User Guide
Page 5
... Figure 4-1: Connect to the Network 10 Figure 4-2: Connect the Power 11 Figure 5-1: Welcome 12 Figure 5-2: Connection 12 Figure 5-3: List of Bridges 13 Figure 5-4: Password 13 Figure 5-5: Mode Settings 14 Figure 5-6: Wireless Settings 15 Figure 5-7: IP Settings 15 Figure 5-8: Security Settings 16 Figure 5-9: Security Settings 16 Figure 5-10: Confirmation 17 Figure 5-11: ...7-3: 802.1x Screen 20 Figure 7-4: Site Survey 21 Figure 7-5: WEP 22 Figure 7-6: RADIUS-MD5 23 Figure 7-7: RADIUS-TLS 24 Figure 7-8: RADIUS-TTLS 25 Figure 7-9: WPA RADIUS-TLS 26
... Figure 4-1: Connect to the Network 10 Figure 4-2: Connect the Power 11 Figure 5-1: Welcome 12 Figure 5-2: Connection 12 Figure 5-3: List of Bridges 13 Figure 5-4: Password 13 Figure 5-5: Mode Settings 14 Figure 5-6: Wireless Settings 15 Figure 5-7: IP Settings 15 Figure 5-8: Security Settings 16 Figure 5-9: Security Settings 16 Figure 5-10: Confirmation 17 Figure 5-11: ...7-3: 802.1x Screen 20 Figure 7-4: Site Survey 21 Figure 7-5: WEP 22 Figure 7-6: RADIUS-MD5 23 Figure 7-7: RADIUS-TLS 24 Figure 7-8: RADIUS-TTLS 25 Figure 7-9: WPA RADIUS-TLS 26
User Guide
Page 6
Wireless-G Ethernet Bridge with 5-Port Switch Figure 7-10: WPA RADIUS-TTLS 27 Figure 7-11: WPA Pre-Shared Key 28 Figure 7-12: Log Table 28 Figure 7-13: Password Tab 29 Figure 7-14: Wireless Tab 30 Figure 7-15: Spanning Tree Protocol Tab 31 Figure 7-16: QOS Tab 32 Figure 7-17: Switch Table Tab 33 Figure ... Tab 34 Figure 7-19: RMON Statistics Tab 36 Figure 7-20: Port Mirroring Tab 38 Figure 7-21: Access List Tab 39 Figure 7-22: Wireless Status Tab 40 Figure 7-23: SNMP Tab 41 Figure 7-24: Help Tab 42 Figure 7-25: Firmware Upgrade 42 Figure C-1: Firmware Upgrade 50
Wireless-G Ethernet Bridge with 5-Port Switch Figure 7-10: WPA RADIUS-TTLS 27 Figure 7-11: WPA Pre-Shared Key 28 Figure 7-12: Log Table 28 Figure 7-13: Password Tab 29 Figure 7-14: Wireless Tab 30 Figure 7-15: Spanning Tree Protocol Tab 31 Figure 7-16: QOS Tab 32 Figure 7-17: Switch Table Tab 33 Figure ... Tab 34 Figure 7-19: RMON Statistics Tab 36 Figure 7-20: Port Mirroring Tab 38 Figure 7-21: Access List Tab 39 Figure 7-22: Wireless Status Tab 40 Figure 7-23: SNMP Tab 41 Figure 7-24: Help Tab 42 Figure 7-25: Firmware Upgrade 42 Figure C-1: Firmware Upgrade 50
User Guide
Page 22
... automatically generated WEP key. WEP stands for the Bridge, refer to manually enter a WEP key, leave the Passphrase field blank and complete the Key 1 field. • Key 1 - The Passphrase is compatible with Linksys wireless products only. (You will be automatically generated. If... you are using 64-bit WEP encryption, then the key must match the passphrase of the wireless security mode options supported by the Bridge: WPA PSK (Pre-Shared Key) and WEP. (WPA stands for Wi-...
... automatically generated WEP key. WEP stands for the Bridge, refer to manually enter a WEP key, leave the Passphrase field blank and complete the Key 1 field. • Key 1 - The Passphrase is compatible with Linksys wireless products only. (You will be automatically generated. If... you are using 64-bit WEP encryption, then the key must match the passphrase of the wireless security mode options supported by the Bridge: WPA PSK (Pre-Shared Key) and WEP. (WPA stands for Wi-...
User Guide
Page 28
...Default Transmit Key - For detailed instructions on the non-Linksys wireless products.) After you can enter one of the wireless network you want to generate one or more WEP keys manually. Wireless-G Ethernet Bridge with 5-Port Switch Wireless-B (802.11b) devices in Figure 7-5, will appear. ... used to communicate with non-Linksys wireless products, you are "0"-"9" and "A"-"F". The Security screen, as shown in your security choice matches the security choice of the four wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA Pre-Shared Key,. (WEP ...
...Default Transmit Key - For detailed instructions on the non-Linksys wireless products.) After you can enter one of the wireless network you want to generate one or more WEP keys manually. Wireless-G Ethernet Bridge with 5-Port Switch Wireless-B (802.11b) devices in Figure 7-5, will appear. ... used to communicate with non-Linksys wireless products, you are "0"-"9" and "A"-"F". The Security screen, as shown in your security choice matches the security choice of the four wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA Pre-Shared Key,. (WEP ...
User Guide
Page 32
... menu. Last, enter a Key Renewal Timeout, which instructs the Router how often it . Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 26 Setup Select TLS from the EAP Type drop-down menu. • WPA Algorithm - The WPA algorithm used is TKIP. Enter the RADIUS server's IP Address and port number, along with a key...
... menu. Last, enter a Key Renewal Timeout, which instructs the Router how often it . Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 26 Setup Select TLS from the EAP Type drop-down menu. • WPA Algorithm - The WPA algorithm used is TKIP. Enter the RADIUS server's IP Address and port number, along with a key...
User Guide
Page 33
... page doesn't automatically refresh itself, then click the Refresh button of your web browser. Figure 7-10: WPA RADIUS-TTLS Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 27 Setup Select TTLS from the drop-down menu. • WPA Algorithm - Enter the Root Certificate in the User ID field. • Password - The authentication method...
... page doesn't automatically refresh itself, then click the Refresh button of your web browser. Figure 7-10: WPA RADIUS-TTLS Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 27 Setup Select TTLS from the drop-down menu. • WPA Algorithm - Enter the Root Certificate in the User ID field. • Password - The authentication method...
User Guide
Page 34
... you TKIP for the encryption method. The log shows the authentication process. Figure 7-11: WPA Pre-Shared Key Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup Figure 7-12: Log Table 28 Click the View Log button to refresh the screen. Click the Refresh button to view a log. ...
... you TKIP for the encryption method. The log shows the authentication process. Figure 7-11: WPA Pre-Shared Key Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup Figure 7-12: Log Table 28 Click the View Log button to refresh the screen. Click the Refresh button to view a log. ...
User Guide
Page 46
.... • Link Quality - The status of the Bridge is displayed here. The Bridge's transmission rate is displayed here. • WEP/WPA- Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Status Figure 7-22: Wireless Status Tab 40 The MAC Address of the Bridge's security is displayed here. • Wireless TX - The Bridge's Subnet Mask is read-only. • Device...
.... • Link Quality - The status of the Bridge is displayed here. The Bridge's transmission rate is displayed here. • WEP/WPA- Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Status Figure 7-22: Wireless Status Tab 40 The MAC Address of the Bridge's security is displayed here. • Wireless TX - The Bridge's Subnet Mask is read-only. • Device...
User Guide
Page 53
... or using your part for the Administrator account. 4. So, keep in mind whenever you as possible. Use WPA if it harder for a hacker to get that in its firmware. Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make it is available. Change the default SSID. 2. Disable SSID Broadcast. 3. Please note that...
... or using your part for the Administrator account. 4. So, keep in mind whenever you as possible. Use WPA if it harder for a hacker to get that in its firmware. Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make it is available. Change the default SSID. 2. Disable SSID Broadcast. 3. Please note that...
User Guide
Page 54
...: Pre-Shared Key and RADIUS. Wi-Fi Protected Access (WPA) is "linksys".) Hackers know these defaults and can check these against hackers.RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Disable Broadcast 2. Change your SSID regularly so ... SSID. Again, this option may be maximized: 1. Use the highest level of broadcasting the SSID. Wireless-G Ethernet Bridge with a default SSID set by the factory. (The Linksys default SSID is the newest and best available standard in mind about the SSID: 1. This includes hackers...
...: Pre-Shared Key and RADIUS. Wi-Fi Protected Access (WPA) is "linksys".) Hackers know these defaults and can check these against hackers.RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Disable Broadcast 2. Change your SSID regularly so ... SSID. Again, this option may be maximized: 1. Use the highest level of broadcasting the SSID. Wireless-G Ethernet Bridge with a default SSID set by the factory. (The Linksys default SSID is the newest and best available standard in mind about the SSID: 1. This includes hackers...
User Guide
Page 55
...a key shared between the device and the server. Appendix B: Wireless Security 49 Security Threats Facing Wireless Networks If you do not have a negative impact on your ...network's performance, but if you are transmitting sensitive data over your mind at ease while you are enjoying the most flexible and convenient technology Linksys... has to the Router or other device how often it should change the encryption keys. RADIUS. Wireless-G Ethernet Bridge with a RADIUS server. ...
...a key shared between the device and the server. Appendix B: Wireless Security 49 Security Threats Facing Wireless Networks If you do not have a negative impact on your ...network's performance, but if you are transmitting sensitive data over your mind at ease while you are enjoying the most flexible and convenient technology Linksys... has to the Router or other device how often it should change the encryption keys. RADIUS. Wireless-G Ethernet Bridge with a RADIUS server. ...
User Guide
Page 64
...method of computers and associated devices that is sent. WINIPCFG - WPA (Wi-Fi Protected Access) - Appendix E: Glossary 58 To transmit a file over the Internet. URL (Uniform Resource Locator) - The Internet. a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which ... Network) - WAN (Wide Area Network)- A group of encrypting network data transmitted on the Internet. Wireless-G Ethernet Bridge with a RADIUS server. A network protocol for transmitting data that does not require acknowledgement from the recipient of a file located...
...method of computers and associated devices that is sent. WINIPCFG - WPA (Wi-Fi Protected Access) - Appendix E: Glossary 58 To transmit a file over the Internet. URL (Uniform Resource Locator) - The Internet. a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which ... Network) - WAN (Wide Area Network)- A group of encrypting network data transmitted on the Internet. Wireless-G Ethernet Bridge with a RADIUS server. A network protocol for transmitting data that does not require acknowledgement from the recipient of a file located...