Product Overview Chapter 1 Chapter 1: Wireless-G (Green) This LED will be lit steadily when the Bridge is connected to the wireless Product Overview network. The LED will flash when there is wireless network traffic. Thank you for choosing the Wireless-G Ethernet Bridge. The versatile Wireless-G Ethernet Bridge can make any wired Back Panel Ethernet-equipped device a part of your wireless network.
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalency Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Configuration using the Web-based Utility Chapter 3 Setup Tab Chapter 3: Configuration using the The Setup screen lets you configure the wired and wireless network settings for the Bridge. Web-based Utility The Bridge is designed to function properly after you configure it using the Setup Wizard.
Page 7
Configuration using the Web-based Utility Chapter 3 Site Survey To search for available wireless networks, click Security To enable security, select Enable, then click Site Survey. The Wireless Site Survey screen will appear. Edit Security Settings. To disable security, select Disable. This screen shows all the wireless networks detected by If you have not enabled security before clicking Edit the Bridge and their general information.
Page 8
Configuration using the Web-based Utility Chapter 3 WEP encryption, then each key must consist of exactly 26 hexadecimal characters in length. Valid hexadecimal Use the WEP screen to configure the WEP encryption for characters are “0”-“9” and “A”-“F”. the Bridge. Click Apply to save your changes.
Page 9
Configuration using the Web-based Utility Chapter 3 RADIUS should not be longer than 32 alphanumeric characters. (This Passphrase function is compatible with Linksys This option features WEP used in coordination with wireless products only and cannot be used with Windows a RADIUS server.
Configuration using the Web-based Utility Chapter 3 the fields or click Browse to browse for it, then upload it. Root Certificate Enter the root certificate you have installed to authenticate you on your wireless network or User ID Your User ID is the Login name of your wireless click Browse to browse for it.
Configuration using the Web-based Utility Chapter 3 Advanced Settings Tab not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates Use the Advanced Settings screen to customize advanced the sending of a data frame. After receiving an RTS, the wireless settings and clone a MAC address onto the wireless station responds with a Clear to Send (CTS) frame Bridge.
Configuration using the Web-based Utility Chapter 3 Status Tab Wireless RX The number of packets received from the wireless network is displayed here. The Status screen displays the Bridge’s current status and Wireless Settings settings. All information is read-only. SSID The Bridge’s SSID is displayed here.
Page 13
Configuration using the Web-based Utility Chapter 3 at www.linksys.com. Firmware should be upgraded ONLY if you experience problems with the Bridge. To upgrade the firmware, follow these instructions: Download the Bridge’s firmware upgrade file from the Linksys website, www.linksys.com. Then extract the file.
Troubleshooting Appendix A Appendix A: The Bridge-enabled PC won’t communicate with a wireless-enabled PC or printer. Troubleshooting Perform the following steps: Check that the wireless-enabled PC or printer is on the • I can’t connect to the access point. same wireless network as the PC using the Bridge. •...
Specifications Appendix B Appendix B: Specifications Model WET54G Standards IEEE 802.11g, IEEE 802.11b, IEEE 802.3, IEEE 802.3u Ports One 10/100 Auto-Cross Over (MDI/MDI-X) Port, Power Port Buttons Reset LEDs Power, Ethernet, Wireless-G Cabling Type Category 5 or better Transmit Power 16 ±...
Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited Warranty Information warranty does not guarantee any continued availability of a third party’s service for which this product’s use or operation may require.
Page 17
Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix D Safety Notices Appendix D: Regulatory Information • Caution: To reduce the risk of fire, use only No.26 AWG or larger telecommunication line cord. Do not use this product near water, for example, in a • FCC Statement wet basement or near a swimming pool.
Regulatory Information Appendix D Avis d’Industrie Canada Avis de non-responsabilité concernant les appareils sans fil Cet appareil numérique de la classe B est conforme aux normes NMB-003 et RSS210 du Canada. Les performances maximales pour les réseaux sans fil L’utilisation de ce dispositif est autorisée seulement aux sont tirées des spécifications de la norme IEEE 802.11.
Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
Page 21
Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 22
Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 23
Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
Page 25
Software and/or your use of either in order you must reproduce all copyright notices and any other (i) to enable Cisco to offer you Upgrades; (ii) to provide proprietary legends found on the original Software and support and assistance with your product and/or the Documentation;...
Page 26
TO THE EXTENT NOT PROHIBITED BY APPLICABLE Cisco product and/or Software indicates your acceptance LAW, ALL IMPLIED WARRANTIES AND CONDITIONS of the terms of the Cisco Privacy Policy, so please review OF MERCHANTABILITY, SATISFACTORY QUALITY OR the policy carefully and check the Web site above to FITNESS FOR A PARTICULAR PURPOSE ARE LIMITED TO review updates to it.
Page 28
Software End User License Agreement Appendix E TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software--to make sure the software is free for all its users. This General Public MODIFICATION License applies to most of the Free Software Foundation’s This License applies to any program or other work software and to any other program whose authors which contains a notice placed by the copyright...
Page 29
Software End User License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 30
General Public License from time to time. Such new versions will be similar in If this Cisco product contains open source software licensed spirit to the present version, but may differ in detail to under Version 2.1 of the “GNU Lesser General Public address new problems or concerns.
Page 31
Software End User License Agreement Appendix E GNU LESSER GENERAL PUBLIC LICENSE To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the Version 2.1, February 1999 library is modified by someone else and passed on, the recipients should know that what they have is not the Copyright (C) 1991, 1999 Free Software Foundation, Inc.
Page 32
Software End User License Agreement Appendix E freedom and the wherewithal to run that program using a You may copy and distribute verbatim copies of the modified version of the Library. Library’s complete source code as you receive it, in any medium, provided that you conspicuously and The precise terms and conditions for copying, distribution appropriately publish on each copy an appropriate...
Page 33
Software End User License Agreement Appendix E Thus, it is not the intent of this section to claim When a “work that uses the Library” uses material from rights or contest your rights to work written entirely a header file that is part of the Library, the object code by you;...
Page 34
Software End User License Agreement Appendix E Use a suitable shared library mechanism for linking You may not copy, modify, sublicense, link with, or with the Library. A suitable mechanism is one that distribute the Library except as expressly provided (1) uses at run time a copy of the library already under this License.
Page 35
Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com). In addition, if this Cisco product contains open source software licensed under the OpenSSL license then the license terms below in this Schedule 3-C will apply to that open source software.
Page 36
Software End User License Agreement Appendix E The OpenSSL toolkit stays under a dual license, i.e. both This product includes cryptographic software written by the conditions of the OpenSSL License and the original Eric Young (eay@cryptsoft.com). This product includes SSLeay license apply to the toolkit. See below for the software written by Tim Hudson (tjh@cryptsoft.com).
Page 37
Software End User License Agreement Appendix E BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
Need help?
Do you have a question about the WET54G and is the answer not in the manual?
Questions and answers