Linksys WET54G Router Manual PDF (Setup & Configuration Guide)

Given below is full router user manual of Linksys WET54G router model. You can also download this manual in PDF Format to read later on your computer.

Product user manuals come handy in case you want to know all functionalities of your device, troubleshooting, fist time configuration & setup and in many other situations.

Page 1 / 37
USER GUIDE
Wireless-G Ethernet Bridge
Model:
WET54G
Page 2 / 37
About This Guide
i
Wireless-G Ethernet Bridge
About This Guide
Icon Descriptions
While reading through the User Guide you may see
various icons that call attention to specific items. Below is
a description of these icons:
NOTE:
This check mark indicates that there is
a note of interest and is something that you
should pay special attention to while using the
product.
WARNING:
This exclamation point indicates
that there is a caution or warning and it is
something that could damage your property or
product.
WEB:
This globe icon indicates a noteworthy
website address or e-mail address.
Online Resources
Website addresses in this document are listed without
http://
in front of the address because most current web
browsers do not require it. If you use an older web browser,
you may have to add
http://
in front of the web address.
Resource
Website
Linksys
www.linksys.com
Linksys International
www.linksys.com/international
Glossary
www.linksys.com/glossary
Network Security
www.linksys.com/security
Copyright and Trademarks
Linksys, Cisco and the Cisco Logo are
registered trademarks or trademarks of
Cisco Systems, Inc. and/or its affiliates
in the U.S. and certain other countries.
Copyright © 2008 Cisco Systems, Inc. All
rights reserved. Other brands and product
names
are
trademarks
or
registered
trademarks of their respective holders.
Page 3 / 37
Table of Contents
ii
Wireless-G Ethernet Bridge
Chapter 1: Product Overview
1
Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2: Wireless Security Checklist
2
General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Chapter 3: Configuration using the Web-based Utility
3
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Setup Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Password Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Advanced Settings Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Status Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Help Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix A: Troubleshooting
11
Appendix B: Specifications
12
Appendix C: Warranty Information
13
Limited Warranty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Appendix D: Regulatory Information
15
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
FCC Radiation Exposure Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Safety Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Avis d’Industrie Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Avis de non-responsabilité concernant les appareils sans fil . . . . . . . . . . . . . . . . . .16
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
Appendix E: Software End User License Agreement
21
Cisco Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21
Page 4 / 37
Chapter 1
Product Overview
1
Wireless-G Ethernet Bridge
Chapter 1:
Product Overview
Thank you for choosing the Wireless-G Ethernet Bridge. The
versatile Wireless-G Ethernet Bridge can make any wired
Ethernet-equipped device a part of your wireless network.
At home, use the Bridge to connect game consoles, set-
top boxes, or computers to your Wireless-G network and
its shared high-speed Internet connection. In the office,
convert your Ethernet-wired printer, camera, notebook or
desktop into a wireless networked device.
Front Panel
Power
(Green) This LED lights up when the
Bridge is powered on. The LED flashes while the
Bridge is booting up and performing a self-test,
and remains lit after the self-test has ended.
Ethernet
(Green) This LED will be lit steadily
when the Bridge is connected to the wired
network. The LED will flash when there is wired
network traffic.
Wireless-G
(Green) This LED will be lit steadily
when the Bridge is connected to the wireless
network. The LED will flash when there is
wireless network traffic.
Back Panel
Reset
When pressed, the Reset button resets
the Bridge to its factory default settings.
LAN
The LAN port is where you will connect
the Ethernet network cable.
Power
The Power port is where you will
connect the power adapter.
NOTE:
If you reset the Wireless-G Ethernet
Bridge, you will erase all of your settings (WEP
encryption, wireless settings, etc.) and replace
them with the factory defaults. Do not reset the
Wireless-G Ethernet Bridge if you want to retain
these settings.
Page 5 / 37
Chapter 2
Wireless Security Checklist
2
Wireless-G Ethernet Bridge
Chapter 2:
Wireless Security Checklist
Wireless networks are convenient and easy to install, so
homes with high-speed Internet access are adopting them
at a rapid pace. Because wireless networking operates by
sending information over radio waves, it can be more
vulnerable to intruders than a traditional wired network.
Like signals from your cellular or cordless phones, signals
from your wireless network can also be intercepted. Since
you cannot physically prevent someone from connecting
to your wireless network, you need to take some additional
steps to keep your network secure.
1. Change the default wireless
network name or SSID
Wireless devices have a default wireless network name
or Service Set Identifier (SSID) set by the factory. This
is the name of your wireless network, and can be up
to 32 characters in length. Linksys wireless products
use
linksys
as the default wireless network name. You
should change the wireless network name to something
unique to distinguish your wireless network from other
wireless networks that may exist around you, but do not
use personal information (such as your Social Security
number) because this information may be available for
anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, and
gateways, you will be asked for a password when you
want to change their settings. These devices have a default
password set by the factory. The Linksys default password
is
admin
. Hackers know these defaults and may try to
use them to access your wireless device and change your
network settings. To thwart any unauthorized changes,
customize the device’s password so it will be hard to
guess.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to
enable Media Access Control (MAC) address filtering. The
MAC address is a unique series of numbers and letters
assigned to every networking device. With MAC address
filtering enabled, wireless network access is provided
solely for wireless devices with specific MAC addresses.
For example, you can specify the MAC address of each
computer in your home so that only those computers can
access your wireless network.
4. Enable encryption
Encryption protects data transmitted over a wireless
network. Wi-Fi Protected Access (WPA/WPA2) and Wired
Equivalency Privacy (WEP) offer different levels of security
for wireless communication.
A network encrypted with WPA/WPA2 is more secure
than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information
as it passes over the airwaves, you should enable the
highest level of encryption supported by your network
equipment.
WEP is an older encryption standard and may be the
only option available on some older devices that do not
support WPA.
General Network Security Guidelines
Wireless network security is useless if the underlying
network is not secure.
Password protect all computers on the network and
individually password protect sensitive files.
Change passwords on a regular basis.
Install
anti-virus
software
and
personal
firewall
software.
Disable file sharing (peer-to-peer). Some applications
may open file sharing without your consent and/or
knowledge.
Additional Security Tips
Keep wireless routers, access points, or gateways away
from exterior walls and windows.
Turn wireless routers, access points, or gateways
off when they are not being used (at night, during
vacations).
Use strong passphrases that are at least eight characters
in length. Combine letters and numbers to avoid using
standard words that can be found in the dictionary.
WEB:
For
more
information
on
wireless
security, visit
www.linksys.com/security

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top