Linksys WET54G User Manual
Linksys WET54G User Manual

Linksys WET54G User Manual

Instant wireless series wireless-g ethernet bridge
Hide thumbs Also See for WET54G:

Advertisement

Instant Wireless
®
Series
Wireless-G Ethernet
Bridge
Use this guide to install:
User Guide
WET54G

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WET54G

  • Page 1 Instant Wireless ® Series Wireless-G Ethernet Bridge Use this guide to install: User Guide WET54G...
  • Page 2 If the product proves defective during this warranty period, go to the Linksys website at www.linksys.com for complete RMA (Return Merchandise Authorization) assistance. You can also call Linksys Technical Support in order to obtain a RMA Number. BE SURE TO HAVE YOUR PROOF OF PURCHASE AND A BARCODE FROM THE PRODUCT’S PACK- AGING ON HAND WHEN CALLING.
  • Page 3: Table Of Contents

    Netherlands NL License required for outdoor installations. Check with reseller for procedure to follow. • Nederlands NL Licentie verplicht voor gebruik met buitenantennes. Neem contact op met verkoper voor juiste procedure. WET54G-UG-30423A JL Wireless-G Ethernet Bridge Table of Contents Chapter 1: Introduction The Wireless-G Ethernet Bridge...
  • Page 4: Chapter 1: Introduction

    With a Wireless-G Ethernet Bridge in the garage, and anoth- er one (or a Wireless-G Access Point) in the house, you’re connected—no dig- ging trenches, and no overhead wires. Let the Wireless-G Ethernet Bridge from Linksys open up exciting new possi- bilities for your wireless network. Features •...
  • Page 5: Chapter 2: Getting To Know The Wireless-G Ethernet Bridge

    Chapter 2: Getting to Know the Wireless-G Ethernet Bridge The Wireless-G Ethernet Bridge’s Back Panel Reset The Reset button resets the Bridge to its factory default settings. X-II The X-II (MDI/MDI-X) slide switch offers a choice between two settings. Use the X setting if you are connecting the Bridge to a network adapter.
  • Page 6: Chapter 3: Planning Your Wireless Network

    Chapter 3: Planning Your Wireless Network Network Topology Network Topology A wireless local area network (WLAN) is exactly like a regular local area net- work (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency chan- nel and SSID, which is an identification name for wireless devices.
  • Page 7: Chapter 4: Connecting The Wireless-G Ethernet Bridge For Setup

    Figure 3-2 shows a typical scenario of four Wireless-G Ethernet Bridges in ad-hoc mode. Figure 3-3 shows a typical wireless bridging scenario using two Wireless-G Ethernet Bridges. Each wireless network is connected to a Wireless-G Ethernet Bridge through a switch. A separate notebook computer is equipped with a wireless PC card and can commu- nicate with both wireless networks as...
  • Page 8: Chapter 5: Setting Up The Wireless-G Ethernet Bridge

    • User Guide - Click the User Guide button to open the PDF file of this User Guide. • LINKSYS Web - Click the LINKSYS Web button to access the Linksys website using an active Internet connection. • Exit - Click the Exit button to exit the Setup Wizard.
  • Page 9 5. For security purposes, you will be asked for your password in order to access the Bridge. In lowercase letters, enter admin in the Password field (later you can change the password through the Web-based Utility). Then click the Enter button. 6.
  • Page 10 Next button. The Passphrase is case-sensitive and should have 16 or fewer alphanumeric characters. It must match the passphrase of your wire- less network and is compatible with Linksys wireless products only. (You will have to enter the WEP key(s) manually on any non-Linksys wireless products.) Figure 5-8...
  • Page 11 10. If you entered a Passphrase, then you will see the automatically generated WEP key in the Key 1 field. Click the Next button, and proceed to step 11. If you did not enter a Passphrase, then enter a WEP key in the Key 1 field. If you are using 64-bit WEP encryption, then the key must consist of exact- ly 10 hexadecimal characters.
  • Page 12: Chapter 6: Connecting The Wireless-G Ethernet Bridge For Network Use

    Chapter 6: Connecting the Wireless-G Ethernet Bridge for Network Use Connection to a Network Device 1. After configuration, unplug the power cable from the electrical outlet, and unplug the Ethernet network cable from the PC. 2. Plug the Ethernet network cable into the RJ-45 port on the Ethernet-ready network device you wish to add to the wireless network.
  • Page 13: Chapter 7: Using The Wireless-G Ethernet Bridge Web-Based Utility

    Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Overview The Bridge is designed to function properly after configuration using the Setup Wizard. However, if you would like to change these settings or make more advanced configuration changes, use your web browser and the Wireless-G Ethernet Bridge Web-based Utility.
  • Page 14: Setup

    (do not use any spaces). Make sure this setting is the same for all devices in your wireless network. For added security, Linksys recommends that you change the default SSID (linksys) to a name of your choice.
  • Page 15: Wireless Site Survey

    An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect your wireless data communications. WEP uses 64-bit or 128-bit keys to provide access control to your network and encryption secu- rity for every data transmission. To decode a data transmission, each device in a network must use an identical WEP key.
  • Page 16: Password

    (The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you will need to enter your WEP key(s) manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to cre- ate WEP key(s).
  • Page 17: Advanced

    If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission.
  • Page 18: Status

    Firmware Version - The version number of the Bridge’s firmware is dis- played here. Firmware should be upgraded ONLY if you experience prob- lems with the Bridge. Firmware updates are posted at www.linksys.com. MAC Address - The MAC Address of the Bridge is displayed here.
  • Page 19: Help

    Utility’s screens and the Bridge’s online technical support resources. All infor- mation is read-only. • Linksys Website - Click the Linksys Website link to visit Linksys’s web- site, www.linksys.com. • Online manual in PDF format - Click the Online manual in PDF format to view this User Guide on-screen.
  • Page 20: Appendix A: Troubleshooting

    This section provides solutions to potential problems regarding the installation and operation of the Wireless-G Ethernet Bridge. If you can’t find an answer here, check the Linksys website at www.linksys.com. 1. I can’t connect to the access point. Open the Web-based Utility. On the Setup tab, perform the following steps: •...
  • Page 21 Can I play multiplayer games with other users of the wireless network? Yes, as long as the game supports multiple players over a LAN. Refer to the game’s user guide for more information. What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped com- puters are configured to communicate directly with each other.
  • Page 22 802.11g - A proposed, but as yet unratified extension of the IEEE 802.11 stan- dard for wireless networking hardware. The draft 802.11g specifications used by Linksys specify a maximum data transfer rate of 54Mbps using OFDM modulation, an operating frequency of 2.4GHz, backward compatibility with IEEE 802.11b devices, and WEP encryption for security.
  • Page 23 cially useful in education and other environments where users change fre- quently. Using very short leases, DHCP can dynamically reconfigure networks in which there are more computers than there are available IP addresses. DHCP supports static addresses for computers containing Web servers that need a permanent IP address.
  • Page 24 Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. PCMCIA - The PCMCIA (Personal Computer Memory Card International Association) is an industry group organized in 1989 to promote standards for a credit card-size memory or I/O device that would fit into a personal computer, usually a notebook or laptop computer.
  • Page 25 WEP (Wired Equivalent Privacy) - A data privacy mechanism based on a 64- bit shared key algorithm, as described in the IEEE 802.11 standard. WINIPCFG - Configuration utility based on the Win32 API for querying, defining, and managing IP addresses within a network. A commonly used util- ity, under Windows 95, 98, and Millennium, for configuring networks with static IP addresses.
  • Page 26 FROM THE PRODUCT’S PACKAGING ON HAND WHEN CALLING. RETURN REQUESTS CANNOT BE PROCESSED WITHOUT PROOF OF PURCHASE. IN NO EVENT SHALL LINKSYS’S LIABILITY EXCEED THE PRICE PAID FOR THE PRODUCT FROM DIRECT, INDIRECT, SPECIAL, INCI- DENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE, OR ITS DOCUMENTATION.
  • Page 27 Appendix E: Contact Information For help with the installation or operation of the Wireless-G Ethernet Bridge, contact Linksys Technical Support at one of the phone numbers or Internet addresses below. Sales Information 800-546-5797 (LINKSYS) 800-326-7114 Technical Support RMA (Return Merchandise Authorization) Issues www.linksys.com (or call 949-271-5461)

Table of Contents