project" must not be in the code are BSD-style Open Source licenses. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; Wireless-G Ethernet Bridge both licenses are not to . Original...
... "OpenSSL Project" must not be in the code are BSD-style Open Source licenses. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; Wireless-G Ethernet Bridge both licenses are not to . Original...