Page 26 / 69 Scroll up to view Page 21 - 25
20
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
Setup
The
Setup
screen, shown in Figure 7-2, lets you configure the wired and wireless network settings for the Bridge.
When finished making your changes on this tab, click the
Apply
button to save these changes, or click the
Cancel
button to undo your changes.
Firmware - The version number of the Bridge’s firmware is displayed here. Firmware should be upgraded
ONLY if you experience problems with the Bridge. Firmware updates are posted at www.linksys.com.
MAC Address - The MAC Address of the Bridge is displayed here.
System Uptime - The amount of time the Bridge has been running is displayed here.
LAN
Device Name - You may assign any name to the Bridge. Unique, memorable names are helpful, especially if
you are using multiple bridges on the same wireless network.
Configuration Type - If the Bridge will obtain an IP address automatically from a DHCP server, such as a router,
then select
Automatic Configuration-DHCP
. If you are assigning the Bridge a static IP address, then select
Static IP Address
, and enter an IP Address, Subnet Mask, and Gateway address in the
IP Address
,
Subnet
Mask
, and
Gateway
fields.
802.1x (See Figure 7-3.) - To change your 801.1x settings, click the
Edit 802.1x Settings
button. Figure 7-3
will appear. To change the settings, select
Enable 801.x Service
.
Radius Server. Enter the
Radius Server IP Address
in the fields.
Radius Server Port. Enter the
Radius Server Port
in the field.
Shared Key. Enter the key that you use for your wireless network in the field.
Reauthentication Timeout. Enter the time in seconds for key authentication.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
Figure 7-2: Setup Tab
Figure 7-3: 802.1x Screen
Downloaded from
www.Manualslib.com
manuals search engine
Page 27 / 69
21
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
Wireless
SSID - The SSID is the network name shared among all devices in a wireless network. The SSID must be
identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric
characters, which may be any keyboard character (do not use any spaces). Make sure this setting is the same
for all devices in your wireless network. For added security, Linksys recommends that you change the default
SSID (linksys) to a name of your choice.
To search for available wireless networks, click the
Site Survey
button.
Site Survey
The
Site Survey
screen, shown in Figure 7-4 shows all the wireless networks detected by the Bridge and their
general information. You can use this screen to connect to one of these networks.
For each wireless network detected, the following information is displayed:
SSID - The network name. To join a wireless network, click its SSID.
MAC Address - The MAC address of the network’s access point.
Channel - The channel setting.
Signal Strength (%) - The percentage of wireless signal strength.
Mode - The type of wireless standard, network mode, and status of WEP encryption.
Click the
Refresh
button to obtain the most up-to-date data. Click the
Close
button to close this screen.
Click the
Help
button for additional on-screen information.
Network Type - Choose a wireless operating mode for the Bridge. Keep the default setting,
Infrastructure
, if
you want your wireless-equipped device to communicate with computers and other devices on your wired
network using a wireless access point. Select
Ad-Hoc
button if you want multiple wireless-equipped devices
to communicate directly with each other.
If you chose Ad-Hoc mode, then select the correct operating channel for your network from the
Channel
drop-
down menu. This should match the channel setting of the other devices in your wireless network.
Select the appropriate network mode. Keep the default,
Mixed
, if you have Wireless-G (802.11g) and
Figure 7-4: Site Survey
Downloaded from
www.Manualslib.com
manuals search engine
Page 28 / 69
22
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
Wireless-B (802.11b) devices in your network. Select
G-Only
if you have only Wireless-G devices in your
network.
Security - To enable security, select
Enable
, then click
Edit Security Settings
. To disable security, select
Disable
.
The Security screen, as shown in Figure 7-5, will appear. From the drop-down menu, select one of the four
wireless security modes supported by the Bridge: WEP, RADIUS, WPA RADIUS, and WPA Pre-Shared Key,. (WEP
stands for Wired Equivalent Privacy, RADIUS stands for Remote Authentication Dial-In User Service, and WPA
stands for Wi-Fi Protected Access, which is a security standard stronger than WEP encryption) .The four
security modes are briefly discussed here. For detailed instructions on configuring wireless security for the
Bridge, turn to “Appendix B: Wireless Security.”
WEP
Use the
WEP
screen, shown in Figure 7-5, to configure the WEP encryption for the Bridge. Select a
Default
Transmit Key
(choose which Key to use), and a level of
WEP Encryption
,
64 bits (10 hex digits)
or (
128 bits
26 hex digits)
. Then either generate a
WEP Key
using a
Passphrase
or enter the WEP key manually.
Default Transmit Key - Select which WEP key (1-4) will be used when the Bridge sends data. Make sure
the other wireless-equipped devices are using the same key.
WEP Encryption - In order to use WEP encryption, select
64-Bit (10 hex digits)
or
128-Bit (26 hex
digits)
from the drop-down menu.
Passphrase - Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is
used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16
alphanumeric characters. (The Passphrase function is compatible with Linksys wireless products only. If
you want to communicate with non-Linksys wireless products, you will need to enter your WEP key
manually on the non-Linksys wireless products.) After you enter the Passphrase, click the
Generate
button to create WEP key(s).
Keys 1-4 - If you are not using a Passphrase, then you can enter one or more WEP keys manually.
In each key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all
zeroes. These are not valid key values.) If you are using 64-bit WEP encryption, then each key must
consist of exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then
each key must consist of exactly 26 hexadecimal characters in length. Valid hexadecimal characters are
“0”-“9” and “A”-“F”.
Figure 7-5: WEP
NOTE:
Make sure that your security choice
matches the security choice of the wireless
network you want to join. Otherwise, the
connection will fail.
Downloaded from
www.Manualslib.com
manuals search engine
Page 29 / 69
23
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
Apply
button to save your changes and close the screen.
RADIUS
This option features WEP used in coordination with a RADIUS server. (This should only be used when a
RADIUS server is connected to the Router.) It offers three authentication methods: MD5, TLS, and TTLS.
EAP Type
MD5
Select a Default Key (choose which Key to use), and a level of WEP encryption,
64 bits 10 hex digits
or
128
bits 26 hex digits
. Then either generate a WEP key using a Passphrase or enter the WEP key manually. (See
Figure 7-6.)
Default Transmit Key
Select which WEP key (1-4) will be used when the Bridge sends data. Make sure
that the receiving device (wireless client) is using the same key.
WEP Encryption. An acronym for Wired Equivalent Privacy, WEP is an encryption method used to protect
your wireless data communications. WEP uses 64-bit or 128-bit keys to provide access control to your
network and encryption security for every data transmission. To decode data transmissions, all devices in
a network must use an identical WEP key. Higher encryption levels offer higher levels of security, but due
to the complexity of the encryption, they may decrease network performance. Select
64 bits (10 hex
digits)
or
128 bits (26 hex digits)
.
Passphrase. Instead of manually entering WEP keys, you can enter a passphrase. This passphrase is used
to generate one or more WEP keys. It is case-sensitive and should not be longer than 32 alphanumeric
characters. (This Passphrase function is compatible with Linksys wireless products only and cannot be
used with Windows XP Zero Configuration. If you want to communicate with non-Linksys wireless
products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and
enter it manually in the wireless client.) After you enter the Passphrase, click the
Generate
button to
create WEP keys.
Keys 1-4. WEP keys enable you to create an encryption scheme for wireless network transmissions. If you
are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not
enter all zeroes; they are not valid key values.) If you are using 64-bit WEP encryption, the key must be
exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be
exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.
Figure 7-6: RADIUS-MD5
Downloaded from
www.Manualslib.com
manuals search engine
Page 30 / 69
24
Chapter 7: Using the Wireless-G Ethernet Bridge Web-based Utility
Setup
Wireless-G Ethernet Bridge with 5-Port Switch
User ID and Password. A user identification and password are required for your security. Enter the ID in
the
User ID
field, then the password in the
Password
field.
When finished making your changes on this tab, click the
Apply
button to save these changes.
TLS
TLS is a mutual authentication method that uses digital certificates.Select TLS from the EAP Type drop-down
menu. Enter the Login name of your wireless network in the
User ID
field. Enter the
User
Certificate and Root
Certificate
in the fields or click the
Browse
button to browse for it, then upload it.
EAP Type - The authentication method that your network uses. Select
TLS
from the drop-down menu.
User ID -Your User ID is the Login name of your wireless network. Enter the Login name of your wireless
network in the
User ID
field.
User Certificate - Enter the user certificate you have installed to authenticate you on your wireless
network
or click the
Browse
button to browse for it. Click the
Upload
button to upload the certificate.
Root Certificate - Enter the root certificate you have installed to authenticate you on your wireless
network
or click the
Browse
button to browse for it. Click the
Upload
button to upload the certificate.
Click the
Apply
button to save your changes. If your page doesn’t automatically refresh itself, then click the
Refresh
button of your web browser. Click the
View Log
button to view a log.
Encryption
- Encoding data transmitted in a
network.
Figure 7-7: RADIUS-TLS
Downloaded from
www.Manualslib.com
manuals search engine

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top