Wireless-G Ethernet Bridge TLS TLS is a mutual authentication method that uses digital certificates.Select TLS from the EAP Type drop-dow n menu. Enter the Login name of your w ireless network in the User ID field. Enter the User Certificate and Root Certificate in the fields or click the Brow se button to brow se for it, then upload it. • EAP Type - The authentication method that your network uses. Select TLS from the drop-dow n menu. • User ID -Your User ID is the Login name of your w ireless network.
Wireless-G Ethernet Bridge TTLS TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type dropdow n menu. Enter the Login name of your w ireless netw ork in the User ID field and the password in the Password field. Enter the Root Certificate in the field or click the Brow se button to brow se for it, then upload it. • EAP Type - The authentication method that your network uses. Select TTLS from the drop-dow n menu.
Wireless-G Ethernet Bridge Password The Password screen, show n in Figure 7-11, lets you change the Bridge’s Password and restore the factory default settings. • Administrative Password - It is strongly recommended that you change the factory default password of the Bridge from admin to a new passw ord that you create. All users w ho try to access the Bridge’s Web-based Utility w ill be prompted for the Bridge’s Password.
Wireless-G Ethernet Bridge w hether a w ireless device uses shared key or open system authentication, and then it w ill transmit data using the appropriate authentication type. • RTS Threshold - This value should remain at its default setting of 2347 . The range is 0-2347 bytes. Should you encounter inconsistent data flow, only minor modifications are recommended. If a netw ork packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism w ill not be enabled.
Wireless-G Ethernet Bridge Status The Status screen displayed the Bridge’s current status and settings. All information is read-only. • Device Name - The name you have assigned to the Bridge is displayed here. • Firmware Version - The version number of the Bridge’s firmware is displayed here. Firmware updates are posted at w w w.linksys.com. Firmware should be upgraded ONLY if you experience problems w ith the Bridge. To upgrade the Bridge’s firmware, use the Help screen.
Wireless-G Ethernet Bridge • Link Quality - The quality of the Bridge’s connection is displayed here. Click the Refresh button to obtain the most up-to-date settings and statistics. Click the Help button for additional on-screen information. Help The Help screen offers links to all of the help information for the Web-based Utility’s screens and the Bridge’s online technical support resources (all information is read-only). You can also upgrade the Bridge’s firmware.(See Figure 7-14.
Wireless-G Ethernet Bridge Appendix A: Troubleshooting This appendix consists of two parts: “ Common Problems and Solutions” and “ Frequently Asked Questions.” This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-G Ethernet Bridge. Read the description below to solve your problems. If you can't find an answ er here, check the Linksys w ebsite at www.linksys.com. Common Problems and Solutions 1. I can’t connect to the access point.
Wireless-G Ethernet Bridge 4. The Bridge-enabled PC won’t communicate with a wireless-enabled PC or printer. Perform the follow ing steps: • Check that the w ireless-enabled PC or printer is on the same w ireless network as the PC using the Bridge. • Make sure that the SSID and network mode are the same for all devices connected to the same w ireless network. • If the w ireless LAN settings are okay, make sure that all the devices are on the same IP network. 5. The Web-based Utility won’t open.
Wireless-G Ethernet Bridge Can I run an application from a remote computer over the wireless network? This w ill depend on w hether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network. Can I play multiplayer games with other users of the wireless network? Yes, as long as the game supports multiple players over a LAN. Refer to the game’s user guide for more information.
Wireless-G Ethernet Bridge What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandw idth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldw ide. This presents a truly revolutionary opportunity to place convenient high speed w ireless capabilities in the hands of users around the globe.
Wireless-G Ethernet Bridge Appendix B: Wireless Security Linksys wants to make w ireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the follow ing in mind w henever you are setting up or using your w ireless network.
Wireless-G Ethernet Bridge SSID. There are several things to keep in mind about the SSID: 1. Disable Broadcast 2. Make it unique 3. Change it often Most w ireless networking devices w ill give you the option of broadcasting the SSID. While this option may be more convenient, it allow s anyone to log into your w ireless network. This includes hackers. So, don’t broadcast the SSID. Wireless networking products come w ith a default SSID set by the factory. (The Linksys default SSID is “ linksys” .
Wireless-G Ethernet Bridge WPA Pre-Shared Key. If you do not have a RADIUS server, Select the type of algorithm, TKIP, and enter a password in the Pre-Shared key field of 8-64 characters, and enter a Group Key Renewal period time betw een 0 and 99,999 seconds, w hich instructs the Router or other device how often it should change the encryption keys. RADIUS. WEP used in coordination w ith a RADIUS server. (This should only be used w hen a RADIUS server is connected to the Router or other device.
Wireless-G Ethernet Bridge Appendix C: Upgrading Firmware You can use the Bridge’s Web-based Utility to upgrade the firmware; how ever, firmware should be upgraded ONLY if you experience problems w ith the Bridge. NOTE: If you upgrade the Bridge’s firmware, you may lose its configuration settings. To upgrade the Bridge’s firmware, follow these instructions: 1. Dow nload the Bridge’s firmware upgrade file from the Linksys w ebsite, w w w.linksys.com. 2. Extract the file on your computer. 3.
Wireless-G Ethernet Bridge Appendix D: Windows Help Almost all Linksys w ireless products require Microsoft Window s. Window s is the most used operating system in the world and comes w ith many features that help make networking easier. These features can be accessed through Window s Help and are described in this appendix. TCP/IP Before a computer can communicate w ith the Bridge, TCP/IP must be enabled. TCP/IP is a set of instructions, or protocol, all PCs follow to communicate over a netw ork.
Wireless-G Ethernet Bridge Appendix E: Glossary 802.11a - An IEEE w ireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE w ireless netw orking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz. 802.11g - An IEEE w ireless netw orking standard that specifies a maximum data transfer rate of 54Mbps, an operating frequency of 2.4GHz, and backward compatibility w ith 802.
Wireless-G Ethernet Bridge Buffer - A block of memory that temporarily holds data to be worked on later w hen a device is currently too busy to accept the data. Cable Modem - A device that connects a computer to the cable television network, w hich in turn connects to the Internet. CSMA/ CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent data loss in a network.
Wireless-G Ethernet Bridge Dynamic IP Address - A temporary IP address assigned by a DHCP server. Encryption - Encoding data to prevent it from being read by unauthorized people. Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium. Finger - A program that tells you the name associated w ith an e-mail address. Firewall - Security measures that protect the resources of a local network from intruders. Firmw are - 1.
Wireless-G Ethernet Bridge IPCONFIG - A Window s 2000 and XP utility that displays the IP address for a particular networking device. IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer. ISM band - Radio band used in w ireless networking transmissions. ISP (Internet Service Provider) - A company that provides access to the Internet. LAN (Local Area Network) - The computers and networking products that make up the network in your home or office.
Wireless-G Ethernet Bridge PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication (username and passw ord) in addition to data transport. PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allow s the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe. Preamble - Part of the w ireless signal that synchronizes network traffic.
Wireless-G Ethernet Bridge TCP/ IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires acknow ledgement from the recipient of data sent. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that uses UDP and has no directory or password capability. Throughput - The amount of data moved successfully from one node to another in a given time period.
Wireless-G Ethernet Bridge Appendix F: Specifications Model WET54GS5 Standards IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u Ports One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Buttons Reset Button Cabling Type Category 5 or better LEDs Power, Ethernet, Wireless-G Transmit Power 16 ± 1 dBm @ 11Mbps CCK 12 ± 1 dBm @ 54Mbps OFDM Security Feature WEP Encryption, WPA, RADIUS WEP Key Bits 64/128-bit Protocols 802.11b: CCK (11Mbps), CCK (5.
Wireless-G Ethernet Bridge Storage Temp.
Wireless-G Ethernet Bridge Appendix G: Warranty Information LIMITED WARRANTY Linksys warrants to You that, for a period of three years (the “ Warranty Period” ), your Linksys Product w ill be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty w ill be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
Wireless-G Ethernet Bridge Appendix H: Regulatory Information FCC STATEMENT This product has been tested and complies w ith the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Wireless-G Ethernet Bridge EN 300-328-1, EN 300-328-2 Technical requirements for Radio equipment. Caution: This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to certain frequencies and/or may require a license for operation. Contact local Authority for procedure to follow.
Wireless-G Ethernet Bridge Appendix I: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or ftp.linksys.