Sign in today to find solutions:

Forgot your password?

Don't have an account? Sign up

 
USER GUIDE
Wireless-N Ethernet Bridge
with Dual-Band
WET610N
Model:

Summary of Contents

  • Page 1

    USER GUIDE Wireless-N Ethernet Bridge with Dual-Band WET610N Model:...

  • Page 2

    Network www.linksysbycisco.com/security Security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.

  • Page 3: Table Of Contents

    Software in Linksys Products ........

  • Page 4: Chapter 1: Product Overview, Leds Panel, Ports Panel

    Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-N Ethernet Bridge with Dual-Band. The Bridge can connect any wired, Ethernet device to your wireless network. The Bridge is based on dual-band Wireless-N, so it is compatible with any Wireless-N, -G, -A, or -B router or access point.

  • Page 5: Chapter 2: Wireless Security Checklist, General Network Security Guidelines, Additional Security Tips

    3. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.

  • Page 6: Chapter 3: Advanced Configuration, Setup > Basic Setup

    Chapter 3 Chapter 3: Advanced Configuration After setting up the Bridge with the Setup Wizard (located on the CD-ROM), the Bridge will be ready for use. However, if you want to change its advanced settings, use the Bridge’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.

  • Page 7: Wireless > Basic Wireless Settings

    Make sure this setting matches the setting on your wireless router or access point. For added security, you should change the default SSID (linksys) to a unique name. Wireless Security The Bridge supports the following wireless security options: WPA Personal, WPA2 Personal, and WEP.

  • Page 8

    Chapter 3 WPA Personal WPA is a security standard stronger than WEP encryption. Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and your wireless router or access point. It must have 8-63 characters.

  • Page 9: Wireless > Wireless Network Site Survey

    Chapter 3 Wi-Fi Protected Setup > Congratulations Method #1 Use this method if your router has a Wi-Fi Protected Setup button. Wi-Fi Protected Setup button on Click or press the the router. Wi-Fi Protected Setup Within two minutes, click the button on the Bridge’s Wi-Fi Protected Setup screen.

  • Page 10: Wireless > Wmm

    Chapter 3 Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and wireless router or access point. It must have 8-63 characters. Click Refresh to update the on-screen information. After you have entered the security settings, click Connect.

  • Page 11

    Chapter 3 Background Use Aggregation This option defines whether or not the Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session. The default is No. Select Yes to enable this option. Accept Aggregation This option defines whether or not the MAC layer will accept an ADDBA request.

  • Page 12: Wireless > Advanced Wireless Settings

    Chapter 3 Voice Use Aggregation This option defines whether or not the Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session. The default is Yes. Select No to disable this option. Accept Aggregation This option defines whether or not the MAC layer will accept an ADDBA request.

  • Page 13: Administration > Management, Administration > Factory Defaults, Administration > Upgrade Firmware

    Bridge or the new firmware has a feature you want to use. Administration > Upgrade Firmware Before upgrading the firmware, download the Bridge’s firmware upgrade file from the Linksys website, www.linksysbycisco.com. Upgrade Firmware Please select a file to upgrade the firmware Browse and select the firmware upgrade file.

  • Page 14: Status > Bridge, Status > Wireless, Status > About

    Chapter 3 Status > Bridge The Bridge’s current status information is displayed. Status > Bridge Bridge Information Firmware Version The Bridge’s current firmware is displayed. Local Network Local MAC Address The Bridge’s MAC Address, as seen on your local, Ethernet network, is displayed. IP Address The Bridge’s IP Address, as seen on your local, Ethernet network, is displayed.

  • Page 15: Appendix A: Troubleshooting

    Unplug the power adapter from the Bridge. Wait five seconds, and then plug the power adapter back into the Bridge. Refresh. On your web browser, click WEB: If your questions are not addressed here, refer Linksys www.linksysbycisco.com website,...

  • Page 16: Appendix B: Specifications

    Appendix B Appendix B: Specifications Model WET610N Standards IEEE 802.3u, 802.11g, 802.11b, 802.11a, draft 802.11n LEDs Power, Ethernet, Wi-Fi Protected Setup™, Wireless Ports Ethernet, Power Buttons Reset, Wi-Fi Protected Setup™ Cabling Type CAT5e # of Antennas 3 (internal) Antenna Connector...

  • Page 17: Appendix C: Warranty Information, Limited Warranty

    Ninety (90) days for refurbished product • Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.

  • Page 18

    This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-N Ethernet Bridge with Dual-Band...

  • Page 19: Appendix D: Regulatory Information, Fcc Statement, Fcc Radiation Exposure Statement, Safety Notices, Industry Canada Statement

    Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

  • Page 20: Avis D'industrie Canada, Restrictions Dans La Bande 5 Ghz, Wireless Disclaimer

    Appendix D regulations of Industry Canada. The required antenna impedance is 50 ohms. The maximum antenna gain (please see the table below) permitted (for devices in the bands 5250-5350 MHz and 5470-5725 MHz) to comply with the E.I.R.P. limit: For 2.4 For 5 Antenna Gain...

  • Page 21: User Information For Consumer Products Covered By Eu Directive 2002/96/ec On Waste Electric And Electronic Equipment (weee)

    (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...

  • Page 22

    Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.

  • Page 23

    Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...

  • Page 24

    Appendix D Português (Portuguese) - Informação ambiental para clientes da União Europeia A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.

  • Page 25: Appendix E: Software License Agreement, Software In Linksys Products, Software Licenses

    Software, and the recipient agrees to the terms of this Agreement. “Software” includes, and this Agreement will apply to (a) the software of Linksys or its suppliers provided in or with the applicable Linksys product, excluding technology from the open source community, and (b) any upgrades, updates, bug fixes or modified versions (“Upgrades”) or...

  • Page 26

    If You would like a copy of the GPL or other open source code in this Software on a CD, Linksys will mail to You a CD with such code for $9.99 plus the cost of shipping, upon request.

  • Page 27

    Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.

  • Page 28

    Appendix E If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...

  • Page 29

    END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under Version 2.1 of the “GNU Lesser General Public License” then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.

  • Page 30

    Appendix E Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble...

  • Page 31

    Appendix E The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.

  • Page 32

    Appendix E a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library.

  • Page 33

    Appendix E Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.

  • Page 34

    OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 3 Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.

  • Page 35

    Appendix E The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. Products derived from this software may not be called “OpenSSL”...

Comments to this Manuals

Symbols: 0

Latest comments:

×

Select the desired size and copy embed code

Copy your embed code and put on your site: