| 	
		 ® 
					A Division of Cisco Systems, Inc.   
					GHz   
					802.11b   
					Wireless-B   
					Ethernet Bridge   
					User Guide   
					WIRELESS   
					Model No.   
					WET11   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Table of Contents   
					Chapter 1: Introduction   
					1 
					1 
					2 
					4 
					4 
					4 
					6 
					6 
					7 
					8 
					Welcome   
					What’s in this Guide?   
					Chapter 2: Planning Your Wireless Network   
					Network Topology   
					Ad-Hoc versus Infrastructure Mode   
					Chapter 3: Getting to Know the Wireless-B Ethernet Bridge   
					The Back Panel   
					The Front Panel   
					Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					9 
					9 
					Overview   
					Setup Wizard   
					9 
					Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use   
					13   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					14   
					14   
					14   
					15   
					17   
					18   
					19   
					20   
					21   
					21   
					22   
					25   
					25   
					25   
					32   
					Overview   
					Starting the Web-based Utility   
					Setup   
					Password   
					Advanced   
					Status   
					Help   
					Appendix A: Troubleshooting   
					Common Problems and Solutions   
					Frequently Asked Questions   
					Appendix B: Wireless Security   
					A Brief Overview   
					What Are the Risks?   
					Appendix C: Upgrading Firmware   
					Appendix D: Windows Help   
					Appendix E: Glossary   
					33   
					34   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix F: Specifications   
					40   
					42   
					43   
					46   
					Appendix G: Warranty Information   
					Appendix H: Regulatory Information   
					Appendix I: Contact Information   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					List of Figures   
					Figure 2-1: Infrastructure Mode   
					Figure 2-2: Ad-Hoc Mode   
					4 
					5 
					Figure 2-3: Wireless Bridging Using Two Bridges   
					Figure 3-1: Back Panel   
					5 
					6 
					Figure 3-2: Front Panel   
					7 
					Figure 4-1: Connect the Ethernet Network Cable   
					Figure 4-2: Connect the Power Adapter   
					Figure 5-1: Welcome   
					8 
					8 
					9 
					Figure 5-2: Check Connection   
					Figure 5-3: List of Bridges   
					Figure 5-4: Password   
					Figure 5-5: Mode Settings   
					Figure 5-6: Wireless Settings   
					Figure 5-7: IP Settings   
					Figure 5-8: Security Settings   
					Figure 5-9: WEP Key   
					Figure 5-10: Confirmation   
					Figure 5-11: Congratulations   
					Figure 7-1: Access the Web-based Utility   
					Figure 7-2: Setup Tab   
					9 
					10   
					10   
					10   
					11   
					11   
					11   
					12   
					12   
					12   
					14   
					15   
					16   
					17   
					17   
					18   
					19   
					20   
					25   
					31   
					Figure 7-3: Site Survey   
					Figure 7-4: WEP Encryption   
					Figure 7-5: Password Tab   
					Figure 7-6: Advanced Settings Tab   
					Figure 7-7: Status Tab   
					Figure 7-8: Help Tab   
					Figure B-1: Warchalking   
					Figure B-2: WEP Encryption   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 1: Introduction   
					Welcome   
					Thank you for choosing the Wireless-B Ethernet Bridge. The versatile Wireless-B Ethernet Bridge can make any   
					wired Ethernet-equipped device a part of your wireless network. At home, use the Wireless-B Ethernet Bridge to   
					connect game consoles, set-top boxes, or computers into your wireless network to share your high-speed   
					network connection. In the office, convert your Ethernet-wired printer, scanner, camera, notebook or desktop   
					into a wireless networked device.   
					802.11b: an IEEE wireless networking   
					standard that specifies a maximum   
					data transfer rate of 11Mbps and an   
					operating frequency of 2.4GHz.   
					It's completely driver-free, so it works on any platform and under any operating system! Since there are no   
					drivers to load, setup is a snap—just plug it into your device and configure the network settings through your   
					web browser.   
					Ethernet: an IEEE standard network   
					protocol that specifies how data is   
					placed on and retrieved from a   
					common transmission medium.   
					You can also use the Wireless-B Ethernet Bridge as a kind of “cable-less cable” to connect remote areas   
					together. Maybe Shipping is all the way across the warehouse from Receiving. Or maybe you want to set up a   
					home office in your detached garage. With a Wireless-B Ethernet Bridge in the garage, and another one (or a   
					Wireless Access Point) in the house, you're connected—with no cabling hassle.   
					Let the Wireless-B Ethernet Bridge from Linksys open up exciting new possibilities for your wireless network.   
					Chapter 1: Introduction   
					Welcome   
					1 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					What’s in this Guide?   
					This user guide covers the steps for setting up and using the Wireless-B Ethernet Bridge.   
					• 
					• 
					• 
					• 
					• 
					• 
					Chapter 1: Introduction   
					This chapter describes the Wireless-B Ethernet Bridge applications and this user guide.   
					Chapter 2: Planning your Wireless Network   
					This chapter describes the basics of wireless networking.   
					Chapter 3: Getting to Know the Wireless-B Ethernet Bridge   
					This chapter describes the physical features of the Bridge.   
					Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup   
					This chapter instructs you on how to connect the Bridge to your network for setup.   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					This chapter explains how to set up the Bridge using the Setup Wizard.   
					Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use   
					This chapter explains how to connect the Bridge to a network device so the device can join your wireless   
					network.   
					• 
					• 
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					This chapter explains how to use the Web-Based Utility to configure the settings on the Bridge.   
					Appendix A: Troubleshooting   
					This appendix describes some problems and solutions, as well as frequently asked questions, regarding   
					installation and use of the Wireless-B Ethernet Bridge.   
					• 
					• 
					• 
					• 
					Appendix B: Wireless Security   
					This appendix explains the risks of wireless networking and some solutions to reduce the risks.   
					Appendix C: Upgrading Firmware   
					This appendix instructs you on how to upgrade the firmware on the Bridge should you need to do so.   
					Appendix D: Glossary   
					This appendix gives a brief glossary of terms frequently used in networking.   
					Appendix E: Windows Help   
					This appendix describes how you can use Windows Help for instructions about networking, such as installing   
					the TCP/IP protocol.   
					Chapter 1: Introduction   
					What’s in this Guide?   
					2 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					• 
					• 
					• 
					• 
					Appendix F: Specifications   
					This appendix provides the technical specifications for the Bridge.   
					Appendix G: Warranty Information   
					This appendix supplies the warranty information for the Bridge.   
					Appendix H: Regulatory Information   
					This appendix supplies the regulatory information regarding the Bridge.   
					Appendix I: Contact Information   
					This appendix provides contact information for a variety of Linksys resources, including Technical Support.   
					Chapter 1: Introduction   
					What’s in this Guide?   
					3 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 2: Planning Your Wireless Network   
					Network Topology   
					A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each   
					computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same   
					frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the   
					same wireless network.   
					LAN (Local Area Network): the   
					computers and networking products   
					that make up your local network.   
					SSID: your wireless network’s name.   
					Ad-Hoc versus Infrastructure Mode   
					Infrastructure: a wireless network   
					that is bridged to a wired network via   
					an access point.   
					Unlike wired networks, wireless networks have two different modes in which they may be set up: infrastructure   
					and ad-hoc. An infrastructure configuration is a WLAN and wired LAN communicating to each other through an   
					access point. An ad-hoc configuration is wireless-equipped computers communicating directly with each other.   
					Choosing between these two modes depends on whether or not the wireless network needs to share data or   
					peripherals with a wired network or not.   
					If the computers on the wireless network need to be accessible by a wired network or need to share a peripheral,   
					such as a printer, with the wired network computers, the wireless network should be set up in Infrastructure   
					mode. The basis of Infrastructure mode centers around an access point, which serves as the main point of   
					communications in a wireless network (see Figure 2-1). Access points transmit data to PCs equipped with   
					wireless network cards, which can roam within a certain radial range of the access point. Multiple access points   
					can be arranged to work in succession to extend the roaming range, and can be set up to communicate with your   
					Ethernet hardware as well.   
					If the wireless network is relatively small and needs to share resources only with the other computers on the   
					wireless network, then the Ad-Hoc mode can be used. Ad-Hoc mode allows computers equipped with wireless   
					transmitters and receivers to communicate directly with each other, eliminating the need for an access point. The   
					drawback of this mode is that in Ad-Hoc mode, wireless-equipped computers are not able to communicate with   
					computers on a wired network. And, of course, communication between the wireless-equipped computers is   
					limited by the distance and interference directly between them.   
					Figure 2-1: Infrastructure Mode   
					Figure 2-2 shows a typical scenario of four Wireless-B Ethernet Bridges in ad-hoc mode. Figure 2-3 shows a   
					typical wireless bridging scenario using two Wireless-B Ethernet Bridges. Each wireless network is connected to   
					a Wireless-B Ethernet Bridge through a switch. A separate notebook computer is equipped with a wireless   
					network adapter and can communicate with either wireless network when it is configured with the appropriate   
					SSID and channel.   
					Ad-hoc: a group of wireless devices   
					communicating directly to each other   
					(peer-to-peer) without the use of an   
					access point.   
					Chapter 2: Planning Your Wireless Network   
					Network Topology   
					4 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at   
					
					Figure 2-2: Ad-Hoc Mode   
					Figure 2-3: Wireless Bridging Using Two Bridges   
					Chapter 2: Planning Your Wireless Network   
					Ad-Hoc versus Infrastructure Mode   
					5 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 3: Getting to Know the Wireless-B Ethernet Bridge   
					The Back Panel   
					All connections to the Bridge are made through the ports in its back panel, shown in Figure 3-1.   
					Figure 3-1: Back Panel   
					Important: Resetting the Wireless-B Ethernet   
					Bridge will erase all of your settings (WEP   
					encryption, wireless settings, etc.) and replace   
					them with the factory defaults. Do not reset the   
					Wireless-B Ethernet Bridge if you want to retain   
					these settings.   
					Reset   
					X-II   
					The Reset button resets the Bridge to its factory default settings.   
					The X-II (MDI/MDI-X) slide switch offers a choice between two settings. Use the X setting if you   
					are connecting the Bridge to a network adapter. Use the II setting if you are connecting the   
					Bridge to a hub or switch.   
					LAN   
					The LAN port is where you will connect the Ethernet network cable.   
					The Power port is where you will connect the power adapter.   
					Power   
					Chapter 3: Getting to Know the Wireless-B Ethernet Bridge   
					The Back Panel   
					6 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					The Front Panel   
					Network activity with the Bridge is shown on the LEDs, shown in Figure 3-2.   
					PWR   
					DIAG   
					Green. The PWR LED will light up when the Bridge is powered on.   
					Green. The DIAG LED will light up when there is a connection error. Re-establish the   
					connection to eliminate the error.   
					LAN   
					Green. The LAN LED will be lit steadily when the Bridge is connected to the wired network. The   
					LED will flash when there is wired network traffic.   
					WLAN   
					Green. The WLAN LED will be lit steadily when the Bridge is connected to the wireless   
					network. The LED will flash when there is wireless network traffic.   
					Figure 3-2: Front Panel   
					Chapter 3: Getting to Know the Wireless-B Ethernet Bridge   
					The Front Panel   
					7 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 4: Connecting the Wireless-B Ethernet Bridge for   
					Setup   
					1. Attach the Bridge’s antenna.   
					2. Plug the included Ethernet network cable into the LAN port on the back panel of the Bridge, shown in Figure   
					4-1.   
					3. The X-II (MDI/MDI-X) slide switch offers a choice between two settings. Slide the X-II switch to the X position   
					if you are connecting the Bridge to a PC’s network adapter. Slide the X-II selection switch to the II position if   
					you are connecting the Bridge to a hub or switch.   
					4. Plug the other end of the Ethernet network cable into the RJ-45 port of the hub, switch, or PC you wish to use   
					Figure 4-1: Connect the Ethernet Network Cable   
					to configure the Bridge.   
					5. Plug the supplied power adapter into the Power port on the back panel of the Bridge, shown in Figure 4-2.   
					Then plug the other end into an electrical outlet.   
					Proceed to the next section, “Chapter 5: Setting Up the Wireless-B Ethernet Bridge.”   
					Figure 4-2: Connect the Power Adapter   
					Chapter 4: Connecting the Wireless-B Ethernet Bridge for Setup   
					8 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					Overview   
					Now that you’ve connected the Wireless-B Ethernet Bridge to your wired network, you are ready to set it up. The   
					Setup Wizard will guide you through all the necessary steps.   
					Setup Wizard   
					1. Insert the Setup CD-ROM into your PC’s CD-ROM drive. The Setup Utility should run automatically, and the   
					screen in Figure 5-1 should appear. If it does not, click the Start button and choose Run. In the field that   
					appears, enter D:\setup.exe (if “D” is the letter of your CD-ROM drive).   
					• 
					• 
					• 
					Setup - Click the Setup button to proceed with the Setup Wizard.   
					User Guide - Click the User Guide button to open the PDF file of this User Guide.   
					LINKSYS Web - Click the LINKSYS Web button to access the Linksys website using an active Internet   
					connection.   
					• 
					Exit - Click the Exit button to exit the Setup Wizard.   
					Figure 5-1: Welcome   
					2. Click the Setup button to begin the setup process.   
					3. Make sure the Bridge is correctly connected to your wired network (see Figure 5-2). Then click the Next   
					button.   
					Figure 5-2: Check Connection   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					Overview   
					9 
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					4. The screen shown in Figure 5-3 displays a list of Wireless-B Ethernet Bridges on your network, along with the   
					status information for each Bridge. (If you have only one Bridge on your network, it will be the only one   
					displayed.) Select the Bridge you are currently installing by clicking its name in the Selection box. Write down   
					the IP address of the Wireless-B Ethernet Bridge, so you can use it to access the Web-based Utility later. Then   
					click the Yes button.   
					5. For security purposes, you will be asked for your password in order to access the Bridge, as shown in Figure   
					5-4. In lowercase letters, enter admin in the Password field (later you can change the password through the   
					Web-based Utility). Then click the Enter button.   
					6. The screen shown in Figure 5-5 shows a choice of two wireless modes. Click the Infrastructure radio button   
					if you want your wireless computers to network with computers on your wired network using a wireless   
					access point. Click the Ad-Hoc radio button if you want multiple wireless computers to network directly with   
					each other. Do not use the Ad-Hoc mode if you want to network your wireless computers with computers on   
					your wired network.   
					Figure 5-3: List of Bridges   
					In the WB Name field, enter a unique name for the Bridge. Memorable names are helpful, especially if you are   
					using multiple bridges on the same network. Click the Next button to continue or the Back button to return to   
					the previous screen.   
					Figure 5-4: Password   
					Figure 5-5: Mode Settings   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					Setup Wizard   
					10   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					7. The Wireless Settings screen, shown in Figure 5-6, will now appear. Enter your wireless network’s SSID. If   
					you chose Ad-Hoc mode, select the channel at which the network broadcasts its wireless signal. Then click   
					the Next button.   
					• 
					SSID - The SSID is the unique name shared among all devices in a wireless network. The SSID must be   
					identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric   
					characters, which can be any keyboard character.   
					• 
					Channel - From the drop-down menu, select the appropriate channel to match your network’s channel setting   
					(available for Ad-Hoc mode only). All devices in your wireless network must use the same channel in order to   
					function correctly.   
					8. The IP Settings screen will appear next, shown in Figure 5-7. If your network has a router or DHCP server   
					automatically assigning IP addresses, click the radio button next to Automatically obtain an IP address   
					(DHCP). Click the Next button to continue or the Back button to return to the previous screen. Then proceed   
					to step 9.   
					Figure 5-6: Wireless Settings   
					If you need to set a static IP address on the Bridge, click the radio button next to Set IP configuration   
					manually to select this option. Enter an IP Address, IP Mask, and Gateway appropriate to your network. You   
					must specify an IP address on this screen. If you are unsure about the IP Mask and Gateway, it is better to   
					leave these two fields blank. Click the Next button to continue or the Back button to return to the previous   
					screen. Then proceed to step 9.   
					• 
					• 
					IP Address - This IP address must be unique to your network.   
					IP Mask - The Bridge’s IP Mask (also known as Subnet Mask) must be the same as your wired network’s   
					Subnet Mask.   
					Figure 5-7: IP Settings   
					• 
					Gateway - Enter the IP address of your network’s Gateway (usually this is the router’s IP address).   
					9. The Security Settings screen, shown in Figure 5-8, appears next. Enable or disable Wired Equivalent Privacy   
					(WEP) encryption for your wireless network. If you enable WEP, select the level of WEP encryption, and then   
					enter a Passphrase. (If you want to enter a WEP key manually, then click the Next button.) If you want to   
					disable WEP encryption, keep the default, Disabled. Click the Next button to continue.   
					• 
					WEP (Disabled/64-bit WEP/128-bit WEP) - In order to utilize WEP encryption, select 64-bit or 128-bit WEP   
					from the drop-down menu. Then enter a Passphrase. (If you want to enter a WEP key manually, then click the   
					Next button.) If you do not want to use WEP encryption, keep the default setting, Disabled.   
					• 
					Passphrase - Instead of manually entering a WEP key, you can enter a Passphrase, so a WEP key will be   
					automatically generated after you click the Next button. The Passphrase is case-sensitive and should have 16   
					Figure 5-8: Security Settings   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					Setup Wizard   
					11   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					or fewer alphanumeric characters. It must match the passphrase of your wireless network and is compatible   
					with Linksys wireless products only. (You will have to enter the WEP key(s) manually on any non-Linksys   
					wireless products.)   
					10. If you entered a Passphrase, then you will see the automatically generated WEP key in the Key 1 field, shown   
					in Figure 5-9. Click the Next button, and proceed to step 11.   
					If you did not enter a Passphrase, then enter a WEP key in the Key 1 field. If you are using 64-bit WEP   
					encryption, then the key must consist of exactly 10 hexadecimal characters. If you are using 128-bit WEP   
					encryption, then the key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters   
					are “0”-“9” and “A”-“F”. Then click the Next button, and proceed to step 11.   
					11. Review your settings on the Confirmation screen, shown in Figure 5-10. Write down the Bridge’s IP Address if   
					you want to configure advanced settings through the Bridge’s Web-based Utility. Click the Yes button to save   
					these settings. Click the No button to exit the Setup Wizard.   
					Figure 5-9: WEP Key   
					Figure 5-10: Confirmation   
					Figure 5-11: Congratulations   
					12. The next screen, shown in Figure 5-11, shows that the configuration is complete. To configure any other   
					Wireless-B Ethernet Bridges on your network, run this Setup Wizard again. To register the Bridge, click the   
					Online Registration button. To exit the Setup Wizard, click the Exit button.   
					The Wireless-B Ethernet Bridge is now successfully configured for your network.   
					Go to “Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use.”   
					Advanced users: For advanced configuration, proceed to “Chapter 7: Using the Wireless-B Ethernet   
					Bridge Web-based Utility.”   
					Chapter 5: Setting Up the Wireless-B Ethernet Bridge   
					Setup Wizard   
					12   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 6: Connecting the Wireless-B Ethernet Bridge for   
					Network Use   
					1. After configuration, unplug the power cable from the electrical outlet, and unplug the Ethernet network cable   
					from the PC, hub, or switch.   
					2. Plug the Ethernet network cable into the RJ-45 port on the Ethernet-ready network device you wish to add to   
					the wireless network.   
					3. Plug the power cable into a local electrical outlet.   
					The installation of the Wireless-B Ethernet Bridge is complete.   
					Note: If you do not have an active connection   
					to the Ethernet-ready network device, then   
					change the position of the X-II switch.   
					If you want to use the Bridge’s Web-based Utility, refer to “Chapter 7: The Wireless-B Ethernet Bridge   
					Web-based Utility.”   
					Chapter 6: Connecting the Wireless-B Ethernet Bridge for Network Use   
					13   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based   
					Utility   
					Overview   
					The Bridge is designed to function properly after configuration using the Setup Wizard. However, if you would like   
					to change these settings or make more advanced configuration changes, use your web browser and the   
					Wireless-B Ethernet Bridge Web-based Utility. This chapter explains how to use the Utility.   
					Starting the Web-based Utility   
					1. Open your web browser, and enter the IP address of the Wireless-B Ethernet Bridge (the default is   
					192.168.1.225). Press the Enter key, and the screen shown in Figure 7-1 will appear. In lowercase letters,   
					enter the default password, admin, in the Password field. Click the OK button. You can set a new password   
					on the Password screen later.   
					2. The Utility’s Setup screen, shown in Figure 7-2, will appear.   
					The Utility provides a convenient, web-browser-based way to alter the Bridge’s settings. It offers five main   
					tabs:   
					Figure 7-1: Access the Web-based Utility   
					• 
					• 
					• 
					• 
					• 
					Setup - Enables you to configure the IP address and wireless settings.   
					Have You: Enabled TCP/IP on your PCs? PCs   
					communicate over the network with this   
					protocol. Refer to “Appendix D: Windows   
					Help” for more information on TCP/IP.   
					Password - Allows you to change the password or reset all settings to factory defaults.   
					Advanced - Lets you change the advanced wireless settings and clone a MAC address onto the Bridge.   
					Status - Displays the Bridge’s current settings.   
					Note: The Wireless-B Ethernet Bridge is   
					designed to function properly after using the   
					Setup Wizard. This chapter is provided solely   
					for those who wish to perform more advanced   
					configuration or monitoring.   
					Help - Provides explanations of various configuration settings and links to online technical support resources.   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Overview   
					14   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Setup   
					The Setup screen, shown in Figure 7-2, lets you configure the wired and wireless network settings for the Bridge.   
					• 
					Firmware - The version number of the Bridge’s firmware is displayed here. Firmware should be upgraded   
					ONLY if you experience problems with the Bridge. Firmware updates are posted at www.linksys.com. For   
					more information, refer to “Appendix C: Upgrading Firmware.”   
					• 
					MAC Address - The MAC Address of the Bridge is displayed here.   
					LAN   
					• 
					Device Name - You may assign any name to the Bridge. Unique, memorable names are helpful, especially if   
					you are using multiple bridges on the same wireless network.   
					• 
					Configuration Type - If the Bridge will obtain an IP address automatically from a DHCP server, such as a   
					router, then select Automatic Configuration-DHCP. If you are assigning the Bridge a static IP address, then   
					select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the IP Address,   
					Subnet Mask, and Gateway fields.   
					Figure 7-2: Setup Tab   
					Wireless   
					• 
					SSID - The SSID is the network name shared among all devices in a wireless network. The SSID must be   
					identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric   
					characters, which may be any keyboard character (do not use any spaces). Make sure this setting is the same   
					for all devices in your wireless network. For added security, Linksys recommends that you change the default   
					SSID (linksys) to a name of your choice.   
					To search for available wireless networks, click the Site Survey button.   
					• 
					Network Type - Choose a wireless operating mode for the Bridge. Keep the default setting, Infrastructure, if   
					you want your wireless-equipped device to communicate with computers and other devices on your wired   
					network using a wireless access point. Select Ad-Hoc button if you want multiple wireless-equipped devices   
					to communicate directly with each other.   
					If you chose Ad-Hoc mode, then select the correct operating channel for your network in the Channel drop-   
					down menu. The channel you choose should match the channel set on the other devices in your wireless   
					network.   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Setup   
					15   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					• 
					WEP - To enable WEP encryption, click the Enable radio button. To increase wireless network security, using   
					WEP encryption is strongly recommended. Then click the Edit WEP Settings button to configure the WEP   
					settings. To disable WEP encryption, keep the default, Disable.   
					An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect your wireless data   
					communications. WEP uses 64-bit or 128-bit keys to provide access control to your network and encryption   
					security for every data transmission. To decode a data transmission, each device in a network must use an   
					identical WEP key. Higher encryption levels offer higher levels of security, but due to the complexity of the   
					encryption, they may decrease network performance.   
					Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the   
					Refresh button of your web browser. Click the Cancel button to cancel your changes. Click the Help button   
					for additional on-screen information.   
					• 
					Site Survey   
					The Site Survey screen, shown in Figure 7-3, shows all the wireless networks detected by the Bridge and   
					their general information. You can use this screen to connect to one of these networks.   
					For each wireless network detected, the following information is displayed:   
					• 
					• 
					• 
					• 
					• 
					SSID - The network name. To join a wireless network, click its SSID.   
					MAC Address - The MAC address of the network’s access point.   
					Channel - The channel setting.   
					Signal Strength (%) - The percentage of wireless signal strength.   
					Mode - The network mode and status of WEP encryption.   
					Click the Refresh button to obtain the most up-to-date data. Click the Cancel button to close this screen.   
					Click the Help button for additional on-screen information.   
					Figure 7-3: Site Survey   
					• 
					WEP Encryption   
					Use the WEP screen, shown in Figure 7-4, to configure the WEP encryption level and WEP keys for the Bridge.   
					NOTE: Make sure that your WEP key matches the   
					WEP key of the wireless network you want to join.   
					Otherwise, the connection will fail.   
					• 
					Default Transmit Key - Select which WEP key (1-4) will be used when the Bridge sends data. Make sure   
					the other wireless-equipped devices are using the same key.   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Setup   
					16   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					• 
					• 
					WEP Encryption - In order to use WEP encryption, select 64-Bit (10 hex digits) or 128-Bit (26 hex   
					digits) from the drop-down menu.   
					Passphrase - Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is   
					used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16   
					alphanumeric characters. (The Passphrase function is compatible with Linksys wireless products only. If   
					you want to communicate with non-Linksys wireless products, you will need to enter your WEP key(s)   
					manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate   
					button to create WEP key(s).   
					• 
					Keys 1-4 - If you are not using a Passphrase, then you can enter one or more WEP keys manually.   
					In each key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all   
					zeroes. These are not valid key values.) If you are using 64-bit WEP encryption, then each key must   
					consist of exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then   
					each key must consist of exactly 26 hexadecimal characters in length. Valid hexadecimal characters are   
					“0”-“9” and “A”-“F”.   
					Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the   
					Refresh button of your web browser. Click the Cancel button to cancel your changes. Click the Help button   
					for additional on-screen information.   
					Figure 7-4: WEP Encryption   
					Password   
					The Password screen, shown in Figure 7-5, lets you change the Bridge’s Password and restore the factory default   
					settings.   
					• 
					Administrative Password - It is strongly recommended that you change the Bridge’s default password   
					(admin). All users who try to access the Bridge’s Web-based Utility will be prompted for the Bridge’s   
					Password. The new Password must not exceed 12 characters in length and must not include any spaces.   
					Enter the new Password a second time to confirm it.   
					• 
					Restore Factory Defaults - Click the Yes radio button to reset all configuration settings to their default values.   
					If you do not want to restore the factory defaults, then keep the default setting, No.   
					To save your changes, click the Apply button. Click the Cancel button to cancel your changes. Click the Help   
					button for additional on-screen information.   
					Figure 7-5: Password Tab   
					IMPORTANT: Any settings you have saved will be   
					lost if the default settings are restored.   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Password   
					17   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Advanced   
					Use the Advanced Settings screen, shown in Figure 7-6, to customize advanced wireless settings and clone a   
					MAC address onto the Bridge.   
					Wireless   
					• 
					• 
					Transmission Rate - The default setting is Auto. The range is from 1 to 11Mbps.   
					The rate of data transmission should be set depending on the speed of your wireless network. You can select   
					from a range of transmission speeds, or you can keep the default setting, Auto, to have the Bridge   
					automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will   
					negotiate the best possible connection speed between the Bridge and another wireless-equipped device.   
					Authentication Type - The default setting is Open System. The choices are Open System and Shared Key.   
					This setting allows the Bridge to authenticate communication with the wireless devices in your network. With   
					the Shared Key setting, all wireless devices must use the same WEP key so that the Bridge and the client can   
					authenticate each other and start transmitting data. With the Open System setting, any device can join a   
					network without performing any security check. Select the authentication type used by your wireless   
					network.   
					Figure 7-6: Advanced Settings Tab   
					MAC Address   
					• 
					Cloning Mode - You can clone the MAC address of any network device onto the Bridge. To disable MAC   
					address cloning, keep the default setting, Disable. To use the MAC cloning feature, select Enable.   
					If you have enabled MAC cloning, then select Auto if you want to clone the MAC address of the device   
					currently connected to the Bridge’s LAN port. The Bridge will actively scan for a new MAC address to be   
					cloned whenever you disconnect and re-connect the Bridge through its LAN port. Select Manual if you want   
					to specify a MAC address in the Enter MAC Address field. This is useful when the Bridge is connected to   
					multiple devices through a switch or a hub.   
					Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the   
					Refresh button of your web browser. Click the Cancel button to cancel your changes. Click the Help button for   
					additional on-screen information.   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Advanced   
					18   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Status   
					The Status screen displays the Bridge’s current status and settings. All information is read-only.   
					• 
					• 
					Device Name - The name you have assigned to the Bridge is displayed here.   
					Firmware Version - The version number of the Bridge’s firmware is displayed here. Firmware should be   
					upgraded ONLY if you experience problems with the Bridge. Firmware updates are posted at   
					
					• 
					MAC Address - The MAC Address of the Bridge is displayed here.   
					LAN Settings   
					• 
					• 
					• 
					IP Address - The Bridge’s IP Address is displayed here.   
					Subnet Mask - The Bridge’s Subnet Mask is displayed here.   
					Gateway - The Gateway address for the Bridge is displayed here.   
					LAN Statistics   
					Figure 7-7: Status Tab   
					• 
					• 
					• 
					• 
					Ethernet TX - The number of packets transmitted to the Ethernet network is displayed here.   
					Ethernet RX - The number of packets received from the Ethernet network is displayed here.   
					Wireless TX - The number of packets transmitted to the wireless network is displayed here.   
					Wireless RX - The number of packets received from the wireless network is displayed here.   
					Wireless Settings   
					• 
					• 
					• 
					• 
					• 
					SSID - The Bridge’s SSID is displayed here.   
					Network Type - The Bridge’s mode is displayed here.   
					Channel - The Bridge’s channel setting is displayed here.   
					WEP - The status of the Bridge’s WEP encryption is displayed here.   
					TX Rate - The Bridge’s transmission rate is displayed here.   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Status   
					19   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Link Quality - The percentage of the Bridge’s wireless signal strength is displayed here.   
					• 
					Click the Refresh button to obtain the most up-to-date settings and statistics. Click the Help button for additional   
					on-screen information.   
					Help   
					The Help screen offers links to all of the help information for the Web-based Utility’s screens and the Bridge’s   
					online technical support resources. All information is read-only.   
					• 
					• 
					
					Online manual in PDF format - Click the Online manual in PDF format to view this User Guide online. It is in   
					Adobe Acrobat Portable Document File (.pdf) format, so you will need the free Adobe Acrobat Reader to view   
					the pdf. If you do not have the Reader, click the Adobe Website link to download it.   
					• 
					Adobe Website (software for viewing PDF documents) - If you need to download the Adobe Acrobat Reader to   
					view the User Guide pdf, then click the Adobe Website link.   
					Figure 7-8: Help Tab   
					Chapter 7: Using the Wireless-B Ethernet Bridge Web-based Utility   
					Help   
					20   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix A: Troubleshooting   
					This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This   
					appendix provides solutions to problems that may occur during the installation and operation of the Wireless-B   
					Ethernet Bridge. Read the descriptions below to solve your problems. If you can't find an answer here, check the   
					
					Common Problems and Solutions   
					1. I can’t connect to the access point.   
					Open the Web-based Utility. On the Setup tab, perform the following steps:   
					• 
					• 
					• 
					Verify that the operating mode is set to Infrastructure mode.   
					Make sure that the SSID is the same as the SSID of the access point.   
					On the WEP Encryption screen, make sure that all of the WEP settings are the same as the WEP settings of   
					the access point.   
					2. I want to play head-to-head (ad-hoc) gaming with two Xboxes, but they won’t communicate.   
					Perform the following steps:   
					• 
					Make sure both Bridges are set to the same SSID, network mode (Ad-Hoc), channel setting, and WEP   
					settings.   
					• 
					• 
					Verify that the Bridges are set to different IP addresses.   
					You need to enable MAC address cloning on the Bridge for each Xbox. Follow these instructions:   
					1. Open the Web-based Utility for one of the Bridges.   
					2. Click the Advanced tab.   
					3. Select Enable from the MAC Address Cloning Mode drop-down menu.   
					4. Click the Auto radio button.   
					5. Click the Apply button to save your changes. When you connect the Bridge to its Xbox, the Bridge will   
					automatically clone the Xbox’s MAC address.   
					• 
					Repeat steps 1-5 for the other Bridge.   
					3. I don’t know how to change the Bridge’s IP address.   
					You have two ways to change the Bridge’s IP address.   
					• 
					Open the Web-based Utility. On the Setup screen, click the Static IP Address radio button, and change   
					the IP address there.   
					• 
					If you encounter problems, power the Bridge off and on again, or push the Reset button. Then try to   
					change the IP address again.   
					Appendix A: Troubleshooting   
					Common Problems and Solutions   
					21   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					4. The Bridge-enabled PC won’t communicate with a wireless-enabled PC or printer.   
					Perform the following steps:   
					• 
					• 
					Check that the wireless-enabled PC or printer is on the same wireless network as the PC using the Bridge.   
					Make sure that the SSID and network mode are identical for all devices connected to the same wireless   
					network.   
					• 
					If the wireless network settings are fine, then make sure that all the devices are on the same IP network.   
					5. The Web-based Utility doesn’t detect the Bridge.   
					Make sure that the Ethernet cable is properly connected and that the Ethernet LED is lit. If the LED is not lit,   
					change the position of the X-II slide switch on the Bridge’s rear panel. Use the X setting if you are connecting   
					the Bridge to a network adapter. Use the II setting if you are connecting the Bridge to a hub or switch. If you   
					still do not have an active connection, then change the position of the X-II switch again.   
					6. The Web-based Utility won’t open.   
					Make sure you correctly entered the Bridge’s IP address in the Address field of your web browser. If you are   
					not sure what the Bridge’s IP address is, then run the Setup Wizard. Follow the on-screen instructions until   
					you see a screen that lists all the Wireless-B Ethernet Bridges on your network. Select the Bridge you want to   
					access, and its IP address will appear in the Status box. Enter this IP address in your web browser’s Address   
					field. For details, see Chapter 5: Setting up the Wireless-B Ethernet Bridge.   
					7. The Web-based Utility does not recognize my password.   
					The password is case-sensitive. Make sure that you are using the correct case(s)—lowercase or   
					uppercase—when entering the password. If you forget your password, you can push the Bridge’s Reset   
					button. This will reset the password to the default setting; however, all other Bridge settings will be reset to   
					the factory defaults as well. To use the default setting, enter admin in the Password field.   
					8. After I make changes through the Web-based Utility, the new settings aren’t displayed on-screen.   
					Click the Refresh button of your web browser. If the new settings aren’t displayed, then unplug the power   
					adapter from the Bridge. Plug the power adapter back in, and then click the Refresh button again.   
					Frequently Asked Questions   
					What is the IEEE 802.11b standard?   
					It is one of the IEEE standards for wireless networks. The 802.11b standard allows wireless networking hardware   
					from different manufacturers to communicate, provided that the hardware complies with the 802.11b standard.   
					The 802.11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.   
					Can I run an application from a remote computer over the wireless network?   
					This will depend on whether or not the application is designed to be used over a network. Consult the   
					application’s user guide to determine if it supports operation over a network.   
					Appendix A: Troubleshooting   
					Frequently Asked Questions   
					22   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Can I play multiplayer games with other users of the wireless network?   
					Yes, as long as the game supports multiple players over a LAN. Refer to the game’s user guide for more   
					information.   
					What is ad-hoc mode?   
					When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to   
					communicate directly with each other. The ad-hoc wireless network will not communicate with any wired   
					network.   
					What is infrastructure mode?   
					When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with   
					a wired network through a wireless access point.   
					What is roaming?   
					Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout   
					an area greater than that covered by a single wireless network access point. Before using the roaming function,   
					the workstation must make sure that it is the same channel number as the wireless network access point of the   
					dedicated coverage area.   
					To achieve true seamless connectivity, the wireless LAN must incorporate a number of different functions. Each   
					node and wireless network access point, for example, must always acknowledge receipt of each message. Each   
					node must maintain contact with the wireless network even when not actually transmitting data. Achieving these   
					functions simultaneously requires a dynamic RF networking technology that links wireless network access points   
					and nodes. In such a system, the user’s end node undertakes a search for the best possible access to the system.   
					First, it evaluates such factors as signal strength and quality, as well as the message load currently being carried   
					by each wireless network access point and the distance of each wireless network access point to the wired   
					backbone. Based on that information, the node next selects the right wireless network access point and registers   
					its address. Communications between end node and host computer can then be transmitted up and down the   
					backbone.   
					As the user moves on, the end node’s RF transmitter regularly checks the system to determine whether it is in   
					touch with the original wireless network access point or whether it should seek a new one. When a node no   
					longer receives acknowledgment from its original wireless network access point, it undertakes a new search.   
					Upon finding a new wireless network access point, it then re-registers, and the communication process   
					continues.   
					What is ISM band?   
					The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM   
					(Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available   
					Appendix A: Troubleshooting   
					Frequently Asked Questions   
					23   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					worldwide. This presents a truly revolutionary opportunity to place convenient high speed wireless capabilities in   
					the hands of users around the globe.   
					What is Spread Spectrum?   
					Spread Spectrum technology is a wideband radio frequency technique developed by the military for use in   
					reliable, secure, mission-critical communications systems. It is designed to trade off bandwidth efficiency for   
					reliability, integrity, and security. In other words, more bandwidth is consumed than in the case of narrowband   
					transmission, but the trade-off produces a signal that is, in effect, louder and thus easier to detect, provided that   
					the receiver knows the parameters of the spread-spectrum signal being broadcast. If a receiver is not tuned to   
					the right frequency, a spread-spectrum signal looks like background noise. There are two main alternatives,   
					Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS).   
					What is DSSS? What is FHSS? And what are their differences?   
					Frequency Hopping Spread Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that   
					is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical   
					channel. To an unintended receiver, FHSS appears to be short-duration impulse noise. Direct Sequence Spread   
					Spectrum (DSSS) generates a redundant bit pattern for each bit to be transmitted. This bit pattern is called a chip   
					(or chipping code). The longer the chip, the greater the probability that the original data can be recovered. Even if   
					one or more bits in the chip are damaged during transmission, statistical techniques embedded in the radio can   
					recover the original data without the need for retransmission. To an unintended receiver, DSSS appears as low   
					power wideband noise and is rejected (ignored) by most narrowband receivers.   
					What is WEP?   
					WEP is Wired Equivalent Privacy, a data privacy mechanism based on a 40/64 bit shared key algorithm, as   
					described in the IEEE 802.11 standard.   
					Appendix A: Troubleshooting   
					Frequently Asked Questions   
					24   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix B: Wireless Security   
					A Brief Overview   
					Whenever data—in the form of files, e-mails, or messages—is transmitted over your wireless network, it is open   
					to attacks. Wireless networking is inherently risky because it broadcasts information on radio waves. Just like   
					signals from your cellular or cordless phone can be intercepted, signals from your wireless network can also be   
					compromised. What are the risks inherent in wireless networking? Read on.   
					What Are the Risks?   
					Computer network hacking is nothing new. With the advent of wireless networking, hackers use methods both   
					old and new to do everything from stealing your bandwidth to stealing your data. There are many ways this is   
					done, some simple, some complex. As a wireless user, you should be aware of the many ways they do this.   
					Every time a wireless transmission is broadcast, signals are sent out from your wireless PC or access point, but   
					not always directly to its destination. The receiving PC or access point can hear the signal because it is within   
					that radius. Just as with a cordless phone, cellular phone, or any kind of radio device, anyone else within that   
					radius, who has their device set to the same channel or bandwidth can also receive those transmission.   
					Wireless networks are easy to find. Hackers know that, in order to join a wireless network, your wireless PC will   
					typically first listen for “beacon messages”. These are identifying packets transmitted from the wireless network   
					to announce its presence to wireless nodes looking to connect. These beacon frames are decrypted and contain   
					much of the network’s information, such as the network’s SSID (Service Set Identifier) and the IP address of the   
					network PC or access point. The SSID is analogous to the network's name. With this information broadcast to   
					anyone within range, hackers are often provided with just the information they need to access that network.   
					One result of this, seen in many large cities and business districts, is called “Warchalking”. This is the term used   
					for hackers looking to access free bandwidth and free Internet access through your wireless network. The marks   
					they chalk into the city streets are well documented in the Internet and communicate exactly where available   
					wireless bandwidth is located for the taking.   
					Even keeping your network settings, such as the SSID and the channel, secret won’t prevent a hacker from   
					listening for those beacon messages and stealing that information. This is why most experts in wireless   
					networking strongly recommend the use of WEP (Wireless Equivalent Privacy). WEP encryption scrambles your   
					wireless signals so they can only be recognized within your wireless network.   
					Figure B-1: Warchalking   
					Appendix B: Wireless Security   
					A Brief Overview   
					25   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					But even WEP has its problems. WEP’s encryption algorithm is referred to as “simple”, which also means   
					“weak”, because the technology that scrambles the wireless signal isn’t too hard to crack for a persistent   
					hacker.   
					There are five common ways that hackers can break into your network and steal your bandwidth as well as your   
					data. The five attacks are popularly known as:   
					1. Passive Attacks   
					2. Jamming Attacks   
					3. Active Attacks   
					4. Dictionary-building or Table Attacks   
					5. Man-in-the-Middle Attacks   
					Passive Attacks   
					There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply   
					listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily   
					available on the Internet that can allow a person to listen into your wireless network and the information it   
					broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message   
					conversations, e-mails, account information, and any data transmitted wirelessly, can easily be seen by someone   
					outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a   
					wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a   
					“packet sniffer”, software available on the Internet, along with other freeware or shareware hacking utilities   
					available on the Internet, to acquire your WEP keys and other network information to defeat security.   
					Jamming Attacks   
					Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down   
					your wireless network. This type of attack is not always intentional and can often come about simply due to the   
					technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave   
					ovens can create a great deal of interference and jam transmissions on your wireless network. One way to   
					resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information   
					transmissions.   
					Appendix B: Wireless Security   
					What Are the Risks?   
					26   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Active Attacks   
					Hackers use Active Attacks for three purposes: 1) stealing data, 2) using your network, and 3) modifying your   
					network so it's easier to hack in the next time.   
					In an Active Attack, the hacker has gained access to all of your network settings (SSID, WEP keys, etc.) and is in   
					your network. Once in your wireless network, the hacker has access to all open resources and transmitted data   
					on the network. In addition, if the wireless network’s access point is connected to a switch, the hacker will also   
					have access to data in the wired network.   
					Further, spammers can use your Internet connection and your ISP’s mail server to send tens of thousands of e-   
					mails from your network without your knowledge.   
					Lastly, the hacker could make hacking into your network even easier by changing or removing safeguards such   
					as MAC address filters and WEP encryption. He can even steal passwords and user names for the next time he   
					wants to hack in.   
					Dictionary-Building or Table Attacks   
					Dictionary-building, or Table attacks, is a method of gaining network settings (SSID, WEP keys, etc.) by analyzing   
					about a day's worth of network traffic, mostly in the case of business networks. Over time, the hacker can build   
					up a table of network data and be able to decrypt all of your wireless transmissions. This type of attack is more   
					effective with networks that transmit more data, such as businesses.   
					Man-in-the-Middle Attacks   
					A hacker doesn’t need to log into your network as a user—he can appear as one of the network’s own access   
					points, setting himself up as the man-in-the-middle. To do this, the hacker simply needs to rig an access point   
					with your network’s settings and send out a stronger signal that your access point. In this way, some of your   
					network's PCs may associate with this rogue access point, not knowing the difference, and may begin sending   
					data through it and to this hacker.   
					The trade-off for the convenience and flexibility wireless networking provides is the possibility of being hacked   
					into through one of the methods described here. With wireless networks, even with WEP encryption, open to the   
					persistent hacker, how can you protect your data? The following section will tell you how to do just that.   
					Maximizing Wireless Security   
					Security experts will all tell you the same thing: Nothing is guaranteed. No technology is secure by itself. An   
					unfortunate axiom is that building the better mousetrap can often create a better mouse. This is why, in the   
					Appendix B: Wireless Security   
					What Are the Risks?   
					27   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					examples below, your implementation and administration of network security measures is the key to maximizing   
					wireless security.   
					No preventative measure will guarantee network security but it will make it more difficult for someone to hack   
					into your network. Often, hackers are looking for an easy target. Making your network less attractive to hackers,   
					by making it harder for them to get in, will make them look elsewhere.   
					How do you do this? Before discussing WEP, let’s look at a few security measures often overlooked.   
					1) Network Content   
					Now that you know the risks assumed when networking wirelessly, you should view wireless networks as you   
					would the Internet. Don’t host any systems or provide access to data on a wireless network that you wouldn't put   
					on the Internet.   
					2) Network Layout   
					When you first lay out your network, keep in mind where your wireless PCs are going to be located and try to   
					position your access point(s) towards the center of that network radius. Remember that access points transmit   
					indiscriminately in a radius; placing an access point at the edge of the physical network area reduces network   
					performance and leaves an opening for any hacker smart enough to discover where the access point is   
					transmitting.   
					This is an invitation for a man-in-the-middle attack, as described in the previous section. To perform this type of   
					attack, the hacker has to be physically close to your network. So, monitoring both your network and your property   
					is important. Furthermore, if you are suspicious of unauthorized network traffic, most wireless products come   
					with a log function, with which you can view activity on your network and verify if any unauthorized users have   
					had access.   
					3) Network Devices   
					With every wireless networking device you use, keep in mind that network settings (SSID, WEP keys, etc.) are   
					stored in its firmware. If they get into the hands of a hacker, so do all of your settings. So keep an eye on them.   
					4) Administrator Passwords   
					Your network administrator is the only person who can change network settings. If a hacker gets a hold of the   
					administrator's password, he, too, can change those settings. So, make it harder for a hacker to get that   
					information. Change the administrator's password regularly.   
					Appendix B: Wireless Security   
					What Are the Risks?   
					28   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					5) SSID   
					There are a few things you can do to make your SSID more secure:   
					a.Disable broadcast   
					b.Make it unique   
					c. Change it often   
					Most wireless networking devices will give you the option of broadcasting the SSID. This is a option for   
					convenience, allowing anyone to log into your wireless network. In this case, however, anyone includes hackers.   
					So don't broadcast the SSID.   
					A default SSID is set on your wireless devices by the factory. (The Linksys default SSID is “linksys”.) Hackers   
					know these defaults and can check these against your network. Change your SSID to something unique and not   
					something related to your company or the networking products you use.   
					Changing your SSID regularly will force any hacker attempting to gain access to your wireless network to start   
					looking for that new SSID.   
					With these three steps in mind, please remember that while SSIDs are good for segmenting networks, they fall   
					short with regards to security. Hackers can usually find them quite easily.   
					6) MAC Addresses   
					Enable MAC address filtering if your wireless products allow it. MAC address filtering will allow you to provide   
					access to only those wireless nodes with certain MAC addresses. This makes it harder for a hacker using a   
					random MAC address or spoofing (faking) a MAC address.   
					7) Firewalls   
					Once a hacker has broken into your wireless network, if it is connected to your wired network, they’ll have   
					access to that, too. This means that the hacker has effectively used your wireless network as a backdoor through   
					your firewall, which you've put in place to protect your network from just this kind of attack via the Internet.   
					You can use the same firewall technology to protect your wired network from hackers coming in through your   
					wireless network as you did for the Internet. Rather than connecting your access point to an unprotected switch,   
					swap those out for a router with a built-in firewall. The router will show the access point coming in through its   
					Internet port and its firewall will protect your network from any transmissions entering via your wireless network.   
					Appendix B: Wireless Security   
					What Are the Risks?   
					29   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					PCs unprotected by a firewall router should at least run firewall software, and all PCs should run up-to-date   
					antiviral software.   
					8) WEP   
					Wired Equivalent Privacy (WEP) is often looked upon as a panacea for wireless security concerns. This is   
					overstating WEP's ability. Again, this can only provide enough security to make a hacker’s job more difficult.   
					WEP encryption implementation was not put in place with the 802.11 standard. This means that there are about   
					as many methods of WEP encryption as there are providers of wireless networking products. In addition, WEP is   
					not completely secure. One piece of information still not encrypted is the MAC address, which hackers can use to   
					break into a network by spoofing (or faking) the MAC address.   
					Programs exist on the Internet that are designed to defeat WEP. The best known of these is AirSnort. In about a   
					day, AirSnort can analyze enough of the wireless transmissions to crack the WEP key. Just like a dictionary-   
					building attack, the best prevention for these types of programs is by not using static settings, periodically   
					changing WEP keys, SSID, etc.   
					There are several ways that WEP can be maximized:   
					a) Use the highest level of encryption possible   
					b) Use multiple WEP keys   
					c) Change your WEP key regularly   
					Current encryption technology offers 64-bit and 128-bit WEP encryption. If you are using 64-bit WEP, swap out   
					your old wireless units for 128-bit encryption right away. Where encryption is concerned, the bigger and more   
					complex, the better. A WEP key is a string of hexadecimal characters that your wireless network uses in two   
					ways. First, nodes in your wireless network are identified with a common WEP key. Second, these WEP keys   
					encrypt and decrypt data sent over your wireless network. So, a higher level of security ensures that hackers will   
					have a harder time breaking into your network.   
					Setting one, static WEP key on your wireless network leaves your network open the threats even as you think it is   
					protecting you. While it is true that using a WEP key increases wireless security, you can increase it further by   
					using multiple WEP keys.   
					Keep in mind that WEP keys are stored in the firmware of wireless cards and access points and can be used to   
					hack into the network if a card or access point falls into the wrong hands. Also, should someone hack into your   
					network, there would be nothing preventing someone access to the entire network, using just one static key.   
					Appendix B: Wireless Security   
					What Are the Risks?   
					30   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Important: Always remember that each   
					point in your wireless network MUST use the   
					same WEP Encryption method and encryption   
					key or your wireless network will not function   
					properly.   
					The solution, then, is to segment your network up into multiple groups. If your network had 80 users and you   
					used four WEP keys, a hacker would have access to only ¼ of your wireless network resources. In this way,   
					multiple keys reduce your liability.   
					Finally, be sure to change your WEP key regularly, once a week or once a day. Using a “dynamic” WEP key, rather   
					than one that is static, makes it even harder for a hacker to break into your network and steal your resources.   
					WEP Encryption   
					WEP encryption for the Bridge is configured through the Setup Wizard or the Web-based Utility’s Setup tab. For   
					more information about the Setup Wizard, refer to “Chapter 5: Setting Up the Wireless-B Ethernet Bridge.” To   
					enable WEP encryption through the Web-based Utility, click the WEP Key Settings button on the Setup tab. The   
					Edit WEP Settings screen will appear, as shown in Figure B-2.   
					To configure the WEP settings, follow these instructions:   
					1. For the Default Transmit Key setting, select which WEP key (1-4) will be used when the Bridge sends data.   
					Make sure the other wireless-equipped devices are using the same key.   
					2. For the WEP Encryption setting, select 64-Bit (10 hex digits) or 128-Bit (26 hex digits) from the drop-down   
					menu.   
					3. The WEP Key can be generated in two ways: you can use a Passphrase or you can enter it manually.   
					If you wish to use a Passphrase, enter it and then click the Generate key to generate WEP key(s). The   
					Passphrase is case-sensitive and can be a maximum of 16 alphanumeric characters. (The Passphrase   
					function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys   
					wireless products, you will need to enter your WEP key(s) manually on the non-Linksys wireless products.)   
					Figure B-2: WEP Encryption   
					If you are not using a Passphrase, then you can enter one or more WEP keys manually.   
					In each Key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes.   
					These are not valid key values.) If you are using 64-bit WEP encryption, then each key must consist of exactly   
					10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then each key must consist of   
					exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.   
					4. Click the Apply button to apply your changes and return to the Setup tab or Cancel to cancel your changes.   
					Click the Help button for additional on-screen information.   
					Appendix B: Wireless Security   
					What Are the Risks?   
					31   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix C: Upgrading Firmware   
					The Bridge’s firmware is upgraded with the firmware utility on the Linksys website at   
					http://linksys.com/download. Firmware should be upgraded ONLY if you experience problems with the Bridge.   
					
					2. Select WET11 - Wireless-B Ethernet Bridge - Version 2, and then select your operating system.   
					3. Then, click the Downloads for this Product button.   
					4. Select Firmware.   
					5. Read the release notes for the firmware version.   
					6. Click the word here in Click here to download the firmware file.   
					7. On the File Download screen, click Save to save the zip file to your computer.   
					8. Open the zip file and double-click the exe file.   
					9. The WET11 Firmware Upgrade utility will appear. Follow the on-screen instructions.   
					Appendix C: Upgrading Firmware   
					32   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix D: Windows Help   
					All Linksys wireless products require Microsoft Windows. Windows is the most used operating system in the   
					world and comes with many features that help make networking easier. These features can be accessed through   
					Windows Help and are described in this appendix.   
					TCP/IP   
					Before a computer can communicate with the Bridge, TCP/IP must be enabled. TCP/IP is a set of instructions, or   
					protocol, all PCs follow to communicate over a network. This is true for wireless networks as well. Your PCs will   
					not be able to utilize wireless networking without having TCP/IP enabled. Windows Help provides complete   
					instructions on enabling TCP/IP.   
					Shared Resources   
					If you wish to share printers, folder, or files over your network, Windows Help provides complete instructions on   
					utilizing shared resources.   
					Network Neighborhood/My Network Places   
					Other PCs on your network will appear under Network Neighborhood or My Network Places (depending upon the   
					version of Windows you're running). Windows Help provides complete instructions on adding PCs to your   
					network.   
					Appendix D: Windows Help   
					33   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix E: Glossary   
					802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an   
					operating frequency of 5GHz.   
					802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an   
					operating frequency of 2.4GHz.   
					802.11g - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps, an   
					operating frequency of 2.4GHz, and backward compatibility with 802.11b devices.   
					Access Point - Device that allows wireless-equipped computers and other devices to communicate with a wired   
					network. Also used to expand the range of a wireless network.   
					Adapter - This is a device that adds network functionality to your PC.   
					Ad-hoc - A group of wireless devices communicating directly with each other (peer-to-peer) without the use of   
					an access point.   
					Backbone - The part of a network that connects most of the systems and networks together, and handles the   
					most data.   
					Bandwidth - The transmission capacity of a given device or network.   
					Beacon Interval - The frequency interval of the beacon, which is a packet broadcast by a router to synchronize a   
					wireless network.   
					Bit - A binary digit.   
					Boot - To start a device and cause it to start executing instructions.   
					Bridge - A device that connects two different kinds of local networks, such as a wireless network to a wired   
					Ethernet network.   
					Broadband - An always-on, fast Internet connection.   
					Browser - A browser is an application program that provides a way to look at and interact with all the   
					information on the World Wide Web.   
					Appendix E: Glossary   
					34   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Buffer - A block of memory that temporarily holds data to be worked on later when a device is currently too busy   
					to accept the data.   
					Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the   
					Internet.   
					CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) - A method of data transfer that is used to prevent   
					data loss in a network.   
					CTS (Clear To Send) - A signal sent by a device to indicate that it is ready to receive data.   
					Daisy Chain - A method used to connect devices in a series, one after the other.   
					Database - A collection of data that is organized so that its contents can easily be accessed, managed, and   
					updated.   
					DDNS (Dynamic Domain Name System) - The capability of having a website, FTP, or e-mail server-with a   
					dynamic IP address-use a fixed domain name.   
					Default Gateway - A device that forwards Internet traffic from your local area network.   
					DHCP (Dynamic Host Configuration Protocol) - A protocol that lets one device on a local network, known as a   
					DHCP server, assign temporary IP addresses to the other network devices, typically computers.   
					DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be “seen” from   
					the Internet.   
					DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP   
					addresses.   
					Domain - A specific name for a network of computers.   
					Download - To receive a file transmitted over a network.   
					DSL (Digital Subscriber Line) - An always-on broadband connection over traditional phone lines.   
					DSSS (Direct-Sequence Spread-Spectrum) - A type of radio transmission technology that includes a redundant   
					bit pattern to lessen the probability of data lost during transmission. Used in 802.11b networking.   
					DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless   
					efficiency.   
					Appendix E: Glossary   
					35   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Dynamic IP Address - A temporary IP address assigned by a DHCP server.   
					Encryption - Encoding data to prevent it from being read by unauthorized people.   
					Ethernet - An IEEE standard network protocol that specifies how data is placed on and retrieved from a common   
					transmission medium.   
					Finger - A program that tells you the name associated with an e-mail address.   
					Firewall - Security measures that protect the resources of a local network from intruders.   
					Firmware - 1. In network devices, the programming that runs the device. 2. Programming loaded into read-only   
					memory (ROM) or programmable read-only memory (PROM) that cannot be altered by end-users.   
					Fragmentation - Breaking a packet into smaller units when transmitting over a network medium that cannot   
					support the original size of the packet.   
					FTP (File Transfer Protocol) - A standard protocol for sending files between computers over a TCP/IP network and   
					the Internet.   
					Full Duplex - The ability of a networking device to receive and transmit data simultaneously.   
					Gateway - A system that interconnects networks.   
					Half Duplex - Data transmission that can occur in two directions over a single line, but only one direction at a   
					time.   
					Hardware - The physical aspect of computers, telecommunications, and other information technology devices.   
					HTTP (HyperText Transport Protocol) - The communications protocol used to connect to servers on the World   
					Wide Web.   
					IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking   
					standards.   
					Infrastructure - Currently installed computing and networking equipment.   
					Infrastructure Mode - Configuration in which a wireless network is bridged to a wired network via an access   
					point.   
					IP (Internet Protocol) - A protocol used to send data over a network.   
					IP Address - The address used to identify a computer or device on a network.   
					Appendix E: Glossary   
					36   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device.   
					IPSec (Internet Protocol Security) - A VPN protocol used to implement secure exchange of packets at the IP layer.   
					ISM band - Radio band used in wireless networking transmissions.   
					ISP (Internet Service Provider) - A company that provides access to the Internet.   
					LAN (Local Area Network) - The computers and networking products that make up the network in your home or   
					office.   
					MAC (Media Access Control) Address - The unique address that a manufacturer assigns to each networking   
					device.   
					Mbps (Megabits Per Second) - One million bits per second; a unit of measurement for data transmission.   
					Multicasting - Sending data to a group of destinations at once.   
					NAT (Network Address Translation) - NAT technology translates IP addresses of a local area network to a   
					different IP address for the Internet.   
					Network - A series of computers or devices connected for the purpose of data sharing, storage, and/or   
					transmission between users.   
					NNTP (Network News Transfer Protocol) - The protocol used to connect to Usenet groups on the Internet.   
					Node - A network junction or connection point, typically a computer or work station.   
					OFDM (Orthogonal Frequency Division Multiplexing) - A type of modulation technology that separates the data   
					stream into a number of lower-speed data streams, which are then transmitted in parallel. Used in 802.11a,   
					802.11g, and powerline networking.   
					Packet - A unit of data sent over a network.   
					Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically   
					generating the WEP encryption keys for Linksys products.   
					Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.   
					POP3 (Post Office Protocol 3) - A standard protocol used to retrieve e-mail stored on a mail server.   
					Port - 1. The connection point on a computer or networking device used for plugging in a cable or an adapter. 2.   
					The virtual connection point through which a computer uses a specific application on a server.   
					Appendix E: Glossary   
					37   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					PPPoE (Point to Point Protocol over Ethernet) - A type of broadband connection that provides authentication   
					(username and password) in addition to data transport.   
					PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be   
					tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.   
					Preamble - Part of the wireless signal that synchronizes network traffic.   
					RJ-45 (Registered Jack-45) - An Ethernet connector that holds up to eight wires.   
					Roaming - The ability to take a wireless device from one access point’s range to another without losing the   
					connection.   
					Router - A networking device that connects multiple networks together, such as a local network and the Internet.   
					RTS (Request To Send) - A packet sent when a computer has data to transmit. The computer will wait for a CTS   
					(Clear To Send) message before sending data.   
					Server - Any computer whose function in a network is to provide user access to files, printing, communications,   
					and other services.   
					SMTP (Simple Mail Transfer Protocol) - The standard e-mail protocol on the Internet.   
					SNMP (Simple Network Management Protocol) - A widely used network monitoring and control protocol.   
					Software - Instructions for the computer. A series of instructions that performs a particular task is called a   
					“program”.   
					Spread Spectrum - Wideband radio frequency technique used for more reliable and secure data transmission.   
					SSID (Service Set IDentifier) - Your wireless network’s name.   
					Static IP Address - A fixed address assigned to a computer or device that is connected to a network.   
					Static Routing - Forwarding data in a network via a fixed path.   
					Subnet Mask - An address code that determines the size of the network.   
					Switch - 1. Device that is the central point of connection for computers and other devices in a network, so data   
					can be shared at full transmission speeds. 2. A device for making, breaking, or changing the connections in an   
					electrical circuit.   
					Appendix E: Glossary   
					38   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					TCP/IP (Transmission Control Protocol/Internet Protocol) - A network protocol for transmitting data that requires   
					acknowledgement from the recipient of data sent.   
					Telnet - A user command and TCP/IP protocol used for accessing remote PCs.   
					TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that uses UDP and has no directory or   
					password capability.   
					Throughput - The amount of data moved successfully from one node to another in a given time period.   
					Topology - The physical layout of a network.   
					TX Rate - Transmission Rate.   
					UDP (User Datagram Protocol) - A network protocol for transmitting data that does not require acknowledgement   
					from the recipient of the data that is sent.   
					Upgrade - To replace existing software or firmware with a newer version.   
					Upload - To transmit a file over a network.   
					URL (Uniform Resource Locator) - The address of a file located on the Internet.   
					VPN (Virtual Private Network) - A security measure to protect data as it leaves one network and goes to another   
					over the Internet.   
					WAN (Wide Area Network) - The Internet.   
					WEP (Wired Equivalent Privacy) - A method of encrypting data transmitted on a wireless network for greater   
					security.   
					WINIPCFG - A Windows 98 and Millennium utility that displays the IP address for a particular networking device.   
					WLAN (Wireless Local Area Network) - A group of computers and associated devices that communicate with   
					each other wirelessly.   
					Appendix E: Glossary   
					39   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix F: Specifications   
					Model   
					WET11   
					Standards   
					Ports   
					IEEE 802.11b, IEEE 802.3   
					One 10BaseT RJ-45 port, Power port   
					MDI/MDI-X slide switch, Reset button   
					Category 5 or better   
					Buttons   
					Cabling Type   
					LEDs   
					Power, LAN, WLAN, Diag   
					Peak Gain of Antenna 5 dBi   
					Transmit Power   
					Receive Sensitivity   
					Security   
					15 dBm @ Normal Temperature   
					-85 dBm   
					WEP 64/128-bit   
					Dimensions   
					4.72" x 1.22" x 3.70"   
					(120 mm x 31 mm x 94 mm)   
					Unit Weight   
					Power   
					7.04 oz. (0.2 kg)   
					External, DC 5V   
					Certifications   
					Operating Temp.   
					Storage Temp.   
					FCC, CE, IC-03, Wi-Fi   
					32°F to 104°F (0°C to 40°C)   
					-4°F to 158°F (-20°C to 70°C)   
					Appendix F: Specifications   
					40   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Operating Humidity   
					Storage Humidity   
					Warranty   
					10% to 85%, Non-Condensing   
					5% to 90%, Non-Condensing   
					1 Year Limited   
					Appendix F: Specifications   
					41   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix G: Warranty Information   
					LIMITED WARRANTY   
					Linksys warrants to the original end user purchaser (“You”) that, for a period of one year, (the “Warranty Period”) Your   
					Linksys product will be free of defects in materials and workmanship under normal use. Your exclusive remedy and   
					Linksys's entire liability under this warranty will be for Linksys at its option to repair or replace the product or refund Your   
					purchase price less any rebates.   
					If the product proves defective during the Warranty Period call Linksys Technical Support in order to obtain a Return   
					Authorization Number. BE SURE TO HAVE YOUR PROOF OF PURCHASE ON HAND WHEN CALLING. When returning a product,   
					mark the Return Authorization Number clearly on the outside of the package and include a copy of your original proof of   
					purchase. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. You are responsible for shipping   
					defective products to Linksys. Linksys pays for UPS Ground shipping from Linksys back to You only. Customers located   
					outside of the United States of America and Canada are responsible for all shipping and handling charges.   
					ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED   
					TO THE DURATION OF THE WARRANTY PERIOD. ALL OTHER EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND   
					WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF NON-INFRINGEMENT, ARE DISCLAIMED. Some jurisdictions do not   
					allow limitations on how long an implied warranty lasts, so the above limitation may not apply to You. This warranty gives   
					You specific legal rights, and You may also have other rights which vary by jurisdiction.   
					TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL LINKSYS BE LIABLE FOR ANY LOST DATA, REVENUE OR   
					PROFIT, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED   
					REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE THE   
					PRODUCT, EVEN IF LINKSYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL LINKSYS'   
					LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT.   
					The foregoing limitations will apply even if any warranty or remedy provided under this Section fails of its essential   
					purpose. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above   
					limitation or exclusion may not apply to You.   
					Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623 USA.   
					42   
					Appendix G: Warranty Information   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix H: Regulatory Information   
					FCC STATEMENT   
					This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15   
					of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a   
					residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not   
					installed and used according to the instructions, may cause harmful interference to radio communications.   
					However, there is no guarantee that interference will not occur in a particular installation. If this equipment does   
					cause harmful interference to radio or television reception, which is found by turning the equipment off and on,   
					the user is encouraged to try to correct the interference by one or more of the following measures:   
					• 
					• 
					• 
					• 
					Reorient or relocate the receiving antenna   
					Increase the separation between the equipment or devices   
					Connect the equipment to an outlet other than the receiver's   
					Consult a dealer or an experienced radio/TV technician for assistance   
					FCC Caution: Any change or modification to the product not expressly approved by Linksys could void the user’s   
					authority to operate the device.   
					FCC RF Radiation Exposure Statement   
					To comply with the FCC and ANSI C95.1 RF exposure limits, the antenna(s) for this device must comply with the   
					following:   
					• 
					Access points with 2.4 GHz or 5 GHz integrated antenna must operate with a separation distance of at least   
					20 cm from all persons using the cable provided and must not be co-located or operating in conjunction with   
					any other antenna or transmitter.   
					End-users must be provided with specific operations for satisfying RF exposure compliance.   
					Note: Dual antennas used for diversity operation are not considered co-located.   
					Appendix H: Regulatory Information   
					43   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					INDUSTRY CANADA (CANADA)   
					This Class B digital apparatus complies with Canadian ICES-003.   
					Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.   
					The use of this device in a system operating either partially or completely outdoors may require the user to obtain   
					a license for the system according to the Canadian regulations.   
					EC DECLARATION OF CONFORMITY (EUROPE)   
					Linksys declares that the Wireless-B Ethernet Bridge conforms to the specifications listed below, following the   
					provisions of the European R&TTE directive 1999/5/EC:   
					For 11Mbps, 2.4 GHz devices with 100 mW radios, the following standards were applied:   
					• 
					• 
					• 
					EN 301 489-1, 301 489-17 General EMC requirements for Radio equipment.   
					EN 609 50 Safety   
					ETS 300-328-2 Technical requirements for Radio equipment.   
					Caution: This equipment is intended to be used in all EU and EFTA countries. Outdoor use may be restricted to   
					certain frequencies and/or may require a license for operation. Contact local Authority for procedure to follow.   
					Note: Combinations of power levels and antennas resulting in a radiated power level of above 100 mW equivalent   
					isotropic radiated power (EIRP) are considered as not compliant with the above mentioned directive and are not   
					allowed for use within the European community and countries that have adopted the European R&TTE directive   
					1999/5/EC.   
					For more details on legal combinations of power levels and antennas, contact Linksys Corporate Compliance.   
					• 
					• 
					• 
					Linksys vakuuttaa täten että Wireless-B Ethernet Bridge tyyppinen laite on direktiivin 1999/5/EY oleellisten   
					vaatimusten ja sitä koskevien näiden direktiivien muiden ehtojen mukainen.   
					Linksys déclare que la Wireless-B Ethernet Bridge est conforme aux conditions essentielles et aux   
					dispositions relatives à la directive 1999/5/EC.   
					Dans le cas d'une utilisation privée, à l'extérieur d'un bâtiment, au-dessus d'un espace public, aucun   
					enregistrement n'est nécessaire pour une distance de moins de 300m. Pour une distance supérieure à 300m   
					un enregistrement auprès de l'IBPT est requise. Pour une utilisation publique à l'extérieur de bâtiments, une   
					licence de l'IBPT est requise. Pour les enregistrements et licences, veuillez contacter l'IBPT.   
					Appendix H: Regulatory Information   
					44   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					• 
					France F:   
					2.4 GHz Bande : les canaux 10, 11, 12, 13 (2457, 2462, 2467, et 2472 MHz respectivement) sont   
					complétement libres d'utilisation en France (en utilisation intérieur). Pour ce qui est des autres canaux, ils   
					peuvent être soumis à autorisation selon le départment. L'utilisation en extérieur est soumis à autorisation   
					préalable et très restreint.   
					Vous pouvez contacter l'Autorité de Régulation des Télécommunications (http://www.art-telecom.fr) pour de   
					plus amples renseignements.   
					2.4 GHz Band: only channels 10, 11, 12, 13 (2457, 2462, 2467, and 2472 MHz respectively) may be used freely   
					in France for indoor use. License required for outdoor installations.   
					
					Appendix H: Regulatory Information   
					45   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				Wireless-B Ethernet Bridge   
					Appendix I: Contact Information   
					Need to contact Linksys?   
					Visit us online for information on the latest products and updates   
					to your existing products at:   
					
					ftp.linksys.com   
					Can't find information about a product you want to buy   
					on the web? Do you want to know more about networking   
					with Linksys products? Give our advice line a call at:   
					Or fax your request in to:   
					800-546-5797 (LINKSYS)   
					949-261-8868   
					If you experience problems with any Linksys product,   
					you can call us at:   
					800-326-7114   
					Don't wish to call? You can e-mail us at:   
					support@linksys.com   
					If any Linksys product proves defective during its warranty period,   
					you can call the Linksys Return Merchandise Authorization   
					department for obtaining a Return Authorization Number at:   
					(Details on Warranty and RMA issues can be found in the Warranty   
					Information section in this Guide.)   
					949-261-1288   
					46   
					Appendix I: Contact Information   
					Download from Www.Somanuals.com. All Manuals Search And Download.   
				 |