User Guide
Page 3
... Connection to a Network Device 18 Wall Mount Placement Option 18 Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 19 Overview 19 Starting the Web-based Utility 19 Setup 20 Password 29 Wireless 30 Port Mirroring 38 Access List 39 Wireless Status 40 SNMP 41 Help 42 Appendix A: Troubleshooting 43 Common Problems and Solutions 43...
... Connection to a Network Device 18 Wall Mount Placement Option 18 Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 19 Overview 19 Starting the Web-based Utility 19 Setup 20 Password 29 Wireless 30 Port Mirroring 38 Access List 39 Wireless Status 40 SNMP 41 Help 42 Appendix A: Troubleshooting 43 Common Problems and Solutions 43...
User Guide
Page 5
... Panel 8 Figure 4-1: Connect to the Network 10 Figure 4-2: Connect the Power 11 Figure 5-1: Welcome 12 Figure 5-2: Connection 12 Figure 5-3: List of Bridges 13 Figure 5-4: Password 13 Figure 5-5: Mode Settings 14 Figure 5-6: Wireless Settings 15 Figure 5-7: IP Settings 15 Figure 5-8: Security Settings 16 Figure 5-9: Security Settings 16 Figure 5-10: Confirmation 17 Figure 5-11: Congratulations...
... Panel 8 Figure 4-1: Connect to the Network 10 Figure 4-2: Connect the Power 11 Figure 5-1: Welcome 12 Figure 5-2: Connection 12 Figure 5-3: List of Bridges 13 Figure 5-4: Password 13 Figure 5-5: Mode Settings 14 Figure 5-6: Wireless Settings 15 Figure 5-7: IP Settings 15 Figure 5-8: Security Settings 16 Figure 5-9: Security Settings 16 Figure 5-10: Confirmation 17 Figure 5-11: Congratulations...
User Guide
Page 6
Wireless-G Ethernet Bridge with 5-Port Switch Figure 7-10: WPA RADIUS-TTLS 27 Figure 7-11: WPA Pre-Shared Key 28 Figure 7-12: Log Table 28 Figure 7-13: Password Tab 29 Figure 7-14: Wireless Tab 30 Figure 7-15: Spanning Tree Protocol Tab 31 Figure 7-16: QOS Tab 32 Figure 7-17: Switch Table Tab 33 Figure 7-18: VLAN...
Wireless-G Ethernet Bridge with 5-Port Switch Figure 7-10: WPA RADIUS-TTLS 27 Figure 7-11: WPA Pre-Shared Key 28 Figure 7-12: Log Table 28 Figure 7-13: Password Tab 29 Figure 7-14: Wireless Tab 30 Figure 7-15: Spanning Tree Protocol Tab 31 Figure 7-16: QOS Tab 32 Figure 7-17: Switch Table Tab 33 Figure 7-18: VLAN...
User Guide
Page 19
.... The screen shown in Figure 5-3 displays a list of Wireless-G Ethernet Bridges on your password in order to access the Web-based Utility later. Figure 5-3: List of the Wireless-G Ethernet Bridge, so you can change the password through the Web-based Utility). In lowercase letters, enter admin in the Password field (later you can use it will be...
.... The screen shown in Figure 5-3 displays a list of Wireless-G Ethernet Bridges on your password in order to access the Web-based Utility later. Figure 5-3: List of the Wireless-G Ethernet Bridge, so you can change the password through the Web-based Utility). In lowercase letters, enter admin in the Password field (later you can use it will be...
User Guide
Page 25
...appear. Press the Enter key, and a screen similar to change the advanced wireless settings and clone a MAC address onto the Bridge. • Switch - Click the OK button. Figure 7-1: Password Screen Have You: Enabled TCP/IP on TCP/IP. However, if you... on your web browser and the Wireless-G Ethernet Bridge Web-based Utility. Displays the Bridge's current wireless settings. • SNMP - Lets you to configure the following settings on the Password screen later. 2. Provides explanations of the Wireless-G Ethernet Bridge (the default is designed to function...
