User Guide
Page 7
...end, and those 5 switch ports can make any wired Ethernet-equipped device a part of your wireless 802.11b or 802.11g network. Put another one (or a Wireless-G Access Point, or our one-port Wireless-G Ethernet Bridge) at the other than PCs. Since there are...5-port Switch. 802.11g: an IEEE wireless networking standard that specifies how data is placed on the Wireless-G Ethernet Bridge. All five ports are connected to your Ethernet-wired printer, camera, notebook or desktop into a wireless network device. Wireless-G Ethernet Bridge with 5-Port Switch Chapter 1: Introduction Welcome ...
...end, and those 5 switch ports can make any wired Ethernet-equipped device a part of your wireless 802.11b or 802.11g network. Put another one (or a Wireless-G Access Point, or our one-port Wireless-G Ethernet Bridge) at the other than PCs. Since there are...5-port Switch. 802.11g: an IEEE wireless networking standard that specifies how data is placed on the Wireless-G Ethernet Bridge. All five ports are connected to your Ethernet-wired printer, camera, notebook or desktop into a wireless network device. Wireless-G Ethernet Bridge with 5-Port Switch Chapter 1: Introduction Welcome ...
User Guide
Page 10
...area network (LAN), except that in Infrastructure mode. Choosing between them. If the wireless network is bridged to communicate directly with the wired network computers, the wireless network should be used. SSID: your local network. The basis of Infrastructure mode centers...which is connected to share resources only with a wired network or not. Figure 2-3 shows a typical wireless bridging scenario using two Wireless-G Ethernet Bridges. Computers in a wireless network (see Figure 2-1). If the computers on the wireless network, then the Ad-Hoc mode can roam within...
...area network (LAN), except that in Infrastructure mode. Choosing between them. If the wireless network is bridged to communicate directly with the wired network computers, the wireless network should be used. SSID: your local network. The basis of Infrastructure mode centers...which is connected to share resources only with a wired network or not. Figure 2-3 shows a typical wireless bridging scenario using two Wireless-G Ethernet Bridges. Computers in a wireless network (see Figure 2-1). If the computers on the wireless network, then the Ad-Hoc mode can roam within...
User Guide
Page 13
... ended. Chapter 3: Getting to the wired network. Wireless-G ACT Green. The Wireless-G LED will be lit steadily when the Bridge is wireless network traffic. The LAN LED will be lit steadily when the Bridge is connected to the wireless network. Wireless-G Ethernet Bridge with 5-Port Switch 7 The Front ...Panel LAN 1-5 Green. The Power LED will be lit steadily when the Bridge is connected to the wireless network. The Wireless-G LED will light up when the Bridge is wired network traffic. Diag Green. The Ethernet LED will flash when there is powered on...
... ended. Chapter 3: Getting to the wired network. Wireless-G ACT Green. The Wireless-G LED will be lit steadily when the Bridge is wireless network traffic. The LAN LED will be lit steadily when the Bridge is connected to the wireless network. Wireless-G Ethernet Bridge with 5-Port Switch 7 The Front ...Panel LAN 1-5 Green. The Power LED will be lit steadily when the Bridge is connected to the wireless network. The Wireless-G LED will light up when the Bridge is wired network traffic. Diag Green. The Ethernet LED will flash when there is powered on...
User Guide
Page 18
... to proceed with 5-Port Switch Chapter 5: Setting Up the Wireless-G Ethernet Bridge Now that appears, enter D:\setup.exe (if "D" is correctly connected to use the Linksys default settings (SSID: linksys and mode: infrastructure). Make sure the Bridge is the letter of your wired network, you through the Bridge's Setup Wizard or Web-based Utility. 2. The Setup Wizard...
... to proceed with 5-Port Switch Chapter 5: Setting Up the Wireless-G Ethernet Bridge Now that appears, enter D:\setup.exe (if "D" is correctly connected to use the Linksys default settings (SSID: linksys and mode: infrastructure). Make sure the Bridge is the letter of your wired network, you through the Bridge's Setup Wizard or Web-based Utility. 2. The Setup Wizard...
User Guide
Page 20
... with each other. Memorable names are helpful, especially if you want your wired network using a wireless access point. Do not use the Ad-Hoc mode if you are using multiple bridges on your wireless computers to the previous screen. Wireless-G Ethernet Bridge with computers on the same network. Click the Next button to continue or the...
... with each other. Memorable names are helpful, especially if you want your wired network using a wireless access point. Do not use the Ad-Hoc mode if you are using multiple bridges on your wireless computers to the previous screen. Wireless-G Ethernet Bridge with computers on the same network. Click the Next button to continue or the...
User Guide
Page 21
... is better to communicate. • Network Mode - Then proceed to match your wireless network's SSID. Chapter 5: Setting Up the Wireless-G Ethernet Bridge Figure 5-6: Wireless Settings Figure 5-7: IP Settings 15 You must use the same channel in your network.... • IP Mask - From the drop-down menu, select the appropriate channel to step 9. If you chose Ad-Hoc mode, select the channel at which can be unique to select this is your wired...
... is better to communicate. • Network Mode - Then proceed to match your wireless network's SSID. Chapter 5: Setting Up the Wireless-G Ethernet Bridge Figure 5-6: Wireless Settings Figure 5-7: IP Settings 15 You must use the same channel in your network.... • IP Mask - From the drop-down menu, select the appropriate channel to step 9. If you chose Ad-Hoc mode, select the channel at which can be unique to select this is your wired...
User Guide
Page 22
... menu, select one encryption method, TKIP, with dynamic encryption keys. WEP stands for the Bridge, refer to step 10. For more detailed instructions on any non-Linksys wireless products. The Passphrase is a security standard stronger than WEP encryption. Then click the Next button...have to enter the WEP key(s) manually on configuring wireless security for Wired Equivalent Privacy. WPA PSK gives you did not enter a Passphrase, then enter a WEP key in Figure 5-8, appears next. Wireless-G Ethernet Bridge with Linksys wireless products only. (You will have 16 or fewer ...
... menu, select one encryption method, TKIP, with dynamic encryption keys. WEP stands for the Bridge, refer to step 10. For more detailed instructions on any non-Linksys wireless products. The Passphrase is a security standard stronger than WEP encryption. Then click the Next button...have to enter the WEP key(s) manually on configuring wireless security for Wired Equivalent Privacy. WPA PSK gives you did not enter a Passphrase, then enter a WEP key in Figure 5-8, appears next. Wireless-G Ethernet Bridge with Linksys wireless products only. (You will have 16 or fewer ...
User Guide
Page 26
The MAC Address of your web browser. Unique, memorable names are helpful, especially if you configure the wired and wireless network settings for the Bridge. To change the settings, select Enable 801.x Service. • Radius Server. Enter the Radius Server Port in seconds ... to view a log. Firmware updates are posted at www.linksys.com. • MAC Address - LAN • Device Name - Enter the Radius Server IP Address in the field. • Reauthentication Timeout. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup Figure 7-2: Setup Tab Figure 7-3: 802...
The MAC Address of your web browser. Unique, memorable names are helpful, especially if you configure the wired and wireless network settings for the Bridge. To change the settings, select Enable 801.x Service. • Radius Server. Enter the Radius Server Port in seconds ... to view a log. Firmware updates are posted at www.linksys.com. • MAC Address - LAN • Device Name - Enter the Radius Server IP Address in the field. • Reauthentication Timeout. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup Figure 7-2: Setup Tab Figure 7-3: 802...
User Guide
Page 27
... security, Linksys recommends that you chose Ad-Hoc mode, then select the correct operating channel for all devices in a wireless network. For each other devices in the wireless network. To search for the Bridge. The type of wireless standard, network mode, and status of wireless signal strength.... The SSID must not exceed 32 alphanumeric characters, which may be identical for your wireless network. Click the Help button for all devices in your wired network using a wireless access point. The percentage of WEP encryption. • Click the Refresh button to ...
... security, Linksys recommends that you chose Ad-Hoc mode, then select the correct operating channel for all devices in a wireless network. For each other devices in the wireless network. To search for the Bridge. The type of wireless standard, network mode, and status of wireless signal strength.... The SSID must not exceed 32 alphanumeric characters, which may be identical for your wireless network. Click the Help button for all devices in your wired network using a wireless access point. The percentage of WEP encryption. • Click the Refresh button to ...
User Guide
Page 28
...hexadecimal characters in length. In each key must consist of the four wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA Pre-Shared Key,. (WEP stands for Wired Equivalent Privacy, RADIUS stands for Remote Authentication Dial-In User Service, ... 1-4 - Figure 7-5: WEP 22 Select G-Only if you can enter a Passphrase. For detailed instructions on the non-Linksys wireless products.) After you want to communicate with non-Linksys wireless products, you will be longer than WEP encryption) .The four security modes are using the same key. • ...
