Linksys WET200 manual Wireless Wireless Security, WPA-Personal aka WPA-PSK

Page 15

Chapter 6

Advanced Configuration

Wireless > Wireless Security

The Wireless Security screen allows you to configure security on your wireless network.

Wireless > Wireless Security - Security Disabled

Security Mode  Enter the security configuration to match the wireless Access Point that this bridge will connect to. To disable security, keep the default setting, Disabled. To enable security, select the desired type of security: WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise,WPA2-Enterprise. Then fill in all the fields that appear on the screen. The fields you see depend on the type of security you select and are described in detail below.

WEP

Use the WEP screen to configure WEP encryption.

NOTE: WEP security is not recommended now due to its weak security protection. Users are urged to migrate to WPA or WPA2.

Wireless > Wireless Security - WEP

Authentication Type  Select the 802.11 authentication type, either Open System (default) or Shared Key.

Default Transmit Key  Select which WEP key (1-4) will be used when the Bridge sends data. Make sure the other wireless-equipped devices are using the same key.

Encryption  In order to use WEP encryption, select 64-Bit (10 hex digits) or 128-Bit (26 hex digits) from the drop- down menu.

Passphrase  Instead of manually entering WEP keys, you can enter a Passphrase. This Passphrase is used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you must enter your WEP key manually on those products.) After you enter the Passphrase, click Generate to create WEP key(s).

Key 1-4 If you are not using a Passphrase, then you can enter one or more WEP keys manually. In each key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.) If you are using 64-bit WEP encryption, then each key must consist of exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, then each key must consist of exactly 26 hexadecimal characters. Valid hexadecimal characters are 0-9and A-F.

Click Apply to apply your changes, or click Cancel to cancel your changes.

WPA-Personal (aka WPA-PSK)

Use the WPA Personal screen to configure WPA Personal encryption for the Bridge.

Wireless > Wireless Security - WPA Personal

Encryption  WPA offers two methods, TKIP and AES, for data encryption. Select the encryption method you want to use. The default is TKIP.

Shared Secret  Enter a WPA Shared Secret of 8-63 characters.

Key Renewal Timeout  Enter a Key Renewal Timeout period, which instructs the Access Point how often it should change the encryption keys. The default is 3600 seconds.

Click Apply to apply your changes, or click Cancel to cancel your changes.

Wireless-G Business Ethernet Bridge

11

Image 15
Contents Wireless-G Business Ethernet Bridge Online Resources About This GuideAbout This Guide Icon DescriptionsTable of Contents Appendix a Wireless Security Checklist Appendix B GlossaryAppendix E Regulatory Information Chapter Introduction ChapterChapter Planning Your Wireless Network Network TopologyNetwork Layout Example of WET200 in Ad-Hoc Mode Back Panel Chapter Product OverviewProduct Overview Front PanelOverview Chapter InstallationInstallation Placement OptionsWall-Mount Option InstallationWireless Chapter Quick Configuration OverviewAccessing the Web-Based Utility SetupSwitch AdministrationSystem Status Chapter Advanced Configuration Advanced ConfigurationSetup Wireless Wireless Basic SettingsWireless Site Survey WPA-Personal aka WPA-PSK Wireless Wireless SecurityWPA2-Personal WPA-EnterpriseWPA2-Enterprise Switch Wireless Advanced SettingsSwitch Port Management Switch Port Mirroring Switch VlanPort Mirroring Setting 802.1Q Port-Based Switch MAC Based ACLSwitch Spanning Tree Switch QoSAdministration Web Access AdministrationSwitch MAC Table Administration PasswordAdministration Factory Defaults Administration SnmpSystem Status System Status Administration Firmware UpgradeSystem Status Wireless Status System StatusSystem Status Port Statistics Ad-HocPersonal, etc General Network Security Guidelines Appendix a Wireless Security ChecklistWireless Security Checklist Appendix aAppendix B Appendix B GlossaryGlossary Http HyperText Transport Protocol GlossarySnmp Simple Network Management Protocol a Smtp Simple Mail Transfer Protocol The standard eAppendix B Appendix C Specifications SpecificationsAppendix C Warranty Information Limited WarrantyAppendix D Regulatory Information Appendix EAvis d’Industrie Canada Wireless DisclaimerDansk Danish Miljøinformation for kunder i EU Appendix E Norsk Norwegian Miljøinformasjon for kunder i EU Appendix E Contact Information Appendix F
Related manuals
Manual 3 pages 10.7 Kb

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.