User Guide
Page 4
Wireless-G Ethernet Bridge with 5-Port Switch Security Precautions 47 Security Threats Facing Wireless Networks 47 Appendix C: Upgrading Firmware 50 Appendix D: Windows Help 51 Appendix E: Glossary 52 Appendix F: Specifications 59 Appendix G: Warranty Information 61 Appendix H: Regulatory Information 62 FCC Statement 62 Industry Canada (Canada) 62 Appendix I: Contact Information 63
Wireless-G Ethernet Bridge with 5-Port Switch Security Precautions 47 Security Threats Facing Wireless Networks 47 Appendix C: Upgrading Firmware 50 Appendix D: Windows Help 51 Appendix E: Glossary 52 Appendix F: Specifications 59 Appendix G: Warranty Information 61 Appendix H: Regulatory Information 62 FCC Statement 62 Industry Canada (Canada) 62 Appendix I: Contact Information 63
User Guide
Page 6
Wireless-G Ethernet Bridge with 5-Port Switch Figure 7-10: WPA RADIUS-TTLS 27 Figure 7-11: WPA Pre-Shared Key 28 Figure 7-12: Log Table 28 Figure 7-13: Password Tab 29 Figure 7-14: Wireless Tab 30 Figure 7-15: Spanning Tree Protocol Tab 31 Figure 7-16: QOS Tab 32 Figure 7-17: Switch Table Tab 33 Figure 7-18...: VLAN Tab 34 Figure 7-19: RMON Statistics Tab 36 Figure 7-20: Port Mirroring Tab 38 Figure 7-21: Access List Tab 39 Figure 7-22: Wireless Status Tab 40 Figure 7-23: SNMP Tab 41 Figure 7-24: Help Tab 42 Figure 7-25...
Wireless-G Ethernet Bridge with 5-Port Switch Figure 7-10: WPA RADIUS-TTLS 27 Figure 7-11: WPA Pre-Shared Key 28 Figure 7-12: Log Table 28 Figure 7-13: Password Tab 29 Figure 7-14: Wireless Tab 30 Figure 7-15: Spanning Tree Protocol Tab 31 Figure 7-16: QOS Tab 32 Figure 7-17: Switch Table Tab 33 Figure 7-18...: VLAN Tab 34 Figure 7-19: RMON Statistics Tab 36 Figure 7-20: Port Mirroring Tab 38 Figure 7-21: Access List Tab 39 Figure 7-22: Wireless Status Tab 40 Figure 7-23: SNMP Tab 41 Figure 7-24: Help Tab 42 Figure 7-25...
User Guide
Page 8
... how to set up the Bridge using the Wireless-G Ethernet Bridge with 5-Port Switch. • Chapter 1: Introduction This chapter describes the Wireless-G Ethernet Bridge applications and this user guide. • Chapter 2: Planning your Wireless Network This chapter describes the basics of wireless networking. • Chapter 3: Getting to reduce the risks. • Appendix C: Upgrading Firmware This appendix instructs you...
... how to set up the Bridge using the Wireless-G Ethernet Bridge with 5-Port Switch. • Chapter 1: Introduction This chapter describes the Wireless-G Ethernet Bridge applications and this user guide. • Chapter 2: Planning your Wireless Network This chapter describes the basics of wireless networking. • Chapter 3: Getting to reduce the risks. • Appendix C: Upgrading Firmware This appendix instructs you...
User Guide
Page 25
Open your web browser and the Wireless-G Ethernet Bridge Web-based Utility. You can also upgrade the Bridge's firmware using the Setup Wizard. The Utility provides a convenient, web-browser-based way to the one shown in Figure 7-1 will appear. This screen... allows you configure it using the Help screen. PCs communicate over the network with 5-Port Switch Chapter 7: Using the Wireless-G Ethernet Bridge Web-based...
Open your web browser and the Wireless-G Ethernet Bridge Web-based Utility. You can also upgrade the Bridge's firmware using the Setup Wizard. The Utility provides a convenient, web-browser-based way to the one shown in Figure 7-1 will appear. This screen... allows you configure it using the Help screen. PCs communicate over the network with 5-Port Switch Chapter 7: Using the Wireless-G Ethernet Bridge Web-based...
User Guide
Page 26
... changes. • Firmware - Wireless-G Ethernet Bridge with the Bridge. Enter the key that you use for your changes on the same wireless network. • Configuration Type - Enter the time in the field. • Shared Key. Firmware should be upgraded ONLY if you are posted at www.linksys.com. • MAC Address - Firmware updates are assigning the Bridge a static IP...
... changes. • Firmware - Wireless-G Ethernet Bridge with the Bridge. Enter the key that you use for your changes on the same wireless network. • Configuration Type - Enter the time in the field. • Shared Key. Firmware should be upgraded ONLY if you are posted at www.linksys.com. • MAC Address - Firmware updates are assigning the Bridge a static IP...
User Guide
Page 46
... displayed here. • TX Rate - The quality of the Bridge's security is displayed here. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Status Figure 7-22: Wireless Status Tab 40 LAN Settings • IP Address - The Bridge's IP Address is displayed here. • Channel - The number of the Bridge's firmware is displayed here. The status of the...
... displayed here. • TX Rate - The quality of the Bridge's security is displayed here. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Status Figure 7-22: Wireless Status Tab 40 LAN Settings • IP Address - The Bridge's IP Address is displayed here. • Channel - The number of the Bridge's firmware is displayed here. The status of the...
User Guide
Page 48
... on -screen. After you do not have selected the appropriate file, click the Upgrade button, and follow these instructions: 1. Wireless-G Ethernet Bridge with the Bridge. Click the Linksys Website link to all of the extracted firmware upgrade file, or click the Browse button to download it. • Adobe Website (software for the Web-based Utility...
... on -screen. After you do not have selected the appropriate file, click the Upgrade button, and follow these instructions: 1. Wireless-G Ethernet Bridge with the Bridge. Click the Linksys Website link to all of the extracted firmware upgrade file, or click the Browse button to download it. • Adobe Website (software for the Web-based Utility...
User Guide
Page 53
... MAC Address Filtering. 5. Refer to the router or access point's documentation for the Administrator account. 4. Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make it is available. The current generation of the network's information, such as the network's... SSID (Service Set Identifier). So, keep in its firmware. Disable SSID Broadcast. 3. Use WPA if it...
... MAC Address Filtering. 5. Refer to the router or access point's documentation for the Administrator account. 4. Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make it is available. The current generation of the network's information, such as the network's... SSID (Service Set Identifier). So, keep in its firmware. Disable SSID Broadcast. 3. Use WPA if it...
User Guide
Page 56
Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. 2. In the field provided, enter the name of the extracted firmware upgrade file, or click the Browse button to upgrade the firmware; After you have selected the ...Firmware You can use the Bridge's Web-based Utility to find this file. 6. however, firmware should be upgraded ONLY if you may lose its configuration settings. To upgrade the Bridge's firmware, follow the on your computer. 3. Open the Bridge's Web-based Utility, and click the Help tab. 4. Wireless-G Ethernet Bridge with the Bridge...
Download the Bridge's firmware upgrade file from the Linksys website, www.linksys.com. 2. In the field provided, enter the name of the extracted firmware upgrade file, or click the Browse button to upgrade the firmware; After you have selected the ...Firmware You can use the Bridge's Web-based Utility to find this file. 6. however, firmware should be upgraded ONLY if you may lose its configuration settings. To upgrade the Bridge's firmware, follow the on your computer. 3. Open the Bridge's Web-based Utility, and click the Help tab. 4. Wireless-G Ethernet Bridge with the Bridge...
User Guide
Page 60
... a network medium that protects the resources of related programs located at a time. EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - Firmware - FTP (File Transfer Protocol) - Half Duplex - Hardware - Encoding data transmitted in two directions over a single line, but only one... networks. Many specific authentication methods work within this framework. Firewall - A mutual authentication method that can increase wireless efficiency. Wireless-G Ethernet Bridge with 5-Port Switch DTIM (Delivery Traffic Indication Message) -
... a network medium that protects the resources of related programs located at a time. EAP-PEAP (Extensible Authentication Protocol-Protected Extensible Authentication Protocol) - Firmware - FTP (File Transfer Protocol) - Half Duplex - Hardware - Encoding data transmitted in two directions over a single line, but only one... networks. Many specific authentication methods work within this framework. Firewall - A mutual authentication method that can increase wireless efficiency. Wireless-G Ethernet Bridge with 5-Port Switch DTIM (Delivery Traffic Indication Message) -
User Guide
Page 64
... goes to another over a network. A group of a file located on a wireless network for a particular networking device. WPA (Wi-Fi Protected Access) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in...other wirelessly. WEP (Wired Equivalent Privacy) - WINIPCFG - WLAN (Wireless Local Area Network) - Upload - URL (Uniform Resource Locator) - WAN (Wide Area Network)- Wireless-G Ethernet Bridge with a newer version. Appendix E: Glossary 58 VPN (Virtual Private Network) - To replace existing software or firmware with...
... goes to another over a network. A group of a file located on a wireless network for a particular networking device. WPA (Wi-Fi Protected Access) - a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be used in...other wirelessly. WEP (Wired Equivalent Privacy) - WINIPCFG - WLAN (Wireless Local Area Network) - Upload - URL (Uniform Resource Locator) - WAN (Wide Area Network)- Wireless-G Ethernet Bridge with a newer version. Appendix E: Glossary 58 VPN (Virtual Private Network) - To replace existing software or firmware with...