Linksys wet610n User Manual
Linksys wet610n User Manual

Linksys wet610n User Manual

Wireless-n ethernet bridge with dual-band
Hide thumbs Also See for wet610n:

Advertisement

USER GUIDE
Wireless-N Ethernet Bridge
with Dual-Band
WET610N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Linksys wet610n

  • Page 1 USER GUIDE Wireless-N Ethernet Bridge with Dual-Band WET610N Model:...
  • Page 2: About This Guide

    About This Guide About This Guide Icon Descriptions While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons: NOTE: This check mark indicates that there is a note of interest and is something that you should pay special attention to while using the product.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview LEDs Panel ..........1 Ports Panel.
  • Page 4: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: Ethernet (Blue) The Ethernet LED lights up when there is a wired connection. The LED Product Overview flashes when the Bridge is actively sending or receiving data over the Ethernet port. Power (Blue) The Power LED lights up when Thank you for choosing the Linksys by Cisco Wireless-N the Bridge is powered on.
  • Page 5: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 6: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: In the Subnet mask field, enter 255.255.0.0. Advanced Configuration NOTE: The steps to assign a static IP address to the Ethernet adapter on your computer vary by operating system. For instructions, please refer After setting up the Bridge with the Setup Wizard (located to the help documentation of your specific on the CD-ROM), the Bridge will be ready for use.
  • Page 7 Advanced Configuration Chapter 3 Basic Wireless Settings Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, Wireless > Basic Wireless Settings (Manual) with dynamic encryption keys. Network Name (SSID) The SSID is the network name Passphrase Enter the key shared by the Bridge and shared among all points in a wireless network.
  • Page 8: Wireless > Wireless Network Site Survey

    Advanced Configuration Chapter 3 Wi-Fi Protected Setup > Congratulations Method #1 Security Mode > WEP Use this method if your router has a Wi-Fi Protected Setup Encryption Select a level of WEP encryption, 40/64 bits button. (10 hex digits) or 104/128 bits (26 hex digits). The Click or press the Wi-Fi Protected Setup button on default is 40/64 bits (10 hex digits).
  • Page 9 Advanced Configuration Chapter 3 Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and wireless router or access point. It must have 8-63 characters. Click Refresh to update the on-screen information. After you have entered the security settings, click Connect.
  • Page 10: Wireless > Wmm

    Advanced Configuration Chapter 3 Security Mode WEP is automatically displayed. Background Encryption Select a level of WEP encryption, 40/64 bits Use Aggregation This option defines whether or not the (10 hex digits) or 104/128 bits (26 hex digits). Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session.
  • Page 11: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 Voice condition” before it is closed by the timer. The range is 0 to 100 ms. The default is 3. Use Aggregation This option defines whether or not the Min. Size of Packet in Aggregation This option defines Media Access Control (MAC) layer will set up an Add Block the minimum size (in bytes) of packets to be accumulated Acknowledgement (ADDBA) session.
  • Page 12: Network Setup > Basic Network Settings

    Advanced Configuration Chapter 3 the default, 802.1D, or select 802.1Q, which is used by NOTE: The settings on the Advanced Wireless some IPTV streams. Settings screen are designed for advanced users only. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
  • Page 13: Administration > Management

    Advanced Configuration Chapter 3 Default Gateway Enter the IP address of the default Restore Click Browse and select the configuration file. • Then click Restore Configurations. gateway for your network (in most cases, this is your router). System Reboot Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
  • Page 14: Status > Bridge

    Advanced Configuration Chapter 3 Upgrade Firmware Wireless Please select a file to upgrade the firmware Link Status Click The status of the connection to your wireless Browse and select the firmware upgrade file. Then click network is displayed. Start to Upgrade and follow the on-screen instructions. MAC Address The Bridge’s MAC Address, as seen on your local, wireless network, is displayed.
  • Page 15: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Press and hold the Bridge’s Reset button for approximately five seconds; the password will be reset Troubleshooting to its factory default, admin. All other Bridge settings will be reset to the factory defaults as well. (To access the web-based utility, enter admin in the Password field.) Your computer or other wired, Ethernet device cannot...
  • Page 16: Appendix B: Specifications

    FCC, UL/cUL, ICES-003, RSS210, Specifications Wi-Fi (IEEE 802.11a/b/g/draft n), WPA2™, Wi-Fi Protected Setup™ Power 12V, 1A Model WET610N Operating Temp. 32 to 104ºF (0 to 40ºC) Standards IEEE 802.3u, 802.11g, 802.11b, 802.11a, draft 802.11n Storage Temp. -4 to 140ºF (-20 to 60ºC)
  • Page 17: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
  • Page 18: Technical Support

    Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 19: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: The availability of some specific channels and/or operational frequency bands is country dependent Regulatory Information and is firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This device complies with Part 15 of the FCC Rules.
  • Page 20: Avis D'industrie Canada

    Regulatory Information Appendix D regulations of Industry Canada. The required antenna Cet appareil est conçu pour fonctionner avec une impedance is 50 ohms. antenne ayant un gain maximal de 1,58 dBi à 2,4 GHz et de 1,45 dBi à 5 GHz. Les antennes ayant un gain plus The maximum antenna gain (please see the élevé...
  • Page 21: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 22 Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 23 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 24 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 25: Appendix E: Software License Agreement

    Software License Agreement Appendix E Appendix E: Software Schedule 1 - Linksys Software License Agreement License Agreement THIS LICENSE AGREEMENT IS BETWEEN YOU AND CISCO-LINKSYS LLC OR ONE OF ITS AFFILIATES CISCO SYSTEMS-LINKSYS (ASIA) PTE LTD. OR CISCO-LINKSYS K.K. (“LINKSYS”) LICENSING THE SOFTWARE INSTEAD OF Software in Linksys Products CISCO-LINKSYS LLC.
  • Page 26 Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 27 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 28 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 29 Software License Agreement Appendix E limited to patent issues), conditions are imposed on may choose any version ever published by the Free you (whether by court order, agreement or otherwise) Software Foundation. that contradict the conditions of this License, they do If you wish to incorporate parts of the Program into not excuse you from the conditions of this License.
  • Page 30 Software License Agreement Appendix E Copyright (C) 1991, 1999 Free Software Foundation, Inc. library is modified by someone else and passed on, the recipients should know that what they have is not the 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, original version, so that the original author’s reputation will not be affected by problems that might be introduced Everyone is permitted to copy and distribute verbatim...
  • Page 31 Software License Agreement Appendix E The precise terms and conditions for copying, distribution You may charge a fee for the physical act of transferring and modification follow. Pay close attention to the a copy, and you may at your option offer warranty difference between a “work based on the library”...
  • Page 32 Software License Agreement Appendix E a work based on the Library) on a volume of a If such an object file uses only numerical parameters, storage or distribution medium does not bring the data structure layouts and accessors, and small macros other work under the scope of this License.
  • Page 33 Software License Agreement Appendix E Accompany the work with a written offer, valid You are not required to accept this License, since you for at least three years, to give the same user the have not signed it. However, nothing else grants you materials specified in Subsection 6a, above, for a permission to modify or distribute the Library or its charge no more than the cost of performing this...
  • Page 34 Software License Agreement Appendix E If the distribution and/or use of the Library is restricted BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING in certain countries either by patents or by copyrighted RENDERED INACCURATE OR LOSSES SUSTAINED BY interfaces, the original copyright holder who places YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY the Library under this License may add an explicit...
  • Page 35 Software License Agreement Appendix E The names “OpenSSL Toolkit” and “OpenSSL Project” program startup or in documentation (online or textual) must not be used to endorse or promote products provided with the package. derived from this software without prior written Redistribution and use in source and binary forms, with permission.

Table of Contents