background image

A Division of Cisco Systems, Inc.

®

Model No.

Bridge for Phone Adapters

Wireless-

G

WBP54G (EU/LA)

User Guide

WIRELESS

GHz

802.11g

2,4

Summary of Contents for SPA-841 - Sipura VoIP Phone

Page 1: ...A Division of Cisco Systems Inc Model No Bridge for Phone Adapters Wireless G WBP54G EU LA User Guide WIRELESS GHz 802 11g 2 4 ...

Page 2: ...hese symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a caution or warning and is something that could damage your p...

Page 3: ...etting Up and Connecting the Wireless G Bridge for Phone Adapters 7 Starting the Setup Wizard 7 Running the Setup Wizard 7 Appendix A Troubleshooting 17 Common Problems and Solutions 17 Frequently Asked Questions 18 Appendix B Wireless Security 21 Security Precautions 21 Security Threats Facing Wireless Networks 21 Appendix C Upgrading Firmware 24 Appendix D Windows Help 29 Appendix E Glossary 30 ...

Page 4: ...4 12 Security Settings WEP Keys Screen 12 Figure 4 13 Confirmation Screen 13 Figure 4 14 If the Bridge Does Not Connect Screen 13 Figure 4 15 Disconnect the Network Cable from the Router Screen 13 Figure 4 16 Disconnect the Power Adapter Screen 14 Figure 4 17 Disconnect the Network Cable from the Phone Adapter Screen 14 Figure 4 18 Connect the Attached Bridge Power Cable to the Phone Adapter Scree...

Page 5: ...Wireless G Bridge for Phone Adapters Figure C 10 BIN File Information Screen 27 Figure C 11 Browsed Devices on Network Screen Select Bridge 27 Figure C 12 Upgrade Successful 28 ...

Page 6: ...crypted with WEP or industrial strength Wi Fi Protected Access WPA WPA2 security But what does all of this mean Networks are useful tools for sharing computer resources You can access one printer from different computers and access data located on another computer s hard drive Networks are even used for playing multiplayer video games So networks are not only useful in homes and offices they can a...

Page 7: ...es some problems and solutions as well as frequently asked questions regarding installation and use of the Bridge Appendix B Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network Appendix C Windows Help This appendix describes how you can use Windows Help for instructions about networking such as inst...

Page 8: ...ss point is able to forward data within a network the effective transmission range in an infrastructure network can be doubled Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they both share the same channel and SSID Before ...

Page 9: ...n add wireless connectivity to your LInksys phone adapter or IP phone compatible model numbers PAP2 SPA1001 SPA2000 SPA2002 SPA3000 SPA2100 SPA841 SPA842 SPA941 SPA942 and SPA9000 When you wish to connect your wired network with your wireless network network ports on access points and wireless routers can be connected to any of Linksys s switches or routers With these and many other Linksys produc...

Page 10: ... Bridge has no active connection to the wired network Wireless Green The Wireless LED lights up when the Bridge is connected to the wireless network It flashes when the Bridge is experiencing wireless network activity The LED is not lit the Bridge is not connected via wireless When the Bridge s firmware is being upgraded the Ethernet and Wireless LEDs alternate flashing The Port The Bridge does no...

Page 11: ...et network cable to connect the Bridge to your network router or PC running the Setup Wizard After setup you will use this cable to connect the Bridge to the Linksys phone adapter or IP phone Power After the Bridge has been configured you will connect this cable to the Power port of the Linksys phone adapter or IP phone One power adapter will power the Bridge as well as the phone adapter or IP pho...

Page 12: ... Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive On the Welcome screen you have the following choices Click Here to Start or Setup Click the Click Here to Start or Setup button to begin the software installation process User Guide Click the User Guide button to open this User Guide Exit Click Exit to exit the Setup Wizard Running the ...

Page 13: ...C running this Setup Wizard to set up the Bridge Disconnect the power jack from the back of the Linksys phone adapter or IP phone You will use this power adapter to power the Bridge If your network router or this PC is in a different room disconnect the power adapter from the electrical outlet Move the power adapter and Bridge to the room where your router or PC is located Click Next to proceed or...

Page 14: ...network and power cable attached to the Bridge Connect the Ethernet network cable of the Bridge to an Ethernet network LAN port of the router or PC Do not use the power cable now you will use it later Make sure the Bridge s Ethernet LED is solidly lit or flashing Click Next to proceed or click Back to return to the previous screen Figure 4 6 Connecting the Network Cable to a Router Screen Figure 4...

Page 15: ...ir status information SSID network name MAC Address Channel Signal strength and Security method Select the wireless network you want If the network you want is not displayed click the Refresh List button to search again To manually enter the SSID of the network you want click the SSID radio button and complete the SSID field Click Next to proceed or click Back to return to the previous screen Figu...

Page 16: ... click Back to return to the previous screen WPA2 WPA2 automatically uses AES with dynamic encryption keys AES is a stronger encryption method than TKIP Enter a passphrase on this screen Encryption AES is automatically selected as the encryption method Passphrase Enter a Passphrase also called a pre shared key of 8 63 characters in the Passphrase field The longer and more complex your Passphrase i...

Page 17: ...en will appear If you entered a Passphrase the WEP key s will be displayed If you did not enter a Passphrase enter the WEP key s on this screen Then select the key you will use from the Key Index drop down menu Key 1 4 One to four fields will be displayed depending on the level of encryption you have selected The WEP key you enter must match the WEP key of your wireless network For 64 bit WEP encr...

Page 18: ...shing This indicates that the Bridge has connected to the wireless network If the attempt succeeds proceed to step 12 If the attempt fails you have two options offered by a pop up screen Click the Yes button to save the new settings and proceed or click the No button to return to the Choose a Wireless Network screen and reconfigure the settings 12 Disconnect the Ethernet network cable of the Bridg...

Page 19: ... adapter or IP phone Click Next to proceed or click Back to return to the previous screen 14 Disconnect the Ethernet network cable from the phone adapter or IP phone You will use the combination Ethernet network and power cable attached to the Bridge Connect the Ethernet network cable of the Bridge to the phone adapter or IP phone Click Next to proceed or click Back to return to the previous scree...

Page 20: ...ower adapter to an electrical outlet Make sure the Bridge s Ethernet and Wireless LEDs are solidly lit or flashing Click Next to proceed or click Back to return to the previous screen 16 Make sure your cable connections match the cable connections shown on screen Click Next to proceed or click Back to return to the previous screen Figure 4 18 Connect the Attached Bridge Power Cable to the Phone Ad...

Page 21: ...ng the Setup Wizard Wireless G Bridge for Phone Adapters 17 The Congratulations screen will appear Click Exit to exit the Setup Wizard or click Online Registration to register the Bridge at www linksys com registration Congratulations Setup is complete Figure 4 20 Congratulations Screen ...

Page 22: ...ht between your wireless devices Also some electrical and electronic devices generate interference You can often locate these by checking wireless data transmission speeds by powering on and off a different device one at a time 3 The Linksys phone adapter or IP phone connected to the Bridge does not have a valid IP address This problem does not involve the Bridge the Bridge only provides a connect...

Page 23: ...ng Up and Configuring the Wireless G Bridge for Phone Adapters for instructions What is the IEEE 802 11b standard It is one of the IEEE standards for wireless networks The 802 11b standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps an...

Page 24: ...the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and quality as well as the message load currently being carried by ...

Page 25: ...hannel To an unintended receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redundant bit pattern for each bit to be transmitted This bit pattern is called a chip or chipping code The longer the chip the greater the probability that the original data can be recovered Even if one or more bits in the chip are damaged during transmission statistic...

Page 26: ...reduce your network performance 7 Change the encryption keys periodically Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s information such as the network s SSID Service Set Identifie...

Page 27: ...o only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WEP can ...

Page 28: ...se field of 8 63 characters Implementing encryption may have a negative impact on your network s performance but if you are transmitting sensitive data over your network encryption should be used These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer ...

Page 29: ...act the files on your computer s desktop The unzipped firmware file is a bin file and the program to install the upgrade application is an exe file named Upgrade 210 Their icons will appear on your desktop 3 Double click the Upgrade 210 icon to install the Upgrade Utility on your computer If your computer is running Windows XP you may see a security warning screen Click the Run button to proceed 4...

Page 30: ...twork and power cable from the phone adapter or IP phone If your PC is in a different room disconnect the power adapter from the electrical outlet Move the power adapter and Bridge to the location of your PC 8 Connect the Ethernet network cable of the Bridge to an Ethernet network LAN port of the PC If necessary plug the power adapter into an electrical outlet 9 In the new window on your desktop d...

Page 31: ...r 10 The Upgrade Utility screen will appear Click Browse and then click Browse Targets 11 The Browsed Devices on Network screen will appear Click the Files button Figure C 8 Browsed Devices on Network Screen Click Files Figure C 7 Upgrade Utility Browse Targets ...

Page 32: ...the Open button 13 The BIN File Information screen will appear Click the OK button 14 On the Browsed Devices on Network screen select the Bridge from the Devices List and click the Upgrade button Figure C 10 BIN File Information Screen Figure C 11 Browsed Devices on Network Screen Select Bridge Figure C 9 Open Firmware File ...

Page 33: ...ower adapter from the electrical outlet Move the power adapter and Bridge to the location of the phone adapter or IP phone 17 Connect the Ethernet network cable of the Bridge to the phone adapter or IP phone 18 Connect the power cable of the Bridge to the Power port of the phone adapter or IP phone If necessary plug the power adapter into an electrical outlet Figure C 12 Upgrade Successful IMPORTA...

Page 34: ... instructions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizin...

Page 35: ...vice and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy Chain...

Page 36: ...hernet IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files over a TCP IP...

Page 37: ... storage and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard mail se...

Page 38: ...etwork s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device for m...

Page 39: ...address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associated devices ...

Page 40: ...ched to the device of Antennas One internal Helix antenna Connector Type One female barrel jack power input one male barrel jack power output one RJ 45 Ethernet connector RF Pwr EIRP in dBm 13 1 5dBm 802 11g 17 1 5dBm 802 11b Antenna Gain in dBi 1 dBi Security Features WPA2 WPA WEP WEP Key Bits 64 128 Dimensions 51 mm x 92 mm x 29 mm 2 01 x 3 62 x 1 14 Unit Weight 0 072 kg 2 54 oz Power External 5...

Page 41: ... G Bridge for Phone Adapters Certifications FCC CE cUL IC 03 Wi Fi WPA WPA2 Operating Temp 0 C to 40 C 32 F to 104 F Storage Temp 20 C to 70 C 4 F to 158 F Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 42: ...ANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated repaired o...

Page 43: ...ment and receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received in...

Page 44: ...003 and RSS210 rules IC Statement Operation is subject to the following two conditions 1 This device may not cause interference and 2 This device must accept any interference including interference that may cause undesired operation of the device Industrie Canada L utilisation de ce périphérique dans un système utilisé partiellement ou totalement en extérieur peut conduire l utilisateur à l obtent...

Page 45: ...idge for Phone Adapters Compliance Information for 2 4 GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999 5 EC R TTE Directive Declaration of Conformity with Regard to the EU Directive 1999 5 EC R TTE Directive ...

Page 46: ...s pays de l UE et dans tous les pays ayant transposés la directive 1999 5 CE sans aucune limitation excepté pour les pays mentionnés ci dessous Questo prodotto è utilizzabile in tutte i paesi EU ed in tutti gli altri paesi che seguono le direttive EU 1999 5 EC senza nessuna limitazione eccetto per i paesii menzionati di seguito Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt w...

Page 47: ...for more details Dans la cas d une utilisation en extérieur la puissance de sortie est limitée pour certaines parties de la bande Reportez vous à la table 1 ou visitez http www arcep fr pour de plus amples détails Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy Unless operating within the boundaries of the ow...

Page 48: ... and antennas resulting in a radiated power level exceeding 100 mW EIRP are illegal Power Output of Your Device To comply with your country s regulations you may have to change the power output of your wireless device Proceed to the appropriate section for your device Wireless Adapters Wireless adapters have the power output set to 100 by default Maximum power output on each adapter does not excee...

Page 49: ...ther wireless product use its Web based Utility to configure its power output setting refer to the product s documentation for more information Technical Documents on www linksys com international Follow these steps to access technical documents 1 Enter http www linksys com international in your web browser 2 Select the country or region in which you live 3 Click the Products tab 4 Select the appr...

Page 50: ...Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with regards to the proper disposal and recycling of Linksys products Consumers are required to comply with this notice for all electronic products bearing the following symbol ...

Page 51: ...46 Appendix H Regulatory Information Wireless G Bridge for Phone Adapters ...

Page 52: ...47 Appendix H Regulatory Information Wireless G Bridge for Phone Adapters ...

Page 53: ...48 Appendix H Regulatory Information Wireless G Bridge for Phone Adapters ...

Page 54: ...49 Appendix H Regulatory Information Wireless G Bridge for Phone Adapters For more information visit www linksys com international ...

Page 55: ...s com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Portugal support pt linksys com Spain support es linksys com Sweden support se linksys com Switzerland support ch linksys com United Kingdom Ireland support uk linksys com Outside of Europe E mail Address Asi...

Reviews: