Cisco WET54Gv2 User manual

Category
Bridges & repeaters
Type
User manual

This manual is also suitable for

USER GUIDE
Wireless-G Ethernet Bridge
Model: WET54G
About This Guide
i
Wireless-G Ethernet Bridge
About This Guide
Icon Descriptions
While reading through the User Guide you may see
various icons that call attention to specific items. Below is
a description of these icons:
NOTE: This check mark indicates that there is
a note of interest and is something that you
should pay special attention to while using the
product.
WARNING: This exclamation point indicates
that there is a caution or warning and it is
something that could damage your property or
product.
WEB: This globe icon indicates a noteworthy
website address or e-mail address.
Online Resources
Website addresses in this document are listed without
http:// in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add http:// in front of the web address.
Resource Website
Linksys www.linksys.com
Linksys International www.linksys.com/international
Glossary www.linksys.com/glossary
Network Security www.linksys.com/security
Copyright and Trademarks
Linksys, Cisco and the Cisco Logo are
registered trademarks or trademarks of
Cisco Systems, Inc. and/or its affiliates
in the U.S. and certain other countries.
Copyright © 2008 Cisco Systems, Inc. All
rights reserved. Other brands and product
names are trademarks or registered
trademarks of their respective holders.
Table of Contents
ii
Wireless-G Ethernet Bridge
Chapter 1: Product Overview 1
Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2: Wireless Security Checklist 2
General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Chapter 3: Conguration using the Web-based Utility 3
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Setup Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Password Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Advanced Settings Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Status Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Help Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix A: Troubleshooting 11
Appendix B: Specications 12
Appendix C: Warranty Information 13
Limited Warranty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Appendix D: Regulatory Information 15
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Safety Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Avis d’Industrie Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Avis de non-responsabilité concernant les appareils sans fil . . . . . . . . . . . . . . . . . .16
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Appendix E: Software End User License Agreement 21
Cisco Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Chapter 1
Product Overview
1
Wireless-G Ethernet Bridge
Chapter 1:
Product Overview
Thank you for choosing the Wireless-G Ethernet Bridge. The
versatile Wireless-G Ethernet Bridge can make any wired
Ethernet-equipped device a part of your wireless network.
At home, use the Bridge to connect game consoles, set-
top boxes, or computers to your Wireless-G network and
its shared high-speed Internet connection. In the office,
convert your Ethernet-wired printer, camera, notebook or
desktop into a wireless networked device.
Front Panel
Power (Green) This LED lights up when the
Bridge is powered on. The LED flashes while the
Bridge is booting up and performing a self-test,
and remains lit after the self-test has ended.
Ethernet (Green) This LED will be lit steadily
when the Bridge is connected to the wired
network. The LED will flash when there is wired
network traffic.
Wireless-G (Green) This LED will be lit steadily
when the Bridge is connected to the wireless
network. The LED will flash when there is
wireless network traffic.
Back Panel
Reset When pressed, the Reset button resets
the Bridge to its factory default settings.
LAN The LAN port is where you will connect
the Ethernet network cable.
Power The Power port is where you will
connect the power adapter.
NOTE: If you reset the Wireless-G Ethernet
Bridge, you will erase all of your settings (WEP
encryption, wireless settings, etc.) and replace
them with the factory defaults. Do not reset the
Wireless-G Ethernet Bridge if you want to retain
these settings.
Chapter 2
Wireless Security Checklist
2
Wireless-G Ethernet Bridge
Chapter 2:
Wireless Security Checklist
Wireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
at a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Like signals from your cellular or cordless phones, signals
from your wireless network can also be intercepted. Since
you cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use linksys as the default wireless network name. You
should change the wireless network name to something
unique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
use personal information (such as your Social Security
number) because this information may be available for
anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, and
gateways, you will be asked for a password when you
want to change their settings. These devices have a default
password set by the factory. The Linksys default password
is admin. Hackers know these defaults and may try to
use them to access your wireless device and change your
network settings. To thwart any unauthorized changes,
customize the device’s password so it will be hard to
guess.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to
enable Media Access Control (MAC) address filtering. The
MAC address is a unique series of numbers and letters
assigned to every networking device. With MAC address
filtering enabled, wireless network access is provided
solely for wireless devices with specific MAC addresses.
For example, you can specify the MAC address of each
computer in your home so that only those computers can
access your wireless network.
4. Enable encryption
Encryption protects data transmitted over a wireless
network. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
for wireless communication.
A network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information
as it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guidelines
Wireless network security is useless if the underlying
network is not secure.
Password protect all computers on the network and
individually password protect sensitive files.
Change passwords on a regular basis.
Install anti-virus software and personal firewall
software.
Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
knowledge.
Additional Security Tips
Keep wireless routers, access points, or gateways away
from exterior walls and windows.
Turn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations).
Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
WEB: For more information on wireless
security, visit www.linksys.com/security
Chapter 3
Configuration using the Web-based Utility
3
Wireless-G Ethernet Bridge
Chapter 3:
Configuration using the
Web-based Utility
The Bridge is designed to function properly after you
configure it using the Setup Wizard. However, if you would
like to change these basic settings or make advanced
configuration changes, use your web browser and the
Wireless-G Ethernet Bridge Web-based Utility. This chapter
explains how to use the Utility.
How to Access the Web-Based Utility
Open your web browser, and enter the IP address 1.
of the Wireless-G Ethernet Bridge (the default is
192.168.1.226) in the browser’s Address field. Then
press Enter.
Internet Explorer Address Bar
The 2. Password screen will appear. In lowercase letters,
enter the default password, admin, in the Password
field. Click OK. You can set a new password on the
Password screen later.
Password Screen
The utility’s Setup screen will appear. The Utility 3.
provides a convenient, web-browser-based way to
alter the Bridges settings. It offers five main tabs
Setup - Enables you to configure the IP address and
wireless settings.
Password - Allows you to change the password or
reset all settings to factory defaults.
Advanced - Lets you change the advanced wireless
settings and clone a MAC address onto the Bridge.
Status - Displays the Bridges current settings.
Help - Provides explanations of various configuration
settings and links to online technical support resources.
You can also upgrade the Bridge’s firmware using the
Help screen.
Setup Tab
The Setup screen lets you configure the wired and wireless
network settings for the Bridge.
Setup
Firmware The version number of the Bridges firmware is
displayed here. Firmware should be upgraded ONLY if you
experience problems with the Bridge. Firmware updates
are posted at www.linksys.com.
MAC Address
The Bridges MAC address is displayed here
.
LAN
Device Name You may assign any name to the Bridge.
Unique, memorable names are helpful, especially if you
are using multiple bridges on the same wireless network.
Configuration Type If the Bridge will obtain an IP
address automatically from a DHCP server, such as a
router, then select Automatic Configuration-DHCP. If
you are assigning the Bridge a static IP address, then select
Static IP Address, and enter an IP Address, Subnet Mask,
and Gateway address in the IP Address, Subnet Mask, and
Gateway fields.
Wireless
SSID The SSID is the network name shared among all
devices in a wireless network. The SSID must be identical
for all devices in the wireless network. It is case-sensitive
and must not exceed 32 alphanumeric characters (A-Z,
a-z, 0-9; do not use spaces). Make sure this setting is the
same for all devices in your wireless network. For added
security, Linksys recommends that you change the default
SSID (linksys) to a name of your choice.
Chapter 3
Configuration using the Web-based Utility
4
Wireless-G Ethernet Bridge
Site Survey To search for available wireless networks, click
Site Survey. The Wireless Site Survey screen will appear.
This screen shows all the wireless networks detected by
the Bridge and their general information. You can use this
screen to connect to one of these networks.
Wireless Site Survey
For each wireless network detected, the following
information is displayed:
SSID
The network name. To join a wireless network,
click its SSID.
MAC Address The MAC address of the network’s
access point.
Channel
The channel setting.
Signal Strength (%) The percentage of wireless
signal strength.
Mode The type of wireless standard, network mode,
and status of WEP encryption.
Click Refresh to obtain the most up-to-date data. Click
Cancel to close this screen. Click Help for additional on-
screen information.
Network Type Choose a wireless operating mode for
the Bridge. Keep the default setting, Infrastructure, if
you want your wireless-equipped device to communicate
with computers and other devices on your wired network
using a wireless access point. Select Ad-Hoc if you want
multiple wireless-equipped devices to communicate
directly with each other.
If you chose Ad-Hoc mode, then select the correct
operating channel for your network from the Channel
drop-down menu. This should match the channel setting
of the other devices in your wireless network.
Select the appropriate network mode from the Mode
drop-down menu. Keep the default, Mixed, if you have
Wireless-G (802.11g) and Wireless-B (802.11b) devices in
your network. Select G-Only if you have only Wireless-G
devices in your network
Security To enable security, select Enable, then click
Edit Security Settings. To disable security, select Disable.
If you have not enabled security before clicking Edit
Security Settings, you will be asked if you want to enable
security settings; click OK to edit the security settings, or
click Cancel to cancel.
Enable Security Settings
If you click Edit Security Settings, the Security screen will
appear.
Security
From the Security Mode drop-down menu, select one of the
four wireless security modes supported by the Bridge:
WPA (Wi-Fi Protected Access) Pre-Shared Key
WPA RADIUS
RADIUS (Remote Authentication Dial-In User Service)
WEP (Wired Equivalent Privacy)
WPA is a security standard stronger than WEP encryption.
The four security modes are briefly discussed here. For
detailed instructions on configuring wireless security for
the Bridge, refer to the Wireless Security” chapter.
Chapter 3
Configuration using the Web-based Utility
5
Wireless-G Ethernet Bridge
WEP
Use the WEP screen to configure the WEP encryption for
the Bridge.
Security > WEP
Select a Default Transmit Key (choose which Key to use),
and a level of WEP Encryption, 64 bits (10 hex digits) or
128 bits (26 hex digits). Then either generate a WEP Key
using a Passphrase or enter the WEP key manually.
Default Transmit Key Select which WEP key (1-4) will be
used when the Bridge sends data. Make sure the other
wireless-equipped devices are using the same key.
WEP Encryption In order to use WEP encryption, select
64-Bit (10 hex digits) or 128-Bit (26 hex digits) from the
drop-down menu.
Passphrase Instead of manually entering WEP keys,
you can enter a Passphrase. This Passphrase is used to
generate one or more WEP keys. It is case-sensitive and
should not be longer than 16 alphanumeric characters.
(The Passphrase function is compatible with Linksys
wireless products only. If you want to communicate with
non-Linksys wireless products, you will need to enter your
WEP key manually on the non-Linksys wireless products.)
After you enter the Passphrase, click Generate to create
WEP key(s).
Keys 1-4 If you are not using a Passphrase, then you can
enter one or more WEP keys manually.
In each key field, manually enter a set of values. (Do not
leave a key field blank, and do not enter all zeroes. These
are not valid key values.) If you are using 64-bit WEP
encryption, then each key must consist of exactly 10
hexadecimal characters in length. If you are using 128-bit
WEP encryption, then each key must consist of exactly
26 hexadecimal characters in length. Valid hexadecimal
characters are “0”-“9” and A”-“F”.
Click Apply to save your changes. If your page does not
automatically refresh itself, then click Refresh on your
web browser.
WPA Pre-Shared Key
WPA gives you TKIP for the encryption method.
Security > WPA Pre-Shared Key
WPA Shared Key Enter a WPA Shared Key of 8-32
characters. This is a key shared between the Bridge and
the server.
View Log Click View Log to display the Log Table screen.
This screen displays a log of the authentication process.
Log Table
Click Refresh to refresh the Log Table screen. Click Close
to return to the the WPA Pre-Shared Key screen.
Click Apply to save your changes. If your page does not
automatically refresh itself, then click Refresh on your
web browser.
Chapter 3
Configuration using the Web-based Utility
6
Wireless-G Ethernet Bridge
RADIUS
This option features WEP used in coordination with
a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router.) It offers three
authentication methods: MD5, TLS, and TTLS.
EAP Type Select the authentication method: MD5, TLS,
or TTLS. The appropriate screen appears depending on
the selection. The screens are described below.
MD5
Security > RADIUS-MD5
Select a Default Key (choose which Key to use), and a
level of WEP encryption, 64 bits 10 hex digits or 128 bits
26 hex digits. Then either generate a WEP key using a
Passphrase or enter the WEP key manually.
Default Transmit Key Select which WEP key (1-4) will
be used when the Bridge sends data. Make sure that the
receiving device (wireless client) is using the same key.
WEP Encryption An acronym for Wired Equivalent
Privacy, WEP is an encryption method used to protect
your wireless data communications. WEP uses 64-bit or
128-bit keys to provide access control to your network
and encryption security for every data transmission. To
decode data transmissions, all devices in a network must
use an identical WEP key. Higher encryption levels offer
higher levels of security, but due to the complexity of the
encryption, they may decrease network performance.
Select 64 bits (10 hex digits) or 128 bits (26 hex digits).
Passphrase Instead of manually entering WEP keys,
you can enter a passphrase. This passphrase is used to
generate one or more WEP keys. It is case-sensitive and
should not be longer than 32 alphanumeric characters.
(This Passphrase function is compatible with Linksys
wireless products only and cannot be used with Windows
XP Zero Configuration. If you want to communicate
with non-Linksys wireless products or Windows XP Zero
Configuration, make a note of the WEP key generated in
the Key 1 field, and enter it manually in the wireless client.)
After you enter the Passphrase, click Generate to create
WEP keys.
Keys 1-4 WEP keys enable you to create an encryption
scheme for wireless network transmissions. If you are
not using a Passphrase, then manually enter a set of
values. (Do not leave a key field blank, and do not enter
all zeroes; they are not valid key values.) If you are using
64-bit WEP encryption, the key must be exactly 10
hexadecimal characters in length. If you are using 128-bit
WEP encryption, the key must be exactly 26 hexadecimal
characters in length. Valid hexadecimal characters are “0”-
“9” and A”-“F”.
User ID and Password A user identification and password
are required for your security. Enter the ID in the User ID
field, then the password in the Password field.
Click Apply to save your changes. If your page does not
automatically refresh itself, then click Refresh on your
web browser. Click View Log to view a log.
TLS
TLS is a mutual authentication method that uses digital
certificates.
Security > RADIUS-TLS
Enter the Login name of your wireless network in the User
ID field. Enter the User Certificate and Root Certificate in
Chapter 3
Configuration using the Web-based Utility
7
Wireless-G Ethernet Bridge
the fields or click Browse to browse for it, then upload it.
User ID Your User ID is the Login name of your wireless
network. Enter the Login name of your wireless network
in the User ID field.
User Certificate Enter the user certificate you have
installed to authenticate you on your wireless network or
click the Browse button to browse for it. Click the Upload
button to upload the certificate.
Root Certificate Enter the root certificate you have
installed to authenticate you on your wireless network or
click the Browse button to browse for it. Click the Upload
button to upload the certificate.
Click Apply to save your changes. If your page does not
automatically refresh itself, then click Refresh on your
web browser. Click View Log to view a log.
TTLS
TTLS is a mutual authentication method that uses digital
certificates.
Security > RADIUS-TTLS
Enter the Login name of your wireless network in the User
ID field and the password in the Password field. Enter the
Root Certificate in the field or click Browse to browse for it,
then upload it.
EAP Type The authentication method that your network
uses. Select TTLS from the drop-down menu.
User ID Your User ID is the Login name of your wireless
network. Enter the Login name of your wireless network
in the User ID field.
Password This is the password used for your wireless
network. Enter the password in the Password field.
Root Certificate Enter the root certificate you have
installed to authenticate you on your wireless network or
click Browse to browse for it. Click Upload to upload the
certificate.
Click Apply to save your changes. If your page does not
automatically refresh itself, then click Refresh on your
web browser. Click View Log to view a log.
To save your changes, click Apply. Click Cancel to
cancel your changes. Click Help for additional on-screen
information.
Password Tab
The Password screen lets you change the Bridges Password
and restore the factory default settings.
Password
Administrative Password It is strongly recommended
that you change the factory default password of the
Bridge from admin to a new password that you create. All
users who try to access the Bridge’s Web-based Utility will
be prompted for the Bridges Password. The new Password
must not exceed 12 characters in length and must not
include any spaces. Enter the new Password a second time
to confirm it.
NOTE: Any settings you have saved will be lost
if the default settings are restored.
Restore Factory Defaults Click Yes to reset all
configuration settings to their default values. If you do not
want to restore the factory defaults, then keep the default
setting, No.
To save your changes, click Apply. Click Cancel to
cancel your changes. Click Help for additional on-screen
information.
Chapter 3
Configuration using the Web-based Utility
8
Wireless-G Ethernet Bridge
Advanced Settings Tab
Use the Advanced Settings screen to customize advanced
wireless settings and clone a MAC address onto the
Bridge.
Advanced Settings
Wireless
Transmission Rate The default setting is Auto. The range
is from 1 to 54Mbps.The rate of data transmission should
be set depending on the speed of your wireless network.
You can select from a range of transmission speeds, or
you can keep the default setting, Auto, to have the Bridge
automatically use the fastest possible data rate and enable
the Auto-Fallback feature. Auto-Fallback will negotiate the
best possible connection speed between the Bridge and
another wireless-equipped device.
Authentication Type The default setting is Auto. The
choices are Auto, Open, and Shared. This setting allows
the Bridge to authenticate communication with the
wireless devices in your network. With the Shared key
setting, all wireless devices must have the same WEP keys
so that the Bridge and the client can authenticate each
other and start transmitting data. With the Open system
setting, any device can join a network without performing
any security check. Using the Auto setting, the Bridge
will automatically detect whether a wireless device uses
shared key or open system authentication, and then it will
transmit data using the appropriate authentication type.
RTS Threshold This value should remain at its default
setting of 2347. The range is 0-2347 bytes. Should you
encounter inconsistent data flow, only minor modifications
are recommended. If a network packet is smaller than the
preset RTS threshold size, the RTS/CTS mechanism will
not be enabled. The Router sends Request to Send (RTS)
frames to a particular receiving station and negotiates
the sending of a data frame. After receiving an RTS, the
wireless station responds with a Clear to Send (CTS) frame
to acknowledge the right to begin transmission.
Fragmentation Threshold This value should remain at
its default setting of 2346. The range is 256-2346 bytes.
It specifies the maximum size for a packet before data
is fragmented into multiple packets. If you experience
a high packet error rate, you may slightly increase the
Fragmentation Threshold. Setting the Fragmentation
Threshold too low may result in poor network performance.
Only minor modifications of this value are recommended.
MAC Address
Cloning Mode You can clone the MAC address of any
network device onto the Bridge. To disable MAC address
cloning, keep the default setting, Disable. To use the MAC
cloning feature, select Enable.
If you have enabled MAC cloning, then select Auto if you
want to clone the MAC address of the device currently
connected to the Bridge’s LAN port. The Bridge will actively
scan for a new MAC address to be cloned whenever you
disconnect and re-connect the Bridge through its LAN
port. Select Manual if you want to specify a MAC address
in the Enter MAC Address field. This is useful when the
Bridge is connected to multiple devices through a switch
or a hub.
Click Apply to save your changes. If your page does not
automatically refresh itself, then click Refresh on your
web browser. Click Cancel to cancel your changes. Click
Help for additional on-screen information.
Chapter 3
Configuration using the Web-based Utility
9
Wireless-G Ethernet Bridge
Status Tab
The Status screen displays the Bridges current status and
settings. All information is read-only.
Status
Device Name The name you have assigned to the Bridge
is displayed here.
Firmware Version The version number of the Bridges
firmware is displayed here. Firmware updates are posted
at www.linksys.com. Firmware should be upgraded ONLY
if you experience problems with the Bridge. To upgrade
the Bridge’s firmware, use the Help screen.
MAC Address The MAC Address of the Bridge is displayed
here.
LAN Settings
IP Address The Bridge’s IP Address is displayed here.
Subnet Mask The Bridges Subnet Mask is displayed
here.
Gateway The Gateway address for the Bridge is displayed
here.
Statistics
Ethernet TX The number of packets transmitted to the
Ethernet network is displayed here.
Ethernet RX The number of packets received from the
Ethernet network is displayed here.
Wireless TX The number of packets transmitted to the
wireless network is displayed here.
Wireless RX The number of packets received from the
wireless network is displayed here.
Wireless Settings
SSID The Bridge’s SSID is displayed here.
Network Type The Bridge’s mode is displayed here.
Channel The Bridge’s channel setting is displayed here.
Security The status of the Bridges security is displayed
here.
TX Rate The Bridge’s transmission rate is displayed here.
Link Quality The quality of the Bridges connection is
displayed here.
Click Refresh to obtain the most up-to-date settings and
statistics. Click Help for additional on-screen information.
Help Tab
The Help screen offers links to all of the help information
for the Web-based Utilitys screens and the Bridges online
technical support resources (all information is read-only).
You can also upgrade the Bridge’s firmware.
Help
Linksys Website Click the link to visit Linksyss website,
www.linksys.com.
Online manual in PDF format Click the link to view this
User Guide on-screen. It is in Adobe Acrobat Portable
Document File (.pdf) format, so you will need the free
Adobe Acrobat Reader to view the pdf. If you do not have
the Reader, click the Adobe Website link to download it.
Adobe Website
(software for viewing PDF documents)
If
you need to download the Adobe Acrobat Reader to view
the User Guide pdf, then click the this link.
Firmware Upgrade The version number of the Bridge’s
firmware is displayed here. Firmware updates are posted
Chapter 3
Configuration using the Web-based Utility
10
Wireless-G Ethernet Bridge
at www.linksys.com. Firmware should be upgraded ONLY
if you experience problems with the Bridge.
To upgrade the firmware, follow these instructions:
Download the Bridge’s firmware upgrade file from the 1.
Linksys website, www.linksys.com. Then extract the
file.
On the 2. Help screen, click Firmware Upgrade.
The 3. Firmware Upgrade screen will appear. In the field
provided, enter the name of the extracted firmware
upgrade file, or click Browse to locate the file on your
computer.
Firmware Upgrade
After you have selected the appropriate file, click 4.
Upgrade, and follow the on-screen instructions.
Appendix A
Troubleshooting
11
Wireless-G Ethernet Bridge
Appendix A:
Troubleshooting
I can’t connect to the access point.
Open the Web-based Utility. On the Setup tab, perform
the following steps:
Verify that the operating mode is set to Infrastructure
mode.
Make sure that the SSID is the same as the SSID of the
access point.
On the WEP Encryption screen, make sure that all of
the WEP settings are the same as the WEP settings of
the access point.
I want to play head-to-head (ad-hoc) gaming with two
Xboxes, but they won’t communicate.
Perform the following steps:
Make sure both Bridges are set to the same SSID,
network mode (Ad-Hoc), channel setting, and WEP
settings.
Verify that the Bridges are set to different IP
addresses.
You need to enable MAC address cloning on the Bridge
for each Xbox. Follow these instructions:
Open the Web-based Utility for one of the 1.
Bridges.
Click the Advanced tab.2.
Select 3. Enable from the MAC Address Cloning
Mode drop-down menu.
Click the Auto radio button.4.
Click 5. Apply to save your changes. When you
connect the Bridge to its Xbox, the Bridge will
automatically clone the Xbox’s MAC address.
Repeat steps 1-5 for the other Bridge.
I don’t know how to change the Bridge’s IP address.
You have two ways to change the Bridge’s IP address.
Open the Web-based Utility. On the Setup screen,
click the Static IP Address radio button, and
change the IP address there.
If you encounter problems, power the Bridge off
and on again, or push the Reset button. Then try
to change the IP address again.
The Bridge-enabled PC won’t communicate with a
wireless-enabled PC or printer.
Perform the following steps:
Check that the wireless-enabled PC or printer is on the
same wireless network as the PC using the Bridge.
Make sure that the SSID and network mode are the
same for all devices connected to the same wireless
network.
If the wireless LAN settings are okay, make sure that all
the devices are on the same IP network.
The Web-based Utility won’t open.
Make sure you correctly entered the Bridges IP address
in the Address field of your web browser. If you are not
sure what the Bridge’s IP address is, then run the Setup
Wizard. Follow the on-screen instructions until you see
a screen that lists all the Wireless-G Ethernet Bridges on
your network. Select the Bridge you want to access, and
its IP address will appear in the Status box. Enter this IP
address in your web browser’s Address field.
The Web-based Utility does not recognize my password.
The password is case-sensitive. Make sure that you are
using the correct case(s) when entering the password. If
you forget your password, you can push the Bridges Reset
button. This will reset the password to the default setting;
however, all other Bridge settings will be reset to the
factory defaults as well. To use the default setting, enter
admin in the Password field.
After I make changes through the Web-based Utility, the
new settings aren’t displayed on-screen.
Click Refresh in your web browser. If the new settings
aren’t displayed, then unplug the power adapter from
the Bridge. Plug the power adapter back in, and then click
Refresh again.
WEB: If your questions are not addressed here,
refer to the Linksys website, www.linksys.com
Appendix B
Specifications
12
Wireless-G Ethernet Bridge
Appendix B:
Specifications
Model WET54G
Standards IEEE 802.11g, IEEE 802.11b,
IEEE 802.3, IEEE 802.3u
Ports One 10/100 Auto-Cross
Over (MDI/MDI-X) Port,
Power Port
Buttons Reset
LEDs Power, Ethernet,
Wireless-G
Cabling Type Category 5 or better
Transmit Power
16 ± 1 dBm @ 11Mbps CCK
12 ± 1 dBm @ 54Mbps OFDM
Security Features WEP Encryption, WPA
WEP Key Bits 64/128-bit
Protocols 802.11b:
CCK (11Mbps),
CCK (5,5Mbps),
DQPSK (2Mbps),
DBPSK (1Mbps)
802.11g:
OFDM (54Mbps)
Environmental
Dimensions 4.96" x 1.06" x 4.21"
(126 x 27 x 107 mm)
Weight 8.50 oz (240 g)
Power 5V DC
Certification FCC, CE, ICES-003
Operating Temp. 32 to 104ºF (0 to 40ºC)
Storage Temp. -4 to 158ºF (-20 to 70ºC)
Operating Humidity 10 to 85% Noncondensing
Storage Humidity 5 to 90% Noncondensing
Specifications are subject to change without notice.
Appendix C
Warranty Information
13
Wireless-G Ethernet Bridge
Appendix C:
Warranty Information
Limited Warranty
Linksys warrants this Linksys hardware product against
defects in materials and workmanship under normal
use for the Warranty Period, which begins on the date of
purchase by the original end-user purchaser and lasts for
the period specified below:
One (1) year for new product
Ninety (90) days for refurbished product
This limited warranty is non-transferable and extends only
to the original end-user purchaser. Your exclusive remedy
and Linksys’ entire liability under this limited warranty
will be for Linksys, at its option, to (a) repair the product
with new or refurbished parts, (b) replace the product
with a reasonably available equivalent new or refurbished
Linksys product, or (c) refund the purchase price of the
product less any rebates. Any repaired or replacement
products will be warranted for the remainder of the
original Warranty Period or thirty (30) days, whichever is
longer. All products and parts that are replaced become
the property of Linksys.
Exclusions and Limitations
This limited warranty does not apply if: (a) the product
assembly seal has been removed or damaged, (b) the
product has been altered or modified, except by Linksys, (c)
the product damage was caused by use with non-Linksys
products, (d) the product has not been installed, operated,
repaired, or maintained in accordance with instructions
supplied by Linksys, (e) the product has been subjected to
abnormal physical or electrical stress, misuse, negligence,
or accident, (f) the serial number on the Product has been
altered, defaced, or removed, or (g) the product is supplied
or licensed for beta, evaluation, testing or demonstration
purposes for which Linksys does not charge a purchase
price or license fee.
ALL SOFTWARE PROVIDED BY LINKSYS WITH THE
PRODUCT, WHETHER FACTORY LOADED ON THE
PRODUCT OR CONTAINED ON MEDIA ACCOMPANYING
THE PRODUCT, IS PROVIDED AS IS” WITHOUT WARRANTY
OF ANY KIND. Without limiting the foregoing, Linksys does
not warrant that the operation of the product or software
will be uninterrupted or error free. Also, due to the
continual development of new techniques for intruding
upon and attacking networks, Linksys does not warrant
that the product, software or any equipment, system or
network on which the product or software is used will be
free of vulnerability to intrusion or attack. The product
may include or be bundled with third party software or
service offerings. This limited warranty shall not apply to
such third party software or service offerings. This limited
warranty does not guarantee any continued availability
of a third party’s service for which this products use or
operation may require.
TO THE EXTENT NOT PROHIBITED BY LAW, ALL IMPLIED
WARRANTIES AND CONDITIONS OF MERCHANTABILITY,
SATISFACTORY QUALITY OR FITNESS FOR A PARTICULAR
PURPOSE ARE LIMITED TO THE DURATION OF THE
WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, ANY IMPLIED
WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED.
Some jurisdictions do not allow limitations on how long
an implied warranty lasts, so the above limitation may not
apply to you. This limited warranty gives you specific legal
rights, and you may also have other rights which vary by
jurisdiction.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT
WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE
OR PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL,
INCIDENTAL OR PUNITIVE DAMAGES, REGARDLESS OF THE
THEORY OF LIABILITY (INCLUDING NEGLIGENCE), ARISING
OUT OF OR RELATED TO THE USE OF OR INABILITY TO
USE THE PRODUCT (INCLUDING ANY SOFTWARE), EVEN
IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. IN NO EVENT WILL LINKSYS’ LIABILITY
EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.
The foregoing limitations will apply even if any warranty
or remedy provided under this limited warranty fails of
its essential purpose. Some jurisdictions do not allow
the exclusion or limitation of incidental or consequential
damages, so the above limitation or exclusion may not
apply to you.
Obtaining Warranty Service
If you have a question about your product or experience a
problem with it, please go to www.linksys.com/support
where you will find a variety of online support tools and
information to assist you with your product. If the product
proves defective during the Warranty Period, contact
Linksys Technical Support for instructions on how to
obtain warranty service. The telephone number for Linksys
Technical Support in your area can be found in the product
User Guide and at www.linksys.com. Have your product
serial number and proof of purchase on hand when calling.
A DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED
TO PROCESS WARRANTY CLAIMS. If you are requested to
return your product, you will be given a Return Materials
Authorization (RMA) number. You are responsible for
properly packaging and shipping your product to Linksys
at your cost and risk. You must include the RMA number
and a copy of your dated proof of original purchase when
returning your product. Products received without a RMA
number and dated proof of original purchase will be
Appendix C
Warranty Information
14
Wireless-G Ethernet Bridge
rejected. Do not include any other items with the product
you are returning to Linksys. Defective product covered
by this limited warranty will be repaired or replaced and
returned to you without charge. Customers outside of
the United States of America and Canada are responsible
for all shipping and handling charges, custom duties,
VAT and other associated taxes and charges. Repairs or
replacements not covered under this limited warranty will
be subject to charge at Linksys then-current rates.
Technical Support
This limited warranty is neither a service nor a support
contract. Information about Linksys’ current technical
support offerings and policies (including any fees for
support services) can be found at:
www.linksys.com/support.
This limited warranty is governed by the laws of the
jurisdiction in which the Product was purchased by you.
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine,
CA 92623.
Appendix D
Regulatory Information
15
Wireless-G Ethernet Bridge
Appendix D:
Regulatory Information
FCC Statement
This device complies with Part 15 of the FCC Rules.
Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this
device must accept any interference received, including
interference that may cause undesired operation.
This product has been tested and complies with the
specifications for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in
a residential installation. This equipment generates,
uses, and can radiate radio frequency energy and, if not
installed and used according to the instructions, may
cause harmful interference to radio communications.
However, there is no guarantee that interference will not
occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception,
which is found by turning the equipment off and on, the
user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna
Increase the separation between the equipment or
devices
Connect the equipment to an outlet other than the
receivers
Consult a dealer or an experienced radio/TV technician
for assistance
FCC Caution: Any changes or modifications not expressly
approved by the party responsible for compliance could
void the user’s authority to operate this equipment.
FCC Radiation Exposure Statement
This equipment complies with FCC radiation exposure
limits set forth for an uncontrolled environment. This
equipment should be installed and operated with
minimum distance 20cm between the radiator and your
body.
This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter. IEEE
802.11b or 802.11g operation of this product in the USA is
firmware-limited to channels 1 through 11.
Safety Notices
Caution: To reduce the risk of fire, use only No.26 AWG
or larger telecommunication line cord.
Do not use this product near water, for example, in a
wet basement or near a swimming pool.
Avoid using this product during an electrical storm.
There may be a remote risk of electric shock from
lightning.
WARNING: This product contains lead, known
to the State of California to cause cancer, and
birth defects or other reproductive harm. Wash
hands after handling.
Industry Canada Statement
This Class B digital apparatus complies with Canadian
ICES-003 and RSS210.
Operation is subject to the following two conditions:
This device may not cause interference and1.
This device must accept any interference, including 2.
interference that may cause undesired operation of the
device. This device has been designed to operate with
an antenna having a maximum gain of 2dBi. Antenna
having a higher gain is strictly prohibited per regulations
of Industry Canada. The required antenna impedance
is 50 ohms.
To reduce potential radio interference to other users,
the antenna type and its gain should be so chosen
that the EIRP is not more than required for successful
communication.
Industry Canada Radiation Exposure Statement:
This equipment complies with IC radiation exposure limits
set forth for an uncontrolled environment. This equipment
should be installed and operated with minimum distance
20cm between the radiator & your body.
This transmitter must not be co-located or operating in
conjunction with any other antenna or transmitter.
Appendix D
Regulatory Information
17
Wireless-G Ethernet Bridge
User Information for Consumer Products
Covered by EU Directive 2002/96/EC on
Waste Electric and Electronic Equipment
(WEEE)
This document contains important information for users
with regards to the proper disposal and recycling of
Linksys products. Consumers are required to comply with
this notice for all electronic products bearing the following
symbol:
English - Environmental Information for Customers in
the European Union
European Directive 2002/96/EC requires that the equipment
bearing this symbol on the product and/or its packaging must
not be disposed of with unsorted municipal waste. The symbol
indicates that this product should be disposed of separately
from regular household waste streams. It is your responsibility to
dispose of this and other electric and electronic equipment via
designated collection facilities appointed by the government or
local authorities. Correct disposal and recycling will help prevent
potential negative consequences to the environment and
human health. For more detailed information about the disposal
of your old equipment, please contact your local authorities,
waste disposal service, or the shop where you purchased the
product.
Български (Bulgarian) - Информация относно
опазването на околната среда за потребители в
Европейския съюз
Европейска директива 2002/96/EC изисква уредите, носещи
този символ върху изделието и/или опаковката му, да не
се изхвърля т с несортирани битови отпадъци. Символът
обозначава, че изделието трябва да се изхвърля отделно от
сметосъбирането на обикновените битови отпадъци. Ваша
е отговорността този и другите електрически и електронни
уреди да се изхвърлят в предварително определени от
държавните или общински органи специализирани пунктове
за събиране. Правилното изхвърляне и рециклиране
ще спомогнат да се предотвратят евентуални вредни за
околната среда и здравето на населението последствия. За
по-подробна информация относно изхвърлянето на вашите
стари уреди се обърнете към местните власти, службите за
сметосъбиране или магазина, от който сте закупили уреда.
Čeština (Czech) - Informace o ochraně životního
prostředí pro zákazníky v zemích Evropské unie
Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené
tímto symbolem na produktu anebo na obalu bylo likvidováno
s netříděným komunálním odpadem. Tento symbol udává,
že daný produkt musí být likvidován odděleně od běžného
komunálního odpadu. Odpovídáte za likvidaci tohoto produktu
a dalších elektrických a elektronických zařízení prostřednictvím
určených sběrných míst stanovených vládou nebo místními
úřady. Správná likvidace a recyklace pomáhá předcházet
potenciálním negativním dopadům na životní prostředí a lidské
zdraví. Podrobnější informace o likvidaci starého vybavení si
laskavě vyžádejte od místních úřadů, podniku zabývajícího se
likvidací komunálních odpadů nebo obchodu, kde jste produkt
zakoupili.
Dansk (Danish) - Miljøinformation for kunder i EU
EU-direktiv 2002/96/EF kræver, at udstyr der bærer dette symbol
produktet og/eller emballagen ikke bortskaffes som
usorteret kommunalt affald. Symbolet betyder, at dette produkt
skal bortskaffes adskilt fra det almindelige husholdningsaffald.
Det er dit ansvar at bortskaffe dette og andet elektrisk og
elektronisk udstyr via bestemte indsamlingssteder udpeget
af staten eller de lokale myndigheder. Korrekt bortskaffelse
og genvinding vil hjælpe med til at undgå mulige skader for
miljøet og menneskers sundhed. Kontakt venligst de lokale
myndigheder, renovationstjenesten eller den butik, hvor du
har købt produktet, angående mere detaljeret information om
bortskaffelse af dit gamle udstyr.
Deutsch (German) - Umweltinformation für Kunden
innerhalb der Europäischen Union
Die Europäische Richtlinie 2002/96/EC verlangt, dass technische
Ausrüstung, die direkt am Gerät und/oder an der Verpackung mit
diesem Symbol versehen ist , nicht zusammen mit unsortiertem
Gemeindeabfall entsorgt werden darf. Das Symbol weist darauf
hin, dass das Produkt von regulärem Haushaltmüll getrennt
entsorgt werden sollte. Es liegt in Ihrer Verantwortung, dieses
Gerät und andere elektrische und elektronische Geräte über
die dafür zuständigen und von der Regierung oder örtlichen
Behörden dazu bestimmten Sammelstellen zu entsorgen.
