Linksys WET200 manual Switch MAC Based ACL, Port-Based

Models: WET200

1 39
Download 39 pages 1.12 Kb
Page 20
Image 20

Chapter 6

Advanced Configuration

Port-Based

In port-based VLAN mode, the wireless bridge uses a port- based VLAN map to limit the traffic between the ports. A VLAN can include any of the five physical Ethernet ports (ports 1-5) as well as port 6, which controls the wireless interface and CPU access (management traffic and web- based utility access).

NOTE: The default port-based VLAN settings consist of connections between port 6 and each of the five Ethernet ports. This is to allow access to the web-based utility from any of the Ethernet ports. In addition, the connection between ports 1 and 6 is permanent and cannot be changed. This ensures that you can always access the web-based utility through at least port 1, regardless of your particular port-based VLAN settings.

Switch > VLAN - Port-Based

Output Vector  Use these fields to configure your VLANs as follows:

1.Each row of the table corresponds to one of the ports. For each port, specify its connections by selecting all of its exit ports. For example, to specify a VLAN connection from port 1 to port 2, select 2 in the row labeled Port 1.

2.Each exit port you select specifies a unidirectional connection only. (In the example in step 1, the direction is from port 1 to port 2.) To automatically add the connection in the opposite direction (from port 2 to port 1 in the example), click Configure Bi-directional.

3.When you are finished defining the connections for the VLAN(s), click Apply Port VLAN Settings to save and activate your VLAN configuration.

Switch > MAC Based ACL

Switch > MAC Based ACL

An Access List (ACL) is a list of source MAC addresses that is used to grant or deny access. If a packet passes from the wireless port to a LAN port or vice versa, the Bridge will check if the packet’s source MAC address matches any entry in the access list, then use the match result to pass or drop the packet. However, packets from LAN port to LAN port are not checked. You can select from two types of Access Lists. A Block list blocks specific MAC addresses specified in the table; all other MAC addresses are accepted. An Accept list only accepts the MAC addresses listed in the table; all other MAC addresses are blocked.

Access List Type  To disable the Access List feature, keep the default setting, Disabled. To enable Access Lists, select Accept or Block, then click Apply Global Setting.

If you choose to use an Accept list, you must remember to include your computer’s MAC address in the list before you click Apply. Failure to do so may result in your computer being denied access to the device.

New Block Entry  To block packets with a specific MAC address, enter the MAC address in this field, and click Add Block Entry. To unblock the MAC address, enter the MAC address in the field, click Delete Block Entry, then click Apply Global Setting.

Block List  Displays a list of blocked MAC addresses and number of packets dropped for each address.

New Accept Entry  To accept packets with a specific MAC address, enter the MAC address in this field, and click Add Access Entry. To unaccept the MAC address, enter the MAC address in the field, click Delete Access Entry, then click Apply Global Setting.

Accept List  Displays a list of accepted MAC addresses and number of packets accepted for each address.

Drop Count, Accept Count  When Access List is enabled, these display the total number of packets dropped and accepted. Click Refresh to display the latest information.

Wireless-G Business Ethernet Bridge

16

Page 20
Image 20
Linksys WET200 manual Switch MAC Based ACL, Port-Based

WET200 specifications

The Linksys WET200 Wireless-G Ethernet Bridge is designed for businesses looking to extend their network capabilities without the hassle of running Ethernet cables throughout their premises. This high-performance device effectively connects wired devices to a wireless network, providing businesses with efficient access to internet resources and network shares.

One of the standout features of the WET200 is its dual-functionality. It operates as both an Ethernet bridge and a wireless access point, allowing users to connect multiple wired devices, such as printers, servers, or computers, to a wireless network. This flexibility makes it an excellent choice for environments where network mobility is crucial, such as offices, retail establishments, and warehouses.

Another key characteristic of the Linksys WET200 is its support for Wireless-G technology, offering a maximum wireless speed of up to 54 Mbps. This ensures that data transfer between connected devices is quick and reliable while providing adequate bandwidth for various applications, including file sharing and streaming. The device also adheres to the IEEE 802.11b/g standard, which means it is compatible with a vast number of other wireless devices.

The WET200 features a simple setup process, aided by its web-based configuration interface. This user-friendly interface allows for easy management of networking settings, making it accessible for both novice and experienced users. Security is a significant consideration, and the WET200 includes robust encryption protocols such as WEP, WPA, and WPA2 to protect data transmission over the wireless network.

Moreover, the Ethernet Bridge is equipped with two 10/100 Ethernet ports, enabling connections to multiple wired devices simultaneously. Its compact design allows for easy placement in various locations, and the inclusion of LEDs provides users with real-time feedback on connectivity status.

Overall, the Linksys WET200 Wireless-G Ethernet Bridge stands out with its combination of performance, flexibility, and ease of use, making it an invaluable asset for businesses aiming to expand their wired network capabilities without compromising on performance or security. It's a smart solution for those who need to harness the power of wireless connectivity while ensuring that their critical wired devices remain connected to the network efficiently.