User Guide
Page 21
...Set IP configuration manually to your router's LAN IP address). Click the Next button to continue or the Back button to return to the previous screen. Then proceed to the previous screen. • SSID - Chapter 5: Setting Up the Wireless-G Ethernet Bridge Figure 5-6: Wireless Settings Figure 5-7:...your network, then keep the default Network Mode setting, Mixed. Keep the default setting, Mixed, if you have Wireless-G and Wireless-B devices in the wireless network. The Bridge's IP Mask (also known as your network's Gateway (usually this option. Select G-Only if you chose Ad-...
...Set IP configuration manually to your router's LAN IP address). Click the Next button to continue or the Back button to return to the previous screen. Then proceed to the previous screen. • SSID - Chapter 5: Setting Up the Wireless-G Ethernet Bridge Figure 5-6: Wireless Settings Figure 5-7:...your network, then keep the default Network Mode setting, Mixed. Keep the default setting, Mixed, if you have Wireless-G and Wireless-B devices in the wireless network. The Bridge's IP Mask (also known as your network's Gateway (usually this option. Select G-Only if you chose Ad-...
User Guide
Page 22
From the drop-down menu. For more detailed instructions on any non-Linksys wireless products. If you want to step 10. WEP stands for the Bridge, refer to manually enter a WEP key, leave the Passphrase field blank and complete the Key 1 field. • Key 1 - WEP (64-bit ... field blank, and complete the Key 1 field.) Click the Next button to enter the WEP key(s) manually on configuring wireless security for Wired Equivalent Privacy. Wireless-G Ethernet Bridge with dynamic encryption keys. If you are using 64-bit WEP encryption, then the key must consist of...
From the drop-down menu. For more detailed instructions on any non-Linksys wireless products. If you want to step 10. WEP stands for the Bridge, refer to manually enter a WEP key, leave the Passphrase field blank and complete the Key 1 field. • Key 1 - WEP (64-bit ... field blank, and complete the Key 1 field.) Click the Next button to enter the WEP key(s) manually on configuring wireless security for Wired Equivalent Privacy. Wireless-G Ethernet Bridge with dynamic encryption keys. If you are using 64-bit WEP encryption, then the key must consist of...
User Guide
Page 28
... same key. • WEP Encryption - In each key must consist of the wireless network you can enter one or more WEP keys manually. From the drop-down menu. • Passphrase - Select which is compatible with Linksys wireless products only. Wireless-G Ethernet Bridge with 5-Port Switch Wireless-B (802.11b) devices in your network. • Security - For detailed instructions...
... same key. • WEP Encryption - In each key must consist of the wireless network you can enter one or more WEP keys manually. From the drop-down menu. • Passphrase - Select which is compatible with Linksys wireless products only. Wireless-G Ethernet Bridge with 5-Port Switch Wireless-B (802.11b) devices in your network. • Security - For detailed instructions...
User Guide
Page 29
...authentication methods: MD5, TLS, and TTLS. To decode data transmissions, all zeroes; Instead of manually entering WEP keys, you to protect your changes and close the screen. This passphrase is compatible with Linksys wireless products only and cannot be exactly 26 hexadecimal characters in a network must use ), and a...• Keys 1-4. If you are using 64-bit WEP encryption, the key must be used when the Bridge sends data. RADIUS This option features WEP used in the wireless client.) After you are using 128-bit WEP encryption, the key must be used to create an encryption ...
...authentication methods: MD5, TLS, and TTLS. To decode data transmissions, all zeroes; Instead of manually entering WEP keys, you to protect your changes and close the screen. This passphrase is compatible with Linksys wireless products only and cannot be exactly 26 hexadecimal characters in a network must use ), and a...• Keys 1-4. If you are using 64-bit WEP encryption, the key must be used when the Bridge sends data. RADIUS This option features WEP used in the wireless client.) After you are using 128-bit WEP encryption, the key must be used to create an encryption ...
User Guide
Page 37
... Forward Delay - For ports 1 through the switch. The smaller the priority value, the higher the priority. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-15: Spanning Tree Protocol Tab 31 It will start from others. • Hello Time - Select Enable to enable the ...a new MAC address to be modified by the time spent in the listening and learning state. The Bridge will change to the Bridge through its LAN port. Select Manual if you disconnect and re-connect multiple devices to listening, learning , then forwarding. Click the Apply ...
... Forward Delay - For ports 1 through the switch. The smaller the priority value, the higher the priority. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-15: Spanning Tree Protocol Tab 31 It will start from others. • Hello Time - Select Enable to enable the ...a new MAC address to be modified by the time spent in the listening and learning state. The Bridge will change to the Bridge through its LAN port. Select Manual if you disconnect and re-connect multiple devices to listening, learning , then forwarding. Click the Apply ...
User Guide
Page 48
... - Figure 7-24: Help Tab Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Help Figure 7-25: Firmware Upgrade 42 Wireless-G Ethernet Bridge with the Bridge. You can also upgrade the Bridge's firmware. • Linksys Website - Click the Linksys Website link to find this User Guide on -screen instructions. Click the Online manual in PDF format - NOTE: If you upgrade...
... - Figure 7-24: Help Tab Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Help Figure 7-25: Firmware Upgrade 42 Wireless-G Ethernet Bridge with the Bridge. You can also upgrade the Bridge's firmware. • Linksys Website - Click the Linksys Website link to find this User Guide on -screen instructions. Click the Online manual in PDF format - NOTE: If you upgrade...
User Guide
Page 55
... server is connected to offer. Appendix B: Wireless Security 49 Security Threats Facing Wireless Networks Implementing encryption may have a negative impact on your network's performance, but if you are enjoying the most flexible and convenient technology Linksys has to the Router or other device.) ... through the Passphrase or enter the WEP key manually. Then, select a WEP key and a level of 864 characters, and enter a Group Key Renewal period time between the device and the server. WEP used . RADIUS. Wireless-G Ethernet Bridge with a RADIUS server. (This should change the...
... server is connected to offer. Appendix B: Wireless Security 49 Security Threats Facing Wireless Networks Implementing encryption may have a negative impact on your network's performance, but if you are enjoying the most flexible and convenient technology Linksys has to the Router or other device.) ... through the Passphrase or enter the WEP key manually. Then, select a WEP key and a level of 864 characters, and enter a Group Key Renewal period time between the device and the server. WEP used . RADIUS. Wireless-G Ethernet Bridge with a RADIUS server. (This should change the...