Page 36 / 57 Scroll up to view Page 31 - 35
30
Chapter 6: Configuring the Wireless-G Music Bridge
Help Tab
Wireless-G Music Bridge
Wireless Mode
. This displays the wireless mode, Infrastructure or Ad-Hoc, used by the network.
Channel
. This displays the wireless network channel that your Bridge uses.
Wireless Mode
. This displays the wireless mode (Mixed, Wireless-G Only) used by the network.
Security
. This displays what type of security the Bridge uses.
Status
. This displays the status of the connection between the Bridge and the wireless network.
Click the
Refresh
button if you need to refresh the screen. Click the
Help
button if you need more information.
Help Tab
The Help Tab provides Online Resources and Firmware Upgrade.
Online Resources. Links are provided to the Linksys website, Linksys online support, and the Adobe website for
downloading a PDF viewer.
Firmware Upgrade. The Music Bridge’s firmware is upgraded through the Web-Utility's Help tab. Follow these
instructions:
1.
Download the firmware from Linksys's website at
www.linksys.com
.
2.
Enter the location of the firmware's file or click the
Browse
button to find the file.
3.
Then, click the
Start to Upgrade
button to upgrade the firmware.
Figure 6-10: Help
Page 37 / 57
31
Appendix A: Troubleshooting
Common Problems and Solutions
Wireless-G Music Bridge
Appendix A: Troubleshooting
This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This
appendix provides solutions to problems that may occur during the installation and operation of this product.
Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at
www.linksys.com
.
Common Problems and Solutions
1.
The music is coming from PC’s speaker and not the speaker that connects to the Music Bridge.
Open the Music Bridge Utility to connect to the Bridge in order to listen to music from speakers that connect
to the Bridge. Refer to Chapter 5: Using the Wireless-G Bridge Music Utility.
2.
My Wireless Bridge has been connected on the utility, but there is no music coming from the speaker.
Check your audio cable connection.
Close, then reopen the player that your are trying to play.
Reboot the PC and try again.
3.
I don’t see the Utility icon appear on the system tray.
You can find the utility software by clicking Start > Programs > Linksys Wireless-G Music Bridge. You can
restart the utility from there.
4.
There is a message that appears that says this bridge had been own by “xxxx” and I cannot connect
to it.
On the
Information
tab of the Bridge Utility, uncheck the option,
Access is limited to the first PC that uses the
utility. If you want o use a different PC, uncheck this item.
.
5.
Why can’t I see my Windows Volume Control’s Microphone Volume Control any more?
On the Status tab of the Wireless-G Music Bridge Utility, click the
Stop Bridge Utility
button to switch the
Wireless-G Music Bridge Utility’s sound driver to your PC’s sound card driver, which allows you to use the
Windows Volume Control’s Microphone Volume Control. To switch back to the Music Bridge, click the
Start
Bridge Utility
button.
Page 38 / 57
32
Appendix A: Troubleshooting
Frequently Asked Questions
Wireless-G Music Bridge
Frequently Asked Questions
What player I can use with Wireless-G Music Bridge?
You can use most any player you like, such as Yahoo Music Engine or Windows Media Player.
Can I listen to music from more than one Music Bridge at the same time?
No, the Music Bridge utility had been designed to connect to one Music Bridge at a time.
I hear some sound breaks occasionally, what can I do?
This should not happen in normal cases, but could happen due to some wireless RF interference,
especially if there are many nearby wireless devices, such as access points or routers, a microwave oven,
Bluetooth device, cordless phone, etc. Keep your Music Bridge away from these devices.
If you are using an Intel Centrino based laptop or some old WLAN card/dongle, it may have a short period
of suspending time for background scanning around every minute. It may also cause the sound streaming
break. Please contact your wireless adapter factory to download the latest driver of your WLAN card.
What should I do if I forget all the settings of bridge?
You may reset to the default settings of the bridge by pressing and holding the reset button on the back panel of
the Bridge for 10 seconds. After that, you need to re-run the setup wizard to configure it again.
