User Guide
Page 3
... 4: Installation 5 Overview 5 Connection 5 Power over Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall-Mount Option 6 Chapter 5: Quick Configuration Overview 7 Overview 7 Accessing the Web-Based Utility 7 Navigating the Web-Based Utility 7 Setup 7 Wireless 7 Switch 8 Administration 8 System Status 8 Chapter 6: Advanced Configuration 9 Setup 9 Wireless 10 Wireless > Basic Settings 10 Wireless > Wireless Security 11 Wireless > Advanced Settings 13 Switch 13 Switch > Port Management 13 Switch > Port Mirroring 14 Switch > VLAN 14 Switch > MAC Based...
... 4: Installation 5 Overview 5 Connection 5 Power over Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall-Mount Option 6 Chapter 5: Quick Configuration Overview 7 Overview 7 Accessing the Web-Based Utility 7 Navigating the Web-Based Utility 7 Setup 7 Wireless 7 Switch 8 Administration 8 System Status 8 Chapter 6: Advanced Configuration 9 Setup 9 Wireless 10 Wireless > Basic Settings 10 Wireless > Wireless Security 11 Wireless > Advanced Settings 13 Switch 13 Switch > Port Management 13 Switch > Port Mirroring 14 Switch > VLAN 14 Switch > MAC Based...
User Guide
Page 6
... network and Internet. Linksys wireless adapters also provide access to each other wireless devices, much like a wireless client card. The WET200 has been designed for use of computers, each equipped with one VLAN connected wirelessly to various wireless adapters for notebook and desktop PC. Wireless-G Business Ethernet Bridge 2 Computers in an infrastructure network may double the effective wireless transmission range for more wireless adapters. An infrastructure configuration extends the accessibility of WET200 in a wired or wireless network via the access point...
... network and Internet. Linksys wireless adapters also provide access to each other wireless devices, much like a wireless client card. The WET200 has been designed for use of computers, each equipped with one VLAN connected wirelessly to various wireless adapters for notebook and desktop PC. Wireless-G Business Ethernet Bridge 2 Computers in an infrastructure network may double the effective wireless transmission range for more wireless adapters. An infrastructure configuration extends the accessibility of WET200 in a wired or wireless network via the access point...
User Guide
Page 8
... to reset the Bridge to draw power directly from a wireless device. WIRELESS (Green) Lights up when the Bridge is being supplied through the Ethernet cable. To connect a device to use the supplied AC power adaptor. POWER The Power port is not used if you connect the AC power. This allows the Bridge to the factory default settings. This port is where you are using wires in half and full-duplex modes. Auto-sensing technology enables each port to automatically detect the speed of the Bridge...
... to reset the Bridge to draw power directly from a wireless device. WIRELESS (Green) Lights up when the Bridge is being supplied through the Ethernet cable. To connect a device to use the supplied AC power adaptor. POWER The Power port is not used if you connect the AC power. This allows the Bridge to the factory default settings. This port is where you are using wires in half and full-duplex modes. Auto-sensing technology enables each port to automatically detect the speed of the Bridge...
User Guide
Page 9
... in the 5 Connect one end of an Ethernet network cable to the LAN port on the front panel lights up the device first before mounting the device. The Bridge includes two stands. Depending on your PC, then connect the other end to the section, "Placement Options." Proceed to set up green as soon as the power is connected properly." Refer to a PC 2. Connect the Bridge to "Chapter 6: Advanced Configuration". Power Adapter 1.
... in the 5 Connect one end of an Ethernet network cable to the LAN port on the front panel lights up the device first before mounting the device. The Bridge includes two stands. Depending on your PC, then connect the other end to the section, "Placement Options." Proceed to set up green as soon as the power is connected properly." Refer to a PC 2. Connect the Bridge to "Chapter 6: Advanced Configuration". Power Adapter 1.
User Guide
Page 11
... have to access the web-based utility. wireless-G), wireless channel, network type, and SSID configuration on this screen. Wireless-G Business Ethernet Bridge 7 To secure the Bridge, change the Password from Administration > Password) Then click OK. Accessing the Web-Based Utility To access the web-based utility, perform these steps: 1. Press the Enter key. 3. You will be able to configure a wireless connection. Setup Setup Enter the Host Name and IP Address settings on this screen to the access point. Otherwise, the bridge will get an IP address in the User Name...
... have to access the web-based utility. wireless-G), wireless channel, network type, and SSID configuration on this screen. Wireless-G Business Ethernet Bridge 7 To secure the Bridge, change the Password from Administration > Password) Then click OK. Accessing the Web-Based Utility To access the web-based utility, perform these steps: 1. Press the Enter key. 3. You will be able to configure a wireless connection. Setup Setup Enter the Host Name and IP Address settings on this screen to the access point. Otherwise, the bridge will get an IP address in the User Name...
User Guide
Page 12
... of Service (QoS) settings on the Bridge. MAC Table Use this screen to its factory default settings. Wireless-G Business Ethernet Bridge Quick Configuration Overview 8 Wireless Status This screen displays wireless network settings including SSID, network type, wireless mode and channel, security mode, transmit rate, and link quality. Port Mirroring Configure Port MIrroring on this screen to reset the Bridge to configure the Bridge's MAC address table settings. Factory Default Use this screen. Chapter 5 Switch You use the Administration tabs to enter settings...
... of Service (QoS) settings on the Bridge. MAC Table Use this screen to its factory default settings. Wireless-G Business Ethernet Bridge Quick Configuration Overview 8 Wireless Status This screen displays wireless network settings including SSID, network type, wireless mode and channel, security mode, transmit rate, and link quality. Port Mirroring Configure Port MIrroring on this screen to reset the Bridge to configure the Bridge's MAC address table settings. Factory Default Use this screen. Chapter 5 Switch You use the Administration tabs to enter settings...
User Guide
Page 13
... may assign any other IP networks. •• Primary DNS Server Enter the IP address of any device name to the Bridge. The default name is 192.168.1.226. IP Settings If you open the utility, enter admin (the default username) in the username field, enter admin in detail below. Chapter 6 Advanced Configuration Chapter 6: Advanced Configuration Open your DNS server if the Bridge is configured to acquire its IP address automatically from the Administration tab's Password screen. The web-based utiity's login...
... may assign any other IP networks. •• Primary DNS Server Enter the IP address of any device name to the Bridge. The default name is 192.168.1.226. IP Settings If you open the utility, enter admin (the default username) in the username field, enter admin in detail below. Chapter 6 Advanced Configuration Chapter 6: Advanced Configuration Open your DNS server if the Bridge is configured to acquire its IP address automatically from the Administration tab's Password screen. The web-based utiity's login...
User Guide
Page 14
... an Access Point. If you are using Ad-Hoc mode, this should match the channel setting of the other clients on this screen to connect to another wired network through a second wireless Bridge which is configured in percent. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless network detected, the following information. Authentication The authentication type. Click Close to close this should change the default SSID (linksys) to configure the Bridge's wireless interfaces: Basic Settings, Wireless Security, and Advanced...
... an Access Point. If you are using Ad-Hoc mode, this should match the channel setting of the other clients on this screen to connect to another wired network through a second wireless Bridge which is configured in percent. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless network detected, the following information. Authentication The authentication type. Click Close to close this should change the default SSID (linksys) to configure the Bridge's wireless interfaces: Basic Settings, Wireless Security, and Advanced...
User Guide
Page 15
...below. Make sure the other wireless-equipped devices are using the same key. Shared Secret Enter a WPA Shared Secret of security: WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise. It is case-sensitive and should change the encryption keys. WEP Authentication Type Select the 802.11 authentication type, either Open System (default) or Shared Key. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Select the encryption method you to configure security on those products.) After you can enter one or more WEP keys manually. Encryption In...
...below. Make sure the other wireless-equipped devices are using the same key. Shared Secret Enter a WPA Shared Secret of security: WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise. It is case-sensitive and should change the encryption keys. WEP Authentication Type Select the 802.11 authentication type, either Open System (default) or Shared Key. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Select the encryption method you to configure security on those products.) After you can enter one or more WEP keys manually. Encryption In...
User Guide
Page 17
... your changes, or click Cancel to have enabled MAC cloning, then select Auto if you can select from 1 to multiple devices through a LAN port. This is useful when the Bridge is from a range of this value, but it will actively scan for wireless authentication while being associated with the RADIUS server. Auto-Fallback negotiates the best possible connection speed between the Bridge and another wireless-equipped device. Encryption This is set to configure the advanced Ethernet switch features...
... your changes, or click Cancel to have enabled MAC cloning, then select Auto if you can select from 1 to multiple devices through a LAN port. This is useful when the Bridge is from a range of this value, but it will actively scan for wireless authentication while being associated with the RADIUS server. Auto-Fallback negotiates the best possible connection speed between the Bridge and another wireless-equipped device. Encryption This is set to configure the advanced Ethernet switch features...
User Guide
Page 18
... 1: Port 2 (default), Port 3, Port 4, Port 5, or Wireless. Switch > Port Mirroring Use this feature is configured. Switch > Port Mirroring Wireless-G Business Ethernet Bridge If this screen to configure Port Mirroring, which uses control frames to throttle the outgoing packets from a switch port to /from any physical connections. To disable port mirroring, keep the default setting, Disabled. Source Port If you mirror traffic to another IEEE 802.3x-compatible device. Switch > VLAN The VLAN screen allows you move a device to a new VLAN without changing any port (including wireless...
... 1: Port 2 (default), Port 3, Port 4, Port 5, or Wireless. Switch > Port Mirroring Use this feature is configured. Switch > Port Mirroring Wireless-G Business Ethernet Bridge If this screen to configure Port Mirroring, which uses control frames to throttle the outgoing packets from a switch port to /from any physical connections. To disable port mirroring, keep the default setting, Disabled. Source Port If you mirror traffic to another IEEE 802.3x-compatible device. Switch > VLAN The VLAN screen allows you move a device to a new VLAN without changing any port (including wireless...
User Guide
Page 20
... port 6, which controls the wireless interface and CPU access (management traffic and webbased utility access). Chapter 6 Advanced Configuration Port-Based In port-based VLAN mode, the wireless bridge uses a portbased VLAN map to limit the traffic between ports 1 and 6 is permanent and cannot be changed. NOTE: The default port-based VLAN settings consist of Access Lists. This ensures that is a list of packets dropped for the VLAN(s), click Apply Port VLAN Settings to LAN port are blocked. For each address...
... port 6, which controls the wireless interface and CPU access (management traffic and webbased utility access). Chapter 6 Advanced Configuration Port-Based In port-based VLAN mode, the wireless bridge uses a portbased VLAN map to limit the traffic between ports 1 and 6 is permanent and cannot be changed. NOTE: The default port-based VLAN settings consist of Access Lists. This ensures that is a list of packets dropped for the VLAN(s), click Apply Port VLAN Settings to LAN port are blocked. For each address...
User Guide
Page 21
...: Blocking, Learning, or Forwarding. STP Table Select the settings for the wireless port the range is from this port. To apply the settings, click Apply Port Setting. To disable STP, select Disabled. The default value is No Limit. •• Egress Rate Select the maximum rate allowed for the switch. The range is used by default. Rate Limiting is from discarding to learning to 4 seconds. The default is 4 seconds. Wireless-G Business Ethernet Bridge Switch...
...: Blocking, Learning, or Forwarding. STP Table Select the settings for the wireless port the range is from this port. To apply the settings, click Apply Port Setting. To disable STP, select Disabled. The default value is No Limit. •• Egress Rate Select the maximum rate allowed for the switch. The range is used by default. Rate Limiting is from discarding to learning to 4 seconds. The default is 4 seconds. Wireless-G Business Ethernet Bridge Switch...
User Guide
Page 22
... you to change the username and/or password for the Bridge. Administration > Web Access 18 Administration > Password This screen allows you to enable or disable https access to the utility. The default is displayed (default admin). You can also disable this screen to configure the MAC address table for various administrative tasks, such as when a connected device moves from one output port. Address Table Dump A complete dump of packets. Wireless-G Business Ethernet Bridge Administration > Password User Name The...
... you to change the username and/or password for the Bridge. Administration > Web Access 18 Administration > Password This screen allows you to enable or disable https access to the utility. The default is displayed (default admin). You can also disable this screen to configure the MAC address table for various administrative tasks, such as when a connected device moves from one output port. Address Table Dump A complete dump of packets. Wireless-G Business Ethernet Bridge Administration > Password User Name The...
User Guide
Page 24
...of the currently installed firmware. LAN Settings The basic LAN settings. •• IP Address, Subnet mask The Bridge's IP address and subnet mask. •• Gateway The IP address of the Bridge's gateway. These screens only display information and cannot be upgraded if you have downloaded a new firmware file from the Linksys website. System Status > System Status This is the System Status tab's default screen. Wireless-G Business Ethernet Bridge System Status > Wireless Status 20 Chapter 6 Administration > Firmware Upgrade Advanced Configuration System Status The System...
...of the currently installed firmware. LAN Settings The basic LAN settings. •• IP Address, Subnet mask The Bridge's IP address and subnet mask. •• Gateway The IP address of the Bridge's gateway. These screens only display information and cannot be upgraded if you have downloaded a new firmware file from the Linksys website. System Status > System Status This is the System Status tab's default screen. Wireless-G Business Ethernet Bridge System Status > Wireless Status 20 Chapter 6 Administration > Firmware Upgrade Advanced Configuration System Status The System...
User Guide
Page 26
... your home so that can access your network settings. Linksys wireless products use personal information (such as the default wireless network name. Enable MAC address filtering Linksys routers give you cannot physically prevent someone from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are required to support WEP. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your cellular or cordless phones, signals from other wireless networks that...
... your home so that can access your network settings. Linksys wireless products use personal information (such as the default wireless network name. Enable MAC address filtering Linksys routers give you cannot physically prevent someone from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are required to support WEP. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your cellular or cordless phones, signals from other wireless networks that...
User Guide
Page 27
... two physical connections, including an RJ-45 connection and a SFP connection. ACE Filters in time and only occur under specific conditions. Wireless-G Business Ethernet Bridge Baud Indicates the number of a given device or network. Bridges are hardware specific, however they are limited in Access Control Lists (ACL) that determine which are used with Half Duplex mode that allows wireless-equipped computers and other devices to time out. Routers bind Broadcast domains, because routers do not forward broadcast frames. Class...
... two physical connections, including an RJ-45 connection and a SFP connection. ACE Filters in time and only occur under specific conditions. Wireless-G Business Ethernet Bridge Baud Indicates the number of a given device or network. Bridges are hardware specific, however they are limited in Access Control Lists (ACL) that determine which are used with Half Duplex mode that allows wireless-equipped computers and other devices to time out. Routers bind Broadcast domains, because routers do not forward broadcast frames. Class...
User Guide
Page 28
... Gateway Routing Protocol) Provides fast convergence, support for a particular networking device. Ethernet IEEE standard network protocol that interconnects networks with QoS priority information. Flow Control Enables lower speed devices to a specific multicast group. This is implemented by a DHCP server. GARP (General Attributes Registration Protocol) Registers client stations into a VLANs. Half Duplex Data transmission that displays the IP address for variablelength subnet mask, and supports multiple network layer protocols. IP (Internet Protocol) A protocol used...
... Gateway Routing Protocol) Provides fast convergence, support for a particular networking device. Ethernet IEEE standard network protocol that interconnects networks with QoS priority information. Flow Control Enables lower speed devices to a specific multicast group. This is implemented by a DHCP server. GARP (General Attributes Registration Protocol) Registers client stations into a VLANs. Half Duplex Data transmission that displays the IP address for variablelength subnet mask, and supports multiple network layer protocols. IP (Internet Protocol) A protocol used...
User Guide
Page 29
... MAC (Media Access Control) Address The unique address that a manufacturer assigns to a network. MD5 is connected to each managed object must have an OID to another computer over a network. MDI (Media Dependent Interface) A cable used for authentication, authorization, and accounting. 25 Multicast Transmits copies of MD4, and increases MD4 security. Port The connection point on the Internet. QoS (Quality of Service) Provides policies that contain sets of the spanning tree, without creating forwarding loops. Router A networking device...
... MAC (Media Access Control) Address The unique address that a manufacturer assigns to a network. MD5 is connected to each managed object must have an OID to another computer over a network. MDI (Media Dependent Interface) A cable used for authentication, authorization, and accounting. 25 Multicast Transmits copies of MD4, and increases MD4 security. Port The connection point on the Internet. QoS (Quality of Service) Provides policies that contain sets of the spanning tree, without creating forwarding loops. Router A networking device...
User Guide
Page 31
... Egress Direction Support for Easy Browser-based Configuration (HTTP/HTTPS) Management SNMP Version SNMP Version 1, 2c, 3 Web Firmware Upgrade Firmware Upgradable Through Web Browser DHCP DHCP Client Operating Modes Wireless Client Infrastructure or Ad-Hoc Wireless Spec/Modulation Radio and Modulation Type: 802.11b/DSSS, 802.11g/OFDM Channels Operating Channels: 11 North America, 13 Most of Europe (ETSI and Japan) Internal Antennas None External Antennas 2 (Omnidirectional) SMA Detachable Transmit Power Transmit Power (Adjustable) @ Normal Temperature Range: 11b: 12...
... Egress Direction Support for Easy Browser-based Configuration (HTTP/HTTPS) Management SNMP Version SNMP Version 1, 2c, 3 Web Firmware Upgrade Firmware Upgradable Through Web Browser DHCP DHCP Client Operating Modes Wireless Client Infrastructure or Ad-Hoc Wireless Spec/Modulation Radio and Modulation Type: 802.11b/DSSS, 802.11g/OFDM Channels Operating Channels: 11 North America, 13 Most of Europe (ETSI and Japan) Internal Antennas None External Antennas 2 (Omnidirectional) SMA Detachable Transmit Power Transmit Power (Adjustable) @ Normal Temperature Range: 11b: 12...