User Guide
Page 3
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based Utility 3 Setup Tab 3 Password Tab 7 Advanced Settings Tab 8 Status Tab 9 Help Tab 9 Appendix A: Troubleshooting 11 Appendix B: Specifications 12 Appendix C: Warranty Information 13 Limited Warranty 13 Appendix D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15...
Table of Contents Chapter 1: Product Overview 1 Front Panel 1 Back Panel 1 Chapter 2: Wireless Security Checklist 2 General Network Security Guidelines 2 Additional Security Tips 2 Chapter 3: Configuration using the Web-based Utility 3 How to Access the Web-Based Utility 3 Setup Tab 3 Password Tab 7 Advanced Settings Tab 8 Status Tab 9 Help Tab 9 Appendix A: Troubleshooting 11 Appendix B: Specifications 12 Appendix C: Warranty Information 13 Limited Warranty 13 Appendix D: Regulatory Information 15 FCC Statement 15 FCC Radiation Exposure Statement 15...
User Guide
Page 4
... for choosing theWireless-G Ethernet Bridge.The versatile Wireless-G Ethernet Bridge can make any wired Ethernet-equipped device a part of your settings (WEP encryption, wireless settings, etc.) and replace them with the factory defaults. The LED flashes while the Bridge is booting up when the Bridge is wired network traffic. Front Panel Wireless-G (Green) This LED will erase all of your wireless network. Power The Power port is where you will flash when there is powered on. At home, use the Bridge to connect game consoles, settop...
... for choosing theWireless-G Ethernet Bridge.The versatile Wireless-G Ethernet Bridge can make any wired Ethernet-equipped device a part of your settings (WEP encryption, wireless settings, etc.) and replace them with the factory defaults. The LED flashes while the Bridge is booting up when the Bridge is wired network traffic. Front Panel Wireless-G (Green) This LED will erase all of your wireless network. Power The Power port is where you will flash when there is powered on. At home, use the Bridge to connect game consoles, settop...
User Guide
Page 5
...over radio waves, it passes over the airwaves, you the ability to enable Media Access Control (MAC) address filtering. Some applications may open file sharing without your wireless network. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless network, you can specify the MAC address of numbers and letters assigned to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Change the default wireless network name or SSID Wireless devices have a default password set by...
...over radio waves, it passes over the airwaves, you the ability to enable Media Access Control (MAC) address filtering. Some applications may open file sharing without your wireless network. Additional Security Tips •• Keep wireless routers, access points, or gateways away from connecting to your wireless network, you can specify the MAC address of numbers and letters assigned to intruders than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. Change the default wireless network name or SSID Wireless devices have a default password set by...
User Guide
Page 6
...configure it using multiple bridges on the Password screen later. Lets you configure the wired and wireless network settings for the Bridge. Provides explanations of your web browser and the Wireless-G Ethernet Bridge Web-based Utility. Wireless-G Ethernet Bridge Setup Tab The Setup screen lets you change the default SSID (linksys) to function properly after you to alter the Bridge's settings. Firmware updates are assigning the Bridge a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the wireless network. LAN...
...configure it using multiple bridges on the Password screen later. Lets you configure the wired and wireless network settings for the Bridge. Provides explanations of your web browser and the Wireless-G Ethernet Bridge Web-based Utility. Wireless-G Ethernet Bridge Setup Tab The Setup screen lets you change the default SSID (linksys) to function properly after you to alter the Bridge's settings. Firmware updates are assigning the Bridge a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the wireless network. LAN...
User Guide
Page 7
... appropriate network mode from the Channel drop-down menu. You can use this screen. The four security modes are briefly discussed here. Keep the default setting, Infrastructure, if you will appear. If you want your wireless network. Chapter 3 Configuration using a wireless access point. This screen shows all the wireless networks detected by the Bridge: •• WPA (Wi-Fi Protected Access) Pre-Shared Key •• WPA RADIUS •• RADIUS (Remote Authentication Dial-In User Service) •• WEP...
... appropriate network mode from the Channel drop-down menu. You can use this screen. The four security modes are briefly discussed here. Keep the default setting, Infrastructure, if you will appear. If you want your wireless network. Chapter 3 Configuration using a wireless access point. This screen shows all the wireless networks detected by the Bridge: •• WPA (Wi-Fi Protected Access) Pre-Shared Key •• WPA RADIUS •• RADIUS (Remote Authentication Dial-In User Service) •• WEP...
User Guide
Page 8
... your changes. It is compatible with non-Linksys wireless products, you will need to enter your web browser. If you are using a Passphrase or enter the WEP key manually. If you want to generate one or more WEP keys. Click Close to return to configure the WEP encryption for the encryption method. Chapter 3 Configuration using the Web-based Utility WEP Use the WEP screen to the the WPA Pre-Shared Key screen. Security > WEP Select a Default Transmit Key (choose which WEP key...
... your changes. It is compatible with non-Linksys wireless products, you will need to enter your web browser. If you are using a Passphrase or enter the WEP key manually. If you want to generate one or more WEP keys. Click Close to return to configure the WEP encryption for the encryption method. Chapter 3 Configuration using the Web-based Utility WEP Use the WEP screen to the the WPA Pre-Shared Key screen. Security > WEP Select a Default Transmit Key (choose which WEP key...
User Guide
Page 9
... a Default Key (choose which WEP key (1-4) will be used with Windows XP Zero Configuration. Make sure that uses digital certificates. WEP uses 64-bit or 128-bit keys to provide access control to protect your changes. Enter the ID in the User ID field, then the password in 6 User ID and Password A user identification and password are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all devices in a network...
... a Default Key (choose which WEP key (1-4) will be used with Windows XP Zero Configuration. Make sure that uses digital certificates. WEP uses 64-bit or 128-bit keys to provide access control to protect your changes. Enter the ID in the User ID field, then the password in 6 User ID and Password A user identification and password are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all devices in a network...
User Guide
Page 10
... Upload button to browse for the Bridge's Password. Password Tab The Password screen lets you create. Chapter 3 Configuration using the Web-based Utility the fields or click Browse to upload the certificate. Enter the new Password a second time to access the Bridge's Web-based Utility will be prompted for it, then upload it . User ID Your User ID is a mutual authentication method that you change the factory default password of your web browser. Enter the Login name...
... Upload button to browse for the Bridge's Password. Password Tab The Password screen lets you create. Chapter 3 Configuration using the Web-based Utility the fields or click Browse to upload the certificate. Enter the new Password a second time to access the Bridge's Web-based Utility will be prompted for it, then upload it . User ID Your User ID is a mutual authentication method that you change the factory default password of your web browser. Enter the Login name...
User Guide
Page 11
... using the Web-based Utility Advanced Settings Tab Use the Advanced Settings screen to specify a MAC address in your network. If you have enabled MAC cloning, then select Auto if you encounter inconsistent data flow, only minor modifications are Auto, Open, and Shared. The Router sends Request to Send (RTS) frames to the Bridge's LAN port. MAC Address Cloning Mode You can authenticate each other and start transmitting data. Click Help for a new MAC address to have the same WEP keys...
... using the Web-based Utility Advanced Settings Tab Use the Advanced Settings screen to specify a MAC address in your network. If you have enabled MAC cloning, then select Auto if you encounter inconsistent data flow, only minor modifications are Auto, Open, and Shared. The Router sends Request to Send (RTS) frames to the Bridge's LAN port. MAC Address Cloning Mode You can authenticate each other and start transmitting data. Click Help for a new MAC address to have the same WEP keys...
User Guide
Page 12
... also upgrade the Bridge's firmware. Firmware Version The version number of the Bridge's firmware is displayed here. Subnet Mask The Bridge's Subnet Mask is read -only). All information is displayed here. Status Device Name The name you need the free Adobe Acrobat Reader to view the pdf. Network Type The Bridge's mode is displayed here. MAC Address The MAC Address of packets received from the wireless network is displayed here. If you experience problems with the Bridge. Ethernet RX The number...
... also upgrade the Bridge's firmware. Firmware Version The version number of the Bridge's firmware is displayed here. Subnet Mask The Bridge's Subnet Mask is read -only). All information is displayed here. Status Device Name The name you need the free Adobe Acrobat Reader to view the pdf. Network Type The Bridge's mode is displayed here. MAC Address The MAC Address of packets received from the wireless network is displayed here. If you experience problems with the Bridge. Ethernet RX The number...
User Guide
Page 14
... Bridge settings will reset the password to -head (ad-hoc) gaming with a wireless-enabled PC or printer. Appendix A Appendix A: Troubleshooting I can push the Bridge's Reset button. Open the Web-based Utility. I want to access, and its Xbox, the Bridge will automatically clone the Xbox's MAC address. •• Repeat steps 1-5 for each Xbox. Follow these instructions: 1. Click Apply to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 If you see a screen that all the Wireless-G Ethernet Bridges...
... Bridge settings will reset the password to -head (ad-hoc) gaming with a wireless-enabled PC or printer. Appendix A Appendix A: Troubleshooting I can push the Bridge's Reset button. Open the Web-based Utility. I want to access, and its Xbox, the Bridge will automatically clone the Xbox's MAC address. •• Repeat steps 1-5 for each Xbox. Follow these instructions: 1. Click Apply to the Linksys website, www.linksys.com Wireless-G Ethernet Bridge 11 If you see a screen that all the Wireless-G Ethernet Bridges...
User Guide
Page 15
Wireless-G Ethernet Bridge Specifications 12 Storage Temp. Appendix B Appendix B: Specifications Model Standards Ports Buttons LEDs Cabling Type Transmit Power Security Features WEP Key Bits Protocols Environmental Dimensions Weight Power Certification Operating Temp. Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM...
Wireless-G Ethernet Bridge Specifications 12 Storage Temp. Appendix B Appendix B: Specifications Model Standards Ports Buttons LEDs Cabling Type Transmit Power Security Features WEP Key Bits Protocols Environmental Dimensions Weight Power Certification Operating Temp. Operating Humidity Storage Humidity WET54G IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Reset Power, Ethernet, Wireless-G Category 5 or better 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM...
User Guide
Page 16
... is used will be uninterrupted or error free. Also, due to the continual development of new techniques for instructions on how to obtain warranty service. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. If the product proves defective during the Warranty Period, contact Linksys Technical Support for intruding upon and attacking networks, Linksys does...
... is used will be uninterrupted or error free. Also, due to the continual development of new techniques for instructions on how to obtain warranty service. IN NO EVENT WILL LINKSYS' LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. If the product proves defective during the Warranty Period, contact Linksys Technical Support for intruding upon and attacking networks, Linksys does...
User Guide
Page 18
...a dealer or an experienced radio/TV technician for assistance FCC Caution: Any changes or modifications not expressly approved by turning the equipment off and on, the user is strictly prohibited per regulations of 2dBi. Antenna having a maximum gain of Industry Canada....a Class B digital device, pursuant to Part 15 of fire, use only No.26 AWG or larger telecommunication line cord. •• Do not use this device must accept any other antenna or transmitter. Operation is firmware-limited to channels 1 through 11. Wireless-G Ethernet Bridge 15 Regulatory Information Safety ...
...a dealer or an experienced radio/TV technician for assistance FCC Caution: Any changes or modifications not expressly approved by turning the equipment off and on, the user is strictly prohibited per regulations of 2dBi. Antenna having a maximum gain of Industry Canada....a Class B digital device, pursuant to Part 15 of fire, use only No.26 AWG or larger telecommunication line cord. •• Do not use this device must accept any other antenna or transmitter. Operation is firmware-limited to channels 1 through 11. Wireless-G Ethernet Bridge 15 Regulatory Information Safety ...
User Guide
Page 24
... TO BE BOUND BY THE "TERMS OF SERVICE" SET FORTH IN SCHEDULE 2 IF APPLICABLE. READ IT CAREFULLY BEFORE INSTALLING AND USING THE SOFTWARE. "Software" includes, and this Agreement will mail to you a CD with the applicable Cisco product, and (b) any upgrades, updates, bug fixes or modified versions ("Upgrades") or backup copies of the Software supplied to the terms of this Agreement and...
... TO BE BOUND BY THE "TERMS OF SERVICE" SET FORTH IN SCHEDULE 2 IF APPLICABLE. READ IT CAREFULLY BEFORE INSTALLING AND USING THE SOFTWARE. "Software" includes, and this Agreement will mail to you a CD with the applicable Cisco product, and (b) any upgrades, updates, bug fixes or modified versions ("Upgrades") or backup copies of the Software supplied to the terms of this Agreement and...
User Guide
Page 25
... activity of computers running the Software can enable or disable any regulatory authority or government agency. Any computer on the original Software and Documentation; (vi) use of either in order (i) to enable Cisco to offer you personally. This information is being used in accordance with your use the Software for management of a business network with the email address supplied by Cisco and its licensors...
... activity of computers running the Software can enable or disable any regulatory authority or government agency. Any computer on the original Software and Documentation; (vi) use of either in order (i) to enable Cisco to offer you personally. This information is being used in accordance with your use the Software for management of a business network with the email address supplied by Cisco and its licensors...
User Guide
Page 26
... ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Use of Liabilities. Software Upgrades etc. Your rights under your Cisco product and/or the Software is used will be uninterrupted or error free. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS...
... ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Use of Liabilities. Software Upgrades etc. Your rights under your Cisco product and/or the Software is used will be uninterrupted or error free. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE ANDTOTHE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, ALL SOFTWARE PROVIDED BY CISCO Wireless-G Ethernet Bridge Software End User License Agreement IS PROVIDED "AS IS...
User Guide
Page 27
... about new products and services that cancellation of Linksys, Cisco, its licensors' names or respective trademarks. Network Magic Cancellation. Cisco may cancel the Service by providing written notice to Cisco via Wireless-G Ethernet Bridge Software End User License Agreement www.networkmagic.com/support of such cancellation and uninstalling the Software and discontinuing your Services is intended to the Software and supersedes any Network Magic product Upgrades...
... about new products and services that cancellation of Linksys, Cisco, its licensors' names or respective trademarks. Network Magic Cancellation. Cisco may cancel the Service by providing written notice to Cisco via Wireless-G Ethernet Bridge Software End User License Agreement www.networkmagic.com/support of such cancellation and uninstalling the Software and discontinuing your Services is intended to the Software and supersedes any Network Magic product Upgrades...
User Guide
Page 31
... distribute copies of an advantage over competing non-free programs. These disadvantages are designed to make sure the software is free for certain libraries in new free programs; We protect your rights, we want ...free software. and that you have is quite different from a patent holder. Wireless-G Ethernet Bridge Software End User License Agreement To protect each distributor, we need to encourage the widest possible use it . A more lax criteria for linking other authors who decide to use of the GNU Library Public License, version 2, hence the version number...
... distribute copies of an advantage over competing non-free programs. These disadvantages are designed to make sure the software is free for certain libraries in new free programs; We protect your rights, we want ...free software. and that you have is quite different from a patent holder. Wireless-G Ethernet Bridge Software End User License Agreement To protect each distributor, we need to encourage the widest possible use it . A more lax criteria for linking other authors who decide to use of the GNU Library Public License, version 2, hence the version number...
User Guide
Page 36
... is covered by the same copyright terms except that the following conditions apply to all code found in the code are adhered to OpenSSL please contact [email protected]. Appendix E The OpenSSL toolkit stays under a dual license, i.e. Wireless-G Ethernet Bridge Software End User License Agreement This product includes cryptographic software written by Tim Hudson ([email protected]).
... is covered by the same copyright terms except that the following conditions apply to all code found in the code are adhered to OpenSSL please contact [email protected]. Appendix E The OpenSSL toolkit stays under a dual license, i.e. Wireless-G Ethernet Bridge Software End User License Agreement This product includes cryptographic software written by Tim Hudson ([email protected]).