...appear. Press the Enter key, and a screen similar to change the advanced wireless settings and clone a MAC address onto the Bridge. • Switch - Click the OK button. Figure 7-1: Password Screen Have You: Enabled TCP/IP on TCP/IP. However, if you... on your web browser and the Wireless-G Ethernet Bridge Web-based Utility. Displays the Bridge's current wireless settings. • SNMP - Lets you to configure the following settings on the Password screen later. 2. Provides explanations of the Wireless-G Ethernet Bridge (the default is designed to function...
User Guide
Page 30
... in the fields or click the Browse button to browse for it . • EAP Type - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 24 Setup The authentication method that uses digital certificates.Select TLS from the drop-down menu. Click the Upload... a mutual authentication method that your changes. Click the Upload button to save your network uses. Wireless-G Ethernet Bridge with 5-Port Switch • User ID and Password. When finished making your wireless network in the User ID field. • User Certificate - Figure 7-7: RADIUS-TLS Encryption ...
... in the fields or click the Browse button to browse for it . • EAP Type - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 24 Setup The authentication method that uses digital certificates.Select TLS from the drop-down menu. Click the Upload... a mutual authentication method that your changes. Click the Upload button to save your network uses. Wireless-G Ethernet Bridge with 5-Port Switch • User ID and Password. When finished making your wireless network in the User ID field. • User Certificate - Figure 7-7: RADIUS-TLS Encryption ...
User Guide
Page 31
... menu. • User ID -Your User ID is the Login name of your wireless network in the User ID field and the password in the Password field. Enter the password in the User ID field. • Password - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 25 Setup Click the Apply button to view a log. Click the...
... menu. • User ID -Your User ID is the Login name of your wireless network in the User ID field and the password in the Password field. Enter the password in the User ID field. • Password - Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 25 Setup Click the Apply button to view a log. Click the...
User Guide
Page 33
... installed to save your network uses. Enter the Root Certificate in the Password field. Enter the password in the User ID field. • Password - Click the Apply button to authenticate you on your wireless network in the Password field. • Root Certificate - Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that your changes...
... installed to save your network uses. Enter the Root Certificate in the Password field. Enter the password in the User ID field. • Password - Click the Apply button to authenticate you on your wireless network in the Password field. • Root Certificate - Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that your changes...
User Guide
Page 35
... will be prompted for the Bridge's Password. Figure 7-13: Password Tab Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 29 Password Click the Cancel button to a new password that you create. The new Password must not exceed 12 characters in length and must not include any spaces. Wireless-G Ethernet Bridge with 5-Port Switch Password The Password screen, shown in Figure 7-13...
... will be prompted for the Bridge's Password. Figure 7-13: Password Tab Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility 29 Password Click the Cancel button to a new password that you create. The new Password must not exceed 12 characters in length and must not include any spaces. Wireless-G Ethernet Bridge with 5-Port Switch Password The Password screen, shown in Figure 7-13...
User Guide
Page 50
...PC using the correct case(s) when entering the password. It is , then run the Setup Wizard. The 802.11b standard allows wireless networking hardware from different manufacturers to the default setting; Select the Bridge you are using the Bridge. • Make sure that the SSID and...of 2.4GHz. Plug the power adapter back in the Password field. 7. It is on -screen instructions until you can push the Bridge's Reset button. Frequently Asked Questions What is one of the IEEE standards for wireless networks. The Bridge-enabled PC won 't open. Perform the following steps:...
...PC using the correct case(s) when entering the password. It is , then run the Setup Wizard. The 802.11b standard allows wireless networking hardware from different manufacturers to the default setting; Select the Bridge you are using the Bridge. • Make sure that the SSID and...of 2.4GHz. Plug the power adapter back in the Password field. 7. It is on -screen instructions until you can push the Bridge's Reset button. Frequently Asked Questions What is one of the IEEE standards for wireless networks. The Bridge-enabled PC won 't open. Perform the following steps:...
User Guide
Page 53
... Precautions Note: Some of these security features, refer to "Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility." These messages can change network settings. For information on your wireless network. Change the administrator's password regularly. Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make it is a complete list of security precautions to take : Change...
... Precautions Note: Some of these security features, refer to "Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility." These messages can change network settings. For information on your wireless network. Change the administrator's password regularly. Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make it is a complete list of security precautions to take : Change...
User Guide
Page 55
...performance, but if you are transmitting sensitive data over your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to the Router or other device how often it should be used when a RADIUS server is connected to offer. These security ...may have a RADIUS server, enter a password in coordination with a RADIUS server. (This should only be used in the Pre-Shared key field of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key manually. WEP used . Wireless-G Ethernet Bridge with a key shared between 0 and...
...performance, but if you are transmitting sensitive data over your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to the Router or other device how often it should be used when a RADIUS server is connected to offer. These security ...may have a RADIUS server, enter a password in coordination with a RADIUS server. (This should only be used in the Pre-Shared key field of WEP encryption, and either generate a WEP key through the Passphrase or enter the WEP key manually. WEP used . Wireless-G Ethernet Bridge with a key shared between 0 and...
User Guide
Page 60
... at a network gateway server that cannot support the original size of digital certificates and another system, such as passwords. A mutual authentication method that specifies how data is placed on the World Wide Web. Ethernet - IEEE standard... of a network from users from a common transmission medium. The communications protocol used to receive and transmit data simultaneously. Wireless-G Ethernet Bridge with different, incompatible communications protocols. EAP (Extensible Authentication Protocol) - Fragmentation -Breaking a packet into smaller units when transmitting...
... at a network gateway server that cannot support the original size of digital certificates and another system, such as passwords. A mutual authentication method that specifies how data is placed on the World Wide Web. Ethernet - IEEE standard... of a network from users from a common transmission medium. The communications protocol used to receive and transmit data simultaneously. Wireless-G Ethernet Bridge with different, incompatible communications protocols. EAP (Extensible Authentication Protocol) - Fragmentation -Breaking a packet into smaller units when transmitting...
User Guide
Page 61
IP Address - A company that uses a username and password system. a unit of measurement for the Internet. NAT technology translates IP addresses of destinations at the IP layer. Network - NNTP (Network...) - The address used to implement secure exchange of computers or devices connected for a particular networking device. Radio bandwidth utilized in wireless transmissions. MAC (Media Access Control) Address - mIRC - Wireless-G Ethernet Bridge with 5-Port Switch IEEE (The Institute of data sharing, storage, and/or transmission between users. Infrastructure -
IP Address - A company that uses a username and password system. a unit of measurement for the Internet. NAT technology translates IP addresses of destinations at the IP layer. Network - NNTP (Network...) - The address used to implement secure exchange of computers or devices connected for a particular networking device. Radio bandwidth utilized in wireless transmissions. MAC (Media Access Control) Address - mIRC - Wireless-G Ethernet Bridge with 5-Port Switch IEEE (The Institute of data sharing, storage, and/or transmission between users. Infrastructure -
User Guide
Page 62
... is also used for Linksys products. Router - Server - A widely used to files, printing, communications, and other services. This protocol is to provide user access to determine whether a particular IP address is online. Wireless-G Ethernet Bridge with 5-Port Switch OFDM... 56 Passphrase - Frequency transmission that provides authentication (username and password) in cables or adapters. A unit of coordinating large packets through an IP network. Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the...
... is also used for Linksys products. Router - Server - A widely used to files, printing, communications, and other services. This protocol is to provide user access to determine whether a particular IP address is online. Wireless-G Ethernet Bridge with 5-Port Switch OFDM... 56 Passphrase - Frequency transmission that provides authentication (username and password) in cables or adapters. A unit of coordinating large packets through an IP network. Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the...
User Guide
Page 63
... A version of a network. Topology - The physical layout of the TCP/IP FTP protocol that has no directory or password capability. Instructions for transmitting data that determines the size of ports. 2. A series of information before allowing it to share ... that performs a particular task is connected to another in small offices. TCP/IP (Transmission Control Protocol/Internet Protocol) - Throughput - a wireless encryption protocol that is called a "program". A network protocol for the computer. An address code that requires acknowledgement from one node to ...
... A version of a network. Topology - The physical layout of the TCP/IP FTP protocol that has no directory or password capability. Instructions for transmitting data that determines the size of ports. 2. A series of information before allowing it to share ... that performs a particular task is connected to another in small offices. TCP/IP (Transmission Control Protocol/Internet Protocol) - Throughput - a wireless encryption protocol that is called a "program". A network protocol for the computer. An address code that requires acknowledgement from one node to ...