background image

39

Appendix E: Glossary

Wireless-G Ethernet Bridge

Dynamic IP Address

 - A temporary IP address assigned by a DHCP server. 

Encryption

 - Encoding data to prevent it from being read by unauthorized people. 

Ethernet

 - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common 

transmission medium. 

Finger

 - A program that tells you the name associated with an e-mail address. 

Firewall

 - Security measures that protect the resources of a local network from intruders. 

Firmware

 - 1. In network devices, the programming that runs the device. 2. Programming loaded into read-only 

memory (ROM) or programmable read-only memory (PROM) that cannot be altered by end-users. 

Fragmentation

 - Breaking a packet into smaller units when transmitting over a network medium that cannot 

support the original size of the packet. 

FTP

 (File Transfer Protocol) - A standard protocol for sending files between computers over a TCP/IP network and 

the Internet. 

Full Duplex

 - The ability of a networking device to receive and transmit data simultaneously. 

Gateway

 - A system that interconnects networks. 

Half Duplex

 - Data transmission that can occur in two directions over a single line, but only one direction at a 

time. 

Hardware

 - The physical aspect of computers, telecommunications, and other information technology devices. 

HTTP

 (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World 

Wide Web. 

IEEE

 (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking 

standards. 

Infrastructure

 - Currently installed computing and networking equipment. 

Infrastructure Mode

 - Configuration in which a wireless network is bridged to a wired network via an access 

point. 

IP

 (Internet Protocol) - A protocol used to send data over a network. 

IP Address

 - The address used to identify a computer or device on a network. 

Summary of Contents for WET54G

Page 1: ...A Division of Cisco Systems Inc Model No Ethernet Bridge Wireless G WET54G v3 User Guide WIRELESS GHz 2 4802 11g ...

Page 2: ...e In addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning and is something that c...

Page 3: ... G Ethernet Bridge 9 Chapter 6 Connecting the Wireless G Ethernet Bridge for Network Use 14 Connection to a Network Device 14 Placement Options 14 Chapter 7 Using the Wireless G Ethernet Bridge Web based Utility 16 Overview 16 Starting the Web based Utility 16 Setup 17 Password 24 Advanced Settings 24 Status 26 Help 27 Appendix A Troubleshooting 28 Common Problems and Solutions 28 Frequently Asked...

Page 4: ...Wireless G Ethernet Bridge Appendix E Glossary 37 Appendix F Specifications 43 Appendix G Warranty Information 45 Appendix H Regulatory Information 46 Appendix I Contact Information 48 ...

Page 5: ...gure 5 4 Password 10 Figure 5 5 Mode Settings 10 Figure 5 6 Wireless Settings 11 Figure 5 7 IP Settings 11 Figure 5 8 Security Settings WEP 12 Figure 5 9 Security Settings WPA PSK 12 Figure 5 10 Confirmation 13 Figure 5 11 Congratulations 13 Figure 6 1 Horizontal Placement 14 Figure 6 2 Vertical Placement 15 Figure 7 1 Password Screen 16 Figure 7 2 Setup Tab 17 Figure 7 3 Site Survey 18 Figure 7 4...

Page 6: ...rnet Bridge Figure 7 10 RADIUS TTLS 23 Figure 7 11 Password Tab 24 Figure 7 12 Advanced Settings Tab 24 Figure 7 13 Status Tab 26 Figure 7 14 Help Tab 27 Figure 7 15 Firmware Upgrade 27 Figure C 1 Firmware Upgrade 35 ...

Page 7: ...herever you want power and data are both supplied through the Category 5 Ethernet cable You can also use the Wireless G Ethernet Bridge as a kind of cable less cable to connect remote areas together Maybe Shipping is all the way across the warehouse from Receiving Or maybe you want to set up a home office in your detached garage With a Wireless G Ethernet Bridge in the garage and another one or a ...

Page 8: ...necting the Wireless G Ethernet Bridge for Network Use This chapter explains how to connect the Bridge to a network device so the device can join your wireless network It also describes placement options for the Bridge Chapter 7 Using the Wireless G Ethernet Bridge Web based Utility This chapter explains how to use the Web based Utility so you can change the Bridge s settings or advanced configura...

Page 9: ...s appendix provides the technical specifications for the Bridge Appendix G Warranty Information This appendix supplies the warranty information for the Bridge Appendix H Regulatory Information This appendix supplies the regulatory information regarding the Bridge Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support...

Page 10: ...ich can roam within a certain radial range of the access point Multiple access points can be arranged to work in succession to extend the roaming range and can be set up to communicate with your Ethernet hardware as well If the wireless network is relatively small and needs to share resources only with the other computers on the wireless network then the Ad Hoc mode can be used Ad Hoc mode allows ...

Page 11: ...s G Network Adapters model numbers WPC11 and WPC54G for your laptop computers Wireless B and Wireless G PCI Adapters model numbers WMP11 and WMP54G for your desktop PCs and Wireless B and Wireless G USB Adapters model numbers WUSB11 and WUSB54G for your computers when you want to enjoy USB connectivity With these and many other Linksys products your networking options are limitless Go to the Links...

Page 12: ...he LAN port is where you will connect the Ethernet network cable Power The Power port is where you will connect the power adapter Important If you reset the Wireless G Ethernet Bridge you will erase all of your settings WEP encryption wireless settings etc and replace them with the factory defaults Do not reset the Wireless G Ethernet Bridge if you want to retain these settings Figure 3 1 Back Pan...

Page 13: ... is booting up and performing a self test the Power LED will flash It will stop flashing and remain lit when the self test has ended Ethernet Green The Ethernet LED will be lit steadily when the Bridge is connected to the wired network The LED will flash when there is wired network traffic Wireless G Green The Wireless G LED will be lit steadily when the Bridge is connected to the wireless network...

Page 14: ...anel of the Bridge shown in Figure 4 1 3 Plug the other end of the Ethernet network cable into the RJ 45 port of the hub switch or PC you wish to use to configure the Bridge 4 Plug the supplied power cable into the Power port on the back panel of the Bridge shown in Figure 4 2 Then plug the other end into an electrical outlet Proceed to Chapter 5 Setting Up the Wireless G Ethernet Bridge Figure 4 ...

Page 15: ...tup button to proceed with the Setup Wizard User Guide Click the User Guide button to open the PDF file of this User Guide LINKSYS Web Click the LINKSYS Web button to access the Linksys website using an active Internet connection Exit Click the Exit button to exit the Setup Wizard 2 Click the Setup button to begin the setup process 3 Make sure the Bridge is correctly connected to your wired networ...

Page 16: ... enter admin in the Password field later you can change the password through the Web based Utility Then click the Enter button 6 The screen shown in Figure 5 5 shows a choice of two wireless modes Click the Infrastructure radio button if you want your wireless computers to network with computers on your wired network using a wireless access point Click the Ad Hoc radio button if you want multiple ...

Page 17: ...ate Network Mode Keep the default setting Mixed if you have Wireless G and Wireless B devices in your network Select G Only if you have only Wireless G devices in your network 8 The IP Settings screen will appear next shown in Figure 5 7 If your network has a DHCP server click the radio button next to Automatically obtain an IP address DHCP Click the Next button to continue or the Back button to r...

Page 18: ...will be automatically generated The Passphrase is case sensitive and should have 16 or fewer alphanumeric characters It must match the passphrase of your wireless network and is compatible with Linksys wireless products only You will have to enter the WEP key s manually on any non Linksys wireless products If you want to manually enter a WEP key leave the Passphrase field blank and complete the Ke...

Page 19: ...hown in Figure 5 11 shows that the configuration is complete To configure any other Wireless G Ethernet Bridges on your network run this Setup Wizard again To register the Bridge click the Online Registration button To exit the Setup Wizard click the Exit button The Wireless G Ethernet Bridge is now successfully configured for your network For advanced configuration proceed to Chapter 7 Using the ...

Page 20: ... the antenna so that it points straight up in the air The second way is to hang the Bridge on a wall with the Bridge in a vertical position The third way is to stand the Bridge vertically on a surface The second and third options are explained in further detail below Wall Mount Option 1 The Bridge has eight rubber inserts four on each side Depending on how you want to mount the Bridge remove two o...

Page 21: ...hat are adjacent to the power port 2 The Bridge includes two triangular stands Insert a stand into an opening Push the stand up to snap it into place 3 Repeat step 2 using the second stand 4 Place the Bridge in an appropriate location 5 If necessary adjust the antenna so that it points straight up in the air See Figure 6 2 The installation of the Wireless G Ethernet Bridge is complete Figure 6 2 V...

Page 22: ... screen shown in Figure 7 2 will appear The Utility provides a convenient web browser based way to alter the Bridge s settings It offers five main tabs Setup Enables you to configure the IP address and wireless settings Password Allows you to change the password or reset all settings to factory defaults Advanced Lets you change the advanced wireless settings and clone a MAC address onto the Bridge...

Page 23: ... in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 alphanumeric characters which may be any keyboard character do not use any spaces Make sure this setting is the same for all devices in your wireless network For added security Linksys recommends that you change the default SSID linksys to a name of your choice To s...

Page 24: ... type of wireless standard network mode and status of WEP encryption Click the Refresh button to obtain the most up to date data Click the Cancel button to close this screen Click the Help button for additional on screen information Security Security To enable security select Enable then click Edit Security Settings If you have not enabled security before clicking on Edit Security Settings the scr...

Page 25: ...d devices are using the same key WEP Encryption In order to use WEP encryption select 64 Bit 10 hex digits or 128 Bit 26 hex digits from the drop down menu Passphrase Instead of manually entering WEP keys you can enter a Passphrase This Passphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric characters The Passphrase function is compat...

Page 26: ...the Bridge and the server Click the Apply button to save your changes If your page doesn t automatically refresh itself then click the Refresh button of your web browser Click the View Log button to view a log The Log Table screen appears in Figure 7 7 The log shows the authentication process Click the Refresh button to refresh the screen Click the Close button to return to the the previous screen...

Page 27: ...Passphrase Instead of manually entering WEP keys you can enter a passphrase This passphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 32 alphanumeric characters This Passphrase function is compatible with Linksys wireless products only and cannot be used with Windows XP Zero Configuration If you want to communicate with non Linksys wireless product...

Page 28: ...nter the user certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it Click the Upload button to upload the certificate Root Certificate Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it Click the Upload button to upload the certificate Click the Appl...

Page 29: ...ame of your wireless network Enter the Login name of your wireless network in the User ID field Password This is the password used for your wireless network Enter the password in the Password field Root Certificate Enter the root certificate you have installed to authenticate you on your wireless network or click the Browse button to browse for it Click the Upload button to upload the certificate ...

Page 30: ...ure 7 12 to customize advanced wireless settings and clone a MAC address onto the Bridge Wireless Transmission Rate The default setting is Auto The range is from 1 to 54Mbps The rate of data transmission should be set depending on the speed of your wireless network You can select from a range of transmission speeds or you can keep the default setting Auto to have the Bridge automatically use the f...

Page 31: ...gmented into multiple packets If you experience a high packet error rate you may slightly increase the Fragmentation Threshold Setting the Fragmentation Threshold too low may result in poor network performance Only minor modifications of this value are recommended MAC Address Cloning Mode You can clone the MAC address of any network device onto the Bridge To disable MAC address cloning keep the de...

Page 32: ...ridge s IP Address is displayed here Subnet Mask The Bridge s Subnet Mask is displayed here Gateway The Gateway address for the Bridge is displayed here LAN Statistics Ethernet TX The number of packets transmitted to the Ethernet network is displayed here Ethernet RX The number of packets received from the Ethernet network is displayed here Wireless TX The number of packets transmitted to the wire...

Page 33: ...f If you do not have the Reader click the Adobe Website link to download it Adobe Website software for viewing PDF documents If you need to download the Adobe Acrobat Reader to view the User Guide pdf then click the Adobe Website link Firmware Upgrade The version number of the Bridge s firmware is displayed here Firmware updates are posted at www linksys com Firmware should be upgraded ONLY if you...

Page 34: ...want to play head to head ad hoc gaming with two Xboxes but they won t communicate Perform the following steps Make sure both Bridges are set to the same SSID network mode Ad Hoc channel setting and WEP settings Verify that the Bridges are set to different IP addresses You need to enable MAC address cloning on the Bridge for each Xbox Follow these instructions 1 Open the Web based Utility for one ...

Page 35: ...t case s when entering the password If you forget your password you can push the Bridge s Reset button This will reset the password to the default setting however all other Bridge settings will be reset to the factory defaults as well To use the default setting enter admin in the Password field 7 After I make changes through the Web based Utility the new settings aren t displayed on screen Click t...

Page 36: ...ccess point of the dedicated coverage area To achieve true seamless connectivity the wireless LAN must incorporate a number of different functions Each node and wireless network access point for example must always acknowledge receipt of each message Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires ...

Page 37: ... What is FHSS And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be short duration impulse noise Direct Sequence Spread Spectrum DSSS generates a redunda...

Page 38: ...ly For information on implementing these security features refer to Chapter 7 Using the Wireless G Ethernet Bridge Web based Utility Setup Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the netwo...

Page 39: ...cess to only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that WE...

Page 40: ...rver This should only be used when a RADIUS server is connected to the Router or other device First enter the RADIUS server s IP Address and port number along with a key shared between the device and the server Then select a WEP key and a level of WEP encryption and either generate a WEP key through the Passphrase or enter the WEP key manually Implementing encryption may have a negative impact on ...

Page 41: ...s website www linksys com 2 Extract the file on your computer 3 Open the Bridge s Web based Utility and click the Help tab 4 On the Help screen click the Firmware Upgrade button 5 The screen shown in Figure C 1 will appear In the field provided enter the name of the extracted firmware upgrade file or click the Browse button to find this file 6 After you have selected the appropriate file click the...

Page 42: ... or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared reso...

Page 43: ...Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval The frequency in...

Page 44: ...domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a DHCP server assign temporary IP addresses to the other network devices typically computers DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the I...

Page 45: ... File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simultaneously Gateway A system that interconnects networks Half Duplex Data transmission that can occur in two directions over a single line but only one direction at a time Hardware The physical aspect o...

Page 46: ...computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Internet Node A network junction or connection point typically a computer or work station OFDM Orthogonal Frequency Division Multiplexing A type of modulation technology that separates the data stream into ...

Page 47: ...a CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer Protocol The standard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol Software Instructions for the computer A series of i...

Page 48: ...etwork protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and go...

Page 49: ...tton Cabling Type Category 5 or better LEDs Power Ethernet Wireless G Transmit Power 16 1 dBm 11Mbps CCK 12 1 dBm 54Mbps OFDM Security Feature WEP Encryption WPA RADIUS WEP Key Bits 64 128 bit Protocols 802 11b CCK 11Mbps CCK 5 5Mbps DQPSK 2Mbps DBPSK 1Mbps 802 11g OFDM 54Mbps Dimensions 4 96 x 1 06 x 4 21 126 mm x 27 mm x 107 mm Unit Weight 8 50 oz 0 24 kg Power 5V DC Certifications FCC CE Operat...

Page 50: ...44 Appendix F Specifications Wireless G Ethernet Bridge Storage Temp 4 F to 158 F 20 C to 70 C Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing Warranty 3 Year Limited ...

Page 51: ...NS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys ...

Page 52: ...ux normes NMB 003 et RSS210 d Industry Canada The use of this device in a system operating either partially or completely outdoors may require the user to obtain a license for the system according to the Canadian regulations EC DECLARATION OF CONFORMITY EUROPE Linksys declares that this product conforms to the specifications listed below following the provisions of the European R TTE directive 199...

Page 53: ...es et aux dispositions relatives à la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT est ...

Page 54: ...rking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization department f...

Reviews: