Wireless-G Ethernet Bridge with 5-Port Switch Table of Contents Chapter 1: Introduction Welcome What’s in this Guide? Chapter 2: Planning Your Wireless Network Network Topology Network Layout Chapter 3: Getting to Know the Wireless-G Ethernet Bridge with 5-Port Switch 6 The Back Panel The Front Panel The Side Panel...
Page 4
Wireless-G Ethernet Bridge with 5-Port Switch Security Precautions Security Threats Facing Wireless Networks Appendix C: Upgrading Firmware Appendix D: Windows Help Appendix E: Glossary Appendix F: Specifications Appendix G: Warranty Information Appendix H: Regulatory Information FCC Statement Industry Canada (Canada) Appendix I: Contact Information...
Page 5
Wireless-G Ethernet Bridge with 5-Port Switch List of Figures Figure 2-1: Infrastructure Network Figure 2-2: Ad-Hoc Network Figure 2-3: Network Using Wireless Bridging Figure 3-1: Back Panel Figure 3-2: Front Panel Figure 3-3: Side Panel Figure 4-1: Connect to the Network Figure 4-2: Connect the Power Figure 5-1: Welcome Figure 5-2: Connection...
Wireless-G Ethernet Bridge with 5-Port Switch Chapter 1: Introduction Welcome Thank you for choosing the Wireless-G Ethernet Bridge with 5-port Switch. The Wireless-G Ethernet Bridge with 5-port Switch can make any wired Ethernet-equipped device a part of your wireless 802.11b or 802.11g network. At home, use the Bridge to connect game consoles or computers to your Wireless-G network and its shared high- speed Internet connection.
Wireless-G Ethernet Bridge with 5-Port Switch What’s in this Guide? This user guide covers the steps for setting up and using the Wireless-G Ethernet Bridge with 5-Port Switch. • Chapter 1: Introduction This chapter describes the Wireless-G Ethernet Bridge applications and this user guide. •...
Page 9
• Appendix H: Regulatory Information This appendix supplies the regulatory information regarding the Bridge. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this Guide?
Wireless-G Ethernet Bridge with 5-Port Switch Chapter 2: Planning Your Wireless Network Network Topology A wireless local area network (WLAN) is exactly like a regular local area network (LAN), except that each computer in the WLAN uses a wireless device to connect to the network. Computers in a WLAN share the same frequency channel and SSID, which is an identification name shared by the wireless devices belonging to the same wireless network.
WUSB11 and WUSB54G) for your computers when you want to enjoy USB connectivity. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about products that work with the Wireless-G Ethernet Bridge with 5-Port Switch.
Wireless-G Ethernet Bridge with 5-Port Switch Chapter 3: Getting to Know the Wireless-G Ethernet Bridge with 5-Port Switch The Back Panel All network connections to the Bridge are made through the ports on its back panel, shown in Figure 3-1. The reset button is also located here.
Wireless-G Ethernet Bridge with 5-Port Switch The Front Panel The LEDs indicate network activity experienced by the Bridge. (See Figure 3-2.) Figure 3-2: Front Panel Power Green. The Power LED will light up when the Bridge is powered on. While the Bridge is booting up and performing a self-test, the Power LED will flash.
Wireless-G Ethernet Bridge with 5-Port Switch Figure 3-3: Side Panel NOTE: If you use a Power over Ethernet (PoE) device to supply data and power through the Ethernet network cable, then you do not need to use the Power port. Chapter 3: Getting to Know the Wireless-G Ethernet Bridge with 5-Port Switch The Front Panel...
Wireless-G Ethernet Bridge with 5-Port Switch The Side Panel The Power port is on the side panel. (See Figure 3-3.) Power The Power port is where you will connect the power adapter. Chapter 3: Getting to Know the Wireless-G Ethernet Bridge with 5-Port Switch The Side Panel...
Wireless-G Ethernet Bridge with 5-Port Switch Chapter 4: Connecting the Wireless-G Ethernet Bridge for Setup 1. Attach the Bridge’s antenna. 2. Plug the included Ethernet network cable into one of the five LAN ports on the back panel of the Bridge, shown in Figure 4-1.
Wireless-G Ethernet Bridge with 5-Port Switch Figure 4-2: Connect the Power 4. Plug the supplied power cable into the Power port on the side panel of the Bridge, shown in Figure 4-2. Then plug the other end into an electrical outlet. Proceed to “Chapter 5: Setting Up the Wireless-G Ethernet Bridge.”...
• Setup - Click the Setup button to proceed with the Setup Wizard. • User Guide - Click the User Guide button to open the PDF file of this User Guide. • LINKSYS Web - Click the LINKSYS Web button to access the Linksys website using an active Internet connection.
Wireless-G Ethernet Bridge with 5-Port Switch 4. The screen shown in Figure 5-3 displays a list of Wireless-G Ethernet Bridges on your network, along with the status information for each Bridge. (If you have only one Bridge on your network, it will be the only one displayed.) Select the Bridge you are currently installing by clicking its name in the Selection box.
Wireless-G Ethernet Bridge with 5-Port Switch 6. The screen shown in Figure 5-5 shows a choice of two wireless modes. Click the Infrastructure radio button if you want your wireless computers to network with computers on your wired network using a wireless access point.
Wireless-G Ethernet Bridge with 5-Port Switch 7. The Wireless Settings screen, shown in Figure 5-6, will now appear. Enter your wireless network’s SSID. If you chose Ad-Hoc mode, select the channel at which the network broadcasts its wireless signal. If you have Wireless-G (802.11g) and Wireless-B (802.11b) devices in your network, then keep the default Network Mode setting, Mixed.
The Passphrase is case-sensitive and should have 16 or fewer alphanumeric characters. It must match the passphrase of your wireless network and is compatible with Linksys wireless products only. (You will have to enter the WEP key(s) manually on any non-Linksys wireless products.
Wireless-G Ethernet Bridge with 5-Port Switch 10. Review your settings on the Confirmation screen, shown in Figure 5-10. Write down the Bridge’s IP Address if you want to configure advanced settings through the Bridge’s Web-based Utility. Click the Yes button to save these settings.
Wireless-G Ethernet Bridge with 5-Port Switch Chapter 6: Connecting the Wireless-G Ethernet Bridge for Network Use Connection to a Network Device 1. After configuration, unplug the power cable from the electrical outlet, and unplug the Ethernet network cable from the PC. 2.
Wireless-G Ethernet Bridge with 5-Port Switch Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility Overview The Bridge is designed to function properly after you configure it using the Setup Wizard. However, if you would like to change these basic settings or make advanced configuration changes, use your web browser and the Wireless-G Ethernet Bridge Web-based Utility.
• Firmware - The version number of the Bridge’s firmware is displayed here. Firmware should be upgraded ONLY if you experience problems with the Bridge. Firmware updates are posted at www.linksys.com. • MAC Address - The MAC Address of the Bridge is displayed here.
(do not use any spaces). Make sure this setting is the same for all devices in your wireless network. For added security, Linksys recommends that you change the default SSID (linksys) to a name of your choice.
(The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you will need to enter your WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click the Generate button to create WEP key(s).
WEP keys. It is case-sensitive and should not be longer than 32 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only and cannot be used with Windows XP Zero Configuration. If you want to communicate with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in the wireless client.) After you enter the Passphrase, click the Generate button to...
Wireless-G Ethernet Bridge with 5-Port Switch • User ID and Password. A user identification and password are required for your security. Enter the ID in the User ID field, then the password in the Password field. When finished making your changes on this tab, click the Apply button to save these changes. TLS is a mutual authentication method that uses digital certificates.Select TLS from the EAP Type drop-down menu.
Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop- down menu. Enter the Login name of your wireless network in the User ID field and the password in the Password field.
Wireless-G Ethernet Bridge with 5-Port Switch WPA RADIUS WPA RADIUS. This option features WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) The WPA algorithm used is TKIP. Enter the RADIUS server’s IP Address and port number, along with a key shared between the Router and the server.
Wireless-G Ethernet Bridge with 5-Port Switch TTLS TTLS is a mutual authentication method that uses digital certificates. Select TTLS from the EAP Type drop- down menu. Enter the Login name of your wireless network in the User ID field and the password in the Password field.
Wireless-G Ethernet Bridge with 5-Port Switch WPA Pre-Shared Key WPA gives you TKIP for the encryption method. Enter a WPA Shared Key of 8-32 characters. (See Figure 7-11.) Enter a key shared between the Bridge and the server. Click the Apply button to save your changes. If your page doesn’t automatically refresh itself, then click the Refresh button of your web browser.
Wireless-G Ethernet Bridge with 5-Port Switch Password The Password screen, shown in Figure 7-13, lets you change the Bridge’s Username and Password and restore the factory default settings. • Username - It is strongly recommended that you change the factory default user name of the Bridge from admin to a new password that you create.
Wireless-G Ethernet Bridge with 5-Port Switch Wireless Use the Wireless screen, shown in Figure 7-14, to customize advanced wireless settings and clone a MAC address onto the Bridge. Advanced Wireless • Transmission Rate - The default setting is Auto. The range is from 1 to 54Mbps.The rate of data transmission should be set depending on the speed of your wireless network.
Wireless-G Ethernet Bridge with 5-Port Switch currently connected to the Bridge’s LAN port. The Bridge will actively scan for a new MAC address to be cloned whenever you disconnect and re-connect multiple devices to the Bridge through its LAN port. Select Manual if you want to specify a MAC address in the Enter MAC Address field.
Wireless-G Ethernet Bridge with 5-Port Switch Cost - The path cost to forward packets from this port, it's usually inversely proportional to the speed of the port. State - The STP state determined by the Spanning Tree protocol. They are Blocking, Listening, Learning and Forwarding.
Wireless-G Ethernet Bridge with 5-Port Switch • All Packets - This rate limit will be applied to all packets. • Flooded - This rate limit will be applied to Flooded unicast and Multicast and Broadcast packets. • Multicast - This rate limit will be applied to Multicast and Broadcast packets. •...
Wireless-G Ethernet Bridge with 5-Port Switch dynamic learned entries to force it to learn again. It will only dump at most 64 entries per page. If there are already 64 entries, use Get Next Page to get more pages. • Life Remaining - This is the life remaining before an idle time out. The value is 0-15. If the switch received any packets with the same destination MAC address, then the life value will reset to 15.
Page 41
Wireless-G Ethernet Bridge with 5-Port Switch The port1 to port6 checkbox is disabled so that the user can always use port1 as a back door to access the web config page when the port based VLAN is enabled. • 802.1q Port VLAN Setting - Default VID Is used when 802.1q is enabled but input packet does not have a VLAN tag.
Wireless-G Ethernet Bridge with 5-Port Switch RMON Statistics This screen is used to view the RMON counters for each port. Port Selection - Select the port to display the packets statistics. EtherStatsDropEvents - The total number of events in which packets were dropped by the probe due to lack of resources.
Page 43
Wireless-G Ethernet Bridge with 5-Port Switch Octets (FCS Error) or a bad FCS with a non-integral number of octets (Alignment Error). Note that this definition of jabber is different than the definition in IEEE-802.3 section 8.2.1.5 (10BASE5) and section 10.3.1.4 (10BASE2). These documents define jabber as the condition where any packet exceeds 20 ms.
Wireless-G Ethernet Bridge with 5-Port Switch Port Mirroring This screen shows the status of each port and allows you to configure the port mirroring settings for the manage switch feature. The information here is for the wired LAN ports. For wireless status and packet counts, please refer to the Wireless Status page.
Wireless-G Ethernet Bridge with 5-Port Switch Access List This screen is used to configure the access list settings between wireless and switch ports. Access List Type - An Access List is a list of source MAC addresses. If a packet is coming from a wireless to a LAN port or vice versa, this device will check if the source MAC address of the packet matches any entry in this list.
Wireless-G Ethernet Bridge with 5-Port Switch Wireless Status The Status screen displayed the Bridge’s current status and settings. All information is read-only. • Device Name - The name you have assigned to the Bridge is displayed here. • Firmware Version - The version number of the Bridge’s firmware is displayed here. •...
Wireless-G Ethernet Bridge with 5-Port Switch Click the Refresh button to obtain the most up-to-date settings and statistics. Click the Help button for additional on-screen information. SNMP This screen is used to configure the SNMP Trap related settings for the Bridge. SNMP Trap - Use this function to enable or disable snmp trap messages.
User Guide pdf, then click the Adobe Website link. • Firmware Upgrade - The version number of the Bridge’s firmware is displayed here. Firmware updates are posted at www.linksys.com. Firmware should be upgraded ONLY if you experience problems with the Bridge. To upgrade the firmware, follow these instructions: 1.
Wireless-G Ethernet Bridge. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com. Common Problems and Solutions 1.
Wireless-G Ethernet Bridge with 5-Port Switch 4. The Bridge-enabled PC won’t communicate with a wireless-enabled PC or printer. Perform the following steps: • Check that the wireless-enabled PC or printer is on the same wireless network as the PC using the Bridge. •...
Page 51
Wireless-G Ethernet Bridge with 5-Port Switch Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network. Can I play multiplayer games with other users of the wireless network? Yes, as long as the game supports multiple players over a LAN.
Page 52
Would the information be intercepted while transmitting on air? Linksys products feature two-fold protection in security. On the hardware side, as with Direct Sequence Spread Spectrum technology, it has the inherent security feature of scrambling. On the software side, Linksys products offer the encryption function (WEP) to enhance security and access control.
Wireless-G Ethernet Bridge with 5-Port Switch Appendix B: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
Page 54
This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
Page 55
These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix B: Wireless Security Security Threats Facing Wireless Networks...
ONLY if you experience problems with the Bridge. To upgrade the Bridge’s firmware, follow these instructions: 1. Download the Bridge’s firmware upgrade file from the Linksys website, www.linksys.com. 2. Extract the file on your computer. 3. Open the Bridge’s Web-based Utility, and click the Help tab.
Wireless-G Ethernet Bridge with 5-Port Switch Appendix D: Windows Help Almost all Linksys wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
Wireless-G Ethernet Bridge with 5-Port Switch Appendix E: Glossary 802.11a - An IEEE wireless networking standard that specifies a maximum data transfer rate of 54Mbps and an operating frequency of 5GHz. 802.11b - An IEEE wireless networking standard that specifies a maximum data transfer rate of 11Mbps and an operating frequency of 2.4GHz.
Page 59
Wireless-G Ethernet Bridge with 5-Port Switch Buffer - A shared or assigned memory area that is used to support and coordinate different computing and networking activities so one isn't held up by the other. Byte - A unit of data that is usually eight bits long Cable Modem - A device that connects a computer to the cable television network, which in turn connects to the Internet.
Page 60
Wireless-G Ethernet Bridge with 5-Port Switch DTIM (Delivery Traffic Indication Message) - A message included in data packets that can increase wireless efficiency. Dynamic IP Address - A temporary IP address assigned by a DHCP server. EAP (Extensible Authentication Protocol) - A general authentication protocol used to control network access. Many specific authentication methods work within this framework.
Page 61
Wireless-G Ethernet Bridge with 5-Port Switch IEEE (The Institute of Electrical and Electronics Engineers) - An independent institute that develops networking standards. Infrastructure - A wireless network that is bridged to a wired network via an access point. IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network.
Page 62
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
Page 63
Wireless-G Ethernet Bridge with 5-Port Switch Software - Instructions for the computer. A series of instructions that performs a particular task is called a "program". SOHO (Small Office/Home Office) - Market segment of professionals who work at home or in small offices. SPI (Stateful Packet Inspection) Firewall - A technology that inspects every incoming packet of information before allowing it to enter the network.
Page 64
Wireless-G Ethernet Bridge with 5-Port Switch UDP (User Datagram Protocol) - A network protocol for transmitting data that does not require acknowledgement from the recipient of the data that is sent. Upgrade - To replace existing software or firmware with a newer version. Upload - To transmit a file over a network.
Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
Wireless-G Ethernet Bridge with 5-Port Switch Appendix H: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...