Linksys WET200 manual Switch MAC Based ACL, Port-Based

Page 20

Chapter 6

Advanced Configuration

Port-Based

In port-based VLAN mode, the wireless bridge uses a port- based VLAN map to limit the traffic between the ports. A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and web- based utility access).

NOTE: The default port-based VLAN settings consist of connections between port 6 and each of the five Ethernet ports. This is to allow access to the web-based utility from any of the Ethernet ports. In addition, the connection between ports 1 and 6 is permanent and cannot be changed. This ensures that you can always access the web-based utility through at least port 1, regardless of your particular port-based VLAN settings.

Switch > VLAN - Port-Based

Output Vector  Use these fields to configure your VLANs as follows:

1.Each row of the table corresponds to one of the ports. For each port, specify its connections by selecting all of its exit ports. For example, to specify a VLAN connection from port 1 to port 2, select 2 in the row labeled Port 1.

2.Each exit port you select specifies a unidirectional connection only. (In the example in step 1, the direction is from port 1 to port 2.) To automatically add the connection in the opposite direction (from port 2 to port 1 in the example), click Configure Bi-directional.

3.When you are finished defining the connections for the VLAN(s), click Apply Port VLAN Settings to save and activate your VLAN configuration.

Switch > MAC Based ACL

Switch > MAC Based ACL

An Access List (ACL) is a list of source MAC addresses that is used to grant or deny access. If a packet passes from the wireless port to a LAN port or vice versa, the Bridge will check if the packet’s source MAC address matches any entry in the access list, then use the match result to pass or drop the packet. However, packets from LAN port to LAN port are not checked. You can select from two types of Access Lists. A Block list blocks specific MAC addresses specified in the table; all other MAC addresses are accepted. An Accept list only accepts the MAC addresses listed in the table; all other MAC addresses are blocked.

Access List Type  To disable the Access List feature, keep the default setting, Disabled. To enable Access Lists, select Accept or Block, then click Apply Global Setting.

If you choose to use an Accept list, you must remember to include your computer’s MAC address in the list before you click Apply. Failure to do so may result in your computer being denied access to the device.

New Block Entry  To block packets with a specific MAC address, enter the MAC address in this field, and click Add Block Entry. To unblock the MAC address, enter the MAC address in the field, click Delete Block Entry, then click Apply Global Setting.

Block List  Displays a list of blocked MAC addresses and number of packets dropped for each address.

New Accept Entry  To accept packets with a specific MAC address, enter the MAC address in this field, and click Add Access Entry. To unaccept the MAC address, enter the MAC address in the field, click Delete Access Entry, then click Apply Global Setting.

Accept List  Displays a list of accepted MAC addresses and number of packets accepted for each address.

Drop Count, Accept Count  When Access List is enabled, these display the total number of packets dropped and accepted. Click Refresh to display the latest information.

Wireless-G Business Ethernet Bridge

16

Image 20
Contents Wireless-G Business Ethernet Bridge About This Guide About This GuideIcon Descriptions Online ResourcesTable of Contents Appendix E Regulatory Information Appendix a Wireless Security ChecklistAppendix B Glossary Chapter Chapter IntroductionNetwork Layout Chapter Planning Your Wireless NetworkNetwork Topology Example of WET200 in Ad-Hoc Mode Chapter Product Overview Product OverviewFront Panel Back PanelChapter Installation InstallationPlacement Options OverviewInstallation Wall-Mount OptionChapter Quick Configuration Overview Accessing the Web-Based UtilitySetup WirelessSystem Status SwitchAdministration Setup Chapter Advanced ConfigurationAdvanced Configuration Wireless Site Survey WirelessWireless Basic Settings Wireless Wireless Security WPA-Personal aka WPA-PSKWPA2-Enterprise WPA2-PersonalWPA-Enterprise Switch Port Management SwitchWireless Advanced Settings Port Mirroring Setting Switch Port MirroringSwitch Vlan 802.1Q Switch MAC Based ACL Port-BasedSwitch QoS Switch Spanning TreeAdministration Switch MAC TableAdministration Password Administration Web AccessAdministration Snmp Administration Factory DefaultsAdministration Firmware Upgrade System Status Wireless StatusSystem Status System Status System StatusPersonal, etc System Status Port StatisticsAd-Hoc Appendix a Wireless Security Checklist Wireless Security ChecklistAppendix a General Network Security GuidelinesGlossary Appendix BAppendix B Glossary Glossary Http HyperText Transport ProtocolSmtp Simple Mail Transfer Protocol The standard e Snmp Simple Network Management Protocol aAppendix B Appendix C Appendix C SpecificationsSpecifications Appendix D Warranty InformationLimited Warranty Appendix E Regulatory InformationWireless Disclaimer Avis d’Industrie CanadaDansk Danish Miljøinformation for kunder i EU Appendix E Norsk Norwegian Miljøinformasjon for kunder i EU Appendix E Appendix F Contact Information
Related manuals
Manual 3 pages 10.7 Kb

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.