User Guide
Page 8
... This appendix describes some problems and solutions, as well as installing the TCP/IP protocol. Chapter 1: Introduction 2 What's in this user guide. • Chapter 2: Planning your Wireless Network This chapter describes the basics of wireless networking. • Chapter 3: Getting to Know the Wireless-G Ethernet Bridge with 5-Port Switch This chapter describes the physical features of...
... This appendix describes some problems and solutions, as well as installing the TCP/IP protocol. Chapter 1: Introduction 2 What's in this user guide. • Chapter 2: Planning your Wireless Network This chapter describes the basics of wireless networking. • Chapter 3: Getting to Know the Wireless-G Ethernet Bridge with 5-Port Switch This chapter describes the physical features of...
User Guide
Page 19
... can use it will be asked for each Bridge. (If you have only one displayed.) Select the Bridge you are currently installing by clicking its name in Figure 5-3 displays a list of Wireless-G Ethernet Bridges on your network, along with 5-Port Switch 4. Then click the Yes button. 5. Wireless-G Ethernet Bridge with the status information for your password in...
... can use it will be asked for each Bridge. (If you have only one displayed.) Select the Bridge you are currently installing by clicking its name in Figure 5-3 displays a list of Wireless-G Ethernet Bridges on your network, along with 5-Port Switch 4. Then click the Yes button. 5. Wireless-G Ethernet Bridge with the status information for your password in...
User Guide
Page 24
... into a local electrical outlet. You can also hang the Bridge on the Ethernet-ready network device you wish to add to the wireless network. The installation of the Wireless-G Ethernet Bridge is complete. Place the Bridge over the screws. 3. Figure 6-1: Wall Placement Chapter 6: Connecting the Wireless-G Ethernet Bridge for Network Use Connection to the wall, so that it...
... into a local electrical outlet. You can also hang the Bridge on the Ethernet-ready network device you wish to add to the wireless network. The installation of the Wireless-G Ethernet Bridge is complete. Place the Bridge over the screws. 3. Figure 6-1: Wall Placement Chapter 6: Connecting the Wireless-G Ethernet Bridge for Network Use Connection to the wall, so that it...
User Guide
Page 30
... then the password in a network. Enter the User Certificate and Root Certificate in the User ID field. Enter the root certificate you have installed to authenticate you on this tab, click the Apply button to upload the certificate. • Root Certificate - TLS TLS is a mutual authentication... making your changes on your security. Enter the Login name of your changes. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 24 Setup Click the Upload button to save your wireless network. Select TLS from the EAP Type drop-down menu. • User ID -Your User ID...
... then the password in a network. Enter the User Certificate and Root Certificate in the User ID field. Enter the root certificate you have installed to authenticate you on this tab, click the Apply button to upload the certificate. • Root Certificate - TLS TLS is a mutual authentication... making your changes on your security. Enter the Login name of your changes. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 24 Setup Click the Upload button to save your wireless network. Select TLS from the EAP Type drop-down menu. • User ID -Your User ID...
User Guide
Page 31
...; Password - This is the password used to browse for it . • EAP Type - Enter the root certificate you have installed to save your wireless network. Click the Upload button to view a log. Select TTLS from the EAP Type dropdown menu. Click the Apply button to ...; User ID -Your User ID is the Login name of your web browser. Many specific authentication methods work within this framework. Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that your network uses. The authentication method that uses digital certificates. Enter...
...; Password - This is the password used to browse for it . • EAP Type - Enter the root certificate you have installed to save your wireless network. Click the Upload button to view a log. Select TTLS from the EAP Type dropdown menu. Click the Apply button to ...; User ID -Your User ID is the Login name of your web browser. Many specific authentication methods work within this framework. Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that your network uses. The authentication method that uses digital certificates. Enter...
User Guide
Page 32
...itself , then click the Refresh button of your network uses. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 26 Setup Enter the user certificate you have installed to authenticate you on your wireless network in the User ID field. Last, enter a Key Renewal Timeout, which instructs ...click the Browse button to save your changes. Enter the Login name of your wireless network or click the Browse button to authenticate you on your web browser. Enter the root certificate you have installed to browse for it . • EAP Type - If your screen doesn't...
...itself , then click the Refresh button of your network uses. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 26 Setup Enter the user certificate you have installed to authenticate you on your wireless network in the User ID field. Last, enter a Key Renewal Timeout, which instructs ...click the Browse button to save your changes. Enter the Login name of your wireless network or click the Browse button to authenticate you on your web browser. Enter the root certificate you have installed to browse for it . • EAP Type - If your screen doesn't...
User Guide
Page 33
...8226; User ID -Your User ID is a mutual authentication method that your web browser. Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it, then upload it . Select TTLS from the EAP Type dropdown menu...Figure 7-10: WPA RADIUS-TTLS Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 27 Setup The WPA algorithm used for it . • EAP Type - Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is the Login name of your wireless network. Click the View Log button to upload the ...
...8226; User ID -Your User ID is a mutual authentication method that your web browser. Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it, then upload it . Select TTLS from the EAP Type dropdown menu...Figure 7-10: WPA RADIUS-TTLS Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 27 Setup The WPA algorithm used for it . • EAP Type - Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is the Login name of your wireless network. Click the View Log button to upload the ...
User Guide
Page 49
...• Make sure both Bridges are set to the same SSID, network mode (Ad-Hoc), channel setting, and WEP settings. • Verify that may occur during the installation and operation of the access...; If you encounter problems, power the Bridge off and on the Bridge for each Xbox. I can 't find an answer here, check the Linksys website at www.linksys.com. Click the Apply button to the... Read the description below to problems that the Bridges are the same as the SSID of the Wireless-G Ethernet Bridge. Click the Wireless tab. 3. Select Enable from the MAC Address Cloning Mode ...
...• Make sure both Bridges are set to the same SSID, network mode (Ad-Hoc), channel setting, and WEP settings. • Verify that may occur during the installation and operation of the access...; If you encounter problems, power the Bridge off and on the Bridge for each Xbox. I can 't find an answer here, check the Linksys website at www.linksys.com. Click the Apply button to the... Read the description below to problems that the Bridges are the same as the SSID of the Wireless-G Ethernet Bridge. Click the Wireless tab. 3. Select Enable from the MAC Address Cloning Mode ...
User Guide
Page 67
...Linksys, (b) has not been installed, operated, repaired, or maintained in accordance with 5-Port Switch Appendix G: Warranty Information LIMITED WARRANTY Linksys warrants to You that the Product will be for UPS Ground shipping from Linksys back to intrusion or attack. Box 18558, Irvine, CA 92623. 61 Appendix G: Warranty Information Wireless-G Ethernet Bridge... with instructions supplied by jurisdiction. If the Product proves defective during the Warranty Period call Linksys Technical Support in order to : Linksys, P.O. If You ...
...Linksys, (b) has not been installed, operated, repaired, or maintained in accordance with 5-Port Switch Appendix G: Warranty Information LIMITED WARRANTY Linksys warrants to You that the Product will be for UPS Ground shipping from Linksys back to intrusion or attack. Box 18558, Irvine, CA 92623. 61 Appendix G: Warranty Information Wireless-G Ethernet Bridge... with instructions supplied by jurisdiction. If the Product proves defective during the Warranty Period call Linksys Technical Support in order to : Linksys, P.O. If You ...
User Guide
Page 68
...the following measures: • Reorient or relocate the receiving antenna • Increase the separation between the radiator and your body. Wireless-G Ethernet Bridge with 5-Port Switch Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class...Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with Canadian ICES-003. However, there is encouraged to try to correct the interference by turning the ...
...the following measures: • Reorient or relocate the receiving antenna • Increase the separation between the radiator and your body. Wireless-G Ethernet Bridge with 5-Port Switch Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class...Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with Canadian ICES-003. However, there is encouraged to try to correct the interference by turning the ...