USER GUIDE BUSINESS SERIES Wireless-G Business Ethernet Bridge Model: WET200
About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product. WARNING: This exclamation point indicates that there is a caution or warning and it is something that could damage your property or product.
Table of Contents Chapter 1: Introduction 1 Chapter 2: Planning Your Wireless Network 2 Network Topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Network Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Example of WET200 in Infrastructure Mode . . . . . . . . . . . . . . . . . . . . . .
Table of Contents Switch > MAC Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Administration > Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Administration > Web Access . . . . . . . . .
Chapter 1 Introduction Chapter 1: Introduction Thank you for choosing the Wireless-G Business Ethernet Bridge. The Linksys WET200 Wireless Bridge seamlessly bridges separate Ethernet networks together wirelessly and is ideal for small businesses with offices and resources that are in different office suites of a building or a closely adjacent building.
Chapter 2 Chapter 2: Planning Your Wireless Network Planning Your Wireless Network Example of WET200 in Infrastructure Mode Network Topology A wireless network is a group of computers, each equipped with one or more wireless adapters. Computers in a wireless network must be configured to share the same radio channel to talk to each other. Several PCs equipped with wireless cards or adapters can communicate with each other to form an ad-hoc network without the use of an access point.
Chapter 2 Planning Your Wireless Network Example of WET200 in Ad-Hoc Mode Example of WET200 in Ad-Hoc Mode The WET200 can also be used to quickly set up a temporary network, as shown above. The diagram shows three wired networks, Office One, Office Two, and Office Three, each with a direct connection to the other wired networks via an Ad-Hoc network connection. The Bridge in Office One is connected to a Linksys switch that provides power to the Bridge.
Product Overview Chapter 3 Chapter 3: Product Overview Back Panel The reset button, the Ethernet ports, and the power port are located on the back panel of the Bridge. Front Panel The Bridge’s LEDs, where information about network activity is displayed, are located on the front panel. Back Panel RESET Press and hold the Reset button for approximately ten seconds to reset the Bridge to the factory default settings. Front Panel POWER (Green) Lights up when the Bridge is powered on.
Installation Chapter 4 Chapter 4: Installation Power Adapter 1. Connect one end of an Ethernet network cable to the LAN port on your PC, then connect the other end to Ethernet port 1, 2, 3, 4, or 5 on the Bridge. Overview This chapter explains how to place and connect the Bridge. Depending on your application, you might want to set up the device first before mounting the device. Refer to “Chapter 6: Advanced Configuration”.
Installation Chapter 4 Bridge, and push the stand upward until it snaps into place. Repeat this step with the other stand. Large Prongs Stand Installation Proceed to “Chapter 6: Advanced Configuration,” for directions on how to set up the Bridge. Wall-Mount Option 1. On the Bridge’s back panel are two crisscross wallmount slots. 2-15/16" Wall-Mount Slots on Bridge’s Back Panel 2. Determine where you want to mount the Bridge, and install two screws that are 2-15/16” apart. 3.
Quick Configuration Overview Chapter 5 Chapter 5: Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to be functional right out of the box with the default settings. In order to use the wireless bridge function, however, you must first perform a minimal configuration on the Bridge so that it can find and communicate with the access point. The Bridge can be configured through your web browser with the web‑based utility. This chapter explains how to use the utility.
Chapter 5 Quick Configuration Overview Switch You use the Switch tabs to enter settings that are used by the Bridge’s switching features. Port Management Use this screen to configure the Administrative Status, Flow Control, Link, Duplex, and Speed of the Bridge’s ports. Port Mirroring Configure Port MIrroring on this screen. VLAN This screen lets you configure Port-Based or 802.1Q VLAN settings.
Chapter 6 Advanced Configuration Chapter 6: Advanced Configuration Contact Enter the name of the administrator responsible for the system. Open your web browser, enter http://192.168.1.226 in the Address field, and press the Enter key. IP Address Type Select how the WET200 will obtain its IP address, either Static IP Address (default) or Automatic Configuration-DHCP. Location This field is used for entering a description of where the Bridge is located, such as 3rd floor.
Advanced Configuration Chapter 6 Wireless The Wireless tab contains the following three screens that allow you to configure the Bridge’s wireless interfaces: Basic Settings, Wireless Security, and Advanced Settings. Network Type Keep the default setting, Infrastructure, if you want your wireless Bridge to connect to another wired network through an Access Point. Select Ad-Hoc if you want to connect to another wired network through a second wireless Bridge which is also in Ad-Hoc mode.
Chapter 6 Wireless > Wireless Security The Wireless Security screen allows you to configure security on your wireless network. Wireless > Wireless Security - Security Disabled Security Mode Enter the security configuration to match the wireless Access Point that this bridge will connect to. To disable security, keep the default setting, Disabled. To enable security, select the desired type of security: WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise.
Advanced Configuration Chapter 6 WPA2-Personal EAP-TLS Use the WPA2 Personal screen to configure WPA2 Personal encryption for the Bridge. EAP-TLS uses a Certificate file for authentication. The Login Name and Private Key Password are used to decrypt the certificate file. Encryption Select either TKIP (default) or AES encryption. Login Name Enter your login name for the RADIUS server. Private Key Password Enter your password.
Advanced Configuration Chapter 6 EAP-TLS EAP-TLS uses a Certificate file for authentication. The Login Name and Private Key Password are used to decrypt the certificate file. Encryption This is set to AES and cannot be changed. Login Name Enter your login name for the RADIUS server. Private Key Password Enter your password. Certificate Enter the name of your certificate file or click Browse to locate it. Click Import to load and decode the certificate file.
Advanced Configuration Chapter 6 You can configure the Administrative Status and Flow Control of the five Ethernet ports. The link speed and duplex settings are done automatically through auto-negotiation. Flow control should be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded. The flow control feature is based on IEEE 802.
Chapter 6 802.1Q In 802.1Q-based VLAN mode, tags are inserted into the data packets to distinguish between different VLANs. Advanced Configuration The following summarizes 802.1Q VLAN operation when a packet is received on a port: 1. If the packet has an 802.1Q tag, then go to step 3. If it does not have an 802.1Q tag, then continue to step 2. 2. If the Acceptable Frame Type field is set to Tagged Only, then the packet is dropped. Otherwise, an 802.1Q tag with the default VLAN ID is inserted. 3.
Chapter 6 Advanced Configuration Switch > MAC Based ACL Port-Based In port-based VLAN mode, the wireless bridge uses a portbased VLAN map to limit the traffic between the ports. A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and webbased utility access). NOTE: The default port-based VLAN settings consist of connections between port 6 and each of the five Ethernet ports.
Chapter 6 Switch > QoS Advanced Configuration Switch > Spanning Tree This screen allows you to configure the Spanning Tree Protocol (STP) settings for the switch. STP can be used to detect and disable network loops, and to provide backup links between switches, bridges or routers.
Advanced Configuration Chapter 6 Switch > MAC Table Administration Use this screen to configure the MAC address table for the switch. The MAC table is used to switch frames to the correct ports. Before the MAC table is populated, a frame is broadcast to all ports. Learning mode is enabled, then the MAC table is populated automatically.
Chapter 6 Web HTTPS Access If you want to enable https access, select Enabled. The default setting is Disabled. Advanced Configuration Administration > Configuration Management Click Apply to apply your changes, or click Cancel to cancel your changes. Administration > SNMP This screen is used to configure Simple Network Management Protocol (SNMP), a popular network monitoring and management protocol.
Advanced Configuration Chapter 6 Administration > Firmware Upgrade System Status The System Status tab displays the Bridge’s current status and configuration information. These screens only display information and cannot be used to change any settings. System Status > System Status This is the System Status tab’s default screen. It displays basic status information for the Bridge.
Chapter 6 Advanced Configuration SSID Name of the wireless network. Network Type Wireless network type (Infrastructure or Ad-Hoc). Wireless Mode Wireless network mode (disabled, B/G Mixed, etc.). Channel Wireless network channel number. Security Mode Security mode (disabled, WEP, WPAPersonal, etc.) Tx Rate Wireless network transmission rate. Link Quality Quality level of the wireless connection. Click Refresh to display the most current information.
Wireless Security Checklist Appendix A Appendix A: Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Glossary Appendix B Appendix B: Glossary Baud Indicates the number of signaling elements transmitted each second. This glossary contains some basic networking terms you may come across when using this product. Bit A binary digit. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies the method by which user access is granted to the system. Access Point A device that allows wireless-equipped computers and other devices to communicate with a wired network.
Appendix B CoS (Class of Service) The 802.1p priority scheme. CoS provides a method for tagging packets with priority information. A CoS value between 0-7 is added to the Layer II header of packets, where zero is the lowest priority and seven is the highest. DDNS (Dynamic Domain Name System) Allows the hosting of a website, FTP server, or e-mail server with a fixed domain name (e.g., www.xyz.com) and a dynamic IP address. Default Gateway A device that forwards Internet traffic from your local area network.
Appendix B Glossary MAC (Media Access Control) Address The unique address that a manufacturer assigns to each networking device. RADIUS (Remote Authentication Dial-In User Service) A protocol that uses an authentication server to control network access. Mask A filter that includes or excludes certain values, for example parts of an IP address. RJ-45 (Registered Jack-45) An Ethernet connector that holds up to eight wires.
Appendix B Glossary TCP (Transmission Control Protocol) A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. TCP/IP (Transmission Control Protocol/Internet Protocol) A set of instructions PCs use to communicate over a network. Telnet A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) A version of the TCP/IP FTP protocol that has no directory or password capability.
Specifications Appendix C Appendix C: Specifications Specifications Security Model WET200 Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, IEEE802.3af (Power over Ethernet), 802.1p (QoS Priority), 802.1Q (VLAN), 802.1X (Security Authentication), 802.11i-Ready (Security WPA2), 802.11e-Ready (Wireless QoS) WEP/WPA/WPA2 WEP 64-bit/128-bit, WPA-PSK, WPA2-PSK, WPA-ENT, WPA2-ENT Access Control MAC-Based ACL between wired and wireless interfaces 802.1X IEEE 802.
Appendix D Appendix D: Warranty Information Limited Warranty Linksys warrants to You that, for a period of three years (the "Warranty Period"), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys’ entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates. This limited warranty extends only to the original purchaser.
Regulatory Information Appendix E Appendix E: Regulatory Information Safety Notices FCC Statement •• Do not use this product near water, for example, in a This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. •• Avoid using this product during an electrical storm.
Appendix E Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : 1. il ne doit pas produire de brouillage et 2. il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Le dispositif a été conçu pour fonctionner avec une antenne ayant un gain maximum de 2 dBi.
Appendix E User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Appendix E Regulatory Information Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Français (French) - Informations environnementales pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol , keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Regulatory Information Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Nederlands (Dutch) - Milieu-informatie voor klanten in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių atliekų srauto.
Appendix E Regulatory Information Português (Portuguese) - Informação ambiental para clientes da União Europeia Slovenčina (Slovene) - Okoljske informacije za stranke v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Appendix F Contact Information Appendix F: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.