background image

Chapter 

Advanced Configuration

Wreless-G Busness Ethernet Brdge

Port-Based

In port-based VLAN mode, the wireless bridge uses a port-

based VLAN map to limit the traffic between the ports. A 

VLAN can include any of the five physical Ethernet ports 

(ports 1-5) as well as port 6, which controls the wireless 

interface and CPU access (management traffic and web-

based utility access).

NOTE:

  The  default  port-based  VLAN  settings 

consist  of  connections  between  port  6  and 

each of the five Ethernet ports. This is to allow 

access  to  the  web-based  utility  from  any  of 

the Ethernet ports. In addition, the connection 

between ports 1 and 6 is permanent and cannot 

be changed. This ensures that you can always 

access  the  web-based  utility  through  at  least 

port 1, regardless of your particular port-based 

VLAN settings. 

Switch > VLAN - Port-Based

Output Vector 

Use these fields to configure your VLANs 

as follows:

Each row of the table corresponds to one of the ports. 

For  each  port,  specify  its  connections  by  selecting 

all  of  its  exit  ports.  For  example,  to  specify  a  VLAN 

connection from port 1 to port 2, select 

 in the row 

labeled 

Port 1

Each  exit  port  you  select  specifies  a  unidirectional 

connection only. (In the example in step 1, the direction 

is  from  port  1  to  port  2.)  To  automatically  add  the 

connection  in  the  opposite  direction  (from  port  2  to 

port 1 in the example), click 

Confgure B-drectonal

.

When  you  are  finished  defining  the  connections  for 

the VLAN(s), click 

Apply Port VLAN Settngs

 to save 

and activate your VLAN configuration.

1.

2.

3.

Switch > MAC Based ACL

Switch > MAC Based ACL

An Access List (ACL) is a list of source MAC addresses that 

is used to grant or deny access. If a packet passes from the 

wireless port to a LAN port or vice versa, the Bridge will 

check  if  the  packet’s  source  MAC  address  matches  any 

entry in the access list, then use the match result to pass 

or  drop  the  packet.  However,  packets  from  LAN  port  to 

LAN port are not checked. You can select from two types 

of Access Lists. A Block list blocks specific MAC addresses 

specified in the table; all other MAC addresses are accepted. 

An Accept list only accepts the MAC addresses listed in the 

table; all other MAC addresses are blocked.

Access Lst Type 

To disable the Access List feature, keep 

the default setting, 

Dsabled

. To enable Access Lists, select 

Accept

 or 

Block

, then click 

Apply Global Settng

.

If you choose to use an Accept list, you must remember to 

include your computer’s MAC address in the list before you 

click 

Apply

. Failure to do so may result in your computer  

being denied access to the device. 

New Block Entry 

To  block  packets  with  a  specific  MAC 

address, enter the MAC address in this field, and click 

Add 

Block Entry

. To unblock the MAC address, enter the MAC 

address in the field, click 

Delete Block Entry

, then click 

Apply Global Settng

.

Block Lst 

Displays a list of blocked MAC addresses and 

number of packets dropped for each address.

New Accept Entry 

To accept packets with a specific MAC 

address, enter the MAC address in this field, and click 

Add 

Access  Entry

.  To  unaccept  the  MAC  address,  enter  the 

MAC address in the field, click 

Delete Access Entry

, then 

click 

Apply Global Settng

.

Accept  Lst 

Displays  a  list  of  accepted  MAC  addresses 

and number of packets accepted for each address.

Drop Count, Accept Count 

When Access List is enabled, 

these  display  the  total  number  of  packets  dropped  and 

accepted. Click 

Refresh

 to display the latest information.

Summary of Contents for WET200 - Wireless-G Business Ethernet Bridge

Page 1: ...USER GUIDE BUSINESS SERIES Wireless G Business Ethernet Bridge Model WET200 EU...

Page 2: ...ddress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web...

Page 3: ...ver Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall Mount Option 6 Chapter 5 Quick Configuration Overview 7 Overview 7 Accessing the Web Based Utility 7 Navigating the Web Based Uti...

Page 4: ...ns 27 Appendix C Warranty Information 28 Appendix E Regulatory Information 29 FCC Statement 29 FCC Radiation Exposure Statement 29 Safety Notices 29 Industry Canada Statement 29 Industry Canada Radiat...

Page 5: ...tlet PoE enables delivery of both data and power to the WET200 An AC adapter is also included if the device installation site has a power outlet nearby Advanced security features include Wi Fi Protect...

Page 6: ...an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled depending on antenna characteristics Network Layout The Wireless G...

Page 7: ...shows three wired networks Office One Office Two and Office Three each with a direct connection to the other wired networks via an Ad Hoc network connection The Bridge in Office One is connected to a...

Page 8: ...ge Back Panel RESET Press and hold the Reset button for approximately ten seconds to reset the Bridge to the factory default settings ETHERNET 1 5 These RJ 45 ports support networkspeedsofeither10 Mbp...

Page 9: ...ed to the section Placement Options 1 2 3 Power Adapter Connect one end of an Ethernet network cable to the LAN port on your PC then connect the other end to Ethernet port 1 2 3 4 or 5 on the Bridge C...

Page 10: ...e s back panel are two crisscross wall mount slots 73 mm Wall Mount Slots on Bridge s Back Panel Determine where you want to mount the Bridge and install two screws that are 73 mm apart Line up the Br...

Page 11: ...ested information such as passphrase or shared secret The wireless bridge will now be connected to the access point Accessing theWeb Based Utility To access the web based utility perform these steps C...

Page 12: ...tings Administration You use the Administration tabs to manage the Bridge Password Use this screen to change the password SNMP This screen is used to enter the Simple Network Management Protocol SNMP...

Page 13: ...able names are helpful The default name is WET200 Contact Enter the name of the administrator responsible for the system Location This field is used for entering a description of where the Bridge is l...

Page 14: ...of the other devices in your wireless network If you are using Infrastructure mode this should match your Access Point s channel number If you are using Ad Hoc mode this should match your peer device...

Page 15: ...assphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric characters The Passphrase function is compatible with Linksys wireless products on...

Page 16: ...ntication The Login Name and Private Key Password are used to decrypt the certificate file Encryption Select either TKIP default or AES encryption Login Name Enter your login name for the RADIUS serve...

Page 17: ...reless equipped device RTSThreshold Thisdetermineshowlargeapacketcanbe before the Bridge coordinates transmission and reception to ensure efficient communication It should remain at its default settin...

Page 18: ...m any port including wireless to Port 1 for real time analysis This can be helpful for troubleshooting purposes Switch Port Mirroring If this feature is enabled Port 1 will only be able to communicate...

Page 19: ...IDs that are configured in the port s membership table This option is not selected by default The following summarizes 802 1QVLAN operation when a packet is received on a port If the packet has an 802...

Page 20: ...urce MAC addresses that is used to grant or deny access If a packet passes from the wireless port to a LAN port or vice versa the Bridge will check if the packet s source MAC address matches any entry...

Page 21: ...interact with other bridging devices that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup li...

Page 22: ...s and click Add New Entry The new entry will then appear in the Status Address Table list Note that static MAC entries are not affected by the Age timer and can only be deleted manually Static Addres...

Page 23: ...nity Enter the name of your Get community Set Community Enter the name of your Set community SNMP Trap Community Enter the name of your Trap community SNMP Trusted Host Enter the IP address of your Tr...

Page 24: ...on information These screens only display information and cannot be used to change any settings System Status System Status This is the System Status tab s default screen It displays basic status info...

Page 25: ...connection Click Refresh to display the most current information System Status Port Statistics System Status Port Statistics This screen displays status information for the Bridge s ports Port 1 5 Wi...

Page 26: ...dress filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device...

Page 27: ...is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An application program th...

Page 28: ...peed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive and transmit da...

Page 29: ...agers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In User Service A protocol th...

Page 30: ...smission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To...

Page 31: ...els Operating Channels 11 North America 13 Most of Europe ETSI and Japan Internal Antennas None External Antennas 2 Omnidirectional SMA Detachable Transmit Power Transmit Power Adjustable Normal Tempe...

Page 32: ...E DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may al...

Page 33: ...B digital apparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and This device must accept any interference...

Page 34: ...paraat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ti iet essenzjali u l provedimenti l o ra ril...

Page 35: ...en sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have be...

Page 36: ...ct is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external ante...

Page 37: ...ce a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho s...

Page 38: ...de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination...

Page 39: ...ek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederland...

Page 40: ...br ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce...

Page 41: ...www linksys com DK support Dominican Republic www linksys com DO support Ecuador www linksys com EC support Egypt Arabic www linksys com EGar support Region Web Address Egypt English www linksys com...

Page 42: ...ksys com QAar support Qatar English www linksys com QAen support Rom nia www linksys com RO support Russia www linksys com RU support Saudi Arabia Arabic www linksys com SAar support Region Web Addres...

Reviews: