User Guide
Page 2
Wireless-G Business Ethernet Bridge About This Guide ii Online Resources Website addresses in this document are registered trademarks or trademarks of Cisco Systems, Inc. About This Guide Icon Descriptions While reading through the User Guide you may have to add... www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are listed without http:// in the U.S. All rights reserved. Copyright © 2008 Cisco Systems, Inc. and certain other countries. WARNING: This exclamation point indicates that there...
Wireless-G Business Ethernet Bridge About This Guide ii Online Resources Website addresses in this document are registered trademarks or trademarks of Cisco Systems, Inc. About This Guide Icon Descriptions While reading through the User Guide you may have to add... www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are listed without http:// in the U.S. All rights reserved. Copyright © 2008 Cisco Systems, Inc. and certain other countries. WARNING: This exclamation point indicates that there...
User Guide
Page 3
...1: Introduction 1 Chapter 2: Planning Your Wireless Network 2 Network Topology 2 Network Layout 2 Example of WET200 in Infrastructure Mode 2 Example of WET200 in Ad-Hoc Mode 3 Chapter ...Wireless 7 Switch 8 Administration 8 System Status 8 Chapter 6: Advanced Configuration 9 Setup 9 Wireless 10 Wireless > Basic Settings 10 Wireless > Wireless Security 11 Wireless > Advanced Settings 13 Switch 13 Switch > Port Management 13 Switch > Port Mirroring 14 Switch > VLAN 14 Switch > MAC Based ACL 16 Switch > QoS 17 Switch > Spanning Tree 17 Wireless-G Business Ethernet Bridge...
...1: Introduction 1 Chapter 2: Planning Your Wireless Network 2 Network Topology 2 Network Layout 2 Example of WET200 in Infrastructure Mode 2 Example of WET200 in Ad-Hoc Mode 3 Chapter ...Wireless 7 Switch 8 Administration 8 System Status 8 Chapter 6: Advanced Configuration 9 Setup 9 Wireless 10 Wireless > Basic Settings 10 Wireless > Wireless Security 11 Wireless > Advanced Settings 13 Switch 13 Switch > Port Management 13 Switch > Port Mirroring 14 Switch > VLAN 14 Switch > MAC Based ACL 16 Switch > QoS 17 Switch > Spanning Tree 17 Wireless-G Business Ethernet Bridge...
User Guide
Page 5
...WET200 Wireless Bridge seamlessly bridges separate Ethernet networks together wirelessly and is not ready access to the WET200. The WET200 is a Power over Ethernet (PoE) end device so it can be installed anywhere an Ethernet cable can be run if there is ideal for small businesses with up to 256-bit AES encryption using EAP (Extensible Authentication Protocol) giving small businesses...Mirroring make this an ideal solution for choosing the Wireless-G Business Ethernet Bridge. Introduction Wireless-G Business Ethernet Bridge 1 The integrated QoS features provide consistent voice and ...
...WET200 Wireless Bridge seamlessly bridges separate Ethernet networks together wirelessly and is not ready access to the WET200. The WET200 is a Power over Ethernet (PoE) end device so it can be installed anywhere an Ethernet cable can be run if there is ideal for small businesses with up to 256-bit AES encryption using EAP (Extensible Authentication Protocol) giving small businesses...Mirroring make this an ideal solution for choosing the Wireless-G Business Ethernet Bridge. Introduction Wireless-G Business Ethernet Bridge 1 The integrated QoS features provide consistent voice and ...
User Guide
Page 6
... be used to manage multiple VLANs, with one VLAN connected wirelessly to the company network and Internet. In this example, the WET200 is connected to a wireless Access Point, which is being used to bridge a separate Ethernet segment wirelessly to the company network backbone. Wireless-G Business Ethernet Bridge 2 Linksys wireless adapters also provide access to the Linksys website at www...
... be used to manage multiple VLANs, with one VLAN connected wirelessly to the company network and Internet. In this example, the WET200 is connected to a wireless Access Point, which is being used to bridge a separate Ethernet segment wirelessly to the company network backbone. Wireless-G Business Ethernet Bridge 2 Linksys wireless adapters also provide access to the Linksys website at www...
User Guide
Page 7
In this example, a DHCP server is connected to a Linksys switch that provides power to the Bridge. Alternatively, static IP addresses can also be used to the other wired networks via an Ad-Hoc network connection. The diagram shows ...Office Two, and Office Three, each with a direct connection to quickly set up a temporary network, as shown above. Chapter 2 Example of WET200 in Ad-Hoc Mode Planning Your Wireless Network Example of WET200 in DHCP server. Wireless-G Business Ethernet Bridge 3 The Bridge in Office One is set up to assign IP addresses automatically, since the...
In this example, a DHCP server is connected to a Linksys switch that provides power to the Bridge. Alternatively, static IP addresses can also be used to the other wired networks via an Ad-Hoc network connection. The diagram shows ...Office Two, and Office Three, each with a direct connection to quickly set up a temporary network, as shown above. Chapter 2 Example of WET200 in Ad-Hoc Mode Planning Your Wireless Network Example of WET200 in DHCP server. Wireless-G Business Ethernet Bridge 3 The Bridge in Office One is set up to assign IP addresses automatically, since the...
User Guide
Page 8
... 3 Product Overview Chapter 3: Product Overview Front Panel The Bridge's LEDs, where information about network activity is displayed, are located on the back panel of the Bridge. Front Panel POWER (Green) Lights up when the wireless module is not available, you connect the AC power. ... (PoE) to the Bridge using Power over that the Bridge is being supplied through 5) with an attached device. ETHERNET 1-5 These RJ-45 ports support network speeds of either 10 Mbps or 100 Mbps, and can use Category 5 (or better) network cable. Wireless-G Business Ethernet Bridge 4
... 3 Product Overview Chapter 3: Product Overview Front Panel The Bridge's LEDs, where information about network activity is displayed, are located on the back panel of the Bridge. Front Panel POWER (Green) Lights up when the wireless module is not available, you connect the AC power. ... (PoE) to the Bridge using Power over that the Bridge is being supplied through 5) with an attached device. ETHERNET 1-5 These RJ-45 ports support network speeds of either 10 Mbps or 100 Mbps, and can use Category 5 (or better) network cable. Wireless-G Business Ethernet Bridge 4
User Guide
Page 9
...small slots in further detail below . The Power LED on its two large prongs facing outward, then insert the short prongs into an electrical outlet. Stand Option 1. Follow the appropriate procedure below . Power Adapter 1. Connect one of the cable to a PC 2. Wireless-G Business Ethernet Bridge... Connect the Power Adapter 3. Connect the Bridge to port 5 on a horizontal surface by attaching the included stands. Placement Options There are two...
...small slots in further detail below . The Power LED on its two large prongs facing outward, then insert the short prongs into an electrical outlet. Stand Option 1. Follow the appropriate procedure below . Power Adapter 1. Connect one of the cable to a PC 2. Wireless-G Business Ethernet Bridge... Connect the Power Adapter 3. Connect the Bridge to port 5 on a horizontal surface by attaching the included stands. Placement Options There are two...
User Guide
Page 10
... screws. 4. Large Prongs Stand Installation Proceed to "Chapter 6: Advanced Configuration," for directions on Bridge's Back Panel 2. Wall-Mount Option 1. Determine where you want to set up the Bridge. Wireless-G Business Ethernet Bridge Installation 6 Place the wall-mount slots over the screws and slide the Bridge down until it snaps into the wall-mount slots. On the...
... screws. 4. Large Prongs Stand Installation Proceed to "Chapter 6: Advanced Configuration," for directions on Bridge's Back Panel 2. Wall-Mount Option 1. Determine where you want to set up the Bridge. Wireless-G Business Ethernet Bridge Installation 6 Place the wall-mount slots over the screws and slide the Bridge down until it snaps into the wall-mount slots. On the...
User Guide
Page 11
...assign the IP address in subnet 192.168.1.0/24. Wireless-G Business Ethernet Bridge 7 If a DHCP server is to be available from its default. •• Wireless Click the Wireless tab to access the Wireless screen to create the wireless connection, see Chapter 6, "Advanced Configuration." ••...of the box with the access point. wireless-G), wireless channel, network type, and SSID configuration on this screen. Chapter 5 Quick Configuration Overview Chapter 5: Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to use the new IP ...
...assign the IP address in subnet 192.168.1.0/24. Wireless-G Business Ethernet Bridge 7 If a DHCP server is to be available from its default. •• Wireless Click the Wireless tab to access the Wireless screen to create the wireless connection, see Chapter 6, "Advanced Configuration." ••...of the box with the access point. wireless-G), wireless channel, network type, and SSID configuration on this screen. Chapter 5 Quick Configuration Overview Chapter 5: Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to use the new IP ...
User Guide
Page 12
... screen is used to enter the Simple Network Management Protocol (SNMP) settings. Wireless-G Business Ethernet Bridge Quick Configuration Overview 8 QoS On this screen. Firmware Upgrade Upgrade the Bridge's firmware on this screen you configure the Quality of Service (QoS) settings on the Bridge's ports. Port Management Use this screen to control which MAC addresses can...