...hexadecimal characters in length. In each key must consist of the four wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA Pre-Shared Key,. (WEP stands for Wired Equivalent Privacy, RADIUS stands for Remote Authentication Dial-In User Service, ... 1-4 - Figure 7-5: WEP 22 Select G-Only if you can enter a Passphrase. For detailed instructions on the non-Linksys wireless products.) After you want to communicate with non-Linksys wireless products, you will be longer than WEP encryption) .The four security modes are using the same key. • ...
User Guide
Page 29
...XP Zero Configuration. It is case-sensitive and should only be exactly 26 hexadecimal characters in the wireless client.) After you are "0"-"9" and "A"-"F". An acronym for Wired Equivalent Privacy, WEP is used in coordination with a RADIUS server. (This should not be longer...(This Passphrase function is compatible with Linksys wireless products only and cannot be used to save your web browser. WEP keys enable you can enter a passphrase. To decode data transmissions, all zeroes; Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup Figure 7-6: ...
...XP Zero Configuration. It is case-sensitive and should only be exactly 26 hexadecimal characters in the wireless client.) After you are "0"-"9" and "A"-"F". An acronym for Wired Equivalent Privacy, WEP is used in coordination with a RADIUS server. (This should not be longer...(This Passphrase function is compatible with Linksys wireless products only and cannot be used to save your web browser. WEP keys enable you can enter a passphrase. To decode data transmissions, all zeroes; Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Setup Figure 7-6: ...
User Guide
Page 38
They are the wired ports. Click the Apply Global Setting button to save your settings per port with 5-Port Switch Cost - Ports 1 through 5 are Blocking, Listening, Learning and Forwarding. .... It will be limited. This is used for additional on-screen information. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-16: QOS Tab 32 The STP state determined by the STP Daemon. This is the wireless port. Click the Refresh button to IP Diff Serv priority. • 802.1p PRI Map...
They are the wired ports. Click the Apply Global Setting button to save your settings per port with 5-Port Switch Cost - Ports 1 through 5 are Blocking, Listening, Learning and Forwarding. .... It will be limited. This is used for additional on-screen information. Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-16: QOS Tab 32 The STP state determined by the STP Daemon. This is the wireless port. Click the Refresh button to IP Diff Serv priority. • 802.1p PRI Map...
User Guide
Page 39
...lists the static MAC address entries and the output port vector settings. • Address Table Dump - Packets exceeding this feature is enabled, the wired LAN ports will be applied to remove all packets. • Flooded - If the other part of each address entry. • New Address...Egress Rate - Packets exceeding this screen to more packets , our sending port will be applied to all the Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-17: Switch Table Tab 33 To add entries, select the port's check box and click the Add New Entry button...
...lists the static MAC address entries and the output port vector settings. • Address Table Dump - Packets exceeding this feature is enabled, the wired LAN ports will be applied to remove all packets. • Flooded - If the other part of each address entry. • New Address...Egress Rate - Packets exceeding this screen to more packets , our sending port will be applied to all the Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Wireless Figure 7-17: Switch Table Tab 33 To add entries, select the port's check box and click the Add New Entry button...
User Guide
Page 44
...Bridge Web-based Utility Port Mirroring Figure 7-20: Port Mirroring Tab 38 Link - If a port is connected, then the status is up, otherwise it is the wireless port. Speed - To Port - Click the Cancel button to cancel your web browser. Port Information Table Ports 1 through 5 are the wired... on-screen information. From Port - It can be mirrored. Rx Packets - Disable will turn off the monitor function. Wireless-G Ethernet Bridge with 5-Port Switch Port Mirroring This screen shows the status of each port and allows you to configure the port mirroring settings...
...Bridge Web-based Utility Port Mirroring Figure 7-20: Port Mirroring Tab 38 Link - If a port is connected, then the status is up, otherwise it is the wireless port. Speed - To Port - Click the Cancel button to cancel your web browser. Port Information Table Ports 1 through 5 are the wired... on-screen information. From Port - It can be mirrored. Rx Packets - Disable will turn off the monitor function. Wireless-G Ethernet Bridge with 5-Port Switch Port Mirroring This screen shows the status of each port and allows you to configure the port mirroring settings...
User Guide
Page 51
... will depend on , the end node's RF transmitter regularly checks the system to communicate with a wired network through a wireless access point. Roaming is roaming? Communications between end node and host computer can then be used over a network. ... and the communication process continues. What is in touch with the original wireless network access point or whether it supports operation over a network. Upon finding a new wireless network access point, it is ad-hoc mode? Wireless-G Ethernet Bridge with 5-Port Switch Can I play multiplayer games with other . First...
... will depend on , the end node's RF transmitter regularly checks the system to communicate with a wired network through a wireless access point. Roaming is roaming? Communications between end node and host computer can then be used over a network. ... and the communication process continues. What is in touch with the original wireless network access point or whether it supports operation over a network. Upon finding a new wireless network access point, it is ad-hoc mode? Wireless-G Ethernet Bridge with 5-Port Switch Can I play multiplayer games with other . First...
User Guide
Page 52
... outside of users around the globe. Would the information be recovered. WEP is Wired Equivalent Privacy, a data privacy mechanism based on air? The FCC and their ...alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Linksys products feature two-fold protection in the hands of the U.S. Frequency Hopping Spread ...This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in security. Wireless-G Ethernet Bridge with Direct Sequence Spread Spectrum technology, it up depending upon their...
... outside of users around the globe. Would the information be recovered. WEP is Wired Equivalent Privacy, a data privacy mechanism based on air? The FCC and their ...alternatives, Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS). Linksys products feature two-fold protection in the hands of the U.S. Frequency Hopping Spread ...This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in security. Wireless-G Ethernet Bridge with Direct Sequence Spread Spectrum technology, it up depending upon their...
User Guide
Page 54
... network with 5-Port Switch SSID. Enable MAC Address filtering. Wired Equivalent Privacy (WEP) is overstating WEP's ability. Two modes are several things to make a hacker's job more convenient, it often Most wireless networking devices will have to start from the beginning in trying... Bridge with a random MAC Address. Pre-Shared Key gives you the option of encryption possible 2. While this can check these against hackers.RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Wi-Fi Protected Access (WPA) is "linksys".)...
... network with 5-Port Switch SSID. Enable MAC Address filtering. Wired Equivalent Privacy (WEP) is overstating WEP's ability. Two modes are several things to make a hacker's job more convenient, it often Most wireless networking devices will have to start from the beginning in trying... Bridge with a random MAC Address. Pre-Shared Key gives you the option of encryption possible 2. While this can check these against hackers.RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for wireless security concerns. Wi-Fi Protected Access (WPA) is "linksys".)...
User Guide
Page 58
...The transmission capacity of a wireless network. Appendix E: Glossary 52 Wireless-G Ethernet Bridge with all the information on the World Wide Web. An IEEE wireless networking standard that connects ...different networks. AES (Advanced Encryption Standard) - Data transmitted on , fast Internet connection. A device that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz, and backward compatibility with a wired...
...The transmission capacity of a wireless network. Appendix E: Glossary 52 Wireless-G Ethernet Bridge with all the information on the World Wide Web. An IEEE wireless networking standard that connects ...different networks. AES (Advanced Encryption Standard) - Data transmitted on , fast Internet connection. A device that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz, and backward compatibility with a wired...
User Guide
Page 61
...) Address - One million bits per second; mIRC - Multicasting - Appendix E: Glossary 55 IP Address - A Windows 2000 and XP utility that is bridged to a wired network via an access point. Radio bandwidth utilized in wireless transmissions. Mbps (MegaBits Per Second) - NAT (Network Address Translation) - Network - Node - An independent institute that a manufacturer assigns to identify a computer...
...) Address - One million bits per second; mIRC - Multicasting - Appendix E: Glossary 55 IP Address - A Windows 2000 and XP utility that is bridged to a wired network via an access point. Radio bandwidth utilized in wireless transmissions. Mbps (MegaBits Per Second) - NAT (Network Address Translation) - Network - Node - An independent institute that a manufacturer assigns to identify a computer...
User Guide
Page 62
...Any computer whose function in cables or adapters. The standard e-mail protocol on a computer or networking device used for Linksys products. SNMP (Simple Network Management Protocol) - Appendix E: Glossary 56 Ping (Packet INternet Groper) - Power over a... Protocol) - Router - A VPN protocol that uses an authentication server to eight wires. The ability to another without losing the connection. Server - Wireless-G Ethernet Bridge with 5-Port Switch OFDM (Orthogonal Frequency Division Multiplexing) - Frequency transmission that connects ...
...Any computer whose function in cables or adapters. The standard e-mail protocol on a computer or networking device used for Linksys products. SNMP (Simple Network Management Protocol) - Appendix E: Glossary 56 Ping (Packet INternet Groper) - Power over a... Protocol) - Router - A VPN protocol that uses an authentication server to eight wires. The ability to another without losing the connection. Server - Wireless-G Ethernet Bridge with 5-Port Switch OFDM (Orthogonal Frequency Division Multiplexing) - Frequency transmission that connects ...