background image

5

Glossary

Wreless-G Busness Ethernet Brdge

Appendx B

MAC  (Meda  Access  Control)  Address 

The  unique 

address that a manufacturer assigns to each networking 

device.

Mask 

A filter that includes or excludes certain values, for 

example parts of an IP address.

Mbps  (MegaBts  Per  Second) 

One  million  bits  per 

second; a unit of measurement for data transmission.

MD5 (Message Dgest 5) 

An algorithm that produces a 

128-bit hash. MD5 is a variation of MD4, and increases MD4 

security. MD5 verifies the integrity of the communication 

and authenticates the origin of the communication.

MDI (Meda Dependent Interface) 

A cable used for end 

stations.

MDIX (Meda Dependent Interface wth Crossover) 

cable used for hubs and switches.

MIB  (Management  Informaton  Base) 

MIBs  contain 

information  describing  specific  aspects  of  network 

components.

Multcast 

Transmits copies of a single packet to multiple 

ports.

Network 

A series of computers or devices connected for 

the purpose of data sharing, storage, and/or transmission 

between users.

NMS (Network Management System) 

An interface that 

provides a method of managing a system.

OID  (Object  Identfer) 

Used  by  SNMP  to  identify 

managed objects. In the SNMP Manager/Agent network 

management paradigm, each managed object must have 

an OID to identify it.

Packet 

A unit of data sent over a network.

Png (Packet INternet Groper) 

An Internet utility used 

to determine whether a particular IP address is online.

Polcng 

Determines if traffic levels are within a specified 

profile. Policing manages the maximum traffic rate used 

to send or receive packets on an interface.

Port 

The connection point on a computer or networking 

device used for plugging in cables or adapters. 

Port Mrrorng 

Monitors and mirrors network traffic by 

forwarding  copies  of  incoming  and  outgoing  packets 

from one port to a monitoring port.

Power  over  Ethernet  (PoE) 

A  technology  enabling  an 

Ethernet network cable to deliver both data and power.

QoS (Qualty of Servce) 

Provides policies that contain 

sets  of  filters  (rules).  QoS  allows  network  managers 

to  decide  how  and  what  network  traffic  is  forwarded 

according to priorities, application types, and source and 

destination addresses.

RADIUS  (Remote  Authentcaton  Dal-In  User 

Servce)  

A protocol that uses an authentication server to 

control network access.

RJ-5 (Regstered Jack-5) 

An Ethernet connector that 

holds up to eight wires.

RMON  (Remote  Montorng) 

Provides 

network 

information to be collected from a single workstation.

Router 

A  networking  device  that  connects  multiple 

networks together.

RSTP (Rapd Spannng Tree Protocol) 

Detects and uses 

network topologies that allow a faster convergence of the 

spanning tree, without creating forwarding loops.

Server 

Any computer whose function in a network is to 

provide  user  access  to  files,  printing,  communications, 

and other services. 

SMTP (Smple Mal Transfer Protocol) 

The standard e-

mail protocol on the Internet.

SNMP  (Smple  Network  Management  Protocol) 

widely used network monitoring and control protocol.

SSH 

Secure Shell. A utility that uses strong authentication 

and secure communications to log in to another computer 

over a network.

SSL  (Secure  Socket  Layer) 

Encryption  technology  for 

the Internet used to provide secure transactions, such as 

the transmission of credit card numbers for e-commerce.

Statc IP Address 

A fixed address assigned to a computer 

or device that is connected to a network.

STP (Spannng Tree Protocol) 

Prevents loops in network 

traffic.  The  Spanning  Tree  Protocol  (STP)  provides  tree 

topography for any arrangement of bridges. STP provides 

one path between end stations on a network, eliminating 

loops.

Subnet  (Sub-network) 

Subnets  are  portions  of  a 

network  that  share  a  common  address  component.  In 

TCP/IP  networks,  devices  that  share  a  prefix  are  part  of 

the same subnet. For example, all devices with a prefix of 

157.100.100.100 are part of the same subnet.

Subnet Mask 

An address code that determines the size 

of the network.

Swtch 

Filters  and  forwards  packets  between  LAN 

segments. Switches support any packet protocol type.

  (Termnal  Access  Controller  Access  Control 

System Plus) 

Proprietary Cisco enhancement to Terminal 

Access Controller Access Control System (TACACS). Provides 

additional support for authentication, authorization, and 

accounting.

Summary of Contents for WET200 - Wireless-G Business Ethernet Bridge

Page 1: ...USER GUIDE BUSINESS SERIES Wireless G Business Ethernet Bridge Model WET200 EU...

Page 2: ...ddress or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an older web...

Page 3: ...ver Ethernet 5 Power Adapter 5 Placement Options 5 Stand Option 5 Wall Mount Option 6 Chapter 5 Quick Configuration Overview 7 Overview 7 Accessing the Web Based Utility 7 Navigating the Web Based Uti...

Page 4: ...ns 27 Appendix C Warranty Information 28 Appendix E Regulatory Information 29 FCC Statement 29 FCC Radiation Exposure Statement 29 Safety Notices 29 Industry Canada Statement 29 Industry Canada Radiat...

Page 5: ...tlet PoE enables delivery of both data and power to the WET200 An AC adapter is also included if the device installation site has a power outlet nearby Advanced security features include Wi Fi Protect...

Page 6: ...an access point is able to forward data within a network the effective transmission range in an infrastructure network may be doubled depending on antenna characteristics Network Layout The Wireless G...

Page 7: ...shows three wired networks Office One Office Two and Office Three each with a direct connection to the other wired networks via an Ad Hoc network connection The Bridge in Office One is connected to a...

Page 8: ...ge Back Panel RESET Press and hold the Reset button for approximately ten seconds to reset the Bridge to the factory default settings ETHERNET 1 5 These RJ 45 ports support networkspeedsofeither10 Mbp...

Page 9: ...ed to the section Placement Options 1 2 3 Power Adapter Connect one end of an Ethernet network cable to the LAN port on your PC then connect the other end to Ethernet port 1 2 3 4 or 5 on the Bridge C...

Page 10: ...e s back panel are two crisscross wall mount slots 73 mm Wall Mount Slots on Bridge s Back Panel Determine where you want to mount the Bridge and install two screws that are 73 mm apart Line up the Br...

Page 11: ...ested information such as passphrase or shared secret The wireless bridge will now be connected to the access point Accessing theWeb Based Utility To access the web based utility perform these steps C...

Page 12: ...tings Administration You use the Administration tabs to manage the Bridge Password Use this screen to change the password SNMP This screen is used to enter the Simple Network Management Protocol SNMP...

Page 13: ...able names are helpful The default name is WET200 Contact Enter the name of the administrator responsible for the system Location This field is used for entering a description of where the Bridge is l...

Page 14: ...of the other devices in your wireless network If you are using Infrastructure mode this should match your Access Point s channel number If you are using Ad Hoc mode this should match your peer device...

Page 15: ...assphrase is used to generate one or more WEP keys It is case sensitive and should not be longer than 16 alphanumeric characters The Passphrase function is compatible with Linksys wireless products on...

Page 16: ...ntication The Login Name and Private Key Password are used to decrypt the certificate file Encryption Select either TKIP default or AES encryption Login Name Enter your login name for the RADIUS serve...

Page 17: ...reless equipped device RTSThreshold Thisdetermineshowlargeapacketcanbe before the Bridge coordinates transmission and reception to ensure efficient communication It should remain at its default settin...

Page 18: ...m any port including wireless to Port 1 for real time analysis This can be helpful for troubleshooting purposes Switch Port Mirroring If this feature is enabled Port 1 will only be able to communicate...

Page 19: ...IDs that are configured in the port s membership table This option is not selected by default The following summarizes 802 1QVLAN operation when a packet is received on a port If the packet has an 802...

Page 20: ...urce MAC addresses that is used to grant or deny access If a packet passes from the wireless port to a LAN port or vice versa the Bridge will check if the packet s source MAC address matches any entry...

Page 21: ...interact with other bridging devices that is an STP compliant switch bridge or router in your network to ensure that only one route exists between any two stations on the network and provide backup li...

Page 22: ...s and click Add New Entry The new entry will then appear in the Status Address Table list Note that static MAC entries are not affected by the Age timer and can only be deleted manually Static Addres...

Page 23: ...nity Enter the name of your Get community Set Community Enter the name of your Set community SNMP Trap Community Enter the name of your Trap community SNMP Trusted Host Enter the IP address of your Tr...

Page 24: ...on information These screens only display information and cannot be used to change any settings System Status System Status This is the System Status tab s default screen It displays basic status info...

Page 25: ...connection Click Refresh to display the most current information System Status Port Statistics System Status Port Statistics This screen displays status information for the Bridge s ports Port 1 5 Wi...

Page 26: ...dress filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every networking device...

Page 27: ...is assigned to the lowest priority queue and packet delivery is not guaranteed Bit A binary digit Boot To start a device and cause it to start executing instructions Browser An application program th...

Page 28: ...peed device refraining from sending packets FTP File Transfer Protocol A protocol used to transfer files over a TCP IP network Full Duplex The ability of a networking device to receive and transmit da...

Page 29: ...agers to decide how and what network traffic is forwarded according to priorities application types and source and destination addresses RADIUS Remote Authentication Dial In User Service A protocol th...

Page 30: ...smission Rate UDP User Data Protocol Communication protocol that transmits packets but does not guarantee their delivery Upgrade To replace existing software or firmware with a newer version Upload To...

Page 31: ...els Operating Channels 11 North America 13 Most of Europe ETSI and Japan Internal Antennas None External Antennas 2 Omnidirectional SMA Detachable Transmit Power Transmit Power Adjustable Normal Tempe...

Page 32: ...E DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may al...

Page 33: ...B digital apparatus complies with Canadian ICES 003 and RSS210 Operation is subject to the following two conditions This device may not cause interference and This device must accept any interference...

Page 34: ...paraat voldoet aan de essentiele eisen en andere van toepassing zijnde bepalingen van de Richtlijn 1999 5 EC Malti Maltese Dan l apparat huwa konformi mal ti iet essenzjali u l provedimenti l o ra ril...

Page 35: ...en sowie in anderen Staaten die der EU Direktive 1999 5 CE folgen mit Au nahme der folgenden aufgef hrten Staaten In the majority of the EU and other European countries the 2 4 and 5 GHz bands have be...

Page 36: ...ct is designed for indoor usage only Outdoor usage is not recommended unless otherwise noted 2 4 GHz Restrictions This product is designed for use with the standard integral or dedicated external ante...

Page 37: ...ce a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho s...

Page 38: ...de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L limination...

Page 39: ...ek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederland...

Page 40: ...br ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaoberaj ce...

Page 41: ...www linksys com DK support Dominican Republic www linksys com DO support Ecuador www linksys com EC support Egypt Arabic www linksys com EGar support Region Web Address Egypt English www linksys com...

Page 42: ...ksys com QAar support Qatar English www linksys com QAen support Rom nia www linksys com RO support Russia www linksys com RU support Saudi Arabia Arabic www linksys com SAar support Region Web Addres...

Reviews: