background image

A Division of Cisco Systems, Inc.

®

Model No.

Ethernet Bridge

Wireless-

B

WET11

User Guide

WIRELESS

GHz

2.4

802.11b

Summary of Contents for Linksys WET11

Page 1: ...A Division of Cisco Systems Inc Model No Ethernet Bridge Wireless B WET11 User Guide WIRELESS GHz 2 4802 11b ...

Page 2: ...n addition to these symbols there are definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section in the Table of Contents This exclamation point means there is a Caution or warning and is something that coul...

Page 3: ...t Bridge 9 Overview 9 Setup Wizard 9 Chapter 6 Connecting the Wireless B Ethernet Bridge for Network Use 13 Chapter 7 Using the Wireless B Ethernet Bridge Web based Utility 14 Overview 14 Starting the Web based Utility 14 Setup 15 Password 17 Advanced 18 Status 19 Help 20 Appendix A Troubleshooting 21 Common Problems and Solutions 21 Frequently Asked Questions 22 Appendix B Wireless Security 25 A ...

Page 4: ...Wireless B Ethernet Bridge Appendix H Regulatory Information 43 Appendix I Contact Information 46 ...

Page 5: ... 3 List of Bridges 10 Figure 5 4 Password 10 Figure 5 5 Mode Settings 10 Figure 5 6 Wireless Settings 11 Figure 5 7 IP Settings 11 Figure 5 8 Security Settings 11 Figure 5 9 WEP Key 12 Figure 5 10 Confirmation 12 Figure 5 11 Congratulations 12 Figure 7 1 Access the Web based Utility 14 Figure 7 2 Setup Tab 15 Figure 7 3 Site Survey 16 Figure 7 4 WEP Encryption 17 Figure 7 5 Password Tab 17 Figure ...

Page 6: ...d setup is a snap just plug it into your device and configure the network settings through your web browser You can also use the Wireless B Ethernet Bridge as a kind of cable less cable to connect remote areas together Maybe Shipping is all the way across the warehouse from Receiving Or maybe you want to set up a home office in your detached garage With a Wireless B Ethernet Bridge in the garage a...

Page 7: ...e Wireless B Ethernet Bridge for Network Use This chapter explains how to connect the Bridge to a network device so the device can join your wireless network Chapter 7 Using the Wireless B Ethernet Bridge Web based Utility This chapter explains how to use the Web Based Utility to configure the settings on the Bridge Appendix A Troubleshooting This appendix describes some problems and solutions as ...

Page 8: ... for the Bridge Appendix G Warranty Information This appendix supplies the warranty information for the Bridge Appendix H Regulatory Information This appendix supplies the regulatory information regarding the Bridge Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 9: ...hich can roam within a certain radial range of the access point Multiple access points can be arranged to work in succession to extend the roaming range and can be set up to communicate with your Ethernet hardware as well If the wireless network is relatively small and needs to share resources only with the other computers on the wireless network then the Ad Hoc mode can be used Ad Hoc mode allows...

Page 10: ...hernet Bridge With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for more information about products that work with the Wireless B Ethernet Bridge Figure 2 3 Wireless Bridging Using Two Bridges Figure 2 2 Ad Hoc Mode ...

Page 11: ...offers a choice between two settings Use the X setting if you are connecting the Bridge to a network adapter Use the II setting if you are connecting the Bridge to a hub or switch LAN The LAN port is where you will connect the Ethernet network cable Power The Power port is where you will connect the power adapter Important Resetting the Wireless B Ethernet Bridge will erase all of your settings WE...

Page 12: ...ed on DIAG Green The DIAG LED will light up when there is a connection error Re establish the connection to eliminate the error LAN Green The LAN LED will be lit steadily when the Bridge is connected to the wired network The LED will flash when there is wired network traffic WLAN Green The WLAN LED will be lit steadily when the Bridge is connected to the wireless network The LED will flash when th...

Page 13: ...you are connecting the Bridge to a PC s network adapter Slide the X II selection switch to the II position if you are connecting the Bridge to a hub or switch 4 Plug the other end of the Ethernet network cable into the RJ 45 port of the hub switch or PC you wish to use to configure the Bridge 5 Plug the supplied power adapter into the Power port on the back panel of the Bridge shown in Figure 4 2 ...

Page 14: ... should appear If it does not click the Start button and choose Run In the field that appears enter D setup exe if D is the letter of your CD ROM drive Setup Click the Setup button to proceed with the Setup Wizard User Guide Click the User Guide button to open the PDF file of this User Guide LINKSYS Web Click the LINKSYS Web button to access the Linksys website using an active Internet connection ...

Page 15: ...etters enter admin in the Password field later you can change the password through the Web based Utility Then click the Enter button 6 The screen shown in Figure 5 5 shows a choice of two wireless modes Click the Infrastructure radio button if you want your wireless computers to network with computers on your wired network using a wireless access point Click the Ad Hoc radio button if you want mul...

Page 16: ...opriate to your network You must specify an IP address on this screen If you are unsure about the IP Mask and Gateway it is better to leave these two fields blank Click the Next button to continue or the Back button to return to the previous screen Then proceed to step 9 IP Address This IP address must be unique to your network IP Mask The Bridge s IP Mask also known as Subnet Mask must be the sam...

Page 17: ...al characters are 0 9 and A F Then click the Next button and proceed to step 11 11 Review your settings on the Confirmation screen shown in Figure 5 10 Write down the Bridge s IP Address if you want to configure advanced settings through the Bridge s Web based Utility Click the Yes button to save these settings Click the No button to exit the Setup Wizard 12 The next screen shown in Figure 5 11 sh...

Page 18: ...witch 2 Plug the Ethernet network cable into the RJ 45 port on the Ethernet ready network device you wish to add to the wireless network 3 Plug the power cable into a local electrical outlet The installation of the Wireless B Ethernet Bridge is complete If you want to use the Bridge s Web based Utility refer to Chapter 7 The Wireless B Ethernet Bridge Web based Utility Note If you do not have an a...

Page 19: ...ssword on the Password screen later 2 The Utility s Setup screen shown in Figure 7 2 will appear The Utility provides a convenient web browser based way to alter the Bridge s settings It offers five main tabs Setup Enables you to configure the IP address and wireless settings Password Allows you to change the password or reset all settings to factory defaults Advanced Lets you change the advanced ...

Page 20: ... address in the IP Address Subnet Mask and Gateway fields Wireless SSID The SSID is the network name shared among all devices in a wireless network The SSID must be identical for all devices in the wireless network It is case sensitive and must not exceed 32 alphanumeric characters which may be any keyboard character do not use any spaces Make sure this setting is the same for all devices in your ...

Page 21: ... cancel your changes Click the Help button for additional on screen information Site Survey The Site Survey screen shown in Figure 7 3 shows all the wireless networks detected by the Bridge and their general information You can use this screen to connect to one of these networks For each wireless network detected the following information is displayed SSID The network name To join a wireless netwo...

Page 22: ...en each key must consist of exactly 26 hexadecimal characters in length Valid hexadecimal characters are 0 9 and A F Click the Apply button to save your changes If your page doesn t automatically refresh itself then click the Refresh button of your web browser Click the Cancel button to cancel your changes Click the Help button for additional on screen information Password The Password screen show...

Page 23: ...he same WEP key so that the Bridge and the client can authenticate each other and start transmitting data With the Open System setting any device can join a network without performing any security check Select the authentication type used by your wireless network MAC Address Cloning Mode You can clone the MAC address of any network device onto the Bridge To disable MAC address cloning keep the def...

Page 24: ...e Bridge s IP Address is displayed here Subnet Mask The Bridge s Subnet Mask is displayed here Gateway The Gateway address for the Bridge is displayed here LAN Statistics Ethernet TX The number of packets transmitted to the Ethernet network is displayed here Ethernet RX The number of packets received from the Ethernet network is displayed here Wireless TX The number of packets transmitted to the w...

Page 25: ...e Bridge s online technical support resources All information is read only Linksys Website Click the Linksys Website link to visit Linksys s website www linksys com Online manual in PDF format Click the Online manual in PDF format to view this User Guide online It is in Adobe Acrobat Portable Document File pdf format so you will need the free Adobe Acrobat Reader to view the pdf If you do not have...

Page 26: ...want to play head to head ad hoc gaming with two Xboxes but they won t communicate Perform the following steps Make sure both Bridges are set to the same SSID network mode Ad Hoc channel setting and WEP settings Verify that the Bridges are set to different IP addresses You need to enable MAC address cloning on the Bridge for each Xbox Follow these instructions 1 Open the Web based Utility for one ...

Page 27: ...s and its IP address will appear in the Status box Enter this IP address in your web browser s Address field For details see Chapter 5 Setting up the Wireless B Ethernet Bridge 7 The Web based Utility does not recognize my password The password is case sensitive Make sure that you are using the correct case s lowercase or uppercase when entering the password If you forget your password you can pus...

Page 28: ...essage Each node must maintain contact with the wireless network even when not actually transmitting data Achieving these functions simultaneously requires a dynamic RF networking technology that links wireless network access points and nodes In such a system the user s end node undertakes a search for the best possible access to the system First it evaluates such factors as signal strength and qu...

Page 29: ...quence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS What is DSSS What is FHSS And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single logical channel To an unintended receiver FHSS appears to be sh...

Page 30: ...eceive those transmission Wireless networks are easy to find Hackers know that in order to join a wireless network your wireless PC will typically first listen for beacon messages These are identifying packets transmitted from the wireless network to announce its presence to wireless nodes looking to connect These beacon frames are decrypted and contain much of the network s information such as th...

Page 31: ... addresses usernames passwords instant message conversations e mails account information and any data transmitted wirelessly can easily be seen by someone outside of your network because it is often broadcast in clear text Simply put any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack All a hacker needs is a packet sniffer software av...

Page 32: ...bout a day s worth of network traffic mostly in the case of business networks Over time the hacker can build up a table of network data and be able to decrypt all of your wireless transmissions This type of attack is more effective with networks that transmit more data such as businesses Man in the Middle Attacks A hacker doesn t need to log into your network as a user he can appear as one of the ...

Page 33: ...emember that access points transmit indiscriminately in a radius placing an access point at the edge of the physical network area reduces network performance and leaves an opening for any hacker smart enough to discover where the access point is transmitting This is an invitation for a man in the middle attack as described in the previous section To perform this type of attack the hacker has to be...

Page 34: ...ks they fall short with regards to security Hackers can usually find them quite easily 6 MAC Addresses Enable MAC address filtering if your wireless products allow it MAC address filtering will allow you to provide access to only those wireless nodes with certain MAC addresses This makes it harder for a hacker using a random MAC address or spoofing faking a MAC address 7 Firewalls Once a hacker ha...

Page 35: ... changing WEP keys SSID etc There are several ways that WEP can be maximized a Use the highest level of encryption possible b Use multiple WEP keys c Change your WEP key regularly Current encryption technology offers 64 bit and 128 bit WEP encryption If you are using 64 bit WEP swap out your old wireless units for 128 bit encryption right away Where encryption is concerned the bigger and more comp...

Page 36: ... digits or 128 Bit 26 hex digits from the drop down menu 3 The WEP Key can be generated in two ways you can use a Passphrase or you can enter it manually If you wish to use a Passphrase enter it and then click the Generate key to generate WEP key s The Passphrase is case sensitive and can be a maximum of 16 alphanumeric characters The Passphrase function is compatible with Linksys wireless product...

Page 37: ...roduct s tab 5 Click Network Adapters 6 Select WET11 Wireless B Ethernet Bridge 7 Select Firmware 8 Read the release notes or version information for the firmware version 9 Click the word here in Click here to download the firmware file 10 On the File Download screen click Save to save the zip file to your computer 11 Open the zip file and double click the exe file 12 The WET11 Firmware Upgrade ut...

Page 38: ... protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing shared resourc...

Page 39: ...Adapter This is a device that adds network functionality to your PC Ad hoc A group of wireless devices communicating directly with each other peer to peer without the use of an access point Backbone The part of a network that connects most of the systems and networks together and handles the most data Bandwidth The transmission capacity of a given device or network Beacon Interval The frequency in...

Page 40: ...domain name Default Gateway A device that forwards Internet traffic from your local area network DHCP Dynamic Host Configuration Protocol A protocol that lets one device on a local network known as a DHCP server assign temporary IP addresses to the other network devices typically computers DMZ Demilitarized Zone Removes the Router s firewall protection from one PC allowing it to be seen from the I...

Page 41: ... File Transfer Protocol A standard protocol for sending files between computers over a TCP IP network and the Internet Full Duplex The ability of a networking device to receive and transmit data simultaneously Gateway A system that interconnects networks Half Duplex Data transmission that can occur in two directions over a single line but only one direction at a time Hardware The physical aspect o...

Page 42: ...computers or devices connected for the purpose of data sharing storage and or transmission between users NNTP Network News Transfer Protocol The protocol used to connect to Usenet groups on the Internet Node A network junction or connection point typically a computer or work station OFDM Orthogonal Frequency Division Multiplexing A type of modulation technology that separates the data stream into ...

Page 43: ...a CTS Clear To Send message before sending data Server Any computer whose function in a network is to provide user access to files printing communications and other services SMTP Simple Mail Transfer Protocol The standard e mail protocol on the Internet SNMP Simple Network Management Protocol A widely used network monitoring and control protocol Software Instructions for the computer A series of i...

Page 44: ...etwork protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent Upgrade To replace existing software or firmware with a newer version Upload To transmit a file over a network URL Uniform Resource Locator The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and go...

Page 45: ...ch Reset button Cabling Type Category 5 or better LEDs Power LAN WLAN Diag Peak Gain of Antenna 5 dBi Transmit Power 15 dBm Normal Temperature Receive Sensitivity 85 dBm Security WEP 64 128 bit Dimensions 120 mm x 31 mm x 94 mm Unit Weight 0 2 kg Power External DC 5V Certifications FCC CE IC 03 Wi Fi Operating Temp 0 C to 40 C Storage Temp 20 C to 70 C Operating Humidity 10 to 85 Non Condensing ...

Page 46: ...41 Appendix F Specifications Wireless B Ethernet Bridge Storage Humidity 5 to 90 Non Condensing ...

Page 47: ... WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except by Linksys b has not been installed operated repai...

Page 48: ...se the separation between the equipment or devices Connect the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between t...

Page 49: ... la directive 1999 5 EC Belgique Dans le cas d une utilisation privée à l extérieur d un bâtiment au dessus d un espace public aucun enregistrement n est nécessaire pour une distance de moins de 300m Pour une distance supérieure à 300m un enregistrement auprès de l IBPT est requise Pour une utilisation publique à l extérieur de bâtiments une licence de l IBPT est requise Pour les enregistrements e...

Page 50: ...odifications in order to maintain uninterrupted service In the event this equipment should fail to operate properly disconnect the unit from the telephone line Try using another FCC approved device in the same telephone jack If the trouble persists call the telephone company repair service bureau If the trouble does not persist and appears to be with this unit disconnect the unit from the telephon...

Page 51: ...uct you can e mail us at Austria support at linksys com Belguim support be linksys com Denmark support dk linksys com France support fr linksys com Germany support de linksys com Italy support it linksys com Netherlands support nl linksys com Norway support no linksys com Portugal support pt linksys com Spain support es linksys com Sweden support se linksys com Switzerland support ch linksys com U...

Reviews: