User Guide
Page 21
...G-Only. Then proceed to match your network. From the drop-down menu, select the appropriate channel to step 9. • IP Address - The IP Settings screen will now appear. The Bridge's IP Mask (also known as your wireless network's SSID. Click the Next button to continue or ... address must specify an IP address on this is better to the previous screen. • SSID - Chapter 5: Setting Up the Wireless-G Ethernet Bridge Figure 5-6: Wireless Settings Figure 5-7: IP Settings 15 Click the Next button to continue or the Back button to return to your network. • IP...
...G-Only. Then proceed to match your network. From the drop-down menu, select the appropriate channel to step 9. • IP Address - The IP Settings screen will now appear. The Bridge's IP Mask (also known as your wireless network's SSID. Click the Next button to continue or ... address must specify an IP address on this is better to the previous screen. • SSID - Chapter 5: Setting Up the Wireless-G Ethernet Bridge Figure 5-6: Wireless Settings Figure 5-7: IP Settings 15 Click the Next button to continue or the Back button to return to your network. • IP...
User Guide
Page 22
..., select WPA PSK from the drop-down menu. From the drop-down menu, select one encryption method, TKIP, with Linksys wireless products only. (You will have 16 or fewer alphanumeric characters. For more detailed instructions on any non-Linksys wireless products. The Security Settings (Optional) screen, shown in the Key 1 field. Wireless-G Ethernet Bridge with 5-Port Switch 9. If...
..., select WPA PSK from the drop-down menu. From the drop-down menu, select one encryption method, TKIP, with Linksys wireless products only. (You will have 16 or fewer alphanumeric characters. For more detailed instructions on any non-Linksys wireless products. The Security Settings (Optional) screen, shown in the Key 1 field. Wireless-G Ethernet Bridge with 5-Port Switch 9. If...
User Guide
Page 28
...characters are using 128-bit WEP encryption, then each key field, manually enter a set of exactly 26 hexadecimal characters in length. From the drop-down menu. • Passphrase - Select a Default Transmit Key (choose which Key to use WEP encryption, select 64-Bit (10 hex... length. For detailed instructions on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP key(s). • Keys 1-4 - In each key must consist of the four wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA...
...characters are using 128-bit WEP encryption, then each key field, manually enter a set of exactly 26 hexadecimal characters in length. From the drop-down menu. • Passphrase - Select a Default Transmit Key (choose which Key to use WEP encryption, select 64-Bit (10 hex... length. For detailed instructions on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP key(s). • Keys 1-4 - In each key must consist of the four wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA...
User Guide
Page 30
...method that uses digital certificates.Select TLS from the drop-down menu. Click the Upload button to save your wireless network. If your page doesn't automatically refresh itself, then click the Refresh button of your wireless network in the fields or click the Browse button...Type - When finished making your changes on your security. Click the Apply button to upload the certificate. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 24 Setup Click the Upload button to save these changes. Enter the User Certificate and Root Certificate in the User...
...method that uses digital certificates.Select TLS from the drop-down menu. Click the Upload button to save your wireless network. If your page doesn't automatically refresh itself, then click the Refresh button of your wireless network in the fields or click the Browse button...Type - When finished making your changes on your security. Click the Apply button to upload the certificate. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 24 Setup Click the Upload button to save these changes. Enter the User Certificate and Root Certificate in the User...
User Guide
Page 31
...Type - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 25 Setup Figure 7-8: RADIUS-TTLS EAP (Extensible Authentication Protocol) - Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that your changes. Select TTLS from the drop-down menu. • User... ID -Your User ID is the Login name of your wireless network in the Password field...
...Type - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 25 Setup Figure 7-8: RADIUS-TTLS EAP (Extensible Authentication Protocol) - Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that your changes. Select TTLS from the drop-down menu. • User... ID -Your User ID is the Login name of your wireless network in the Password field...
User Guide
Page 32
.... Select TLS from the drop-down menu. Enter the Login name of your web browser. Enter the User Certificate and Root Certificate in the User ID field. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 26 Setup Enter the RADIUS server's IP Address and port..., then click the Refresh button of your network uses. Select TLS from the EAP Type drop-down menu. • WPA Algorithm - A mutual authentication method that your web browser. Wireless-G Ethernet Bridge with a key shared between the Router and the server. Enter the root certificate you have ...
.... Select TLS from the drop-down menu. Enter the Login name of your web browser. Enter the User Certificate and Root Certificate in the User ID field. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 26 Setup Enter the RADIUS server's IP Address and port..., then click the Refresh button of your network uses. Select TLS from the EAP Type drop-down menu. • WPA Algorithm - A mutual authentication method that your web browser. Wireless-G Ethernet Bridge with a key shared between the Router and the server. Enter the root certificate you have ...
User Guide
Page 33
...for it . • EAP Type - Click the Apply button to view a log. Figure 7-10: WPA RADIUS-TTLS Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 27 Setup Select TTLS from the EAP Type dropdown menu. This is the password used is TKIP. • User ID -...TTLS from the drop-down menu. • WPA Algorithm - The WPA algorithm used for it, then upload it . Enter the Root Certificate in the User ID field. • Password - Enter the Login name of your wireless network. Enter the password in the Password field. Wireless-G Ethernet Bridge with 5-Port ...
...for it . • EAP Type - Click the Apply button to view a log. Figure 7-10: WPA RADIUS-TTLS Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 27 Setup Select TTLS from the EAP Type dropdown menu. This is the password used is TKIP. • User ID -...TTLS from the drop-down menu. • WPA Algorithm - The WPA algorithm used for it, then upload it . Enter the Root Certificate in the User ID field. • Password - Enter the Login name of your wireless network. Enter the password in the Password field. Wireless-G Ethernet Bridge with 5-Port ...
User Guide
Page 39
...dropped. • Egress Rate - Global ATU Setting is enabled. To delete entries, select the port's check box and click the Delete Selected Entry button. • Static Address Table - This rate limit will not be routed to all the Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless... port vector settings. • Address Table Dump - Packets exceeding this rate will be dropped. • Flow Control - Click the Help button for additional on the wire. Switch... Entry button. Wireless-G Ethernet Bridge with the connected port before sending packets.
...dropped. • Egress Rate - Global ATU Setting is enabled. To delete entries, select the port's check box and click the Delete Selected Entry button. • Static Address Table - This rate limit will not be routed to all the Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless... port vector settings. • Address Table Dump - Packets exceeding this rate will be dropped. • Flow Control - Click the Help button for additional on the wire. Switch... Entry button. Wireless-G Ethernet Bridge with the connected port before sending packets.
User Guide
Page 40
...entries. Port Based VLAN Setting • This is not listed in , the switch will also be dropped. • Port Based - Otherwise, the switch will be dropped. If there are not allowed to learn again. If the switch received any packets with 5-Port ... first. If the packet does not have a management subtitle. This is enabled. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-18: VLAN Tab 34 Wireless-G Ethernet Bridge with the same destination MAC address, then the life value will be removed from the table. spanning tree...
...entries. Port Based VLAN Setting • This is not listed in , the switch will also be dropped. • Port Based - Otherwise, the switch will be dropped. If there are not allowed to learn again. If the switch received any packets with 5-Port ... first. If the packet does not have a management subtitle. This is enabled. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-18: VLAN Tab 34 Wireless-G Ethernet Bridge with the same destination MAC address, then the life value will be removed from the table. spanning tree...
User Guide
Page 41
... per port. Click the Refresh button to save your screen. The maximum VLAN table size is enabled but input packet does not have a VLAN tag. Drop - Default VID Is used as a back door to access the web config page when the port based VLAN is disabled so that the user can... from the table. This port is a member of this port with the VLAN tag removed. Tag - The user can be any integer between 1-4095. Wireless-G Ethernet Bridge with the packet or the default VVID of the inport. • 802.1q VLAN Table - This port is the entire VLAN table. This is a member...
... per port. Click the Refresh button to save your screen. The maximum VLAN table size is enabled but input packet does not have a VLAN tag. Drop - Default VID Is used as a back door to access the web config page when the port based VLAN is disabled so that the user can... from the table. This port is a member of this port with the VLAN tag removed. Tag - The user can be any integer between 1-4095. Wireless-G Ethernet Bridge with the packet or the default VVID of the inport. • 802.1q VLAN Table - This port is the entire VLAN table. This is a member...
User Guide
Page 42
... including FCS octets) and were otherwise well formed. The total number of Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-19: RMON Statistics Tab 36 Wireless-G Ethernet Bridge with 5-Port Switch RMON Statistics This screen is used as a reasonable estimate of packets (including ...Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of packets dropped; The total number of packets received that this number is not necessarily the number of octets (Alignment Error). EtherStatsJabbers - The total ...
... including FCS octets) and were otherwise well formed. The total number of Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-19: RMON Statistics Tab 36 Wireless-G Ethernet Bridge with 5-Port Switch RMON Statistics This screen is used as a reasonable estimate of packets (including ...Check Sequence (FCS) with an integral number of octets (FCS Error) or a bad FCS with a non-integral number of packets dropped; The total number of packets received that this number is not necessarily the number of octets (Alignment Error). EtherStatsJabbers - The total ...
User Guide
Page 45
... will be passed. Packets that matches an entry on the list will be dropped. Block List - Accept Count - Click the Refresh button to configure the access list settings between wireless and switch ports. Wireless-G Ethernet Bridge with 5-Port Switch Access List This screen is used to refresh the screen....enter the MAC address in the New Accept Entry field, and click the Add Accept Entry button. Pkt Count - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Access List Figure 7-21: Access List Tab 39 To accept a port, enter the MAC address in the New Accept ...
... will be passed. Packets that matches an entry on the list will be dropped. Block List - Accept Count - Click the Refresh button to configure the access list settings between wireless and switch ports. Wireless-G Ethernet Bridge with 5-Port Switch Access List This screen is used to refresh the screen....enter the MAC address in the New Accept Entry field, and click the Add Accept Entry button. Pkt Count - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Access List Figure 7-21: Access List Tab 39 To accept a port, enter the MAC address in the New Accept ...
User Guide
Page 49
...save your problems. If you can 't connect to change the Bridge's IP address. Select Enable from the MAC Address Cloning Mode drop-down menu. 4. When you encounter problems, power the Bridge off and on the Bridge for each Xbox. Click the Apply button to -head (...1-5 for one of the Wireless-G Ethernet Bridge. Common Problems and Solutions 1. Open the Web-based Utility. Follow these instructions: 1. Open the Web-based Utility for the other Bridge. 3. Click the Wireless tab. 3. I can 't find an answer here, check the Linksys website at www.linksys.com. You have two ...
...save your problems. If you can 't connect to change the Bridge's IP address. Select Enable from the MAC Address Cloning Mode drop-down menu. 4. When you encounter problems, power the Bridge off and on the Bridge for each Xbox. Click the Apply button to -head (...1-5 for one of the Wireless-G Ethernet Bridge. Common Problems and Solutions 1. Open the Web-based Utility. Follow these instructions: 1. Open the Web-based Utility for the other Bridge. 3. Click the Wireless tab. 3. I can 't find an answer here, check the Linksys website at www.linksys.com. You have two ...