Wireless-G Business
Ethernet Bridge

   Related Manuals for Linksys WET200

   Summary of Contents for Linksys WET200

  • Page 1

    USER GUIDE BUSINESS SERIES Wireless-G Business Ethernet Bridge WET200 Model:...

  • Page 2: About This Guide

    Glossary Network Security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.

  • Page 3: Table Of Contents

    Example of WET200 in Ad-Hoc Mode ....... . . 3...

  • Page 4: Table Of Contents

    Administration ..........18 System Status .

  • Page 5: Chapter 1: Introduction

    Ethernet cable can be run if there is not ready access to a power outlet. PoE enables delivery of both data and power to the WET200. An AC adapter is also included if the device installation site has a power outlet nearby.

  • Page 6: Chapter 2: Planning Your Wireless Network, Network Topology, Network Layout

    In Ad-Hoc mode, the WET200 communicates directly with other wireless devices, much like a wireless client card. The WET200 has been designed for use with 802.11g and 802.11b products, such as the WAP200 Wireless-G Access Point, in addition to various wireless adapters for notebook and desktop PC.

  • Page 7: Example Of Wet200 In Ad-hoc Mode

    Example of WET200 in Ad-Hoc Mode Example of WET00 in Ad-Hoc Mode The WET200 can also be used to quickly set up a temporary network, as shown above. The diagram shows three wired networks, Office One, Office Two, and Office Three, each with a direct connection to the other wired networks via an Ad-Hoc network connection.

  • Page 8: Chapter 3: Product Overview, Front Panel, Back Panel

    Chapter  Chapter : Product Overview Front Panel The Bridge’s LEDs, where information about network activity is displayed, are located on the front panel. Front Panel POWER (Green) Lights up when the Bridge is powered on. (Green) Lights up when power is being supplied through Ethernet cable.

  • Page 9: Chapter 4: Installation, Overview, Connection, Power Over Ethernet, Power Adapter, Placement Options, Stand Option

    Chapter  Chapter : Installation Overview This chapter explains how to place and connect the Bridge. Depending on your application, you might want to set up the device first before mounting the device. Refer to “Chapter 6: Advanced Configuration”. Connection There are two ways to install the Bridge: using Power over Ethernet (PoE), or using the supplied power adapter.

  • Page 10: Wall-mount Option

    Chapter  Bridge, and push the stand upward until it snaps into place. Repeat this step with the other stand. Large Prongs Stand Installation Proceed to “Chapter 6: Advanced Configuration, ” for directions on how to set up the Bridge. Wall-Mount Option On the Bridge’s back panel are two crisscross wall- mount slots.

  • Page 11: Chapter 5: Quick Configuration Overview, Overview, Accessing The Web-based Utility, Navigating The Web-based Utility, Setup

    Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to be functional right out of the box with the default settings. In order to use the wireless bridge function, however, you must first perform a minimal configuration on the Bridge so that it can find and communicate with the access point.

  • Page 12: Switch, Administration, System Status

    Chapter 5 Switch You use the Switch tabs to enter settings that are used by the Bridge’s switching features. Port Management Use this screen to configure the Administrative Status, Flow Control, Link, Duplex, and Speed of the Bridge’s ports. Port Mirroring Configure Port MIrroring on this screen.

  • Page 13: Chapter 6: Advanced Configuration, Setup

    This field is used for entering a description of where the Bridge is located, such as 3rd floor. IP Address Type Select how the WET200 will obtain its IP address, either Static IP Address (default) or Automatic Configuration-DHCP. Automatic Configuration-DHCP •...

  • Page 14: Wireless, Wireless > Basic Settings

    For added security, you should change the default SSID (linksys) to a unique name. If you are using the WET200 in Infrastructure mode to communicate with a wireless access point, enter the SSID of the access point, or click Site Survey to see a list of available access points.

  • Page 15: Wireless > Wireless Security

    (The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you must enter your WEP key manually on those products.) After you enter the Passphrase, click Generate to create WEP key(s).

  • Page 16

    Chapter  WPA2-Personal Use the WPA2 Personal screen to configure WPA2 Personal encryption for the Bridge. Wireless > Wireless Security - WPA2 Personal Encryption This is set to AES and cannot be changed as WPA2 always uses AES encryption. Shared Secret Enter a WPA Shared Secret of 8-63 characters.

  • Page 17: Wireless > Advanced Settings, Switch, Switch > Port Management

    Apply to apply your changes, or click Cancel to cancel your changes. Wireless > Advanced Settings This screen lets you configure advanced wireless settings. Linksys recommends letting the Bridge automatically adjust the parameters for maximum data throughput. Wireless > Wireless Security - Advanced Settings Transmission Rate The default setting is Auto.

  • Page 18: Switch > Port Mirroring, Switch > Vlan

    Chapter  You can configure the Administrative Status and Flow Control of the five Ethernet ports. The link speed and duplex settings are done automatically through auto-negotiation. Flow control should be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded.

  • Page 19

    Chapter  802.1Q In 802.1Q-based VLAN mode, tags are inserted into the data packets to distinguish between different VLANs. Switch > VLAN - 802.1Q A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and web- based utility access).

  • Page 20: Switch > Mac Based Acl

    Chapter  Port-Based In port-based VLAN mode, the wireless bridge uses a port- based VLAN map to limit the traffic between the ports. A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and web- based utility access).

  • Page 21: Switch > Qos, Switch > Spanning Tree

    Chapter  Switch > QoS Switch > QoS The Quality of Service (QoS) configuration in this switch has two parts: QoS Mode and Rate Limiting. QoS Mode is used to classify and prioritize packets. Rate Limiting is used to limit the amount of bandwidth used by data passing in or out of the switch port.

  • Page 22: Switch > Mac Table, Administration, Administration > Password, Administration > Web Access

    Chapter  Switch > MAC Table Use this screen to configure the MAC address table for the switch. The MAC table is used to switch frames to the correct ports. Before the MAC table is populated, a frame is broadcast to all ports. Learning mode is enabled, then the MAC table is populated automatically.

  • Page 23: Administration > Snmp, Administration > Configuration Management, Administration > Factory Defaults

    Chapter  Web HTTPS Access If you want to enable https access, select Enabled. The default setting is Disabled. Click Apply to apply your changes, or click Cancel to cancel your changes. Administration > SNMP This screen is used to configure Simple Network Management Protocol (SNMP), a popular network monitoring and management protocol.

  • Page 24: Administration > Firmware Upgrade, System Status, System Status > System Status

    This screen allows you to upgrade the Bridge’s firmware after you have downloaded a new firmware file from the Linksys website. Firmware should only be upgraded if you experience problems with the Bridge. Enter the name of the firmware file or click Browse to locate the file on your computer, then click Upgrade to begin the upgrade.

  • Page 25: System Status > Port Statistics

    Chapter  SSID Name of the wireless network. Network Type Wireless network type (Infrastructure or Ad-Hoc). Wireless Mode Wireless network mode (disabled, B/G Mixed, etc.). Channel Wireless network channel number. Security Mode Security mode (disabled, WEP, WPA- Personal, etc.) Tx Rate Wireless network transmission rate.

  • Page 26: Appendix A: Wireless Security Checklist, General Network Security Guidelines, Additional Security Tips

    . Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.

  • Page 27: Appendix B: Glossary

    This glossary contains some basic networking terms you may come across when using this product. WEB: For additional terms, please visit the glossary at Access Mode Specifies the method by which user access is granted to the system. Access Point A device that allows wireless-equipped computers and other devices to communicate with a wired network.

  • Page 28

    Appendix B CoS (Class of Service) The 802.1p priority scheme. CoS provides a method for tagging packets with priority information. A CoS value between 0-7 is added to the Layer II header of packets, where zero is the lowest priority and seven is the highest.

  • Page 29

    Appendix B MAC (Media Access Control) Address The unique address that a manufacturer assigns to each networking device. Mask A filter that includes or excludes certain values, for example parts of an IP address. Mbps (MegaBits Per Second) One million bits per second;...

  • Page 30

    Appendix B Glossary TCP (Transmission Control Protocol) A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. TCP/IP (Transmission Control Protocol/Internet Protocol) A set of instructions PCs use to communicate over a network. Telnet A user command and TCP/IP protocol used for accessing remote PCs.

  • Page 31: Appendix C: Specifications

    Appendix C Appendix C: Specifications Specifications Model WET200 Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, IEEE802.3af (Power over Ethernet), 802.1p (QoS Priority), 802.1Q (VLAN), 802.1X (Security Authentication), 802.11i-Ready (Security WPA2), 802.11e-Ready (Wireless QoS) Ports 5 10/100 Base-T Ethernet, 12 VDC Power Cabling Type...

  • Page 32: Appendix D: Warranty Information

    Appendix D: Warranty Information Limited Warranty Linksys warrants to You that, for a period of three years (the "Warranty Period"), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys’...

  • Page 33: Appendix E: Regulatory Information, Fcc Statement, Fcc Radiation Exposure Statement, Safety Notices, Industry Canada Statement

    Appendix E Appendix E: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.

  • Page 34: Avis D'industrie Canada, Avis D'industrie Canada Concernant L'exposition Aux Radiofréquences, Wireless Disclaimer

    Appendix E Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : il ne doit pas produire de brouillage et il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.

  • Page 35: User Information For Consumer Products Covered By Eu Directive 2002/96/ec On Waste Electric And Electronic Equipment (weee)

    (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...

  • Page 36

    Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.

  • Page 37

    Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...

  • Page 38

    återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit estää...

  • Page 39: Appendix F: Contact Information

    Appendix F Appendix F: Contact Information Linksys Contact Information Website Support Site FTP Site Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.

Comments to this Manuals

Symbols: 0
Latest comments: