background image

Quick Configuration Overview

Wreless-G Busness Ethernet Brdge

Chapter 5

Chapter 5:  

Quck Confguraton 

Overvew

Overview

The  Ethernet  switch  of  the  WET200  is  designed  to  be 

functional right out of the box with the default settings. 

In order to use the wireless bridge function, however, you 

must first perform a minimal configuration on the Bridge 

so that it can find and communicate with the access point. 

The Bridge can be configured through your web browser 

with the web-based utility. This chapter explains how to 

use the utility.
The  utility  can  be  accessed  via  web  browsers,  such  as 

Microsoft Internet Explorer or Mozilla Firefox through the 

use of a computer that is networked with the Bridge.
For a basic network setup, most users only have to use the 

following screens of the Utility:

Setup 

The 

Setup

 screen is the first screen displayed. 

Enter your basic network settings (IP address) here to 

allow your PC to access the web-based utility. 

NOTE:

  If  your  network  backbone  has  a 

DHCP  server,  you  must  first  create  a  wireless 

connection between the bridge and the access 

point  before  you  attempt  to  configure  DHCP.  

Otherwise, the bridge will not be able to obtain 

an  IP  address  and  the  web-based  utility  will 

be  inaccessible.  For  information  on  how  to 

create the wireless connection, see Chapter 6, 

“Advanced Configuration.”

Password 

Click the 

Admnstraton

 tab, then select 

the 

Password 

sub  tab. The  Bridge’s  default  password 

is 

admn

. To secure the Bridge, change the Password 

from its default.

Wreless 

Click the 

Wreless

 tab to access  the 

Wireless

 

screen to configure a wireless connection. This is most 

easily done using the 

Ste Survey

 feature. Click 

Ste 

Survey

,  then  select  your  wireless  network’s  access 

point  from  the  list.  If  you  are  prompted  for  security 

settings,  enter  the  requested  information  (such  as 

passphrase or shared secret), The wireless bridge will 

now be connected to the access point.

Accessing the Web-Based Utility

To access the web-based utility, perform these steps:

Configure  your  PC  with  a  static  IP  address  in  the 

same  subnet  as  the  Bridge’s  default  IP  address, 

9.8..

.  If  a  DHCP  server  is  to  be  connected 

to the switch, configure it to assign the IP address in 

subnet 192.168.1.0/24. Your PC will get an IP address 

in the subnet through the DHCP.
Launch  your  web  browser,  such  as  Internet  Explorer 

or  Mozilla  Firefox,  and  enter  the  Bridge’s  default  IP 

address, 

9.8..

, in the 

Address

 field. Press the 

Enter

 key.

Enter 

admn

  in  the 

User  Name

  field.  The  first  time 

you  open  the  web-based  utility,  use  the  default 

password, 

admn

. (You can set a new password from 

Administration

 > 

Password

) Then click 

OK

.

When you are finished setting up the Bridge’s IP address, 

either  by  manually  assigning  it  a  new  IP  address  or  by 

configuring  it  to  use  DHCP,  move  your  Bridge  to  the 

desired network. You will have to use the new IP address 

the next time you access the web-based utility.

Navigating the Web-Based Utility

The web-based utility consists of the following five main 

tabs: 

Setup

Wreless

Swtch

Admnstraton

,  and 

System  Status

.  Additional  screens  (sub  tabs)  will  be 

available from most of the main tabs.
The following briefly describes the main and sub tabs of 

the Utility.

Setup

Setup 

Enter the Host Name and IP Address settings on 

this screen.

Wireless

You  use  the 

Wireless

  tabs  to  enter  a  variety  of  wireless 

settings for the Bridge.

Basc Settngs 

Choose the wireless network mode (e.g. 

wireless-G),  wireless  channel,  network  type,  and  SSID 

configuration on this screen.

Wreless Securty 

Use this screen to configure the Bridge’s 

security settings including security mode, authentication, 

and encryption information.

Advanced Settngs 

This screen allows you to configure 

the  Bridge’s  more  advanced  wireless  settings  such  as 

Transmission Rate, RTS Threshold, etc.

1.

2.

3.

Summary of Contents for WET200 - Wireless-G Business Ethernet Bridge

Page 1: ...USER GUIDE BUSINESS SERIES Wireless G Business Ethernet Bridge Model WET200 EU...

Page 2: ...ddress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web...

Page 3: ...ver Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall Mount Option 6 Chapter 5 Quick Configuration Overview 7 Overview 7 Accessing the Web Based Utility 7 Navigating the Web Based Uti...

Page 4: ...ns 27 Appendix C Warranty Information 28 Appendix E Regulatory Information 29 FCC Statement 29 FCC Radiation Exposure Statement 29 Safety Notices 29 Industry Canada Statement 29 Industry Canada Radiat...

Page 5: ...tlet PoE enables delivery of both data and power to the WET200 An AC adapter is also included if the device installation site has a power outlet nearby Advanced security features include Wi Fi Protect...

Page 6: ...an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled depending on antenna characteristics Network Layout The Wireless G...

Page 7: ...shows three wired networks Office One Office Two and Office Three each with a direct connection to the other wired networks via an Ad Hoc network connection The Bridge in Office One is connected to a...

Page 8: ...ge Back Panel RESET Press and hold the Reset button for approximately ten seconds to reset the Bridge to the factory default settings ETHERNET 1 5 These RJ 45 ports support networkspeedsofeither10 Mbp...

Page 9: ...ed to the section Placement Options 1 2 3 Power Adapter Connect one end of an Ethernet network cable to the LAN port on your PC then connect the other end to Ethernet port 1 2 3 4 or 5 on the Bridge C...

Page 10: ...e s back panel are two crisscross wall mount slots 73 mm Wall Mount Slots on Bridge s Back Panel Determine where you want to mount the Bridge and install two screws that are 73 mm apart Line up the Br...

Page 11: ...ested information such as passphrase or shared secret The wireless bridge will now be connected to the access point Accessing theWeb Based Utility To access the web based utility perform these steps C...

Page 12: ...tings Administration You use the Administration tabs to manage the Bridge Password Use this screen to change the password SNMP This screen is used to enter the Simple Network Management Protocol SNMP...

Page 13: ...able names are helpful The default name is WET200 Contact Enter the name of the administrator responsible for the system Location This field is used for entering a description of where the Bridge is l...

Page 14: ...of the other devices in your wireless network If you are using Infrastructure mode this should match your Access Point s channel number If you are using Ad Hoc mode this should match your peer device...

Page 15: ...assphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric characters The Passphrase function is compatible with Linksys wireless products on...

Page 16: ...ntication The Login Name and Private Key Password are used to decrypt the certificate file Encryption Select either TKIP default or AES encryption Login Name Enter your login name for the RADIUS serve...

Page 17: ...reless equipped device RTSThreshold Thisdetermineshowlargeapacketcanbe before the Bridge coordinates transmission and reception to ensure efficient communication It should remain at its default settin...

Page 18: ...m any port including wireless to Port 1 for real time analysis This can be helpful for troubleshooting purposes Switch Port Mirroring If this feature is enabled Port 1 will only be able to communicate...

Page 19: ...IDs that are configured in the port s membership table This option is not selected by default The following summarizes 802 1QVLAN operation when a packet is received on a port If the packet has an 802...

Page 20: ...urce MAC addresses that is used to grant or deny access If a packet passes from the wireless port to a LAN port or vice versa the Bridge will check if the packet s source MAC address matches any entry...

Page 21: ...interact with other bridging devices that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup li...

Page 22: ...s and click Add New Entry The new entry will then appear in the Status Address Table list Note that static MAC entries are not affected by the Age timer and can only be deleted manually Static Addres...

Page 23: ...nity Enter the name of your Get community Set Community Enter the name of your Set community SNMP Trap Community Enter the name of your Trap community SNMP Trusted Host Enter the IP address of your Tr...

Page 24: ...on information These screens only display information and cannot be used to change any settings System Status System Status This is the System Status tab s default screen It displays basic status info...

Page 25: ...connection Click Refresh to display the most current information System Status Port Statistics System Status Port Statistics This screen displays status information for the Bridge s ports Port 1 5 Wi...

Page 26: ...dress filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device...

Page 27: ...is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An application program th...

Page 28: ...peed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive and transmit da...

Page 29: ...agers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In User Service A protocol th...

Page 30: ...smission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To...

Page 31: ...els Operating Channels 11 North America 13 Most of Europe ETSI and Japan Internal Antennas None External Antennas 2 Omnidirectional SMA Detachable Transmit Power Transmit Power Adjustable Normal Tempe...

Page 32: ...E DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may al...

Page 33: ...B digital apparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and This device must accept any interference...

Page 34: ...paraat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ti iet essenzjali u l provedimenti l o ra ril...

Page 35: ...en sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have be...

Page 36: ...ct is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external ante...

Page 37: ...ce a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho s...

Page 38: ...de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination...

Page 39: ...ek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederland...

Page 40: ...br ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce...

Page 41: ...www linksys com DK support Dominican Republic www linksys com DO support Ecuador www linksys com EC support Egypt Arabic www linksys com EGar support Region Web Address Egypt English www linksys com...

Page 42: ...ksys com QAar support Qatar English www linksys com QAen support Rom nia www linksys com RO support Russia www linksys com RU support Saudi Arabia Arabic www linksys com SAar support Region Web Addres...

Reviews: