Linksys wap54gpe manual
Wireless-g access point with power over ethernet 2 pages. Instant wireless series wireless-g access point 67 pages. Wireless-G Linksys is a registered trademark or trademark of Cisco Systems, Inc. All rights reserved. Page 7: Chapter 1: Introduction Welcome Use the instructions in this Guide to help you connect the Access Point, set it up, and configure it to bridge your different networks.
These instructions should be all you need to get the most out of the Access Point. Page Chapter 2: Planning Your Wireless Network Linksys wireless adapters also provide users access to a wired network when using an access point, such as the Wireless-G Exterior Access Point, or wireless router.
An integrated wireless and wired network is called an infrastructure network. Figure Front Panel Power Green. Either press the Reset button, for approximately ten seconds, or restore the defaults using the Access Point's Web- based Utility. Use the mounting plate as a template. On the wall you have chosen, mark the locations of the two wall-mount slots at the bottom of the mounting plate.
Attach two screws not included at the top of the mounting plate so the Access Point is securely mounted. Connect the other end of the Ethernet network cable to a switch, router, or other device that supports Power over Ethernet. This Setup Wizard will take you through all the steps necessary to configure the Access Point. The Setup Wizard will run a search for the Access Point within your network and then display a list along with the status information for the selected access point.
If this is the only access point on your network, it will be the only one displayed. You will be asked to sign onto the Access Point you have selected. Enter the default user name and password, admin, in both fields. Then, click Enter. This user name and password can be changed from the Web-based Utility's Administration - Management tab. Page Figure Wireless Settings Screen Select the wireless mode you want the Access Point to use for all of the wireless networks it supports.
The Wireless Power Management screen will appear. You can adjust the power output of the Access Point to get the appropriate coverage for your wireless network. Select the setting appropriate for your environment. Page Figure Confirmation Screen At this point, the configuration performed with the Setup Wizard is complete. To configure any other Access Points in your network, you can run this Setup Wizard again.
However, if you'd like to change these settings, the Access Point can be configured through your web browser with the Web-based Utility. Use this screen to reboot the Access Point. You can back up the configuration file for the Access Point, as well as save the backup configuration file to the Access Point. Page Accessing The Utility It will scan the Access Point and give you its IP address.
Press the Enter key and the following screen will appear. Enter admin in the User Name field. The first time you open the Web-based Utility, use the default password, admin. The IP address must be unique to your network.
We suggest you use the default IP address of Only users in the same VLAN will have access. When enabled, the devices of the designated wireless network will have access to the other wireless networks configured on the Access Point. If you want devices of the designated wireless network to have access to other wireless networks, select Enabled. Otherwise, select Disabled. Notwithstanding anything to the contrary in this Agreement, by using the Software, you acknowledge and agree that it is solely your responsibility to understand the terms of this Agreement, as well as the terms of use of any App Store that may be relevant to the Software or the Product.
While Belkin is not required to do so, Belkin may provide you with upgrades or updates to this Software. Some Products include an auto-update feature, which gives us the ability to make updates automatically.
You can change auto-update options by changing your settings within the Product account information. In very limited cases, updates may still be automatically applied, regardless of the auto-update setting.
For example, we may provide an automatic update that fixes a security breach or vulnerability to your network. We may also provide you with updated Software data files automatically to benefit you, such as to provide you with updated device information to identify new devices in your network. These data files do not update your firmware but consist of Software files that are cached on your Product and override older files.
By agreeing to this Agreement, you agree to automatic updates. Belkin is committed to protecting your privacy. Our privacy practices are described in the Privacy Policy, as well as in separate notices given when an app, product or service is purchased or downloaded.
At all times your information will be treated in accordance with the Belkin Privacy Policy, which is incorporated by reference into this Agreement and can be viewed here. You hereby acknowledge that the Software may contain Open Source Software. This license does not apply to Open Source Software contained in the Software. Rather, the terms and conditions in the applicable Open Source Software license shall apply to the Open Source Software. Nothing in this Agreement limits your rights under, or grants you rights that supersede, any Open Source Software license.
You acknowledge that the Open Source Software license is solely between you and the applicable licensor of the Open Source Software. You shall comply with the terms of all applicable Open Source Software licenses, if any.
Belkin is not obligated to provide any maintenance or support for the Open Source Software or any Product Software that has been modified by you pursuant to an Open Source Software license. Open source licenses are generally licenses that make source code available for free modification and distribution, but can also apply to technology received and distributed solely in object code form. All title and intellectual property rights including without limitation all copyrights, patents, trade secret rights and trademark rights in and to the Software including but not limited to any content incorporated into the Software , the accompanying printed materials, and any copies of the Software, are owned by Belkin or its suppliers.
Therefore, you must treat the Software like any other material protected by laws and treaties relating to international property rights and in accordance with this Agreement. These features are provided solely as a convenience to you.
You will need to make your own independent judgment regarding your interaction with any Linked Sites. You hereby waive and release any legal claim you might have against Belkin with respect to these sites or third-party products or services, and your use of these sites, third-party products or services. We encourage you to read the terms and conditions and privacy policy of each third party website that you choose to visit.
If Belkin is the subject of a claim, becomes involved in a legal proceeding, or suffers any economic loss or damage as a result of your violation of this Agreement, to the extent permitted by law, you will be responsible for compensating Belkin for the full amount of its loss, as well as any reasonable amounts Belkin incurs in lawyers' fees, expenses and court costs, except to the extent that Belkin contributed to the loss or damage.
Once accepted, this Agreement remains in effect until terminated. The limited license in this Agreement will automatically terminate if you fail to comply with any of the terms and conditions in this Agreement. You agree that upon such termination, you will immediately destroy all programs and documentation that relate to the Software, including all copies made or obtained by you, and otherwise cease use of the Software.
If the Software has been installed on a personal computer or mobile device, you must uninstall the Software immediately. If the Software is software or firmware embedded in a Product, you must stop using the Product. All provisions of this Agreement except for Section 1 and the limited warranty in Section 12 the first paragraph will survive termination.
If you are located in Australia or New Zealand, the following four paragraphs apply to you:. In Australia, our Software and the media on which it is provided, as well as any related services, come with guarantees that cannot be excluded under the Australian Consumer Law. For major failures with the service, you are entitled:. You are also entitled to be compensated for any other reasonably foreseeable loss or damage.
If the failure does not amount to a major failure, you are entitled to have problems with the Service rectified in a reasonable time and, if this is not done, to cancel your contract and obtain a refund for the unused portion of the contract. This Agreement is not intended to and does not: i change or exclude any statutory consumer rights that cannot be lawfully changed or excluded; or ii limit or exclude any right you have against the person who sold the Product to you if that person has breached any sales contract with you.
You agree to use the Software in compliance with all applicable laws, including local laws of the country or region in which you live or in which you download or use the Software. To make a claim under this Limited Warranty, return the defective media along with the sales receipt directly to Belkin at the address indicated below, or you can contact the Belkin Support Team in your area as indicated below. This Limited Warranty is void if failure of the media has resulted from accident, abuse, or misapplication.
Any replacement media will be warranted for the remainder of the original Warranty Period or thirty 30 days, whichever is longer. In relation to consumers who are entitled to the benefit of the CGA, the media on which Software is provided comes with guarantees that cannot be excluded under New Zealand law, and this Limited Warranty is in addition to any statutory rights such consumers may have under New Zealand law.
This Limited Warranty does not apply in Australia. Consumers in Australia have statutory rights in relation to the Software and media on which the Software is provided under the Australian Consumer Law.
To the extent warranties cannot be disclaimed or excluded, they are limited to the duration of the Warranty Period indicated above. Download AP Config. Information Hardware Version. Software Version. System Performance Wired Name. This indicates that the statistics are for the wired network, the LAN. IP Address. This shows the number of bytes received for each wireless network. Bytes Sent. This shows the number of bytes sent for each wireless network. Error Packets Received.
This shows the number of error packets received for each wireless network. Dropped Packets Received. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.
The product supports the following IEEE Page 44 Can Linksys wireless products support file and printer sharing? Linksys wireless products perform the same function as LAN products. The Media Access Control MAC address is a unique number assigned by the manufacturer to any Ethernet networking device, such as a network adapter, that allows the network to identify it at the hardware level. For all practical purposes, this number is usually permanent.
The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. Page 47 This includes hackers. Wireless networking products come with a default SSID set by the factory.
Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use. Page 48 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Follow these instructions: 1.
Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. Many specific authentication methods work within this framework. Page 54 Packet - A unit of data sent over a network. Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products.
PEAP Protected Extensible Authentication Protocol - A mutual authentication method that uses a combination of digital certificates and another system, such as passwords. Port - The connection point on a computer or networking device used for plugging in cables or adapters.
Static IP Address - A fixed address assigned to a computer or device that is connected to a network. Static Routing - Forwarding data in a network via a fixed path. WEP Wired Equivalent Privacy - A method of encrypting network data transmitted on a wireless network for greater security.
Page Appendix G: Warranty Information Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
0コメント