Cisco Linksys WET610N Quick Installation Manual
Cisco Linksys WET610N Quick Installation Manual

Cisco Linksys WET610N Quick Installation Manual

Wireless-n ethernet bridge with dual-band
Hide thumbs Also See for Linksys WET610N:

Advertisement

LINKSYS®by
Cisco
• I
I
I • I
I
I •
CISCO.
QUICK INSTALLATION GUIDE
Wireless-N Ethernet Bridge
with Dual-Band
Model:
WET610N

Advertisement

Table of Contents
loading

Summary of Contents for Cisco Linksys WET610N

  • Page 12 USER GUIDE Wireless-N Ethernet Bridge with Dual-Band WET610N Model:...
  • Page 13: About This Guide

    Glossary www.linksys.com/glossary Network Security www.linksys.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2009 Cisco Systems, Inc. All rights reserved.
  • Page 14: Table Of Contents

    Table of Contents Chapter 1: Product Overview LEDs Panel ..........1 Ports Panel.
  • Page 15: Chapter 1: Product Overview

    Ethernet port. Power (Blue) The Power LED lights up when Thank you for choosing the Linksys by Cisco Wireless-N the Bridge is powered on. Ethernet Bridge with Dual-Band. The Bridge can connect any wired, Ethernet device to your wireless network. The...
  • Page 16: Chapter 2: Wireless Security Checklist

    Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 17: Chapter 3: Advanced Configuration

    Advanced Configuration Chapter 3 Chapter 3: In the Subnet mask field, enter 255.255.0.0. Advanced Configuration NOTE: The steps to assign a static IP address to the Ethernet adapter on your computer vary by operating system. For instructions, please refer After setting up the Bridge with the Setup Wizard (located to the help documentation of your specific on the CD-ROM), the Bridge will be ready for use.
  • Page 18: Advanced Configuration

    Advanced Configuration Chapter 3 Basic Wireless Settings Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, Wireless > Basic Wireless Settings (Manual) with dynamic encryption keys. Network Name (SSID) The SSID is the network name Passphrase Enter the key shared by the Bridge and shared among all points in a wireless network.
  • Page 19: Wireless > Wireless Network Site Survey

    Advanced Configuration Chapter 3 Wi-Fi Protected Setup > Congratulations Method #1 Security Mode > WEP Use this method if your router has a Wi-Fi Protected Setup Encryption Select a level of WEP encryption, 40/64 bits button. (10 hex digits) or 104/128 bits (26 hex digits). The Click or press the Wi-Fi Protected Setup button on default is 40/64 bits (10 hex digits).
  • Page 20 Advanced Configuration Chapter 3 Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and wireless router or access point. It must have 8-63 characters. Click Refresh to update the on-screen information. After you have entered the security settings, click Connect.
  • Page 21: Wireless > Wmm

    Advanced Configuration Chapter 3 Security Mode WEP is automatically displayed. Background Encryption Select a level of WEP encryption, 40/64 bits Use Aggregation This option defines whether or not the (10 hex digits) or 104/128 bits (26 hex digits). Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session.
  • Page 22: Wireless > Advanced Wireless Settings

    Advanced Configuration Chapter 3 condition” before it is closed by the timer. The range is 0 to Voice 100 ms. The default is 3. Use Aggregation This option defines whether or not the Min. Size of Packet in Aggregation This option defines Media Access Control (MAC) layer will set up an Add Block the minimum size (in bytes) of packets to be accumulated Acknowledgement (ADDBA) session.
  • Page 23: Network Setup > Basic Network Settings

    Advanced Configuration Chapter 3 the default, 802.1D, or select 802.1Q, which is used by NOTE: The settings on the Advanced Wireless some IPTV streams. Settings screen are designed for advanced users only. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
  • Page 24: Administration > Management

    Advanced Configuration Chapter 3 Default Gateway Enter the IP address of the default Restore Click Browse and select the configuration file. gateway for your network (in most cases, this is your Then click Restore Configurations. router). System Reboot Click Save Settings to apply your changes, or click Cancel Reboot To reboot or restart the Bridge, click Start to Changes to cancel your changes.
  • Page 25: Status > Bridge

    Advanced Configuration Chapter 3 Upgrade Firmware Wireless Please select a file to upgrade the firmware Click Link Status The status of the connection to your wireless Browse and select the firmware upgrade file. Then click network is displayed. Start to Upgrade and follow the on-screen instructions. MAC Address The Bridge’s MAC Address, as seen on your local, wireless network, is displayed.
  • Page 26: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: Press and hold the Bridge’s Reset button for approximately five seconds; the password will be reset to its factory default, admin. All other Bridge settings Troubleshooting will be reset to the factory defaults as well. (To access the web-based utility, enter admin in the Password field.) Your computer or other wired, Ethernet device cannot...
  • Page 27: Appendix B: Specifications

    FCC, UL/cUL, ICES-003, RSS210, Specifications Wi-Fi (IEEE 802.11a/b/g/draft n), WPA2™, Wi-Fi Protected Setup™ Power 12V, 1A Model WET610N Operating Temp. 32 to 104ºF (0 to 40ºC) Standards IEEE 802.3u, 802.11g, 802.11b, 802.11a, draft 802.11n Storage Temp. -4 to 140ºF (-20 to 60ºC)
  • Page 28: Appendix C: Warranty Information

    Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited warranty does not guarantee any continued availability Warranty Information of a third party’s service for which this product’s use or operation may require.
  • Page 29: Technical Support

    Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
  • Page 30: Appendix D: Regulatory Information

    Regulatory Information Appendix D Appendix D: The availability of some specific channels and/or operational frequency bands is country dependent and is firmware programmed at the factory to match Regulatory Information the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This device complies with Part 15 of the FCC Rules.
  • Page 31: Avis D'industrie Canada

    Regulatory Information Appendix D regulations of Industry Canada. The required antenna Cet appareil est conçu pour fonctionner avec une impedance is 50 ohms. antenne ayant un gain maximal de 1,58 dBi à 2,4 GHz et de 1,45 dBi à 5 GHz. Les antennes ayant un gain plus The maximum antenna gain (please see the élevé...
  • Page 32: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
  • Page 33: Regulatory Information

    Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 34 Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 35 Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 36: Appendix E: Software License Agreement

    CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
  • Page 37: Software License Agreement

    Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
  • Page 38 Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
  • Page 39 Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
  • Page 40 Software License Agreement Appendix E limited to patent issues), conditions are imposed on may choose any version ever published by the Free you (whether by court order, agreement or otherwise) Software Foundation. that contradict the conditions of this License, they do If you wish to incorporate parts of the Program into not excuse you from the conditions of this License.
  • Page 41 Software License Agreement Appendix E Copyright (C) 1991, 1999 Free Software Foundation, Inc. library is modified by someone else and passed on, the recipients should know that what they have is not the 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, original version, so that the original author’s reputation will not be affected by problems that might be introduced Everyone is permitted to copy and distribute verbatim...
  • Page 42 Software License Agreement Appendix E The precise terms and conditions for copying, distribution You may charge a fee for the physical act of transferring and modification follow. Pay close attention to the a copy, and you may at your option offer warranty difference between a “work based on the library”...
  • Page 43 Software License Agreement Appendix E a work based on the Library) on a volume of a If such an object file uses only numerical parameters, storage or distribution medium does not bring the data structure layouts and accessors, and small macros other work under the scope of this License.
  • Page 44 Software License Agreement Appendix E Accompany the work with a written offer, valid You are not required to accept this License, since you for at least three years, to give the same user the have not signed it. However, nothing else grants you materials specified in Subsection 6a, above, for a permission to modify or distribute the Library or its charge no more than the cost of performing this...
  • Page 45 Software License Agreement Appendix E If the distribution and/or use of the Library is restricted BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING in certain countries either by patents or by copyrighted RENDERED INACCURATE OR LOSSES SUSTAINED BY interfaces, the original copyright holder who places YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY the Library under this License may add an explicit...
  • Page 46 Software License Agreement Appendix E The names “OpenSSL Toolkit” and “OpenSSL Project” program startup or in documentation (online or textual) must not be used to endorse or promote products provided with the package. derived from this software without prior written Redistribution and use in source and binary forms, with permission.

Table of Contents