Quick Links. Download this manual See also: User Manual. Table of Contents. Wireless-g access point with power over ethernet 2 pages. Instant wireless series wireless-g access point 67 pages. Wireless-G
|Published (Last):||7 November 2011|
|PDF File Size:||11.76 Mb|
|ePub File Size:||14.9 Mb|
|Price:||Free* [*Free Regsitration Required]|
Quick Links. Download this manual See also: User Manual. Table of Contents. Wireless-g access point with power over ethernet 2 pages.
Instant wireless series wireless-g access point 67 pages. Wireless-G Linksys is a registered trademark or trademark of Cisco Systems, Inc. All rights reserved. This Access Point will allow you to network wirelessly better than ever. How does the Access Point do all of this? An access point allows for greater range and mobility within your wireless network while also allowing you to connect the wireless network to a wired environment.
An integrated wireless and wired network is called an infrastructure network. Power Green. Ethernet Port The Ethernet network port connects to an Ethernet network device, such as a switch or router. Connect your Ethernet network cable to your network router or switch.
The first way is to place it horizontally on a surface, so it sits on its four rubber feet. The second way is to stand the Access Point vertically on a surface. The third way is to mount it on a wall. AP Mode Use this screen to configure how the Access Point will work with other access points in your network.
Administration You will use the Administration tabs to manage the Access Point. Figure Setup - Automatic Configuration The IP address must be unique to your network. We suggest you use the default IP address of The Access Point can connect to up to eight wireless networks at the same time. Wireless Network Configure the Access Point using the available settings. Auto-Fallback will automatically negotiate the best possible connection speed between the Access Point and a wireless device.
Select SSID. Select the SSID whose security settings you want to configure. Security Mode. When enabled, devices in the same wireless network will be able to access each other, so they can transfer files through the network.
Shared Key is when both the sender and the recipient share a WEP key for authentication. Open System is when the sender and the recipient do not share a WEP key for authentication. Access List. In most cases, these settings do not need to be changed. Advanced Wireless You can change the data transmission and output power settings for the Access Point. This specifies the maximum size a data packet can be before splitting and creating a new packet.
It should remain at its default setting of A smaller setting means smaller packets, which will create more packets for each transmission. The Access Point will not communicate with any other kind of remote access point. When set to Wireless Repeater mode, the Wireless Repeater is able to talk to up a remote access point within its range and retransmit its signal.
This mode connects two physically separated wired networks using two access points use additional access points to connect more wired networks. The default is private. Enter the password required by the remote host computer that will receive trap messages or notices sent by the Access Point. Email Alert E-Mail Alert. After you upgrade its firmware, you will have to re-enter all of your configuration settings. Download the firmware upgrade file from the Linksys website, www. Extract the firmware upgrade file on your computer.
Download the language upgrade file from the Linksys website, www. Extract the language upgrade file on your computer. On the Language Upgrade screen, enter the location of the language upgrade file in the field provided, or click the Browse button to find the file. Config Management Use this screen to upload or download configuration files for the Access Point. Download AP Config. Information Hardware Version. Software Version. System Performance Wired Name.
This indicates that the statistics are for the wired network, the LAN. IP Address. This shows the number of bytes received for each wireless network. Bytes Sent. This shows the number of bytes sent for each wireless network. Error Packets Received. This shows the number of error packets received for each wireless network. Dropped Packets Received. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www. The product supports the following IEEE Page 44 Can Linksys wireless products support file and printer sharing?
Linksys wireless products perform the same function as LAN products. The Media Access Control MAC address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
Page 47 This includes hackers. Wireless networking products come with a default SSID set by the factory. Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Page 48 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Follow these instructions: 1.
Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. Many specific authentication methods work within this framework. Page 54 Packet - A unit of data sent over a network.
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. PEAP Protected Extensible Authentication Protocol - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords. Port - The connection point on a computer or networking device used for plugging in cables or adapters.
Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path. WEP Wired Equivalent Privacy - A method of encrypting network data transmitted on a wireless network for greater security. Page Appendix G: Warranty Information Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
These limits are designed to provide reasonable protection against harmful interference in a residential installation. Check the CE label on the product to find out which notified body was involved during the assessment. Both of these cables are 9 meters long and have a cable loss attenuation of 5 dB. Page 66 7. Click the type of documentation you want. The document will automatically open in PDF format.
Appendix H: Regulatory Information Page Appendix I: Contact Information Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product, This manual is also suitable for: Wap54gp.
How to Set Up a Linksys WAP54G
Cisco's Linksys WAP54G is a network device that adds wireless capability to your business network, offering reliable wireless encryption and powerful access to all wireless devices. You can install the WAP54G to the business router for large office environments or directly to a computer wired to a network router. After installation, configure wireless security settings to protect your network from unauthorized intrusion. Press "Enter.
Linksys WAP54GP User Manual
Linksys WAP54GP Network Router User Manual