What is my bridge’s default IP Address?
The bridge’s default IP address is 192.168.1.210.
Why can’t I see the Bridge on my Bridge Utility?
My Bridge has a wired connection to my network.
Restart the PC and try again.
Check all the cable connections and power.
My bridge is wirelessly connecting to my network, so why can’t I see the Bridge on my Bridge Utility?
Restart the PC and try again.
If it’sthe first time, please return to the setup wizard again and make sure you configure the Bridge
properly or move your Bridge closer to your wireless access point and try again.
Page 39 / 57
33
Appendix B: Wireless Security
Security Precautions
Wireless-G Music Bridge
Appendix B: Wireless Security
Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of
Linksys products provide several network security features, but they require specific action on your part for
implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
Security Precautions
The following is a complete list of security precautions to take (as shown in this User Guide) (at least steps 1
through 5 should be followed):
1.
Change the default SSID.
2.
Disable SSID Broadcast.
3.
Change the default password for the Administrator account.
4.
Enable MAC Address Filtering.
5.
Change the SSID periodically.
6.
Use the highest encryption algorithm possible. Use WPA if it is available. Please note that this may reduce
your network performance.
7.
Change the WEP encryption keys periodically.
To ensure network security, steps one through five should be followed, at least.
Security Threats Facing Wireless Networks
Wireless networks are easy to find. Hackers know that in order to join a wireless network, wireless networking
products first listen for “beacon messages”. These messages can be easily decrypted and contain much of the
network’s information, such as the network’s SSID (Service Set Identifier). Here are the steps you can take:
Change the administrator’s password regularly.
With every wireless networking device you use, keep in
mind that network settings (SSID, WEP keys, etc.) are stored in its firmware. Your network administrator is the
only person who can change network settings. If a hacker gets a hold of the administrator’s password, he, too,
can change those settings. So, make it harder for a hacker to get that information. Change the administrator’s
password regularly.
Note:
Some of these security features are
available only through the network router or
access point. Refer to the router or access
point’s documentation for more information.
Page 40 / 57
34
Appendix B: Wireless Security
Security Threats Facing Wireless Networks
Wireless-G Music Bridge
SSID.
There are several things to keep in mind about the SSID:
1.
Disable Broadcast
2.
Make it unique
3.
Change it often
Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be
more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast
the SSID.
Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.)
Hackers know these defaults and can check these against your network. Change your SSID to something unique
and not something related to your company or the networking products you use.
Change your SSID regularly so that any hackers who have gained access to your wireless network will have to
start from the beginning in trying to break in.
MAC Addresses.
Enable MAC Address filtering. MAC Address filtering will allow you to provide access to only
those wireless nodes with certain MAC Addresses. This makes it harder for a hacker to access your network with
a random MAC Address.
WEP Encryption.
Wired Equivalent Privacy (WEP) is often looked upon as a cure-all for wireless security
concerns. This is overstating WEP’s ability. Again, this can only provide enough security to make a hacker’s job
more difficult.
There are several ways that WEP can be maximized:
1.
Use the highest level of encryption possible
2.
Use “Shared Key” authentication
3.
Change your WEP key regularly
WPA.
Wi-Fi Protected Access (WPA) is the newest and best available standard in Wi-Fi security. Two modes are
available: Pre-Shared Key and RADIUS. Pre-Shared Key gives you a choice of two encryption methods: TKIP
(Temporal Key Integrity Protocol), which utilizes a stronger encryption method and incorporates Message
Integrity Code (MIC) to provide protection against hackers, and AES (Advanced Encryption System), which utilizes
a symmetric 128-Bit block data encryption. RADIUS (Remote Authentication Dial-In User Service) utilizes a
RADIUS server for authentication and the use of dynamic TKIP, AES, or WEP.
Important:
Always remember that each
device in your wireless network MUST use
the same encryption method and encryption
key or your wireless network will not function
properly.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top