Ordnungsgemäßes Entsorgen und Recyceln trägt dazu bei,
potentielle negative Folgen für Umwelt und die menschliche
Gesundheit zu vermeiden. Wenn Sie weitere Informationen zur
Entsorgung Ihrer Altgeräte benötigen, wenden Sie sich bitte an
die örtlichen Behörden oder städtischen Entsorgungsdienste
oder an den Händler, bei dem Sie das Produkt erworben haben.
21
Appendix E
Software End User License Agreement
Wireless-G Ethernet Bridge
Appendix E: Software End
User License Agreement
Cisco Products
This product from Cisco Systems, Inc. or its subsidiary
licensing the Software instead of Cisco Systems, Inc.
(“Cisco”) contains software (including firmware) originating
from Cisco and its suppliers and may also contain software
from the open source community.
Any software originating from Cisco and its suppliers is
licensed under the Cisco Software License Agreement
contained at Schedule 1 below. You may also be prompted
to review and accept the Cisco Software License Agreement
upon installation of the software. Separate terms and
features of Network Magic, a Cisco Software product, are
set forth in Schedule 2 below.
Any software from the open source community is licensed
under the specific license terms applicable to that software
made available by Cisco at www.linksysbycisco.com/gpl
or as provided for in Schedule 3 below. By using the Software,
you acknowledge that you have reviewed such license
terms and that you agree to be bound by the terms of
such licenses. Where such specific license terms entitle
you to the source code of such software, that source
code is available upon request at cost from Cisco for
at least three years from the purchase date of this
product and may also be available for download from
www.linksysbycisco.com/gpl. For detailed license terms
and additional information on open source software in
Cisco products please look at the Cisco public web site at:
www.linksysbycisco.com/gpl/ or Schedule 3 below as
applicable. If you would like a copy of the GPL or certain
other open source code in this Software on a CD, Cisco will
mail to you a CD with such code for $9.99 plus the cost of
shipping, upon request.
THIS SOFTWARE END USER LICENSE AGREEMENT IS
A LEGAL AGREEMENT BETWEEN YOU AND CISCO.
READ IT CAREFULLY BEFORE INSTALLING AND USING
THE SOFTWARE. IT PROVIDES A LICENSE TO USE THE
SOFTWARE AND CONTAINS WARRANTY INFORMATION
AND LIABILITY DISCLAIMERS. BY CHECKING THE “I
ACCEPT BOX, DOWNLOADING, INSTALLING OR USING THE
SOFTWARE, OR USING THE PRODUCT CONTAINING THE
SOFTWARE, YOU ARE CONFIRMING YOUR ACCEPTANCE
OF THE SOFTWARE AND CONSENTING TO BE BOUND
BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF
THESE TERMS, THEN DO NOT CLICK ON THE “I ACCEPT”
BUTTON AND DO NOT DOWNLOAD, INSTALL OR USE THE
SOFTWARE. YOU MAY RETURN UNUSED SOFTWARE (OR,
IF THE SOFTWARE IS SUPPLIED AS PART OF ANOTHER
PRODUCT, THE UNUSED PRODUCT) FOR A FULL REFUND
UP TO 30 DAYS AFTER ORIGINAL PURCHASE, SUBJECT TO
THE RETURN PROCESS AND POLICIES OF THE PARTY FROM
WHICH YOU PURCHASED SUCH PRODUCT OR SOFTWARE.
IN THE EVENT THAT YOU HAVE ELECTED TO OBTAIN A
SUBSCRIPTION LICENSE, AS INDICATED IN YOUR ORDER,
YOU ADDITIONALLY AGREE TO BE BOUND BY THE “TERMS
OF SERVICE” SET FORTH IN SCHEDULE 2 IF APPLICABLE.
Software Licenses
The software licenses applicable to software
from Cisco are made available at the Cisco public
web site at: www.linksysbycisco.com and
www.linksysbycisco.com/gpl/ respectively. For your
convenience of reference, a copy of the Cisco Software
License Agreement and the main open source code
licenses used by Cisco in its products are contained in the
Schedules below.
Schedule 1
Cisco Software License Agreement
License. Subject to the terms and conditions of this
Agreement, Cisco grants the original end user purchaser of
the Software a nonexclusive license to (i) use the Software
solely as embedded in, as a stand-alone application or
(where authorized in the applicable documentation) for
communication with such product, each solely at Cisco’s
discretion; (ii) if the Software is purchased separately
from any Cisco Product, install the Software on personal
computers within a single household or business
location according to the maximum number of licenses
you have purchased; and (iii) make one copy of the
Software in machine-readable form and one copy of the
Documentation, solely for backup purposes. This license
may not be sublicensed, and is not transferable except
to a person or entity to which you transfer ownership of
the complete Cisco product containing the Software or
complete Software product, provided you permanently
transfer all rights under this Agreement and do not retain
any full or partial copies of the Software, and the recipient
agrees to the terms of this Agreement.
“Software” includes, and this Agreement will apply to
(a) the software of Cisco or its suppliers purchased
separately or provided in or with the applicable Cisco
product, and (b) any upgrades, updates, bug fixes or
modified versions (“Upgrades”) or backup copies of
the Software supplied to you by Cisco or an authorized
reseller (whether or not for a fee), provided you already
hold a valid license to the original software and have paid
any applicable fee for the Upgrade.
“Documentation means all documentation and other
related materials supplied by Cisco to you pursuant to this
Agreement.
License Restrictions. Other than as set forth in this
Agreement, you may not (i) make or distribute copies
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37

Cisco WET54Gv2 User manual

Category
Bridges & repeaters
Type
User manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI