Ethernet port. Power (Blue) The Power LED lights up when Thank you for choosing the Linksys by Cisco Wireless-N the Bridge is powered on. Ethernet Bridge with Dual-Band. The Bridge can connect any wired, Ethernet device to your wireless network. The...
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Advanced Configuration Chapter 3 Chapter 3: In the Subnet mask field, enter 255.255.0.0. Advanced Configuration NOTE: The steps to assign a static IP address to the Ethernet adapter on your computer vary by operating system. For instructions, please refer After setting up the Bridge with the Setup Wizard (located to the help documentation of your specific on the CD-ROM), the Bridge will be ready for use.
Advanced Configuration Chapter 3 Basic Wireless Settings Security Mode > WPA Personal Encryption WPA supports the TKIP encryption method, Wireless > Basic Wireless Settings (Manual) with dynamic encryption keys. Network Name (SSID) The SSID is the network name Passphrase Enter the key shared by the Bridge and shared among all points in a wireless network.
Advanced Configuration Chapter 3 Wi-Fi Protected Setup > Congratulations Method #1 Security Mode > WEP Use this method if your router has a Wi-Fi Protected Setup Encryption Select a level of WEP encryption, 40/64 bits button. (10 hex digits) or 104/128 bits (26 hex digits). The Click or press the Wi-Fi Protected Setup button on default is 40/64 bits (10 hex digits).
Page 20
Advanced Configuration Chapter 3 Encryption WPA supports the TKIP encryption method, with dynamic encryption keys. Passphrase Enter the key shared by the Bridge and wireless router or access point. It must have 8-63 characters. Click Refresh to update the on-screen information. After you have entered the security settings, click Connect.
Advanced Configuration Chapter 3 Security Mode WEP is automatically displayed. Background Encryption Select a level of WEP encryption, 40/64 bits Use Aggregation This option defines whether or not the (10 hex digits) or 104/128 bits (26 hex digits). Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session.
Advanced Configuration Chapter 3 condition” before it is closed by the timer. The range is 0 to Voice 100 ms. The default is 3. Use Aggregation This option defines whether or not the Min. Size of Packet in Aggregation This option defines Media Access Control (MAC) layer will set up an Add Block the minimum size (in bytes) of packets to be accumulated Acknowledgement (ADDBA) session.
Advanced Configuration Chapter 3 the default, 802.1D, or select 802.1Q, which is used by NOTE: The settings on the Advanced Wireless some IPTV streams. Settings screen are designed for advanced users only. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes.
Advanced Configuration Chapter 3 Default Gateway Enter the IP address of the default Restore Click Browse and select the configuration file. gateway for your network (in most cases, this is your Then click Restore Configurations. router). System Reboot Click Save Settings to apply your changes, or click Cancel Reboot To reboot or restart the Bridge, click Start to Changes to cancel your changes.
Advanced Configuration Chapter 3 Upgrade Firmware Wireless Please select a file to upgrade the firmware Click Link Status The status of the connection to your wireless Browse and select the firmware upgrade file. Then click network is displayed. Start to Upgrade and follow the on-screen instructions. MAC Address The Bridge’s MAC Address, as seen on your local, wireless network, is displayed.
Troubleshooting Appendix A Appendix A: Press and hold the Bridge’s Reset button for approximately five seconds; the password will be reset to its factory default, admin. All other Bridge settings Troubleshooting will be reset to the factory defaults as well. (To access the web-based utility, enter admin in the Password field.) Your computer or other wired, Ethernet device cannot...
Warranty Information Appendix C Appendix C: service offerings. This limited warranty shall not apply to such third party software or service offerings. This limited warranty does not guarantee any continued availability Warranty Information of a third party’s service for which this product’s use or operation may require.
Warranty Information Appendix C rejected. Do not include any other items with the product you are returning to Linksys. Defective product covered by this limited warranty will be repaired or replaced and returned to you without charge. Customers outside of the United States of America and Canada are responsible for all shipping and handling charges, custom duties, VAT and other associated taxes and charges.
Regulatory Information Appendix D Appendix D: The availability of some specific channels and/or operational frequency bands is country dependent and is firmware programmed at the factory to match Regulatory Information the intended destination. The firmware setting is not accessible by the end user. FCC Statement Safety Notices This device complies with Part 15 of the FCC Rules.
Regulatory Information Appendix D regulations of Industry Canada. The required antenna Cet appareil est conçu pour fonctionner avec une impedance is 50 ohms. antenne ayant un gain maximal de 1,58 dBi à 2,4 GHz et de 1,45 dBi à 5 GHz. Les antennes ayant un gain plus The maximum antenna gain (please see the élevé...
Regulatory Information Appendix D User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené tímto symbolem na produktu anebo na obalu bylo likvidováno Waste Electric and Electronic Equipment s netříděným komunálním odpadem.
Regulatory Information Appendix D Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 34
Regulatory Information Appendix D Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 35
Regulatory Information Appendix D Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
CISCO-LINKSYS LLC. BY DOWNLOADING OR INSTALLING THE SOFTWARE, OR USING THE PRODUCT CONTAINING This product from Cisco-Linksys LLC or from one of its THE SOFTWARE, YOU ARE CONSENTING TO BE BOUND BY affiliates Cisco Systems-Linksys (Asia) Pte Ltd. or Cisco- THIS AGREEMENT.
Software License Agreement Appendix E your Linksys product and/or the Software is being used in OR RELATED TO THE USE OF OR INABILITY TO USE THE accordance with the terms of this Agreement; (iii) to provide SOFTWARE, EVEN IF LINKSYS HAS BEEN ADVISED OF improvements to the way Linksys delivers technology to THE POSSIBILITY OF SUCH DAMAGES.
Page 38
Software License Agreement Appendix E GNU General Public License is intended to guarantee your TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND freedom to share and change free software–to make sure MODIFICATION the software is free for all its users. This General Public This License applies to any program or other work License applies to most of the Free Software Foundation’s which contains a notice placed by the copyright...
Page 39
Software License Agreement Appendix E If the modified program normally reads commands Accompany it with the information you received as interactively when run, you must cause it, when to the offer to distribute corresponding source code. started running for such interactive use in the most (This alternative is allowed only for noncommercial ordinary way, to print or display an announcement distribution and only if you received the program...
Page 40
Software License Agreement Appendix E limited to patent issues), conditions are imposed on may choose any version ever published by the Free you (whether by court order, agreement or otherwise) Software Foundation. that contradict the conditions of this License, they do If you wish to incorporate parts of the Program into not excuse you from the conditions of this License.
Page 41
Software License Agreement Appendix E Copyright (C) 1991, 1999 Free Software Foundation, Inc. library is modified by someone else and passed on, the recipients should know that what they have is not the 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, original version, so that the original author’s reputation will not be affected by problems that might be introduced Everyone is permitted to copy and distribute verbatim...
Page 42
Software License Agreement Appendix E The precise terms and conditions for copying, distribution You may charge a fee for the physical act of transferring and modification follow. Pay close attention to the a copy, and you may at your option offer warranty difference between a “work based on the library”...
Page 43
Software License Agreement Appendix E a work based on the Library) on a volume of a If such an object file uses only numerical parameters, storage or distribution medium does not bring the data structure layouts and accessors, and small macros other work under the scope of this License.
Page 44
Software License Agreement Appendix E Accompany the work with a written offer, valid You are not required to accept this License, since you for at least three years, to give the same user the have not signed it. However, nothing else grants you materials specified in Subsection 6a, above, for a permission to modify or distribute the Library or its charge no more than the cost of performing this...
Page 45
Software License Agreement Appendix E If the distribution and/or use of the Library is restricted BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING in certain countries either by patents or by copyrighted RENDERED INACCURATE OR LOSSES SUSTAINED BY interfaces, the original copyright holder who places YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY the Library under this License may add an explicit...
Page 46
Software License Agreement Appendix E The names “OpenSSL Toolkit” and “OpenSSL Project” program startup or in documentation (online or textual) must not be used to endorse or promote products provided with the package. derived from this software without prior written Redistribution and use in source and binary forms, with permission.