... screen is used to enter the Simple Network Management Protocol (SNMP) settings. Wireless-G Business Ethernet Bridge Quick Configuration Overview 8 QoS On this screen. Firmware Upgrade Upgrade the Bridge's firmware on this screen you configure the Quality of Service (QoS) settings on the Bridge's ports. Port Management Use this screen to control which MAC addresses can...
User Guide
Page 13
... screens. In that this option and fill in this field. The default name is WET200. Host Name This is the host name assigned to the Bridge. Wireless-G Business Ethernet Bridge Contact Enter the name of the default. Setup Screen 9 This host name will obtain... its IP address through DHCP. Device Name You may assign any other devices on the WET200. Chapter 6 Advanced Configuration Chapter...
... screens. In that this option and fill in this field. The default name is WET200. Host Name This is the host name assigned to the Bridge. Wireless-G Business Ethernet Bridge Contact Enter the name of the default. Setup Screen 9 This host name will obtain... its IP address through DHCP. Device Name You may assign any other devices on the WET200. Chapter 6 Advanced Configuration Chapter...
User Guide
Page 14
...this should change the default SSID (linksys) to your wireless access point. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless network detected, the following information is the network name used by the Bridge and their general information. Network Type Keep the default ...The type of that allow you to its left. Encryption The encryption type. This should match your wireless network. If you are using the WET200 in your Access Point's channel number. SSID The network name. Click Apply to apply your network...
...this should change the default SSID (linksys) to your wireless access point. Wireless-G Business Ethernet Bridge Wireless > Basic Settings > Wireless Site Survey For each wireless network detected, the following information is the network name used by the Bridge and their general information. Network Type Keep the default ...The type of that allow you to its left. Encryption The encryption type. This should match your wireless network. If you are using the WET200 in your Access Point's channel number. SSID The network name. Click Apply to apply your network...
User Guide
Page 15
...Personal (aka WPA-PSK) Use the WPA Personal screen to create WEP key(s). Make sure the other wireless-equipped devices are 0-9 and A-F. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Then fill in all zeroes. NOTE: WEP security is not recommended now due to WPA or... urged to migrate to its weak security protection. Wireless > Wireless Security - WPA Personal Encryption WPA offers two methods, TKIP and AES, for the Bridge. Select the encryption method you want to communicate with Linksys wireless products only. Shared Secret Enter a WPA Shared Secret...
...Personal (aka WPA-PSK) Use the WPA Personal screen to create WEP key(s). Make sure the other wireless-equipped devices are 0-9 and A-F. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Then fill in all zeroes. NOTE: WEP security is not recommended now due to WPA or... urged to migrate to its weak security protection. Wireless > Wireless Security - WPA Personal Encryption WPA offers two methods, TKIP and AES, for the Bridge. Select the encryption method you want to communicate with Linksys wireless products only. Shared Secret Enter a WPA Shared Secret...
User Guide
Page 16
... changes, or click Cancel to decrypt the certificate file. Encryption Select either TKIP (default) or AES encryption. Certificate Enter the name of 8-63 characters. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Chapter 6 Advanced Configuration WPA2-Personal Use the WPA2 Personal screen to load and decode the certificate file. Click Import to configure WPA2 Personal encryption...
... changes, or click Cancel to decrypt the certificate file. Encryption Select either TKIP (default) or AES encryption. Certificate Enter the name of 8-63 characters. Wireless-G Business Ethernet Bridge Wireless > Wireless Security - Chapter 6 Advanced Configuration WPA2-Personal Use the WPA2 Personal screen to load and decode the certificate file. Click Import to configure WPA2 Personal encryption...
User Guide
Page 17
... Cancel to one of speeds, or keep the default setting, Disable. Wireless-G Business Ethernet Bridge Switch > Port Management 13 When you want to multiple devices through a LAN port. The Bridge will likely decrease overall network performance. Switch The Switch tab contains seven ...minor modifications are used to AES and cannot be set to cancel your password. Wireless > Wireless Security - Only minor modifications of the Bridge's ports-the five Ethernet ports and the wireless "virtual" interface. The Login Name and Private Key Password are recommended. Click...
... Cancel to one of speeds, or keep the default setting, Disable. Wireless-G Business Ethernet Bridge Switch > Port Management 13 When you want to multiple devices through a LAN port. The Bridge will likely decrease overall network performance. Switch The Switch tab contains seven ...minor modifications are used to AES and cannot be set to cancel your password. Wireless > Wireless Security - Only minor modifications of the Bridge's ports-the five Ethernet ports and the wireless "virtual" interface. The Login Name and Private Key Password are recommended. Click...
User Guide
Page 18
...is physically connected. NOTE: Flow Control should be shut down even if it is not available on the switch. Switch > Port Mirroring Wireless-G Business Ethernet Bridge If this screen to configure Port Mirroring, which to cancel your changes. Port 1 will only be disabled when QoS mode (802.1p,... mirroring, select the port whose packets will be used for multimedia applications such as e-mail), or multicast groups (used on the wireless interface. Flow control should be able to communicate with the source port and monitor the source port's traffic. Flow Control To configure...
...is physically connected. NOTE: Flow Control should be shut down even if it is not available on the switch. Switch > Port Mirroring Wireless-G Business Ethernet Bridge If this screen to configure Port Mirroring, which to cancel your changes. Port 1 will only be disabled when QoS mode (802.1p,... mirroring, select the port whose packets will be used for multimedia applications such as e-mail), or multicast groups (used on the wireless interface. Flow control should be able to communicate with the source port and monitor the source port's traffic. Flow Control To configure...
User Guide
Page 19
... by default and cannot be created or modified. For each VLAN ID to enable ingress filtering. This option is 1 and which controls the wireless interface and CPU access (management traffic and webbased utility access). If the packet has an 802.1Q tag, then go to 4095. Otherwise,... VLAN and frames will be part of the VLAN to be changed . •• Acceptable Frame Type Select the type of the ports. Wireless-G Business Ethernet Bridge 15 otherwise the packet is accepted. 4. You use these fields to create the VLAN membership table. •• ID # Enter the ID...
... by default and cannot be created or modified. For each VLAN ID to enable ingress filtering. This option is 1 and which controls the wireless interface and CPU access (management traffic and webbased utility access). If the packet has an 802.1Q tag, then go to 4095. Otherwise,... VLAN and frames will be part of the VLAN to be changed . •• Acceptable Frame Type Select the type of the ports. Wireless-G Business Ethernet Bridge 15 otherwise the packet is accepted. 4. You use these fields to create the VLAN membership table. •• ID # Enter the ID...
User Guide
Page 20
...must remember to pass or drop the packet. To unaccept the MAC address, enter the MAC address in the table; Click Refresh to the device. Wireless-G Business Ethernet Bridge Switch > MAC Based ACL Switch > MAC Based ACL An Access List (ACL) is from port 1 to port 2.) To automatically add the ...connection in the opposite direction (from the wireless port to a LAN port or vice versa, the Bridge will check if the packet's source MAC address matches any of your computer's MAC address in this field, and click ...
...must remember to pass or drop the packet. To unaccept the MAC address, enter the MAC address in the table; Click Refresh to the device. Wireless-G Business Ethernet Bridge Switch > MAC Based ACL Switch > MAC Based ACL An Access List (ACL) is from port 1 to port 2.) To automatically add the ...connection in the opposite direction (from the wireless port to a LAN port or vice versa, the Bridge will check if the packet's source MAC address matches any of your computer's MAC address in this field, and click ...
User Guide
Page 21
...Mode and Rate Limiting. For ports 1-5, the range is 128 kbps to 64 Mbps and for the port. The default is from this port. Wireless-G Business Ethernet Bridge Switch > Spanning Tree This screen allows you to 4 seconds. To disable STP, select Disabled. The range is 3 seconds. It is No ...seconds. The range is 1 second. STP Table Select the settings for the wireless port the range is 128 kbps to ensure that only one route exists between switches, bridges or routers. This is , an STP-compliant switch, bridge or router) in this port. If two ports form a loop, the ...
...Mode and Rate Limiting. For ports 1-5, the range is 128 kbps to 64 Mbps and for the port. The default is from this port. Wireless-G Business Ethernet Bridge Switch > Spanning Tree This screen allows you to 4 seconds. To disable STP, select Disabled. The range is 3 seconds. It is No ...seconds. The range is 1 second. STP Table Select the settings for the wireless port the range is 128 kbps to ensure that only one route exists between switches, bridges or routers. This is , an STP-compliant switch, bridge or router) in this port. If two ports form a loop, the ...
User Guide
Page 22
... change occurs, click Refresh to remove the learned entries and force the entries to change the password from one output port. Wireless-G Business Ethernet Bridge Administration > Password User Name The current user name is populated automatically. Learning mode is enabled, then the MAC table is ...displayed (default admin). Administration > Password This screen allows you change the username and/or password for the Bridge. Switch > MAC Table Global ATU Setting This is 300 seconds. Select Enable Learning (default) or Disable Learning. ••...
... change occurs, click Refresh to remove the learned entries and force the entries to change the password from one output port. Wireless-G Business Ethernet Bridge Administration > Password User Name The current user name is populated automatically. Learning mode is enabled, then the MAC table is ...displayed (default admin). Administration > Password This screen allows you change the username and/or password for the Bridge. Switch > MAC Table Global ATU Setting This is 300 seconds. Select Enable Learning (default) or Disable Learning. ••...