Linksys WET11 manual Infrastructure Mode, Ad-Hoc Mode

Page 5

Wireless-B Ethernet Bridge

List of Figures

Figure 2-1: Infrastructure Mode

4

Figure 2-2: Ad-Hoc Mode

5

Figure 2-3: Wireless Bridging Using Two Bridges

5

Figure 3-1: Back Panel

6

Figure 3-2: Front Panel

7

Figure 4-1: Connect the Ethernet Network Cable

8

Figure 4-2: Connect the Power Adapter

8

Figure 5-1: Welcome

9

Figure 5-2: Check Connection

9

Figure 5-3: List of Bridges

10

Figure 5-4: Password

10

Figure 5-5: Mode Settings

10

Figure 5-6: Wireless Settings

11

Figure 5-7: IP Settings

11

Figure 5-8: Security Settings

11

Figure 5-9: WEP Key

12

Figure 5-10: Confirmation

12

Figure 5-11: Congratulations

12

Figure 7-1: Access the Web-based Utility

14

Figure 7-2: Setup Tab

15

Figure 7-3: Site Survey

16

Figure 7-4: WEP Encryption

17

Figure 7-5: Password Tab

17

Figure 7-6: Advanced Settings Tab

18

Figure 7-7: Status Tab

19

Figure 7-8: Help Tab

20

Figure B-1: Warchalking

25

Figure B-2: WEP Encryption

31

Image 5
Contents 802 GHz .11b Wireless- B Copyright and Trademarks How to Use this GuideTable of Contents Wireless-B Ethernet Bridge Ad-Hoc Mode Infrastructure ModeIntroduction IntroductionWhat’s in this Guide? Wireless-B Ethernet Bridge Network Topology Ad-Hoc versus Infrastructure ModeAd-Hoc Mode LAN Getting to Know the Wireless-B Ethernet BridgePWR Connect the Ethernet Network Cable Connecting the Wireless-B Ethernet Bridge for SetupOverview Setting Up the Wireless-B Ethernet BridgeSetup Wizard List of Bridges Wireless Settings WEP Key Connecting the Wireless-B Ethernet Bridge for Network Use Starting the Web-based Utility Using the Wireless-B Ethernet Bridge Web-based UtilityWireless SetupSite Survey Password Tab MAC Address AdvancedWireless Settings LAN SettingsStatus LAN StatisticsHelp Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility doesn’t detect the Bridge Frequently Asked QuestionsWhat is ad-hoc mode? What is Spread Spectrum? What Are the Risks? Appendix B Wireless SecurityBrief Overview Jamming Attacks Passive AttacksActive Attacks Maximizing Wireless SecurityDictionary-Building or Table Attacks Man-in-the-Middle AttacksWireless-B Ethernet Bridge Ssid Wireless-B Ethernet Bridge Figure B-2 WEP Encryption WEP EncryptionAppendix C Upgrading Firmware Network Neighborhood/My Network Places Appendix D Windows HelpShared Resources Appendix E Glossary Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Model Appendix F SpecificationsStandards Ieee 802.11b, Ieee Ports ButtonsStorage Humidity Warranty Year LimitedOperating Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada Wireless-B Ethernet Bridge Appendix I Contact Information