Linksys Network Card WET11 User Manual

®
A Division of Cisco Systems, Inc.  
2.
4
GHz  
802.11b  
Wireless-B  
Ethernet Bridge  
User Guide  
WIRELESS  
Model No.  
WET11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Table of Contents  
Chapter 1: Introduction  
1
1
2
4
4
4
6
6
7
8
Welcome  
What’s in this Guide?  
Chapter 2: Planning Your Wireless Network  
Network Topology  
Ad-Hoc versus Infrastructure Mode  
Chapter 3: Getting to Know the Wireless-B Ethernet Bridge  
The Back Panel  
The Front Panel  
Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
9
9
Overview  
Setup Wizard  
9
Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use  
13  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
14  
14  
14  
15  
17  
18  
19  
20  
21  
21  
22  
25  
25  
25  
32  
Overview  
Starting the Web-based Utility  
Setup  
Password  
Advanced  
Status  
Help  
Appendix A: Troubleshooting  
Common Problems and Solutions  
Frequently Asked Questions  
Appendix B: Wireless Security  
A Brief Overview  
What Are the Risks?  
Appendix C: Upgrading Firmware  
Appendix D: Windows Help  
Appendix E: Glossary  
33  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix F: Specifications  
40  
42  
43  
46  
Appendix G: Warranty Information  
Appendix H: Regulatory Information  
Appendix I: Contact Information  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
List of Figures  
Figure 2-1: Infrastructure Mode  
Figure 2-2: Ad-Hoc Mode  
4
5
Figure 2-3: Wireless Bridging Using Two Bridges  
Figure 3-1: Back Panel  
5
6
Figure 3-2: Front Panel  
7
Figure 4-1: Connect the Ethernet Network Cable  
Figure 4-2: Connect the Power Adapter  
Figure 5-1: Welcome  
8
8
9
Figure 5-2: Check Connection  
Figure 5-3: List of Bridges  
Figure 5-4: Password  
Figure 5-5: Mode Settings  
Figure 5-6: Wireless Settings  
Figure 5-7: IP Settings  
Figure 5-8: Security Settings  
Figure 5-9: WEP Key  
Figure 5-10: Confirmation  
Figure 5-11: Congratulations  
Figure 7-1: Access the Web-based Utility  
Figure 7-2: Setup Tab  
9
10  
10  
10  
11  
11  
11  
12  
12  
12  
14  
15  
16  
17  
17  
18  
19  
20  
25  
31  
Figure 7-3: Site Survey  
Figure 7-4: WEP Encryption  
Figure 7-5: Password Tab  
Figure 7-6: Advanced Settings Tab  
Figure 7-7: Status Tab  
Figure 7-8: Help Tab  
Figure B-1: Warchalking  
Figure B-2: WEP Encryption  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 1: Introduction  
Welcome  
Thank you for choosing the Wireless-B Ethernet Bridge. The versatile Wireless-B Ethernet Bridge can make any  
wired Ethernet-equipped device a part of your wireless network. At home, use the Wireless-B Ethernet Bridge to  
connect game consoles, set-top boxes, or computers into your wireless network to share your high-speed  
network connection. In the office, convert your Ethernet-wired printer, scanner, camera, notebook or desktop  
into a wireless networked device.  
802.11b: an IEEE wireless networking  
standard that specifies a maximum  
data transfer rate of 11Mbps and an  
operating frequency of 2.4GHz.  
It's completely driver-free, so it works on any platform and under any operating system! Since there are no  
drivers to load, setup is a snap—just plug it into your device and configure the network settings through your  
web browser.  
Ethernet: an IEEE standard network  
protocol that specifies how data is  
placed on and retrieved from a  
common transmission medium.  
You can also use the Wireless-B Ethernet Bridge as a kind of cable-less cable” to connect remote areas  
together. Maybe Shipping is all the way across the warehouse from Receiving. Or maybe you want to set up a  
home office in your detached garage. With a Wireless-B Ethernet Bridge in the garage, and another one (or a  
Wireless Access Point) in the house, you're connected—with no cabling hassle.  
Let the Wireless-B Ethernet Bridge from Linksys open up exciting new possibilities for your wireless network.  
Chapter 1: Introduction  
Welcome  
1
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
What’s in this Guide?  
This user guide covers the steps for setting up and using the Wireless-B Ethernet Bridge.  
Chapter 1: Introduction  
This chapter describes the Wireless-B Ethernet Bridge applications and this user guide.  
Chapter 2: Planning your Wireless Network  
This chapter describes the basics of wireless networking.  
Chapter 3: Getting to Know the Wireless-B Ethernet Bridge  
This chapter describes the physical features of the Bridge.  
Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup  
This chapter instructs you on how to connect the Bridge to your network for setup.  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
This chapter explains how to set up the Bridge using the Setup Wizard.  
Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use  
This chapter explains how to connect the Bridge to a network device so the device can join your wireless  
network.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
This chapter explains how to use the Web-Based Utility to configure the settings on the Bridge.  
Appendix A: Troubleshooting  
This appendix describes some problems and solutions, as well as frequently asked questions, regarding  
installation and use of the Wireless-B Ethernet Bridge.  
Appendix B: Wireless Security  
This appendix explains the risks of wireless networking and some solutions to reduce the risks.  
Appendix C: Upgrading Firmware  
This appendix instructs you on how to upgrade the firmware on the Bridge should you need to do so.  
Appendix D: Glossary  
This appendix gives a brief glossary of terms frequently used in networking.  
Appendix E: Windows Help  
This appendix describes how you can use Windows Help for instructions about networking, such as installing  
the TCP/IP protocol.  
Chapter 1: Introduction  
What’s in this Guide?  
2
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix F: Specifications  
This appendix provides the technical specifications for the Bridge.  
Appendix G: Warranty Information  
This appendix supplies the warranty information for the Bridge.  
Appendix H: Regulatory Information  
This appendix supplies the regulatory information regarding the Bridge.  
Appendix I: Contact Information  
This appendix provides contact information for a variety of Linksys resources, including Technical Support.  
Chapter 1: Introduction  
What’s in this Guide?  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 2: Planning Your Wireless Network  
Network Topology  
A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each  
computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same  
frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the  
same wireless network.  
LAN (Local Area Network): the  
computers and networking products  
that make up your local network.  
SSID: your wireless network’s name.  
Ad-Hoc versus Infrastructure Mode  
Infrastructure: a wireless network  
that is bridged to a wired network via  
an access point.  
Unlike wired networks, wireless networks have two different modes in which they may be set up: infrastructure  
and ad-hoc. An infrastructure configuration is a WLAN and wired LAN communicating to each other through an  
access point. An ad-hoc configuration is wireless-equipped computers communicating directly with each other.  
Choosing between these two modes depends on whether or not the wireless network needs to share data or  
peripherals with a wired network or not.  
If the computers on the wireless network need to be accessible by a wired network or need to share a peripheral,  
such as a printer, with the wired network computers, the wireless network should be set up in Infrastructure  
mode. The basis of Infrastructure mode centers around an access point, which serves as the main point of  
communications in a wireless network (see Figure 2-1). Access points transmit data to PCs equipped with  
wireless network cards, which can roam within a certain radial range of the access point. Multiple access points  
can be arranged to work in succession to extend the roaming range, and can be set up to communicate with your  
Ethernet hardware as well.  
If the wireless network is relatively small and needs to share resources only with the other computers on the  
wireless network, then the Ad-Hoc mode can be used. Ad-Hoc mode allows computers equipped with wireless  
transmitters and receivers to communicate directly with each other, eliminating the need for an access point. The  
drawback of this mode is that in Ad-Hoc mode, wireless-equipped computers are not able to communicate with  
computers on a wired network. And, of course, communication between the wireless-equipped computers is  
limited by the distance and interference directly between them.  
Figure 2-1: Infrastructure Mode  
Figure 2-2 shows a typical scenario of four Wireless-B Ethernet Bridges in ad-hoc mode. Figure 2-3 shows a  
typical wireless bridging scenario using two Wireless-B Ethernet Bridges. Each wireless network is connected to  
a Wireless-B Ethernet Bridge through a switch. A separate notebook computer is equipped with a wireless  
network adapter and can communicate with either wireless network when it is configured with the appropriate  
SSID and channel.  
Ad-hoc: a group of wireless devices  
communicating directly to each other  
(peer-to-peer) without the use of an  
access point.  
Chapter 2: Planning Your Wireless Network  
Network Topology  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at  
www.linksys.com for more information about products that work with the Wireless-B Ethernet Bridge.  
Figure 2-2: Ad-Hoc Mode  
Figure 2-3: Wireless Bridging Using Two Bridges  
Chapter 2: Planning Your Wireless Network  
Ad-Hoc versus Infrastructure Mode  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 3: Getting to Know the Wireless-B Ethernet Bridge  
The Back Panel  
All connections to the Bridge are made through the ports in its back panel, shown in Figure 3-1.  
Figure 3-1: Back Panel  
Important: Resetting the Wireless-B Ethernet  
Bridge will erase all of your settings (WEP  
encryption, wireless settings, etc.) and replace  
them with the factory defaults. Do not reset the  
Wireless-B Ethernet Bridge if you want to retain  
these settings.  
Reset  
X-II  
The Reset button resets the Bridge to its factory default settings.  
The X-II (MDI/MDI-X) slide switch offers a choice between two settings. Use the X setting if you  
are connecting the Bridge to a network adapter. Use the II setting if you are connecting the  
Bridge to a hub or switch.  
LAN  
The LAN port is where you will connect the Ethernet network cable.  
The Power port is where you will connect the power adapter.  
Power  
Chapter 3: Getting to Know the Wireless-B Ethernet Bridge  
The Back Panel  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
The Front Panel  
Network activity with the Bridge is shown on the LEDs, shown in Figure 3-2.  
PWR  
DIAG  
Green. The PWR LED will light up when the Bridge is powered on.  
Green. The DIAG LED will light up when there is a connection error. Re-establish the  
connection to eliminate the error.  
LAN  
Green. The LAN LED will be lit steadily when the Bridge is connected to the wired network. The  
LED will flash when there is wired network traffic.  
WLAN  
Green. The WLAN LED will be lit steadily when the Bridge is connected to the wireless  
network. The LED will flash when there is wireless network traffic.  
Figure 3-2: Front Panel  
Chapter 3: Getting to Know the Wireless-B Ethernet Bridge  
The Front Panel  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 4: Connecting the Wireless-B Ethernet Bridge for  
Setup  
1. Attach the Bridge’s antenna.  
2. Plug the included Ethernet network cable into the LAN port on the back panel of the Bridge, shown in Figure  
4-1.  
3. The X-II (MDI/MDI-X) slide switch offers a choice between two settings. Slide the X-II switch to the X position  
if you are connecting the Bridge to a PCs network adapter. Slide the X-II selection switch to the II position if  
you are connecting the Bridge to a hub or switch.  
4. Plug the other end of the Ethernet network cable into the RJ-45 port of the hub, switch, or PC you wish to use  
Figure 4-1: Connect the Ethernet Network Cable  
to configure the Bridge.  
5. Plug the supplied power adapter into the Power port on the back panel of the Bridge, shown in Figure 4-2.  
Then plug the other end into an electrical outlet.  
Proceed to the next section, Chapter 5: Setting Up the Wireless-B Ethernet Bridge.”  
Figure 4-2: Connect the Power Adapter  
Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
Overview  
Now that you’ve connected the Wireless-B Ethernet Bridge to your wired network, you are ready to set it up. The  
Setup Wizard will guide you through all the necessary steps.  
Setup Wizard  
1. Insert the Setup CD-ROM into your PCs CD-ROM drive. The Setup Utility should run automatically, and the  
screen in Figure 5-1 should appear. If it does not, click the Start button and choose Run. In the field that  
appears, enter D:\setup.exe (if Dis the letter of your CD-ROM drive).  
Setup - Click the Setup button to proceed with the Setup Wizard.  
User Guide - Click the User Guide button to open the PDF file of this User Guide.  
LINKSYS Web - Click the LINKSYS Web button to access the Linksys website using an active Internet  
connection.  
Exit - Click the Exit button to exit the Setup Wizard.  
Figure 5-1: Welcome  
2. Click the Setup button to begin the setup process.  
3. Make sure the Bridge is correctly connected to your wired network (see Figure 5-2). Then click the Next  
button.  
Figure 5-2: Check Connection  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
Overview  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
4. The screen shown in Figure 5-3 displays a list of Wireless-B Ethernet Bridges on your network, along with the  
status information for each Bridge. (If you have only one Bridge on your network, it will be the only one  
displayed.) Select the Bridge you are currently installing by clicking its name in the Selection box. Write down  
the IP address of the Wireless-B Ethernet Bridge, so you can use it to access the Web-based Utility later. Then  
click the Yes button.  
5. For security purposes, you will be asked for your password in order to access the Bridge, as shown in Figure  
5-4. In lowercase letters, enter admin in the Password field (later you can change the password through the  
Web-based Utility). Then click the Enter button.  
6. The screen shown in Figure 5-5 shows a choice of two wireless modes. Click the Infrastructure radio button  
if you want your wireless computers to network with computers on your wired network using a wireless  
access point. Click the Ad-Hoc radio button if you want multiple wireless computers to network directly with  
each other. Do not use the Ad-Hoc mode if you want to network your wireless computers with computers on  
your wired network.  
Figure 5-3: List of Bridges  
In the WB Name field, enter a unique name for the Bridge. Memorable names are helpful, especially if you are  
using multiple bridges on the same network. Click the Next button to continue or the Back button to return to  
the previous screen.  
Figure 5-4: Password  
Figure 5-5: Mode Settings  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
Setup Wizard  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
7. The Wireless Settings screen, shown in Figure 5-6, will now appear. Enter your wireless network’s SSID. If  
you chose Ad-Hoc mode, select the channel at which the network broadcasts its wireless signal. Then click  
the Next button.  
SSID - The SSID is the unique name shared among all devices in a wireless network. The SSID must be  
identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric  
characters, which can be any keyboard character.  
Channel - From the drop-down menu, select the appropriate channel to match your network’s channel setting  
(available for Ad-Hoc mode only). All devices in your wireless network must use the same channel in order to  
function correctly.  
8. The IP Settings screen will appear next, shown in Figure 5-7. If your network has a router or DHCP server  
automatically assigning IP addresses, click the radio button next to Automatically obtain an IP address  
(DHCP). Click the Next button to continue or the Back button to return to the previous screen. Then proceed  
to step 9.  
Figure 5-6: Wireless Settings  
If you need to set a static IP address on the Bridge, click the radio button next to Set IP configuration  
manually to select this option. Enter an IP Address, IP Mask, and Gateway appropriate to your network. You  
must specify an IP address on this screen. If you are unsure about the IP Mask and Gateway, it is better to  
leave these two fields blank. Click the Next button to continue or the Back button to return to the previous  
screen. Then proceed to step 9.  
IP Address - This IP address must be unique to your network.  
IP Mask - The Bridges IP Mask (also known as Subnet Mask) must be the same as your wired network’s  
Subnet Mask.  
Figure 5-7: IP Settings  
Gateway - Enter the IP address of your network’s Gateway (usually this is the router’s IP address).  
9. The Security Settings screen, shown in Figure 5-8, appears next. Enable or disable Wired Equivalent Privacy  
(WEP) encryption for your wireless network. If you enable WEP, select the level of WEP encryption, and then  
enter a Passphrase. (If you want to enter a WEP key manually, then click the Next button.) If you want to  
disable WEP encryption, keep the default, Disabled. Click the Next button to continue.  
WEP (Disabled/64-bit WEP/128-bit WEP) - In order to utilize WEP encryption, select 64-bit or 128-bit WEP  
from the drop-down menu. Then enter a Passphrase. (If you want to enter a WEP key manually, then click the  
Next button.) If you do not want to use WEP encryption, keep the default setting, Disabled.  
Passphrase - Instead of manually entering a WEP key, you can enter a Passphrase, so a WEP key will be  
automatically generated after you click the Next button. The Passphrase is case-sensitive and should have 16  
Figure 5-8: Security Settings  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
Setup Wizard  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
or fewer alphanumeric characters. It must match the passphrase of your wireless network and is compatible  
with Linksys wireless products only. (You will have to enter the WEP key(s) manually on any non-Linksys  
wireless products.)  
10. If you entered a Passphrase, then you will see the automatically generated WEP key in the Key 1 field, shown  
in Figure 5-9. Click the Next button, and proceed to step 11.  
If you did not enter a Passphrase, then enter a WEP key in the Key 1 field. If you are using 64-bit WEP  
encryption, then the key must consist of exactly 10 hexadecimal characters. If you are using 128-bit WEP  
encryption, then the key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters  
are 0-“9 and A-“F. Then click the Next button, and proceed to step 11.  
11. Review your settings on the Confirmation screen, shown in Figure 5-10. Write down the Bridge’s IP Address if  
you want to configure advanced settings through the Bridge’s Web-based Utility. Click the Yes button to save  
these settings. Click the No button to exit the Setup Wizard.  
Figure 5-9: WEP Key  
Figure 5-10: Confirmation  
Figure 5-11: Congratulations  
12. The next screen, shown in Figure 5-11, shows that the configuration is complete. To configure any other  
Wireless-B Ethernet Bridges on your network, run this Setup Wizard again. To register the Bridge, click the  
Online Registration button. To exit the Setup Wizard, click the Exit button.  
The Wireless-B Ethernet Bridge is now successfully configured for your network.  
Go to Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use.”  
Advanced users: For advanced configuration, proceed to Chapter 7: Using the Wireless-B Ethernet  
Bridge Web-based Utility.”  
Chapter 5: Setting Up the Wireless-B Ethernet Bridge  
Setup Wizard  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 6: Connecting the Wireless-B Ethernet Bridge for  
Network Use  
1. After configuration, unplug the power cable from the electrical outlet, and unplug the Ethernet network cable  
from the PC, hub, or switch.  
2. Plug the Ethernet network cable into the RJ-45 port on the Ethernet-ready network device you wish to add to  
the wireless network.  
3. Plug the power cable into a local electrical outlet.  
The installation of the Wireless-B Ethernet Bridge is complete.  
Note: If you do not have an active connection  
to the Ethernet-ready network device, then  
change the position of the X-II switch.  
If you want to use the Bridge’s Web-based Utility, refer to Chapter 7: The Wireless-B Ethernet Bridge  
Web-based Utility.”  
Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based  
Utility  
Overview  
The Bridge is designed to function properly after configuration using the Setup Wizard. However, if you would like  
to change these settings or make more advanced configuration changes, use your web browser and the  
Wireless-B Ethernet Bridge Web-based Utility. This chapter explains how to use the Utility.  
Starting the Web-based Utility  
1. Open your web browser, and enter the IP address of the Wireless-B Ethernet Bridge (the default is  
192.168.1.225). Press the Enter key, and the screen shown in Figure 7-1 will appear. In lowercase letters,  
enter the default password, admin, in the Password field. Click the OK button. You can set a new password  
on the Password screen later.  
2. The Utility’s Setup screen, shown in Figure 7-2, will appear.  
The Utility provides a convenient, web-browser-based way to alter the Bridge’s settings. It offers five main  
tabs:  
Figure 7-1: Access the Web-based Utility  
Setup - Enables you to configure the IP address and wireless settings.  
Have You: Enabled TCP/IP on your PCs? PCs  
communicate over the network with this  
protocol. Refer to Appendix D: Windows  
Help” for more information on TCP/IP.  
Password - Allows you to change the password or reset all settings to factory defaults.  
Advanced - Lets you change the advanced wireless settings and clone a MAC address onto the Bridge.  
Status - Displays the Bridge’s current settings.  
Note: The Wireless-B Ethernet Bridge is  
designed to function properly after using the  
Setup Wizard. This chapter is provided solely  
for those who wish to perform more advanced  
configuration or monitoring.  
Help - Provides explanations of various configuration settings and links to online technical support resources.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Overview  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Setup  
The Setup screen, shown in Figure 7-2, lets you configure the wired and wireless network settings for the Bridge.  
Firmware - The version number of the Bridge’s firmware is displayed here. Firmware should be upgraded  
ONLY if you experience problems with the Bridge. Firmware updates are posted at www.linksys.com. For  
more information, refer to Appendix C: Upgrading Firmware.”  
MAC Address - The MAC Address of the Bridge is displayed here.  
LAN  
Device Name - You may assign any name to the Bridge. Unique, memorable names are helpful, especially if  
you are using multiple bridges on the same wireless network.  
Configuration Type - If the Bridge will obtain an IP address automatically from a DHCP server, such as a  
router, then select Automatic Configuration-DHCP. If you are assigning the Bridge a static IP address, then  
select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the IP Address,  
Subnet Mask, and Gateway fields.  
Figure 7-2: Setup Tab  
Wireless  
SSID - The SSID is the network name shared among all devices in a wireless network. The SSID must be  
identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric  
characters, which may be any keyboard character (do not use any spaces). Make sure this setting is the same  
for all devices in your wireless network. For added security, Linksys recommends that you change the default  
SSID (linksys) to a name of your choice.  
To search for available wireless networks, click the Site Survey button.  
Network Type - Choose a wireless operating mode for the Bridge. Keep the default setting, Infrastructure, if  
you want your wireless-equipped device to communicate with computers and other devices on your wired  
network using a wireless access point. Select Ad-Hoc button if you want multiple wireless-equipped devices  
to communicate directly with each other.  
If you chose Ad-Hoc mode, then select the correct operating channel for your network in the Channel drop-  
down menu. The channel you choose should match the channel set on the other devices in your wireless  
network.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Setup  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
WEP - To enable WEP encryption, click the Enable radio button. To increase wireless network security, using  
WEP encryption is strongly recommended. Then click the Edit WEP Settings button to configure the WEP  
settings. To disable WEP encryption, keep the default, Disable.  
An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect your wireless data  
communications. WEP uses 64-bit or 128-bit keys to provide access control to your network and encryption  
security for every data transmission. To decode a data transmission, each device in a network must use an  
identical WEP key. Higher encryption levels offer higher levels of security, but due to the complexity of the  
encryption, they may decrease network performance.  
Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the  
Refresh button of your web browser. Click the Cancel button to cancel your changes. Click the Help button  
for additional on-screen information.  
Site Survey  
The Site Survey screen, shown in Figure 7-3, shows all the wireless networks detected by the Bridge and  
their general information. You can use this screen to connect to one of these networks.  
For each wireless network detected, the following information is displayed:  
SSID - The network name. To join a wireless network, click its SSID.  
MAC Address - The MAC address of the network’s access point.  
Channel - The channel setting.  
Signal Strength (%) - The percentage of wireless signal strength.  
Mode - The network mode and status of WEP encryption.  
Click the Refresh button to obtain the most up-to-date data. Click the Cancel button to close this screen.  
Click the Help button for additional on-screen information.  
Figure 7-3: Site Survey  
WEP Encryption  
Use the WEP screen, shown in Figure 7-4, to configure the WEP encryption level and WEP keys for the Bridge.  
NOTE: Make sure that your WEP key matches the  
WEP key of the wireless network you want to join.  
Otherwise, the connection will fail.  
Default Transmit Key - Select which WEP key (1-4) will be used when the Bridge sends data. Make sure  
the other wireless-equipped devices are using the same key.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Setup  
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
WEP Encryption - In order to use WEP encryption, select 64-Bit (10 hex digits) or 128-Bit (26 hex  
digits) from the drop-down menu.  
Passphrase - Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is  
used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16  
alphanumeric characters. (The Passphrase function is compatible with Linksys wireless products only. If  
you want to communicate with non-Linksys wireless products, you will need to enter your WEP key(s)  
manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate  
button to create WEP key(s).  
Keys 1-4 - If you are not using a Passphrase, then you can enter one or more WEP keys manually.  
In each key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all  
zeroes. These are not valid key values.) If you are using 64-bit WEP encryption, then each key must  
consist of exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then  
each key must consist of exactly 26 hexadecimal characters in length. Valid hexadecimal characters are  
0-“9” and A-“F.  
Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the  
Refresh button of your web browser. Click the Cancel button to cancel your changes. Click the Help button  
for additional on-screen information.  
Figure 7-4: WEP Encryption  
Password  
The Password screen, shown in Figure 7-5, lets you change the Bridge’s Password and restore the factory default  
settings.  
Administrative Password - It is strongly recommended that you change the Bridge’s default password  
(admin). All users who try to access the Bridge’s Web-based Utility will be prompted for the Bridge’s  
Password. The new Password must not exceed 12 characters in length and must not include any spaces.  
Enter the new Password a second time to confirm it.  
Restore Factory Defaults - Click the Yes radio button to reset all configuration settings to their default values.  
If you do not want to restore the factory defaults, then keep the default setting, No.  
To save your changes, click the Apply button. Click the Cancel button to cancel your changes. Click the Help  
button for additional on-screen information.  
Figure 7-5: Password Tab  
IMPORTANT: Any settings you have saved will be  
lost if the default settings are restored.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Password  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Advanced  
Use the Advanced Settings screen, shown in Figure 7-6, to customize advanced wireless settings and clone a  
MAC address onto the Bridge.  
Wireless  
Transmission Rate - The default setting is Auto. The range is from 1 to 11Mbps.  
The rate of data transmission should be set depending on the speed of your wireless network. You can select  
from a range of transmission speeds, or you can keep the default setting, Auto, to have the Bridge  
automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will  
negotiate the best possible connection speed between the Bridge and another wireless-equipped device.  
Authentication Type - The default setting is Open System. The choices are Open System and Shared Key.  
This setting allows the Bridge to authenticate communication with the wireless devices in your network. With  
the Shared Key setting, all wireless devices must use the same WEP key so that the Bridge and the client can  
authenticate each other and start transmitting data. With the Open System setting, any device can join a  
network without performing any security check. Select the authentication type used by your wireless  
network.  
Figure 7-6: Advanced Settings Tab  
MAC Address  
Cloning Mode - You can clone the MAC address of any network device onto the Bridge. To disable MAC  
address cloning, keep the default setting, Disable. To use the MAC cloning feature, select Enable.  
If you have enabled MAC cloning, then select Auto if you want to clone the MAC address of the device  
currently connected to the Bridge’s LAN port. The Bridge will actively scan for a new MAC address to be  
cloned whenever you disconnect and re-connect the Bridge through its LAN port. Select Manual if you want  
to specify a MAC address in the Enter MAC Address field. This is useful when the Bridge is connected to  
multiple devices through a switch or a hub.  
Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the  
Refresh button of your web browser. Click the Cancel button to cancel your changes. Click the Help button for  
additional on-screen information.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Advanced  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Status  
The Status screen displays the Bridge’s current status and settings. All information is read-only.  
Device Name - The name you have assigned to the Bridge is displayed here.  
Firmware Version - The version number of the Bridge’s firmware is displayed here. Firmware should be  
upgraded ONLY if you experience problems with the Bridge. Firmware updates are posted at  
www.linksys.com. For more information, refer to Appendix C: Upgrading Firmware.”  
MAC Address - The MAC Address of the Bridge is displayed here.  
LAN Settings  
IP Address - The Bridges IP Address is displayed here.  
Subnet Mask - The Bridge’s Subnet Mask is displayed here.  
Gateway - The Gateway address for the Bridge is displayed here.  
LAN Statistics  
Figure 7-7: Status Tab  
Ethernet TX - The number of packets transmitted to the Ethernet network is displayed here.  
Ethernet RX - The number of packets received from the Ethernet network is displayed here.  
Wireless TX - The number of packets transmitted to the wireless network is displayed here.  
Wireless RX - The number of packets received from the wireless network is displayed here.  
Wireless Settings  
SSID - The Bridge’s SSID is displayed here.  
Network Type - The Bridge’s mode is displayed here.  
Channel - The Bridges channel setting is displayed here.  
WEP - The status of the Bridge’s WEP encryption is displayed here.  
TX Rate - The Bridge’s transmission rate is displayed here.  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Status  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Link Quality - The percentage of the Bridge’s wireless signal strength is displayed here.  
Click the Refresh button to obtain the most up-to-date settings and statistics. Click the Help button for additional  
on-screen information.  
Help  
The Help screen offers links to all of the help information for the Web-based Utility’s screens and the Bridge’s  
online technical support resources. All information is read-only.  
Linksys Website - Click the Linksys Website link to visit Linksys’s website, www.linksys.com.  
Online manual in PDF format - Click the Online manual in PDF format to view this User Guide online. It is in  
Adobe Acrobat Portable Document File (.pdf) format, so you will need the free Adobe Acrobat Reader to view  
the pdf. If you do not have the Reader, click the Adobe Website link to download it.  
Adobe Website (software for viewing PDF documents) - If you need to download the Adobe Acrobat Reader to  
view the User Guide pdf, then click the Adobe Website link.  
Figure 7-8: Help Tab  
Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility  
Help  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix A: Troubleshooting  
This appendix consists of two parts: Common Problems and Solutions” and Frequently Asked Questions.” This  
appendix provides solutions to problems that may occur during the installation and operation of the Wireless-B  
Ethernet Bridge. Read the descriptions below to solve your problems. If you can't find an answer here, check the  
Linksys website at www.linksys.com.  
Common Problems and Solutions  
1. I can’t connect to the access point.  
Open the Web-based Utility. On the Setup tab, perform the following steps:  
Verify that the operating mode is set to Infrastructure mode.  
Make sure that the SSID is the same as the SSID of the access point.  
On the WEP Encryption screen, make sure that all of the WEP settings are the same as the WEP settings of  
the access point.  
2. I want to play head-to-head (ad-hoc) gaming with two Xboxes, but they won’t communicate.  
Perform the following steps:  
Make sure both Bridges are set to the same SSID, network mode (Ad-Hoc), channel setting, and WEP  
settings.  
Verify that the Bridges are set to different IP addresses.  
You need to enable MAC address cloning on the Bridge for each Xbox. Follow these instructions:  
1. Open the Web-based Utility for one of the Bridges.  
2. Click the Advanced tab.  
3. Select Enable from the MAC Address Cloning Mode drop-down menu.  
4. Click the Auto radio button.  
5. Click the Apply button to save your changes. When you connect the Bridge to its Xbox, the Bridge will  
automatically clone the Xboxs MAC address.  
Repeat steps 1-5 for the other Bridge.  
3. I don’t know how to change the Bridge’s IP address.  
You have two ways to change the Bridge’s IP address.  
Open the Web-based Utility. On the Setup screen, click the Static IP Address radio button, and change  
the IP address there.  
If you encounter problems, power the Bridge off and on again, or push the Reset button. Then try to  
change the IP address again.  
Appendix A: Troubleshooting  
Common Problems and Solutions  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
4. The Bridge-enabled PC won’t communicate with a wireless-enabled PC or printer.  
Perform the following steps:  
Check that the wireless-enabled PC or printer is on the same wireless network as the PC using the Bridge.  
Make sure that the SSID and network mode are identical for all devices connected to the same wireless  
network.  
If the wireless network settings are fine, then make sure that all the devices are on the same IP network.  
5. The Web-based Utility doesn’t detect the Bridge.  
Make sure that the Ethernet cable is properly connected and that the Ethernet LED is lit. If the LED is not lit,  
change the position of the X-II slide switch on the Bridge’s rear panel. Use the X setting if you are connecting  
the Bridge to a network adapter. Use the II setting if you are connecting the Bridge to a hub or switch. If you  
still do not have an active connection, then change the position of the X-II switch again.  
6. The Web-based Utility won’t open.  
Make sure you correctly entered the Bridge’s IP address in the Address field of your web browser. If you are  
not sure what the Bridge’s IP address is, then run the Setup Wizard. Follow the on-screen instructions until  
you see a screen that lists all the Wireless-B Ethernet Bridges on your network. Select the Bridge you want to  
access, and its IP address will appear in the Status box. Enter this IP address in your web browser’s Address  
field. For details, see Chapter 5: Setting up the Wireless-B Ethernet Bridge.  
7. The Web-based Utility does not recognize my password.  
The password is case-sensitive. Make sure that you are using the correct case(s)—lowercase or  
uppercase—when entering the password. If you forget your password, you can push the Bridge’s Reset  
button. This will reset the password to the default setting; however, all other Bridge settings will be reset to  
the factory defaults as well. To use the default setting, enter admin in the Password field.  
8. After I make changes through the Web-based Utility, the new settings aren’t displayed on-screen.  
Click the Refresh button of your web browser. If the new settings aren’t displayed, then unplug the power  
adapter from the Bridge. Plug the power adapter back in, and then click the Refresh button again.  
Frequently Asked Questions  
What is the IEEE 802.11b standard?  
It is one of the IEEE standards for wireless networks. The 802.11b standard allows wireless networking hardware  
from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard.  
The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.  
Can I run an application from a remote computer over the wireless network?  
This will depend on whether or not the application is designed to be used over a network. Consult the  
application’s user guide to determine if it supports operation over a network.  
Appendix A: Troubleshooting  
Frequently Asked Questions  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Can I play multiplayer games with other users of the wireless network?  
Yes, as long as the game supports multiple players over a LAN. Refer to the game’s user guide for more  
information.  
What is ad-hoc mode?  
When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to  
communicate directly with each other. The ad-hoc wireless network will not communicate with any wired  
network.  
What is infrastructure mode?  
When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with  
a wired network through a wireless access point.  
What is roaming?  
Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout  
an area greater than that covered by a single wireless network access point. Before using the roaming function,  
the workstation must make sure that it is the same channel number as the wireless network access point of the  
dedicated coverage area.  
To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each  
node and wireless network access point, for example, must always acknowledge receipt of each message. Each  
node must maintain contact with the wireless network even when not actually transmitting data. Achieving these  
functions simultaneously requires a dynamic RF networking technology that links wireless network access points  
and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system.  
First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried  
by each wireless network access point and the distance of each wireless network access point to the wired  
backbone. Based on that information, the node next selects the right wireless network access point and registers  
its address. Communications between end node and host computer can then be transmitted up and down the  
backbone.  
As the user moves on, the end nodes RF transmitter regularly checks the system to determine whether it is in  
touch with the original wireless network access point or whether it should seek a new one. When a node no  
longer receives acknowledgment from its original wireless network access point, it undertakes a new search.  
Upon finding a new wireless network access point, it then re-registers, and the communication process  
continues.  
What is ISM band?  
The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM  
(Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available  
Appendix A: Troubleshooting  
Frequently Asked Questions  
23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
worldwide. This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in  
the hands of users around the globe.  
What is Spread Spectrum?  
Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in  
reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for  
reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband  
transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that  
the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to  
the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives,  
Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).  
What is DSSS? What is FHSS? And what are their differences?  
Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that  
is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical  
channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct Sequence Spread  
Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip  
(or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if  
one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can  
recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low  
power wideband noise and is rejected (ignored) by most narrowband receivers.  
What is WEP?  
WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40/64 bit shared key algorithm, as  
described in the IEEE 802.11 standard.  
Appendix A: Troubleshooting  
Frequently Asked Questions  
24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix B: Wireless Security  
A Brief Overview  
Whenever data—in the form of files, e-mails, or messages—is transmitted over your wireless network, it is open  
to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just like  
signals from your cellular or cordless phone can be intercepted, signals from your wireless network can also be  
compromised. What are the risks inherent in wireless networking? Read on.  
What Are the Risks?  
Computer network hacking is nothing new. With the advent of wireless networking, hackers use methods both  
old and new to do everything from stealing your bandwidth to stealing your data. There are many ways this is  
done, some simple, some complex. As a wireless user, you should be aware of the many ways they do this.  
Every time a wireless transmission is broadcast, signals are sent out from your wireless PC or access point, but  
not always directly to its destination. The receiving PC or access point can hear the signal because it is within  
that radius. Just as with a cordless phone, cellular phone, or any kind of radio device, anyone else within that  
radius, who has their device set to the same channel or bandwidth can also receive those transmission.  
Wireless networks are easy to find. Hackers know that, in order to join a wireless network, your wireless PC will  
typically first listen for beacon messages. These are identifying packets transmitted from the wireless network  
to announce its presence to wireless nodes looking to connect. These beacon frames are decrypted and contain  
much of the network’s information, such as the network’s SSID (Service Set Identifier) and the IP address of the  
network PC or access point. The SSID is analogous to the network's name. With this information broadcast to  
anyone within range, hackers are often provided with just the information they need to access that network.  
One result of this, seen in many large cities and business districts, is called Warchalking. This is the term used  
for hackers looking to access free bandwidth and free Internet access through your wireless network. The marks  
they chalk into the city streets are well documented in the Internet and communicate exactly where available  
wireless bandwidth is located for the taking.  
Even keeping your network settings, such as the SSID and the channel, secret won’t prevent a hacker from  
listening for those beacon messages and stealing that information. This is why most experts in wireless  
networking strongly recommend the use of WEP (Wireless Equivalent Privacy). WEP encryption scrambles your  
wireless signals so they can only be recognized within your wireless network.  
Figure B-1: Warchalking  
Appendix B: Wireless Security  
A Brief Overview  
25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
But even WEP has its problems. WEPs encryption algorithm is referred to as simple, which also means  
weak, because the technology that scrambles the wireless signal isn’t too hard to crack for a persistent  
hacker.  
There are five common ways that hackers can break into your network and steal your bandwidth as well as your  
data. The five attacks are popularly known as:  
1. Passive Attacks  
2. Jamming Attacks  
3. Active Attacks  
4. Dictionary-building or Table Attacks  
5. Man-in-the-Middle Attacks  
Passive Attacks  
There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply  
listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily  
available on the Internet that can allow a person to listen into your wireless network and the information it  
broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message  
conversations, e-mails, account information, and any data transmitted wirelessly, can easily be seen by someone  
outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a  
wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a  
packet sniffer, software available on the Internet, along with other freeware or shareware hacking utilities  
available on the Internet, to acquire your WEP keys and other network information to defeat security.  
Jamming Attacks  
Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down  
your wireless network. This type of attack is not always intentional and can often come about simply due to the  
technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave  
ovens can create a great deal of interference and jam transmissions on your wireless network. One way to  
resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information  
transmissions.  
Appendix B: Wireless Security  
What Are the Risks?  
26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Active Attacks  
Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your  
network so it's easier to hack in the next time.  
In an Active Attack, the hacker has gained access to all of your network settings (SSID, WEP keys, etc.) and is in  
your network. Once in your wireless network, the hacker has access to all open resources and transmitted data  
on the network. In addition, if the wireless network’s access point is connected to a switch, the hacker will also  
have access to data in the wired network.  
Further, spammers can use your Internet connection and your ISPs mail server to send tens of thousands of e-  
mails from your network without your knowledge.  
Lastly, the hacker could make hacking into your network even easier by changing or removing safeguards such  
as MAC address filters and WEP encryption. He can even steal passwords and user names for the next time he  
wants to hack in.  
Dictionary-Building or Table Attacks  
Dictionary-building, or Table attacks, is a method of gaining network settings (SSID, WEP keys, etc.) by analyzing  
about a day's worth of network traffic, mostly in the case of business networks. Over time, the hacker can build  
up a table of network data and be able to decrypt all of your wireless transmissions. This type of attack is more  
effective with networks that transmit more data, such as businesses.  
Man-in-the-Middle Attacks  
A hacker doesnt need to log into your network as a user—he can appear as one of the network’s own access  
points, setting himself up as the man-in-the-middle. To do this, the hacker simply needs to rig an access point  
with your network’s settings and send out a stronger signal that your access point. In this way, some of your  
network's PCs may associate with this rogue access point, not knowing the difference, and may begin sending  
data through it and to this hacker.  
The trade-off for the convenience and flexibility wireless networking provides is the possibility of being hacked  
into through one of the methods described here. With wireless networks, even with WEP encryption, open to the  
persistent hacker, how can you protect your data? The following section will tell you how to do just that.  
Maximizing Wireless Security  
Security experts will all tell you the same thing: Nothing is guaranteed. No technology is secure by itself. An  
unfortunate axiom is that building the better mousetrap can often create a better mouse. This is why, in the  
Appendix B: Wireless Security  
What Are the Risks?  
27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
examples below, your implementation and administration of network security measures is the key to maximizing  
wireless security.  
No preventative measure will guarantee network security but it will make it more difficult for someone to hack  
into your network. Often, hackers are looking for an easy target. Making your network less attractive to hackers,  
by making it harder for them to get in, will make them look elsewhere.  
How do you do this? Before discussing WEP, let’s look at a few security measures often overlooked.  
1) Network Content  
Now that you know the risks assumed when networking wirelessly, you should view wireless networks as you  
would the Internet. Dont host any systems or provide access to data on a wireless network that you wouldn't put  
on the Internet.  
2) Network Layout  
When you first lay out your network, keep in mind where your wireless PCs are going to be located and try to  
position your access point(s) towards the center of that network radius. Remember that access points transmit  
indiscriminately in a radius; placing an access point at the edge of the physical network area reduces network  
performance and leaves an opening for any hacker smart enough to discover where the access point is  
transmitting.  
This is an invitation for a man-in-the-middle attack, as described in the previous section. To perform this type of  
attack, the hacker has to be physically close to your network. So, monitoring both your network and your property  
is important. Furthermore, if you are suspicious of unauthorized network traffic, most wireless products come  
with a log function, with which you can view activity on your network and verify if any unauthorized users have  
had access.  
3) Network Devices  
With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are  
stored in its firmware. If they get into the hands of a hacker, so do all of your settings. So keep an eye on them.  
4) Administrator Passwords  
Your network administrator is the only person who can change network settings. If a hacker gets a hold of the  
administrator's password, he, too, can change those settings. So, make it harder for a hacker to get that  
information. Change the administrator's password regularly.  
Appendix B: Wireless Security  
What Are the Risks?  
28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
5) SSID  
There are a few things you can do to make your SSID more secure:  
a.Disable broadcast  
b.Make it unique  
c. Change it often  
Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for  
convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers.  
So don't broadcast the SSID.  
A default SSID is set on your wireless devices by the factory. (The Linksys default SSID is linksys.) Hackers  
know these defaults and can check these against your network. Change your SSID to something unique and not  
something related to your company or the networking products you use.  
Changing your SSID regularly will force any hacker attempting to gain access to your wireless network to start  
looking for that new SSID.  
With these three steps in mind, please remember that while SSIDs are good for segmenting networks, they fall  
short with regards to security. Hackers can usually find them quite easily.  
6) MAC Addresses  
Enable MAC address filtering if your wireless products allow it. MAC address filtering will allow you to provide  
access to only those wireless nodes with certain MAC addresses. This makes it harder for a hacker using a  
random MAC address or spoofing (faking) a MAC address.  
7) Firewalls  
Once a hacker has broken into your wireless network, if it is connected to your wired network, they’ll have  
access to that, too. This means that the hacker has effectively used your wireless network as a backdoor through  
your firewall, which you've put in place to protect your network from just this kind of attack via the Internet.  
You can use the same firewall technology to protect your wired network from hackers coming in through your  
wireless network as you did for the Internet. Rather than connecting your access point to an unprotected switch,  
swap those out for a router with a built-in firewall. The router will show the access point coming in through its  
Internet port and its firewall will protect your network from any transmissions entering via your wireless network.  
Appendix B: Wireless Security  
What Are the Risks?  
29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date  
antiviral software.  
8) WEP  
Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is  
overstating WEP's ability. Again, this can only provide enough security to make a hacker’s job more difficult.  
WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about  
as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is  
not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to  
break into a network by spoofing (or faking) the MAC address.  
Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a  
day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key. Just like a dictionary-  
building attack, the best prevention for these types of programs is by not using static settings, periodically  
changing WEP keys, SSID, etc.  
There are several ways that WEP can be maximized:  
a) Use the highest level of encryption possible  
b) Use multiple WEP keys  
c) Change your WEP key regularly  
Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out  
your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more  
complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two  
ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys  
encrypt and decrypt data sent over your wireless network. So, a higher level of security ensures that hackers will  
have a harder time breaking into your network.  
Setting one, static WEP key on your wireless network leaves your network open the threats even as you think it is  
protecting you. While it is true that using a WEP key increases wireless security, you can increase it further by  
using multiple WEP keys.  
Keep in mind that WEP keys are stored in the firmware of wireless cards and access points and can be used to  
hack into the network if a card or access point falls into the wrong hands. Also, should someone hack into your  
network, there would be nothing preventing someone access to the entire network, using just one static key.  
Appendix B: Wireless Security  
What Are the Risks?  
30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Important: Always remember that each  
point in your wireless network MUST use the  
same WEP Encryption method and encryption  
key or your wireless network will not function  
properly.  
The solution, then, is to segment your network up into multiple groups. If your network had 80 users and you  
used four WEP keys, a hacker would have access to only ¼ of your wireless network resources. In this way,  
multiple keys reduce your liability.  
Finally, be sure to change your WEP key regularly, once a week or once a day. Using a dynamic” WEP key, rather  
than one that is static, makes it even harder for a hacker to break into your network and steal your resources.  
WEP Encryption  
WEP encryption for the Bridge is configured through the Setup Wizard or the Web-based Utility’s Setup tab. For  
more information about the Setup Wizard, refer to Chapter 5: Setting Up the Wireless-B Ethernet Bridge.” To  
enable WEP encryption through the Web-based Utility, click the WEP Key Settings button on the Setup tab. The  
Edit WEP Settings screen will appear, as shown in Figure B-2.  
To configure the WEP settings, follow these instructions:  
1. For the Default Transmit Key setting, select which WEP key (1-4) will be used when the Bridge sends data.  
Make sure the other wireless-equipped devices are using the same key.  
2. For the WEP Encryption setting, select 64-Bit (10 hex digits) or 128-Bit (26 hex digits) from the drop-down  
menu.  
3. The WEP Key can be generated in two ways: you can use a Passphrase or you can enter it manually.  
If you wish to use a Passphrase, enter it and then click the Generate key to generate WEP key(s). The  
Passphrase is case-sensitive and can be a maximum of 16 alphanumeric characters. (The Passphrase  
function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys  
wireless products, you will need to enter your WEP key(s) manually on the non-Linksys wireless products.)  
Figure B-2: WEP Encryption  
If you are not using a Passphrase, then you can enter one or more WEP keys manually.  
In each Key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes.  
These are not valid key values.) If you are using 64-bit WEP encryption, then each key must consist of exactly  
10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then each key must consist of  
exactly 26 hexadecimal characters in length. Valid hexadecimal characters are 0-“9” and A-“F.  
4. Click the Apply button to apply your changes and return to the Setup tab or Cancel to cancel your changes.  
Click the Help button for additional on-screen information.  
Appendix B: Wireless Security  
What Are the Risks?  
31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix C: Upgrading Firmware  
The Bridge’s firmware is upgraded with the firmware utility on the Linksys website at  
http://linksys.com/download. Firmware should be upgraded ONLY if you experience problems with the Bridge.  
2. Select WET11 - Wireless-B Ethernet Bridge - Version 2, and then select your operating system.  
3. Then, click the Downloads for this Product button.  
4. Select Firmware.  
5. Read the release notes for the firmware version.  
6. Click the word here in Click here to download the firmware file.  
7. On the File Download screen, click Save to save the zip file to your computer.  
8. Open the zip file and double-click the exe file.  
9. The WET11 Firmware Upgrade utility will appear. Follow the on-screen instructions.  
Appendix C: Upgrading Firmware  
32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix D: Windows Help  
All Linksys wireless products require Microsoft Windows. Windows is the most used operating system in the  
world and comes with many features that help make networking easier. These features can be accessed through  
Windows Help and are described in this appendix.  
TCP/IP  
Before a computer can communicate with the Bridge, TCP/IP must be enabled. TCP/IP is a set of instructions, or  
protocol, all PCs follow to communicate over a network. This is true for wireless networks as well. Your PCs will  
not be able to utilize wireless networking without having TCP/IP enabled. Windows Help provides complete  
instructions on enabling TCP/IP.  
Shared Resources  
If you wish to share printers, folder, or files over your network, Windows Help provides complete instructions on  
utilizing shared resources.  
Network Neighborhood/My Network Places  
Other PCs on your network will appear under Network Neighborhood or My Network Places (depending upon the  
version of Windows you're running). Windows Help provides complete instructions on adding PCs to your  
network.  
Appendix D: Windows Help  
33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix E: Glossary  
802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an  
operating frequency of 5GHz.  
802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an  
operating frequency of 2.4GHz.  
802.11g - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an  
operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.  
Access Point - Device that allows wireless-equipped computers and other devices to communicate with a wired  
network. Also used to expand the range of a wireless network.  
Adapter - This is a device that adds network functionality to your PC.  
Ad-hoc - A group of wireless devices communicating directly with each other (peer-to-peer) without the use of  
an access point.  
Backbone - The part of a network that connects most of the systems and networks together, and handles the  
most data.  
Bandwidth - The transmission capacity of a given device or network.  
Beacon Interval - The frequency interval of the beacon, which is a packet broadcast by a router to synchronize a  
wireless network.  
Bit - A binary digit.  
Boot - To start a device and cause it to start executing instructions.  
Bridge - A device that connects two different kinds of local networks, such as a wireless network to a wired  
Ethernet network.  
Broadband - An always-on, fast Internet connection.  
Browser - A browser is an application program that provides a way to look at and interact with all the  
information on the World Wide Web.  
Appendix E: Glossary  
34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Buffer - A block of memory that temporarily holds data to be worked on later when a device is currently too busy  
to accept the data.  
Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the  
Internet.  
CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent  
data loss in a network.  
CTS (Clear To Send) - A signal sent by a device to indicate that it is ready to receive data.  
Daisy Chain - A method used to connect devices in a series, one after the other.  
Database - A collection of data that is organized so that its contents can easily be accessed, managed, and  
updated.  
DDNS (Dynamic Domain Name System) - The capability of having a website, FTP, or e-mail server-with a  
dynamic IP address-use a fixed domain name.  
Default Gateway - A device that forwards Internet traffic from your local area network.  
DHCP (Dynamic Host Configuration Protocol) - A protocol that lets one device on a local network, known as a  
DHCP server, assign temporary IP addresses to the other network devices, typically computers.  
DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be seen” from  
the Internet.  
DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP  
addresses.  
Domain - A specific name for a network of computers.  
Download - To receive a file transmitted over a network.  
DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines.  
DSSS (Direct-Sequence Spread-Spectrum) - A type of radio transmission technology that includes a redundant  
bit pattern to lessen the probability of data lost during transmission. Used in 802.11b networking.  
DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless  
efficiency.  
Appendix E: Glossary  
35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Dynamic IP Address - A temporary IP address assigned by a DHCP server.  
Encryption - Encoding data to prevent it from being read by unauthorized people.  
Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common  
transmission medium.  
Finger - A program that tells you the name associated with an e-mail address.  
Firewall - Security measures that protect the resources of a local network from intruders.  
Firmware - 1. In network devices, the programming that runs the device. 2. Programming loaded into read-only  
memory (ROM) or programmable read-only memory (PROM) that cannot be altered by end-users.  
Fragmentation - Breaking a packet into smaller units when transmitting over a network medium that cannot  
support the original size of the packet.  
FTP (File Transfer Protocol) - A standard protocol for sending files between computers over a TCP/IP network and  
the Internet.  
Full Duplex - The ability of a networking device to receive and transmit data simultaneously.  
Gateway - A system that interconnects networks.  
Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a  
time.  
Hardware - The physical aspect of computers, telecommunications, and other information technology devices.  
HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World  
Wide Web.  
IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking  
standards.  
Infrastructure - Currently installed computing and networking equipment.  
Infrastructure Mode - Configuration in which a wireless network is bridged to a wired network via an access  
point.  
IP (Internet Protocol) - A protocol used to send data over a network.  
IP Address - The address used to identify a computer or device on a network.  
Appendix E: Glossary  
36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device.  
IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer.  
ISM band - Radio band used in wireless networking transmissions.  
ISP (Internet Service Provider) - A company that provides access to the Internet.  
LAN (Local Area Network) - The computers and networking products that make up the network in your home or  
office.  
MAC (Media Access Control) Address - The unique address that a manufacturer assigns to each networking  
device.  
Mbps (Megabits Per Second) - One million bits per second; a unit of measurement for data transmission.  
Multicasting - Sending data to a group of destinations at once.  
NAT (Network Address Translation) - NAT technology translates IP addresses of a local area network to a  
different IP address for the Internet.  
Network - A series of computers or devices connected for the purpose of data sharing, storage, and/or  
transmission between users.  
NNTP (Network News Transfer Protocol) - The protocol used to connect to Usenet groups on the Internet.  
Node - A network junction or connection point, typically a computer or work station.  
OFDM (Orthogonal Frequency Division Multiplexing) - A type of modulation technology that separates the data  
stream into a number of lower-speed data streams, which are then transmitted in parallel. Used in 802.11a,  
802.11g, and powerline networking.  
Packet - A unit of data sent over a network.  
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically  
generating the WEP encryption keys for Linksys products.  
Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.  
POP3 (Post Office Protocol 3) - A standard protocol used to retrieve e-mail stored on a mail server.  
Port - 1. The connection point on a computer or networking device used for plugging in a cable or an adapter. 2.  
The virtual connection point through which a computer uses a specific application on a server.  
Appendix E: Glossary  
37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication  
(username and password) in addition to data transport.  
PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be  
tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.  
Preamble - Part of the wireless signal that synchronizes network traffic.  
RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires.  
Roaming - The ability to take a wireless device from one access point’s range to another without losing the  
connection.  
Router - A networking device that connects multiple networks together, such as a local network and the Internet.  
RTS (Request To Send) - A packet sent when a computer has data to transmit. The computer will wait for a CTS  
(Clear To Send) message before sending data.  
Server - Any computer whose function in a network is to provide user access to files, printing, communications,  
and other services.  
SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet.  
SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol.  
Software - Instructions for the computer. A series of instructions that performs a particular task is called a  
program.  
Spread Spectrum - Wideband radio frequency technique used for more reliable and secure data transmission.  
SSID (Service Set IDentifier) - Your wireless network’s name.  
Static IP Address - A fixed address assigned to a computer or device that is connected to a network.  
Static Routing - Forwarding data in a network via a fixed path.  
Subnet Mask - An address code that determines the size of the network.  
Switch - 1. Device that is the central point of connection for computers and other devices in a network, so data  
can be shared at full transmission speeds. 2. A device for making, breaking, or changing the connections in an  
electrical circuit.  
Appendix E: Glossary  
38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
TCP/IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires  
acknowledgement from the recipient of data sent.  
Telnet - A user command and TCP/IP protocol used for accessing remote PCs.  
TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that uses UDP and has no directory or  
password capability.  
Throughput - The amount of data moved successfully from one node to another in a given time period.  
Topology - The physical layout of a network.  
TX Rate - Transmission Rate.  
UDP (User Datagram Protocol) - A network protocol for transmitting data that does not require acknowledgement  
from the recipient of the data that is sent.  
Upgrade - To replace existing software or firmware with a newer version.  
Upload - To transmit a file over a network.  
URL (Uniform Resource Locator) - The address of a file located on the Internet.  
VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another  
over the Internet.  
WAN (Wide Area Network) - The Internet.  
WEP (Wired Equivalent Privacy) - A method of encrypting data transmitted on a wireless network for greater  
security.  
WINIPCFG - A Windows 98 and Millennium utility that displays the IP address for a particular networking device.  
WLAN (Wireless Local Area Network) - A group of computers and associated devices that communicate with  
each other wirelessly.  
Appendix E: Glossary  
39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix F: Specifications  
Model  
WET11  
Standards  
Ports  
IEEE 802.11b, IEEE 802.3  
One 10BaseT RJ-45 port, Power port  
MDI/MDI-X slide switch, Reset button  
Category 5 or better  
Buttons  
Cabling Type  
LEDs  
Power, LAN, WLAN, Diag  
Peak Gain of Antenna 5 dBi  
Transmit Power  
Receive Sensitivity  
Security  
15 dBm @ Normal Temperature  
-85 dBm  
WEP 64/128-bit  
Dimensions  
4.72" x 1.22" x 3.70"  
(120 mm x 31 mm x 94 mm)  
Unit Weight  
Power  
7.04 oz. (0.2 kg)  
External, DC 5V  
Certifications  
Operating Temp.  
Storage Temp.  
FCC, CE, IC-03, Wi-Fi  
32°F to 104°F (0°C to 40°C)  
-4°F to 158°F (-20°C to 70°C)  
Appendix F: Specifications  
40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Operating Humidity  
Storage Humidity  
Warranty  
10% to 85%, Non-Condensing  
5% to 90%, Non-Condensing  
1 Year Limited  
Appendix F: Specifications  
41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix G: Warranty Information  
LIMITED WARRANTY  
Linksys warrants to the original end user purchaser (You) that, for a period of one year, (the Warranty Period) Your  
Linksys product will be free of defects in materials and workmanship under normal use. Your exclusive remedy and  
Linksys's entire liability under this warranty will be for Linksys at its option to repair or replace the product or refund Your  
purchase price less any rebates.  
If the product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a Return  
Authorization Number. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING. When returning a product,  
mark the Return Authorization Number clearly on the outside of the package and include a copy of your original proof of  
purchase. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. You are responsible for shipping  
defective products to Linksys. Linksys pays for UPS Ground shipping from Linksys back to You only. Customers located  
outside of the United States of America and Canada are responsible for all shipping and handling charges.  
ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED  
TO THE DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND  
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions do not  
allow limitations on how long an implied warranty lasts, so the above limitation may not apply to You. This warranty gives  
You specific legal rights, and You may also have other rights which vary by jurisdiction.  
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR  
PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED  
REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE  
PRODUCT, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL LINKSYS'  
LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.  
The foregoing limitations will apply even if any warranty or remedy provided under this Section fails of its essential  
purpose. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above  
limitation or exclusion may not apply to You.  
Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623 USA.  
42  
Appendix G: Warranty Information  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix H: Regulatory Information  
FCC STATEMENT  
This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15  
of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a  
residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not  
installed and used according to the instructions, may cause harmful interference to radio communications.  
However, there is no guarantee that interference will not occur in a particular installation. If this equipment does  
cause harmful interference to radio or television reception, which is found by turning the equipment off and on,  
the user is encouraged to try to correct the interference by one or more of the following measures:  
Reorient or relocate the receiving antenna  
Increase the separation between the equipment or devices  
Connect the equipment to an outlet other than the receiver's  
Consult a dealer or an experienced radio/TV technician for assistance  
FCC Caution: Any change or modification to the product not expressly approved by Linksys could void the user’s  
authority to operate the device.  
FCC RF Radiation Exposure Statement  
To comply with the FCC and ANSI C95.1 RF exposure limits, the antenna(s) for this device must comply with the  
following:  
Access points with 2.4 GHz or 5 GHz integrated antenna must operate with a separation distance of at least  
20 cm from all persons using the cable provided and must not be co-located or operating in conjunction with  
any other antenna or transmitter.  
End-users must be provided with specific operations for satisfying RF exposure compliance.  
Note: Dual antennas used for diversity operation are not considered co-located.  
Appendix H: Regulatory Information  
43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
INDUSTRY CANADA (CANADA)  
This Class B digital apparatus complies with Canadian ICES-003.  
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.  
The use of this device in a system operating either partially or completely outdoors may require the user to obtain  
a license for the system according to the Canadian regulations.  
EC DECLARATION OF CONFORMITY (EUROPE)  
Linksys declares that the Wireless-B Ethernet Bridge conforms to the specifications listed below, following the  
provisions of the European R&TTE directive 1999/5/EC:  
For 11Mbps, 2.4 GHz devices with 100 mW radios, the following standards were applied:  
EN 301 489-1, 301 489-17 General EMC requirements for Radio equipment.  
EN 609 50 Safety  
ETS 300-328-2 Technical requirements for Radio equipment.  
Caution: This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to  
certain frequencies and/or may require a license for operation. Contact local Authority for procedure to follow.  
Note: Combinations of power levels and antennas resulting in a radiated power level of above 100 mW equivalent  
isotropic radiated power (EIRP) are considered as not compliant with the above mentioned directive and are not  
allowed for use within the European community and countries that have adopted the European R&TTE directive  
1999/5/EC.  
For more details on legal combinations of power levels and antennas, contact Linksys Corporate Compliance.  
Linksys vakuuttaa täten että Wireless-B Ethernet Bridge tyyppinen laite on direktiivin 1999/5/EY oleellisten  
vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen.  
Linksys déclare que la Wireless-B Ethernet Bridge est conforme aux conditions essentielles et aux  
dispositions relatives à la directive 1999/5/EC.  
Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun  
enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m  
un enregistrement auprès de l'IBPT est requise. Pour une utilisation publique à l'extérieur de bâtiments, une  
licence de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT.  
Appendix H: Regulatory Information  
44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
France F:  
2.4 GHz Bande : les canaux 10, 11, 12, 13 (2457, 2462, 2467, et 2472 MHz respectivement) sont  
complétement libres d'utilisation en France (en utilisation intérieur). Pour ce qui est des autres canaux, ils  
peuvent être soumis à autorisation selon le départment. L'utilisation en extérieur est soumis à autorisation  
préalable et très restreint.  
plus amples renseignements.  
2.4 GHz Band: only channels 10, 11, 12, 13 (2457, 2462, 2467, and 2472 MHz respectively) may be used freely  
in France for indoor use. License required for outdoor installations.  
Appendix H: Regulatory Information  
45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Wireless-B Ethernet Bridge  
Appendix I: Contact Information  
Need to contact Linksys?  
Visit us online for information on the latest products and updates  
to your existing products at:  
ftp.linksys.com  
Can't find information about a product you want to buy  
on the web? Do you want to know more about networking  
with Linksys products? Give our advice line a call at:  
Or fax your request in to:  
800-546-5797 (LINKSYS)  
949-261-8868  
If you experience problems with any Linksys product,  
you can call us at:  
800-326-7114  
Don't wish to call? You can e-mail us at:  
support@linksys.com  
If any Linksys product proves defective during its warranty period,  
you can call the Linksys Return Merchandise Authorization  
department for obtaining a Return Authorization Number at:  
(Details on Warranty and RMA issues can be found in the Warranty  
Information section in this Guide.)  
949-261-1288  
46  
Appendix I: Contact Information  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Life Fitness Heart Rate Monitor Digital Heart Rate Sensors User Manual
Linksys Home Theater Server DP 600 User Manual
Linksys Network Router RVS4000 User Manual
Mackie Music Mixer CFXMKII User Manual
Magnavox Flat Panel Television 52MF438B F7 User Manual
Makita Lawn Mower PLM5120 User Manual
Maytag Water Heater HRN4975S User Manual
Melissa Toaster 243 011 User Manual
Memorex Computer Monitor MM1520 User Manual
Memorex MP3 Player MPD8505CP User Manual