User Guide
Page 2
.../glossary Network Security www.linksys.com/security Copyright and Trademarks Specifications are subject to while using the product. Copyright © 2007 Cisco Systems, Inc. Upon request, open -source software licenses. WEB: For detailed license terms and additional information visit: www.linksys.com/gpl Wireless-G Access Point with Power Over Ethernet ii and/or its affiliates...
.../glossary Network Security www.linksys.com/security Copyright and Trademarks Specifications are subject to while using the product. Copyright © 2007 Cisco Systems, Inc. Upon request, open -source software licenses. WEB: For detailed license terms and additional information visit: www.linksys.com/gpl Wireless-G Access Point with Power Over Ethernet ii and/or its affiliates...
User Guide
Page 4
... Canada concernant l'exposition aux radiofréquences 31 Wireless Disclaimer 31 Avis de non-responsabilité concernant les appareils sans fil 31 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 32 Appendix G: Contact Information 36 Wireless-G Access Point with Power Over Ethernet ii
... Canada concernant l'exposition aux radiofréquences 31 Wireless Disclaimer 31 Avis de non-responsabilité concernant les appareils sans fil 31 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE 32 Appendix G: Contact Information 36 Wireless-G Access Point with Power Over Ethernet ii
User Guide
Page 12
... described here and click Apply to the Access Point at their respective data rates. Wireless > Wireless Security Change the Access Point's wireless security settings on the right side of the screen. Wireless Isolation (between the Access Point and your client devices. The default is powering up. The detailed options are specific for Wi-Fi Protected Access, which is a security standard stronger than...
... described here and click Apply to the Access Point at their respective data rates. Wireless > Wireless Security Change the Access Point's wireless security settings on the right side of the screen. Wireless Isolation (between the Access Point and your client devices. The default is powering up. The detailed options are specific for Wi-Fi Protected Access, which is a security standard stronger than...
User Guide
Page 13
...the numbers "0" through "9". The default is Open System. It should change the encryption keys. Wireless-G Access Point with Power Over Ethernet WPA-Personal (aka WPA-PSK) Wireless > Wireless Security > WPA-Personal Encryption WPA offers you want to save your changes. Chapter 5 Advanced Configuration... Key Renewal Timeout period, which instructs the Access Point how often it should be 10 characters in length for 64-bit encryption or 26 characters in the original IEEE 802.11 specification. WPA2-Personal Wireless > Wireless Security > WPA2-Personal Encryption WPA2 always uses...
...the numbers "0" through "9". The default is Open System. It should change the encryption keys. Wireless-G Access Point with Power Over Ethernet WPA-Personal (aka WPA-PSK) Wireless > Wireless Security > WPA-Personal Encryption WPA offers you want to save your changes. Chapter 5 Advanced Configuration... Key Renewal Timeout period, which instructs the Access Point how often it should be 10 characters in length for 64-bit encryption or 26 characters in the original IEEE 802.11 specification. WPA2-Personal Wireless > Wireless Security > WPA2-Personal Encryption WPA2 always uses...
User Guide
Page 16
... as described here and click Apply to configure the advanced wireless settings for the Access Point. Wireless > Advanced Wireless Settings This screen allows you to save your wireless network. The default is set to select a specific client device from connecting to wireless network When this feature as needed, when Wireless-G products are not sure of which data rates the...
... as described here and click Apply to configure the advanced wireless settings for the Access Point. Wireless > Advanced Wireless Settings This screen allows you to save your wireless network. The default is set to select a specific client device from connecting to wireless network When this feature as needed, when Wireless-G products are not sure of which data rates the...
User Guide
Page 27
...wireless devices with specific MAC addresses. To protect the information as your network settings. Appendix B Wireless Security Checklist Appendix B: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them to access your wireless... want to change the wireless network name to something unique to distinguish your wireless network from your consent and/or knowledge. Change the default password For wireless products such as the default wireless network name. Wireless-G Access Point with WPA/WPA2 is ...
...wireless devices with specific MAC addresses. To protect the information as your network settings. Appendix B Wireless Security Checklist Appendix B: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them to access your wireless... want to change the wireless network name to something unique to distinguish your wireless network from your consent and/or knowledge. Change the default password For wireless products such as the default wireless network name. Wireless-G Access Point with WPA/WPA2 is ...
User Guide
Page 28
... to grant, deny, or limit access devices, features, or applications. Wireless-G Access Point with two physical connections, including an RJ-45 connection and a SFP connection. Boot To start executing instructions. Broadcast Storm An excessive amount of Service system that traffic is assigned to packets in time and only occur under specific conditions. Combo Ports A single...
... to grant, deny, or limit access devices, features, or applications. Wireless-G Access Point with two physical connections, including an RJ-45 connection and a SFP connection. Boot To start executing instructions. Broadcast Storm An excessive amount of Service system that traffic is assigned to packets in time and only occur under specific conditions. Combo Ports A single...
User Guide
Page 29
... address for variable-length subnet mask, and supports multiple network layer protocols. This is implemented by "leasing" an IP address to a specific multicast group. DHCP Clients An Internet host using DHCP to report a processing error. Flow Control Enables lower speed devices to communicate with priority...a method of a networking device to send data over a single line, but only one direction at the IP layer. Wireless-G Access Point with Power Over Ethernet Full Duplex The ability of tagging IP packets with higher speed devices. Gateway A device that specifies...
... address for variable-length subnet mask, and supports multiple network layer protocols. This is implemented by "leasing" an IP address to a specific multicast group. DHCP Clients An Internet host using DHCP to report a processing error. Flow Control Enables lower speed devices to communicate with priority...a method of a networking device to send data over a single line, but only one direction at the IP layer. Wireless-G Access Point with Power Over Ethernet Full Duplex The ability of tagging IP packets with higher speed devices. Gateway A device that specifies...
User Guide
Page 30
...transmission. MIB (Management Information Base) MIBs contain information describing specific aspects of the communication. Port Mirroring Monitors and mirrors network traffic by...Ping (Packet INternet Groper) An Internet utility used to multiple ports. Wireless-G Access Point with Power Over Ethernet RADIUS (Remote Authentication Dial-In User Service) ... topography for authentication, authorization, and accounting. 26 TACACS+ (Terminal Access Controller Access Control System Plus) Proprietary Cisco enhancement to identify it. Network A series of incoming and outgoing ...
...transmission. MIB (Management Information Base) MIBs contain information describing specific aspects of the communication. Port Mirroring Monitors and mirrors network traffic by...Ping (Packet INternet Groper) An Internet utility used to multiple ports. Wireless-G Access Point with Power Over Ethernet RADIUS (Remote Authentication Dial-In User Service) ... topography for authentication, authorization, and accounting. 26 TACACS+ (Terminal Access Controller Access Control System Plus) Proprietary Cisco enhancement to identify it. Network A series of incoming and outgoing ...
User Guide
Page 32
.... Appendix D Specifications Appendix D: Specifications Specifications Model WAP2000 Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, IEEE802.3af (Power over Ethernet), 802.1p (QoS priority), 802.1Q (VLAN), 802.1X (Security Authentication), 802.11i - Flash, RAM, LAN, WLAN DHCP DHCP Client Operating Modes Access Point Access Point Mode, point-to-point Bridge Mode, point-to-multipoint Bridge Mode, Repeater Mode Wireless Spec/Modulation...
.... Appendix D Specifications Appendix D: Specifications Specifications Model WAP2000 Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, IEEE802.3af (Power over Ethernet), 802.1p (QoS priority), 802.1Q (VLAN), 802.1X (Security Authentication), 802.11i - Flash, RAM, LAN, WLAN DHCP DHCP Client Operating Modes Access Point Access Point Mode, point-to-point Bridge Mode, point-to-multipoint Bridge Mode, Repeater Mode Wireless Spec/Modulation...
User Guide
Page 33
... will be free of incidental or consequential damages, so the above limitation may not apply to Linksys. This warranty gives You specific legal rights, and You may not apply to return the Product, mark the Return Authorization Number clearly on the outside of ... repair or replace the Product or refund Your purchase price less any warranty or remedy provided under this Agreement fails of purchase. Wireless-G Access Point with instructions supplied by jurisdiction. Please direct all shipping and handling charges. Your exclusive remedy and Linksys' entire liability under this...
... will be free of incidental or consequential damages, so the above limitation may not apply to Linksys. This warranty gives You specific legal rights, and You may not apply to return the Product, mark the Return Authorization Number clearly on the outside of ... repair or replace the Product or refund Your purchase price less any warranty or remedy provided under this Agreement fails of purchase. Wireless-G Access Point with instructions supplied by jurisdiction. Please direct all shipping and handling charges. Your exclusive remedy and Linksys' entire liability under this...
User Guide
Page 34
...forth for compliance could void the user's authority to the following two conditions: 1. This equipment should be installed and operated with the specifications for successful communication. This product has been tested and complies with minimum distance 20cm between the radiator and your body. FCC Radiation ... Antenna having a maximum gain of Industry Canada. Industry Canada Radiation Exposure Statement: This equipment complies with Power Over Ethernet 30 Wireless-G Access Point with IC radiation exposure limits set forth for example, in a residential installation.
...forth for compliance could void the user's authority to the following two conditions: 1. This equipment should be installed and operated with the specifications for successful communication. This product has been tested and complies with minimum distance 20cm between the radiator and your body. FCC Radiation ... Antenna having a maximum gain of Industry Canada. Industry Canada Radiation Exposure Statement: This equipment complies with Power Over Ethernet 30 Wireless-G Access Point with IC radiation exposure limits set forth for example, in a residential installation.