background image

Chapter 3

Advanced Configuration

3

Wireless-N Ethernet Bridge with Dual-Band

Chapter 3:  

Advanced Configuration

After setting up the Bridge with the Setup Wizard (located 

on the CD-ROM), the Bridge will be ready for use. However, 

if  you  want  to  change  its  advanced  settings,  use  the 

Bridge’s  web-based  utility.  This  chapter  describes  each 

web page of the utility and each page’s key functions. You 

can  access  the  utility  via  a  web  browser  on  a  computer 

networked with the Bridge.
The  web-based  utility  has  these  main  tabs:  Wireless, 

Network  Setup,  Administration,  and  Status.  Additional 

tabs will be available after you click one of the main tabs.

 

How to Access the Web-Based Utility

Use a web browser to access the web-based utility.
If the Bridge is connected to a network with a DHCP server 

(usually the network router), then the Bridge will obtain 

its IP address from the DHCP server. If there is no DHCP 

server, then the Bridge will use its default static IP address, 

169.254.1.250

. (If you set a permanent static IP address 

on the Bridge through the web-based utility, then enter 

the static IP address instead.)

NOTE:

 If you do not know the Bridge’s IP address, 

then find its IP address in the DHCP clients table 

of your router. (Refer to the documentation for 

your router.)

If you cannot locate the Bridge’s IP address, you 

can  reset  the  Bridge;  press  the 

Reset

  button 

on  the  Bridge  for  approximately  five  seconds, 

using a straightened paper clip. This will reset 

the Bridge back to the factory default settings. 

The Bridge will request an IP address from the 

DHCP server (usually the network router). If no 

DHCP server is found, then the Bridge will use 

its  default  static  IP  address, 

169.254.1.250

until it detects a DHCP server and is assigned a 

dynamic IP address.

If the Bridge is not associated with a router and is using 

the  factory  default  settings,  connect  a  computer  to 

the  Bridge  using  an  Ethernet  connection  to  access  the 

web-based utility. You will need to configure the Ethernet 

connection on the computer with a static IP address and 

subnet mask.
The IP address of your Ethernet adapter should be set to a 

specific IP address.

In  the

1. 

  IP  address

  field,  enter 

169.254.x.y

  (x  should 

be replaced by a number between 1 and 254, and y 

should be replaced by a number between 0 and 255).

In the

2. 

 Subnet mask

 field, enter 

255.255.0.0

.

NOTE:

 The steps to assign a static IP address to 

the Ethernet adapter on your computer vary by 

operating system. For instructions, please refer 

to  the  help  documentation  of  your  specific 

operating system.  

After  you  have  assigned  your  Ethernet  adapter  with  a 

static IP address, launch your web browser, and enter the 

Adapter’s IP address (the default setting is 

169.254.1.250

)

in the 

Address

 field. Press 

Enter

.

A  password  request  screen  appears.  (Non-Windows  XP 

users will see a similar screen.) Leave the 

User name

 field 

blank. Enter the password you created during the Setup 

Wizard.  If  you  did  not  create  a  new  password,  use  the 

default  password 

admin

.  (You  can  set  a  new  password 

from the 

Administration >

 

Management

 screen.) Click 

OK

 

to continue.

  

Password Screen

NOTE:

 If the password request screen does not 

appear, wait two minutes and try again.

Wireless > Basic Wireless Settings

The first screen that appears is the 

Basic Wireless Settings 

screen. Configure the basic wireless and security settings 

on this screen.
There  are  two  ways  to  configure  the  Bridge’s  settings, 

manual and Wi-Fi Protected Setup. Wi-Fi Protected Setup 

is  a  feature  that  makes  it  easy  to  set  up  your  wireless 

network. If your network router supports Wi-Fi Protected 

Setup  and  uses  WPA  or  WPA2  security,  then  you  can 

use Wi-Fi  Protected  Setup  to  automatically  connect  the 

Bridge.

Wireless  Configuration 

To  manually  configure  your 

wireless network, select 

Manual

. Refer to 

Basic Wireless 

Settings

page  4

.  To  use  Wi-Fi  Protected  Setup,  select 

Wi-Fi Protected Setup

. Refer to 

Wi-Fi Protected Setup

page 5

.

Summary of Contents for WET610N - Wireless-N EN Bridge

Page 1: ...USER GUIDE Wireless N Ethernet Bridge with Dual Band Model WET610N...

Page 2: ...ite address or e mail address Online Resources Website addresses in this document are listed without http in front of the address because most current web browsers do not require it If you use an olde...

Page 3: ...ss 11 Status About 11 Appendix A Troubleshooting 12 Appendix B Specifications 13 Appendix C Warranty Information 14 Limited Warranty 14 Exclusions and Limitations 14 Obtaining Warranty Service 14 Tech...

Page 4: ...Fi Protected Setup run the SetupWizard or refer to Wireless Basic Wireless Settings page 3 Wi Fi Protected Setup LED Blue Amber The LED flashes blue for two minutes during Wi Fi Protected Setup It li...

Page 5: ...ss 3 Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control MAC address filtering The MAC address is a unique series of numbers and letters assigned to every...

Page 6: ...ect a computer to the Bridge using an Ethernet connection to access the web based utility You will need to configure the Ethernet connection on the computer with a static IP address and subnet mask Th...

Page 7: ...to use wireless security keep the default Disabled NOTE Remember that each device in your wireless network MUST use the same security methodandpassphrase key orelsethewireless devices will not be abl...

Page 8: ...ed Setup Congratulations Method 1 Use this method if your router has a Wi Fi Protected Setup button Click or press the 1 Wi Fi Protected Setup button on the router Within two minutes click the 2 Wi Fi...

Page 9: ...vey Wireless Security WPA Network Name SSID The name of the network you selected is automatically displayed Security Mode WPA Personal is automatically displayed Encryption WPA supports the TKIP encry...

Page 10: ...tion Max Number of Packets in Aggregation This option defines the maximum number of packets sub frames in the aggregate The range is 0 to 7 The default is 7 Max AggregationSize Thisoptiondefinesthemax...

Page 11: ...no frame exchanges within this duration by the Block Acknowledgement ACK agreement The range is 0 to 65535 ms The default is 0 which disables the timeout Aggregation Window Size This option defines th...

Page 12: ...om the receiving device To use the RTS CTS option keep the default RTS CTS The None option may cause collisions between HT and legacy packets To use the None option select None To use the CTS2Self opt...

Page 13: ...sable the setting Keep the default Enabled to allow wireless access to the Bridge s web based utility or select Disabled to block wireless access to the utility Backup and Restore Backup To back up th...

Page 14: ...twork Name SSID The wireless network name or SSID is displayed BSSID The wireless MAC address of the connected wireless router or access point is displayed Radio Band The radio band of your wireless n...

Page 15: ...red Ethernet device will not communicate with another wireless enabled device such as a computer or printer Check the following Make sure the wireless enabled device is on the same wireless network as...

Page 16: ...dBm typical 130 Mbps HT20 270 Mbps HT40 Receive Sensitivity 802 11a 72 dBm typical 54 Mbps 802 11b 85 dBm typical 11 Mbps 802 11g 73 dBm typical 54 Mbps 802 11n 70 dBm typical MCS15 2 4 GHz 69 dBm ty...

Page 17: ...This limited warranty shall not apply to such third party software or service offerings This limited warranty does not guarantee any continued availability of a third party s service for which this pr...

Page 18: ...custom duties VAT and other associated taxes and charges Repairs or replacements not covered under this limited warranty will be subject to charge at Linksys then current rates Technical Support This...

Page 19: ...umented in this manual This transmitter must not be co located or operating in conjunction with any other antenna or transmitter This equipment should be installed and operated with minimum distance 2...

Page 20: ...con u pour fonctionner avec une 2 antenne ayant un gain maximal de 1 58 dBi 2 4 GHz et de 1 45 dBi 5 GHz Les antennes ayant un gain plus lev sont strictement interdites par Industrie Canada L imp danc...

Page 21: ...dace a recyklace pom h p edch zet potenci ln m negativn m dopad m na ivotn prost ed a lidsk zdrav Podrobn j informace o likvidaci star ho vybaven si laskav vy dejte od m stn ch ad podniku zab vaj c ho...

Page 22: ...it de jeter ce mat riel ainsi que tout autre mat riel lectrique ou lectronique par les moyens de collecte indiqu s par le gouvernement et les pouvoirs publics des collectivit s territoriales L liminat...

Page 23: ...einek felsz mol s hoz tov bbi r szletes inform ci ra van sz ks ge k rj k l pjen kapcsolatba a helyi hat s gokkal a hullad kfeldolgoz si szolg lattal vagy azzal zlettel ahol a term ket v s rolta Nederl...

Page 24: ...pom e zabr ni pr padn m negat vnym dopadom na ivotn prostredie a zdravie ud Ak m te z ujem o podrobnej ie inform cie o likvid cii star ho zariadenia obr te sa pros m na miestne org ny organiz cie zaob...

Page 25: ...KSYS ASIA PTE LTD OR CISCO LINKSYS K K LINKSYS LICENSING THE SOFTWARE INSTEAD OF CISCO LINKSYS LLC BY DOWNLOADING OR INSTALLING THE SOFTWARE OR USING THE PRODUCT CONTAINING THE SOFTWARE YOU ARE CONSEN...

Page 26: ...if You fail to comply with any provision of this Agreement Limited Warranty The warranty terms and period specified in the applicable Linksys Product User Guide shall also apply to the Software Discl...

Page 27: ...etary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification f...

Page 28: ...ly used for software interchange or Accompany it with the information you received as c totheoffertodistributecorrespondingsourcecode This alternative is allowed only for noncommercial distribution an...

Page 29: ...er in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later versi...

Page 30: ...and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others F...

Page 31: ...e copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You...

Page 32: ...ource code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely def...

Page 33: ...ties remain in full compliance You are not required to accept this License since you 9 have not signed it However nothing else grants you permission to modify or distribute the Library or its derivati...

Page 34: ...RY SERVICING REPAIR OR CORRECTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW 16 OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY A...

Page 35: ...he holder is Tim Hudson tjh cryptsoft com Copyright remains EricYoung s and as such any Copyright notices in the code are not to be removed If this package is used in a product Eric Young should be gi...

Reviews: