USER GUIDE BUSINESS SERIES Wireless-G Business Ethernet Bridge WET200 Model:...
Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/ or its affiliates in the U.S. and certain other countries. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Example of WET200 in Ad-Hoc Mode ....... . . 3...
Administration ..........18 System Status .
Ethernet cable can be run if there is not ready access to a power outlet. PoE enables delivery of both data and power to the WET200. An AC adapter is also included if the device installation site has a power outlet nearby.
In Ad-Hoc mode, the WET200 communicates directly with other wireless devices, much like a wireless client card. The WET200 has been designed for use with 802.11g and 802.11b products, such as the WAP200 Wireless-G Access Point, in addition to various wireless adapters for notebook and desktop PC.
Example of WET200 in Ad-Hoc Mode Example of WET00 in Ad-Hoc Mode The WET200 can also be used to quickly set up a temporary network, as shown above. The diagram shows three wired networks, Office One, Office Two, and Office Three, each with a direct connection to the other wired networks via an Ad-Hoc network connection.
Chapter Chapter : Product Overview Front Panel The Bridge’s LEDs, where information about network activity is displayed, are located on the front panel. Front Panel POWER (Green) Lights up when the Bridge is powered on. (Green) Lights up when power is being supplied through Ethernet cable.
Chapter Chapter : Installation Overview This chapter explains how to place and connect the Bridge. Depending on your application, you might want to set up the device first before mounting the device. Refer to “Chapter 6: Advanced Configuration”. Connection There are two ways to install the Bridge: using Power over Ethernet (PoE), or using the supplied power adapter.
Chapter Bridge, and push the stand upward until it snaps into place. Repeat this step with the other stand. Large Prongs Stand Installation Proceed to “Chapter 6: Advanced Configuration, ” for directions on how to set up the Bridge. Wall-Mount Option On the Bridge’s back panel are two crisscross wall- mount slots.
Quick Configuration Overview Overview The Ethernet switch of the WET200 is designed to be functional right out of the box with the default settings. In order to use the wireless bridge function, however, you must first perform a minimal configuration on the Bridge so that it can find and communicate with the access point.
Chapter 5 Switch You use the Switch tabs to enter settings that are used by the Bridge’s switching features. Port Management Use this screen to configure the Administrative Status, Flow Control, Link, Duplex, and Speed of the Bridge’s ports. Port Mirroring Configure Port MIrroring on this screen.
This field is used for entering a description of where the Bridge is located, such as 3rd floor. IP Address Type Select how the WET200 will obtain its IP address, either Static IP Address (default) or Automatic Configuration-DHCP. Automatic Configuration-DHCP •...
For added security, you should change the default SSID (linksys) to a unique name. If you are using the WET200 in Infrastructure mode to communicate with a wireless access point, enter the SSID of the access point, or click Site Survey to see a list of available access points.
(The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you must enter your WEP key manually on those products.) After you enter the Passphrase, click Generate to create WEP key(s).
Chapter WPA2-Personal Use the WPA2 Personal screen to configure WPA2 Personal encryption for the Bridge. Wireless > Wireless Security - WPA2 Personal Encryption This is set to AES and cannot be changed as WPA2 always uses AES encryption. Shared Secret Enter a WPA Shared Secret of 8-63 characters.
Apply to apply your changes, or click Cancel to cancel your changes. Wireless > Advanced Settings This screen lets you configure advanced wireless settings. Linksys recommends letting the Bridge automatically adjust the parameters for maximum data throughput. Wireless > Wireless Security - Advanced Settings Transmission Rate The default setting is Auto.
Chapter You can configure the Administrative Status and Flow Control of the five Ethernet ports. The link speed and duplex settings are done automatically through auto-negotiation. Flow control should be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded.
Chapter 802.1Q In 802.1Q-based VLAN mode, tags are inserted into the data packets to distinguish between different VLANs. Switch > VLAN - 802.1Q A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and web- based utility access).
Chapter Port-Based In port-based VLAN mode, the wireless bridge uses a port- based VLAN map to limit the traffic between the ports. A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and web- based utility access).
Chapter Switch > QoS Switch > QoS The Quality of Service (QoS) configuration in this switch has two parts: QoS Mode and Rate Limiting. QoS Mode is used to classify and prioritize packets. Rate Limiting is used to limit the amount of bandwidth used by data passing in or out of the switch port.
Chapter Switch > MAC Table Use this screen to configure the MAC address table for the switch. The MAC table is used to switch frames to the correct ports. Before the MAC table is populated, a frame is broadcast to all ports. Learning mode is enabled, then the MAC table is populated automatically.
Chapter Web HTTPS Access If you want to enable https access, select Enabled. The default setting is Disabled. Click Apply to apply your changes, or click Cancel to cancel your changes. Administration > SNMP This screen is used to configure Simple Network Management Protocol (SNMP), a popular network monitoring and management protocol.
This screen allows you to upgrade the Bridge’s firmware after you have downloaded a new firmware file from the Linksys website. Firmware should only be upgraded if you experience problems with the Bridge. Enter the name of the firmware file or click Browse to locate the file on your computer, then click Upgrade to begin the upgrade.
Chapter SSID Name of the wireless network. Network Type Wireless network type (Infrastructure or Ad-Hoc). Wireless Mode Wireless network mode (disabled, B/G Mixed, etc.). Channel Wireless network channel number. Security Mode Security mode (disabled, WEP, WPA- Personal, etc.) Tx Rate Wireless network transmission rate.
. Enable MAC address filtering Linksys routers give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device.
This glossary contains some basic networking terms you may come across when using this product. WEB: For additional terms, please visit the glossary at www.linksys.com/glossary Access Mode Specifies the method by which user access is granted to the system. Access Point A device that allows wireless-equipped computers and other devices to communicate with a wired network.
Appendix B CoS (Class of Service) The 802.1p priority scheme. CoS provides a method for tagging packets with priority information. A CoS value between 0-7 is added to the Layer II header of packets, where zero is the lowest priority and seven is the highest.
Appendix B MAC (Media Access Control) Address The unique address that a manufacturer assigns to each networking device. Mask A filter that includes or excludes certain values, for example parts of an IP address. Mbps (MegaBits Per Second) One million bits per second;...
Appendix B Glossary TCP (Transmission Control Protocol) A network protocol for transmitting data that requires acknowledgement from the recipient of data sent. TCP/IP (Transmission Control Protocol/Internet Protocol) A set of instructions PCs use to communicate over a network. Telnet A user command and TCP/IP protocol used for accessing remote PCs.
Appendix C Appendix C: Specifications Specifications Model WET200 Standards IEEE802.11g, IEEE802.11b, IEEE802.3, IEEE802.3u, IEEE802.3af (Power over Ethernet), 802.1p (QoS Priority), 802.1Q (VLAN), 802.1X (Security Authentication), 802.11i-Ready (Security WPA2), 802.11e-Ready (Wireless QoS) Ports 5 10/100 Base-T Ethernet, 12 VDC Power Cabling Type...
Appendix D: Warranty Information Limited Warranty Linksys warrants to You that, for a period of three years (the "Warranty Period"), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys’...
Appendix E Appendix E: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Appendix E Avis d’Industrie Canada Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : il ne doit pas produire de brouillage et il doit accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
(WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: English - Environmental Information for Customers in...
Appendix E Eesti (Estonian) - Keskkonnaalane informatsioon Euroopa Liidus asuvatele klientidele Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on seadmeid, millel on tootel või pakendil käesolev sümbol keelatud kõrvaldada koos sorteerimata olmejäätmetega. See sümbol näitab, et toode tuleks kõrvaldada eraldi tavalistest olmejäätmevoogudest.
Appendix E Lietuvškai (Lithuanian) - Aplinkosaugos informacija, skirta Europos Sąjungos vartotojams Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir kurios pakuotė yra pažymėta šiuo simboliu (įveskite simbolį), negalima šalinti kartu su nerūšiuotomis komunalinėmis atliekomis. Šis simbolis rodo, kad gaminį reikia šalinti atskirai nuo bendro buitinių...
återvinning skyddar mot eventuella negativa konsekvenser för miljön och personhälsa. För mer detaljerad information om kassering av din gamla utrustning kontaktar du dina lokala myndigheter, avfallshanteringen eller butiken där du köpte produkten. WEB: For additional information, please visit www.linksys.com estää...
Appendix F Appendix F: Contact Information Linksys Contact Information Website http://www.linksys.com Support Site http://www.linksys.com/support FTP Site ftp.linksys.com Advice Line 800-546-5797 (LINKSYS) Support 800-326-7114 RMA (Return Merchandise http://www.linksys.com/warranty Authorization) NOTE: Details on warranty and RMA issues can be found in the Warranty section of this Guide.