Network www.linksysbycisco.com/security Security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
Chapter 1 Chapter 1: Product Overview Thank you for choosing the Linksys by Cisco Wireless-N Ethernet Bridge with Dual-Band. The Bridge can connect any wired, Ethernet device to your wireless network. The Bridge is based on dual-band Wireless-N, so it is compatible with any Wireless-N, -G, -A, or -B router or access point.
3. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
Chapter 3 Chapter 3: Advanced Configuration After setting up the Bridge with the Setup Wizard (located on the CD-ROM), the Bridge will be ready for use. However, if you want to change its advanced settings, use the Bridge’s web-based utility. This chapter describes each web page of the utility and each page’s key functions.
Make sure this setting matches the setting on your wireless router or access point. For added security, you should change the default SSID (linksys) to a unique name. Wireless Security The Bridge supports the following wireless security options: WPA Personal, WPA2 Personal, and WEP.
Chapter 3 WPA Personal WPA is a security standard stronger than WEP encryption. Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and your wireless router or access point. It must have 8-63 characters.
Chapter 3 Wi-Fi Protected Setup > Congratulations Method #1 Use this method if your router has a Wi-Fi Protected Setup button. Wi-Fi Protected Setup button on Click or press the the router. Wi-Fi Protected Setup Within two minutes, click the button on the Bridge’s Wi-Fi Protected Setup screen.
Chapter 3 Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and wireless router or access point. It must have 8-63 characters. Click Refresh to update the on-screen information. After you have entered the security settings, click Connect.
Chapter 3 Background Use Aggregation This option defines whether or not the Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session. The default is No. Select Yes to enable this option. Accept Aggregation This option defines whether or not the MAC layer will accept an ADDBA request.
Chapter 3 Voice Use Aggregation This option defines whether or not the Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session. The default is Yes. Select No to disable this option. Accept Aggregation This option defines whether or not the MAC layer will accept an ADDBA request.
Bridge or the new firmware has a feature you want to use. Administration > Upgrade Firmware Before upgrading the firmware, download the Bridge’s firmware upgrade file from the Linksys website, www.linksysbycisco.com. Upgrade Firmware Please select a file to upgrade the firmware Browse and select the firmware upgrade file.
Chapter 3 Status > Bridge The Bridge’s current status information is displayed. Status > Bridge Bridge Information Firmware Version The Bridge’s current firmware is displayed. Local Network Local MAC Address The Bridge’s MAC Address, as seen on your local, Ethernet network, is displayed. IP Address The Bridge’s IP Address, as seen on your local, Ethernet network, is displayed.
Unplug the power adapter from the Bridge. Wait five seconds, and then plug the power adapter back into the Bridge. Refresh. On your web browser, click WEB: If your questions are not addressed here, refer Linksys www.linksysbycisco.com website,...
Ninety (90) days for refurbished product • Your exclusive remedy and Linksys’ entire liability under this limited warranty will be for Linksys, at its option, to (a) repair the product with new or refurbished parts, (b) replace the product with a reasonably available equivalent new or refurbished Linksys product, or (c) refund the purchase price of the product less any rebates.
This limited warranty is governed by the laws of the jurisdiction in which the Product was purchased by you. Please direct all inquiries to: Linksys, P.O. Box 18558, Irvine, CA 92623. Wireless-N Ethernet Bridge with Dual-Band...
Appendix D Appendix D: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Appendix D regulations of Industry Canada. The required antenna impedance is 50 ohms. The maximum antenna gain (please see the table below) permitted (for devices in the bands 5250-5350 MHz and 5470-5725 MHz) to comply with the E.I.R.P. limit: For 2.4 For 5 Antenna Gain...
(WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
Appendix D Português (Portuguese) - Informação ambiental para clientes da União Europeia A Directiva Europeia 2002/96/CE exige que o equipamento que exibe este símbolo no produto e/ou na sua embalagem não seja eliminado junto com os resíduos municipais não separados. O símbolo indica que este produto deve ser eliminado separadamente dos resíduos domésticos regulares.
Software, and the recipient agrees to the terms of this Agreement. “Software” includes, and this Agreement will apply to (a) the software of Linksys or its suppliers provided in or with the applicable Linksys product, excluding technology from the open source community, and (b) any upgrades, updates, bug fixes or modified versions (“Upgrades”) or...
Appendix E GNU General Public License is intended to guarantee your freedom to share and change free software–to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.
Appendix E If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions,...
END OF TERMS AND CONDITIONS END OF SCHEDULE 2 Schedule 3 If this Linksys product contains open source software licensed under Version 2.1 of the “GNU Lesser General Public License” then the license terms below in this Schedule 3 will apply to that open source software. The license terms below in this Schedule 3 are from the public web site at http://www.gnu.org/licenses/old-licenses/lgpl-2.1.html.
Appendix E Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] Preamble...
Appendix E The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a “work based on the library” and a “work that uses the library”. The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Appendix E a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library.
Appendix E Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS END OF SCHEDULE 3 Schedule 4 If this Linksys product contains open source software licensed under the OpenSSL license: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit.
Appendix E The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact email@example.com. Products derived from this software may not be called “OpenSSL”...