background image

Chapter 

Advanced Configuration

Wreless-G Busness Ethernet Brdge

Wireless > Wireless Security

The 

Wireless  Security

  screen  allows  you  to  configure 

security on your wireless network.

Wireless > Wireless Security - Security Disabled

Securty Mode 

Enter the security configuration to match 

the wireless Access Point that this bridge will connect to. 

To  disable  security,  keep  the  default  setting, 

Dsabled

To  enable  security,  select  the  desired  type  of  security: 

WEP

WPA-Personal

WPA-Personal

WPA-Enterprse,

 

WPA-Enterprse

.  Then  fill  in  all  the  fields  that  appear 

on the screen.  The fields you see depend on the type of 

security you select and are described in detail below. 

WEP

Use the 

WEP

 screen to configure WEP encryption. 

NOTE:

 WEP security is not recommended now 

due  to  its  weak  security  protection.  Users  are 

urged to migrate to WPA or WPA2.

 

Wireless > Wireless Security - WEP

Authentcaton  Type 

Select  the  802.11  authentication 

type, either 

Open System

 (default) or 

Shared Key

.

Default Transmt Key 

Select which WEP key (1-4) will be 

used  when  the  Bridge  sends  data.  Make  sure  the  other 

wireless-equipped devices are using the same key.

Encrypton 

In order to use WEP encryption, select 

-Bt 

(0 hex dgts)

 or 

8-Bt ( hex dgts)

 from the drop-

down menu.

Passphrase 

Instead  of  manually  entering  WEP  keys, 

you  can  enter  a  Passphrase.  This  Passphrase  is  used  to 

generate one or more WEP keys. It is case-sensitive and 

should  not  be  longer  than  16  alphanumeric  characters. 

(The  Passphrase  function  is  compatible  with  Linksys 

wireless products only. If you want to communicate with 

non-Linksys wireless products, you must enter your WEP 

key  manually  on  those  products.)  After  you  enter  the 

Passphrase, click 

Generate

 to create WEP key(s).

Key - 

If you are not using a Passphrase, then you can 

enter one or more WEP keys manually. In each key field, 

manually enter a set of values. (Do not leave a key field 

blank, and do not enter all zeroes. These are not valid key 

values.) If you are using 64-bit WEP encryption, then each 

key must consist of exactly 10 hexadecimal characters in 

length. If you are using 128-bit WEP encryption, then each 

key  must  consist  of  exactly  26  hexadecimal  characters. 

Valid hexadecimal characters are 

0-9

 and 

A

-

F

.

Click 

Apply

  to  apply  your  changes,  or  click 

Cancel

  to 

cancel your changes. 

WPA-Personal (aka WPA-PSK)

Use  the 

WPA Personal

  screen  to  configure WPA  Personal 

encryption for the Bridge.

Wireless > Wireless Security - WPA Personal

Encrypton 

WPA offers two methods, 

TKIP

 and 

AES

, for 

data encryption. Select the encryption method you want 

to use. The default is 

TKIP

.

Shared  Secret 

Enter  a  WPA  Shared  Secret  of  8-63 

characters.

Key  Renewal  Tmeout 

Enter  a  Key  Renewal  Timeout 

period,  which  instructs  the  Access  Point  how  often  it 

should change the encryption keys. The default is 

00

 

seconds.
Click 

Apply

  to  apply  your  changes,  or  click 

Cancel

  to 

cancel your changes. 

Summary of Contents for WET200 - Wireless-G Business Ethernet Bridge

Page 1: ...USER GUIDE BUSINESS SERIES Wireless G Business Ethernet Bridge Model WET200 EU...

Page 2: ...ddress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web...

Page 3: ...ver Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall Mount Option 6 Chapter 5 Quick Configuration Overview 7 Overview 7 Accessing the Web Based Utility 7 Navigating the Web Based Uti...

Page 4: ...ns 27 Appendix C Warranty Information 28 Appendix E Regulatory Information 29 FCC Statement 29 FCC Radiation Exposure Statement 29 Safety Notices 29 Industry Canada Statement 29 Industry Canada Radiat...

Page 5: ...tlet PoE enables delivery of both data and power to the WET200 An AC adapter is also included if the device installation site has a power outlet nearby Advanced security features include Wi Fi Protect...

Page 6: ...an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled depending on antenna characteristics Network Layout The Wireless G...

Page 7: ...shows three wired networks Office One Office Two and Office Three each with a direct connection to the other wired networks via an Ad Hoc network connection The Bridge in Office One is connected to a...

Page 8: ...ge Back Panel RESET Press and hold the Reset button for approximately ten seconds to reset the Bridge to the factory default settings ETHERNET 1 5 These RJ 45 ports support networkspeedsofeither10 Mbp...

Page 9: ...ed to the section Placement Options 1 2 3 Power Adapter Connect one end of an Ethernet network cable to the LAN port on your PC then connect the other end to Ethernet port 1 2 3 4 or 5 on the Bridge C...

Page 10: ...e s back panel are two crisscross wall mount slots 73 mm Wall Mount Slots on Bridge s Back Panel Determine where you want to mount the Bridge and install two screws that are 73 mm apart Line up the Br...

Page 11: ...ested information such as passphrase or shared secret The wireless bridge will now be connected to the access point Accessing theWeb Based Utility To access the web based utility perform these steps C...

Page 12: ...tings Administration You use the Administration tabs to manage the Bridge Password Use this screen to change the password SNMP This screen is used to enter the Simple Network Management Protocol SNMP...

Page 13: ...able names are helpful The default name is WET200 Contact Enter the name of the administrator responsible for the system Location This field is used for entering a description of where the Bridge is l...

Page 14: ...of the other devices in your wireless network If you are using Infrastructure mode this should match your Access Point s channel number If you are using Ad Hoc mode this should match your peer device...

Page 15: ...assphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric characters The Passphrase function is compatible with Linksys wireless products on...

Page 16: ...ntication The Login Name and Private Key Password are used to decrypt the certificate file Encryption Select either TKIP default or AES encryption Login Name Enter your login name for the RADIUS serve...

Page 17: ...reless equipped device RTSThreshold Thisdetermineshowlargeapacketcanbe before the Bridge coordinates transmission and reception to ensure efficient communication It should remain at its default settin...

Page 18: ...m any port including wireless to Port 1 for real time analysis This can be helpful for troubleshooting purposes Switch Port Mirroring If this feature is enabled Port 1 will only be able to communicate...

Page 19: ...IDs that are configured in the port s membership table This option is not selected by default The following summarizes 802 1QVLAN operation when a packet is received on a port If the packet has an 802...

Page 20: ...urce MAC addresses that is used to grant or deny access If a packet passes from the wireless port to a LAN port or vice versa the Bridge will check if the packet s source MAC address matches any entry...

Page 21: ...interact with other bridging devices that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup li...

Page 22: ...s and click Add New Entry The new entry will then appear in the Status Address Table list Note that static MAC entries are not affected by the Age timer and can only be deleted manually Static Addres...

Page 23: ...nity Enter the name of your Get community Set Community Enter the name of your Set community SNMP Trap Community Enter the name of your Trap community SNMP Trusted Host Enter the IP address of your Tr...

Page 24: ...on information These screens only display information and cannot be used to change any settings System Status System Status This is the System Status tab s default screen It displays basic status info...

Page 25: ...connection Click Refresh to display the most current information System Status Port Statistics System Status Port Statistics This screen displays status information for the Bridge s ports Port 1 5 Wi...

Page 26: ...dress filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device...

Page 27: ...is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An application program th...

Page 28: ...peed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive and transmit da...

Page 29: ...agers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In User Service A protocol th...

Page 30: ...smission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To...

Page 31: ...els Operating Channels 11 North America 13 Most of Europe ETSI and Japan Internal Antennas None External Antennas 2 Omnidirectional SMA Detachable Transmit Power Transmit Power Adjustable Normal Tempe...

Page 32: ...E DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may al...

Page 33: ...B digital apparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and This device must accept any interference...

Page 34: ...paraat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ti iet essenzjali u l provedimenti l o ra ril...

Page 35: ...en sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have be...

Page 36: ...ct is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external ante...

Page 37: ...ce a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho s...

Page 38: ...de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination...

Page 39: ...ek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederland...

Page 40: ...br ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce...

Page 41: ...www linksys com DK support Dominican Republic www linksys com DO support Ecuador www linksys com EC support Egypt Arabic www linksys com EGar support Region Web Address Egypt English www linksys com...

Page 42: ...ksys com QAar support Qatar English www linksys com QAen support Rom nia www linksys com RO support Russia www linksys com RU support Saudi Arabia Arabic www linksys com SAar support Region Web Addres...

Reviews: