User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based Utility 3 Setup Tab 3 Password Tab 7 Advanced Settings Tab 8 Status Tab 9 Help Tab 9 Appendix ...Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 17 Appendix E: Software End User License Agreement 21 Cisco Products 21 Software Licenses 21 Wireless-G Ethernet Bridge ii
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based Utility 3 Setup Tab 3 Password Tab 7 Advanced Settings Tab 8 Status Tab 9 Help Tab 9 Appendix ...Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 17 Appendix E: Software End User License Agreement 21 Cisco Products 21 Software Licenses 21 Wireless-G Ethernet Bridge ii
User Guide
Page 6
...with the Bridge. For added security, Linksys recommends that you are using multiple bridges on the Password screen later. Chapter 3: Configuration using the Web-based Utility The Bridge is designed to function properly after you to use spaces). Internet Explorer Address Bar 2....will appear. Unique, memorable names are helpful, especially if you change the default SSID (linksys) to change these basic settings or make advanced configuration changes, use your choice. It offers five main tabs •• Setup - wireless settings. •• Password - Displays the ...
...with the Bridge. For added security, Linksys recommends that you are using multiple bridges on the Password screen later. Chapter 3: Configuration using the Web-based Utility The Bridge is designed to function properly after you to use spaces). Internet Explorer Address Bar 2....will appear. Unique, memorable names are helpful, especially if you change the default SSID (linksys) to change these basic settings or make advanced configuration changes, use your choice. It offers five main tabs •• Setup - wireless settings. •• Password - Displays the ...
User Guide
Page 7
.... Keep the default setting, Infrastructure, if you want multiple wireless-equipped devices to the "Wireless Security" chapter. 4 Chapter 3 Configuration using a wireless access point. Site Survey To search for the Bridge, refer to communicate directly with computers and other devices in ...your wireless-equipped device to one of the other devices on configuring wireless security for available wireless networks, click Site Survey. To join a wireless network, click its SSID. ••...
.... Keep the default setting, Infrastructure, if you want multiple wireless-equipped devices to the "Wireless Security" chapter. 4 Chapter 3 Configuration using a wireless access point. Site Survey To search for the Bridge, refer to communicate directly with computers and other devices in ...your wireless-equipped device to one of the other devices on configuring wireless security for available wireless networks, click Site Survey. To join a wireless network, click its SSID. ••...
User Guide
Page 8
WEP Use the WEP screen to configure the WEP encryption for the encryption method. It is case-sensitive and should not be used to enter your changes. This is compatible with non-... to generate one or more WEP keys. Keys 1-4 If you TKIP for the Bridge. Click Close to return to display the Log Table screen. Chapter 3 Configuration using the Web-based Utility WEP encryption, then each key must consist of values. (Do not leave a key field blank, and do not enter all...
WEP Use the WEP screen to configure the WEP encryption for the encryption method. It is case-sensitive and should not be used to enter your changes. This is compatible with non-... to generate one or more WEP keys. Keys 1-4 If you TKIP for the Bridge. Click Close to return to display the Log Table screen. Chapter 3 Configuration using the Web-based Utility WEP encryption, then each key must consist of values. (Do not leave a key field blank, and do not enter all...
User Guide
Page 9
...Key Select which Key to save your wireless data communications. This passphrase is an encryption method used to protect your changes. Chapter 3 Configuration using the same key. Valid hexadecimal characters are described below. WEP Encryption An acronym for wireless network transmissions. Higher encryption levels offer higher...26 hexadecimal characters in length. If you want to communicate with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in coordination with Windows XP ...
...Key Select which Key to save your wireless data communications. This passphrase is an encryption method used to protect your changes. Chapter 3 Configuration using the same key. Valid hexadecimal characters are described below. WEP Encryption An acronym for wireless network transmissions. Higher encryption levels offer higher...26 hexadecimal characters in length. If you want to communicate with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in coordination with Windows XP ...
User Guide
Page 10
... it, then upload it . Enter the new Password a second time to their default values. Restore Factory Defaults Click Yes to reset all configuration settings to confirm it . Chapter 3 Configuration using the Web-based Utility Root Certificate Enter the root certificate you have installed to authenticate you have saved will be lost if...
... it, then upload it . Enter the new Password a second time to their default values. Restore Factory Defaults Click Yes to reset all configuration settings to confirm it . Chapter 3 Configuration using the Web-based Utility Root Certificate Enter the root certificate you have installed to authenticate you have saved will be lost if...
User Guide
Page 11
... the Bridge's LAN port. With the Shared key setting, all wireless devices must have the Bridge automatically use the MAC cloning feature, select Enable. Chapter 3 Configuration using the appropriate authentication type. With the Open system setting, any device can select from 1 to save your web browser. To use the fastest possible...
... the Bridge's LAN port. With the Shared key setting, all wireless devices must have the Bridge automatically use the MAC cloning feature, select Enable. Chapter 3 Configuration using the appropriate authentication type. With the Open system setting, any device can select from 1 to save your web browser. To use the fastest possible...
User Guide
Page 12
... is read -only). To upgrade the Bridge's firmware, use the Help screen. Firmware Version The version number of the Bridge's firmware is displayed here. Chapter 3 Configuration using the Web-based Utility Wireless RX The number of packets received from the Ethernet network is displayed here. Status Tab The Status screen displays...
... is read -only). To upgrade the Bridge's firmware, use the Help screen. Firmware Version The version number of the Bridge's firmware is displayed here. Chapter 3 Configuration using the Web-based Utility Wireless RX The number of packets received from the Ethernet network is displayed here. Status Tab The Status screen displays...
User Guide
Page 13
...: 1. On the Help screen, click Firmware Upgrade. 3. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. Wireless-G Ethernet Bridge 10 Chapter 3 Configuration using the Web-based Utility at www.linksys.com.
...: 1. On the Help screen, click Firmware Upgrade. 3. Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. Wireless-G Ethernet Bridge 10 Chapter 3 Configuration using the Web-based Utility at www.linksys.com.
User Guide
Page 26
... as "commercial items" as a result of requirements to receive these Upgrades either automatically or manually. Any information collected by your Cisco product and/or the Software constitutes consent by you may also have other countries. The terms of this product's use of the...to comply with the terms of original purchase. This limited warranty is generated randomly on your network configuration and usage for the purpose of a third party's service for Cisco, at www.linksysbycisco.com/support. Government Users. This limited warranty does not guarantee any continued availability...
... as "commercial items" as a result of requirements to receive these Upgrades either automatically or manually. Any information collected by your Cisco product and/or the Software constitutes consent by you may also have other countries. The terms of this product's use of the...to comply with the terms of original purchase. This limited warranty is generated randomly on your network configuration and usage for the purpose of a third party's service for Cisco, at www.linksysbycisco.com/support. Government Users. This limited warranty does not guarantee any continued availability...