User Guide Linksys WET610N/WES610N Dual-Band N Entertainment Bridge
Linksys E-Series Contents Contents Product Overview Administration > Management . . . . . . . . . . . . . . . . . . . . 14 LED panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Ports panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Administration > Factory Defaults . . . . . . . . . . . . . . . . . .
Linksys WES610N/WET610N Product Overview Product Overview Thank you for choosing the Linksys Dual-Band N Entertainment Bridge. The bridge can connect any wired, Ethernet device to your wireless network. The bridge is based on dual-band Wireless-N, so it is compatible with any Wireless-N, -G, -A, or -B router or access point. For first-time installation, follow the steps on the CD folder. To configure advanced settings, use the convenient, browser-based utility.
Linksys WES610N/WET610N Product Overview Ports panel WES610N WET610N Ethernet The Ethernet port(s) connects the bridge to a computer or other Ethernet network device. The WES610N has four ports, and the WET610N has a single port. Reset There are two ways to reset the bridge’s factory defaults. Either press and hold the Reset button for approximately five seconds, or restore the defaults from Administration > Factory Defaults in the bridge’s browser-based utility.
Linksys WES610N/WET610N Wireless Security Checklist Wireless Security Checklist Wireless networks are convenient and easy to install, so homes with highspeed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted.
Linksys WES610N/WET610N Wireless Security Checklist Additional Security Tips •• Keep wireless routers, access points, or gateways away from exterior walls and windows. •• Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations). •• Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.
Linksys WES610N/WET610N Advanced Configuration Advanced Configuration After setting up the bridge by following the steps on the CD folder, the bridge will be ready for use. However, if you want to change its advanced settings, use the bridge’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions. You can access the utility via a web browser on a computer networked with the bridge.
Linksys WES610N/WET610N Setup > Basic Setup The first screen that appears is the Basic Setup screen. Use this screen to change the browser-based utility’s language, or to change the bridge’s wired, Ethernet network settings. Advanced Configuration Bridge IP If your network has a DHCP server, such as your network router, assigning IP addresses to your network devices, then keep the default, Automatic Configuration - DHCP.
Linksys WES610N/WET610N Basic Wireless Settings Advanced Configuration WPA Personal WPA is a security standard stronger than WEP encryption. Network Name (SSID) The SSID is the network name shared among all points in a wireless network. The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 characters (use any characters on the keyboard). Make sure this setting matches the setting on your wireless router or access point.
Linksys WES610N/WET610N Passphrase Enter the key shared by the bridge and wireless router or access point. It must have 8-63 characters. Click Save Settings to apply your changes, or click Cancel Changes to cancel your changes. Advanced Configuration Wi-Fi Protected Setup There are two methods available. Use the method that applies to the router you are using. WEP WEP is a basic encryption method, which is not as secure as WPA or WPA2.
Linksys WES610N/WET610N Method #2 Use this method if your router requests the PIN number of the bridge. 1. On the router’s Wi-Fi Protected Setup screen, enter the PIN number on the bridge’s Wi-Fi Protected Setup screen. Then click Register or the appropriate button. (It is also listed on the label on the bottom of the bridge.) 2. On the bridge’s Wi-Fi Protected Setup screen, click OK. 3. After the bridge has been configured, click Close.
Linksys WES610N/WET610N WPA2 Advanced Configuration Key 1 Enter the WEP key of your network. Tx Key Key 1 is the transmit key used by the bridge. Authentication The default is Auto, which allows either Open system or Shared key authentication to be used. Select Open to use open system authentication; the sender and recipient do not use a WEP key for authentication. Select Shared to use shared key authentication; the sender and recipient use a WEP key for authentication.
Linksys WES610N/WET610N Advanced Configuration WMM Best Effort Access Mode Use Aggregation This option defines whether or not the Media Access Control (MAC) layer will set up an Add Block Acknowledgement (ADDBA) session. The default is Yes. Select No to disable this option. You can assign different settings to the four access modes available. Select the mode you want to configure: Background, Best Effort, Video, or Voice. Follow the instructions for the mode you select.
Linksys WES610N/WET610N Max. Aggregation Size This option defines the maximum size of the aggregate (in bytes). The range is 0 to 16000. The default is 12000. Timeout Internal This option defines the timeout period in which the aggregate should be closed with a “closing condition” before it is closed by the timer. The range is 0 to 100 ms. The default is 3. Min. Size of Packet in Aggregation This option defines the minimum size (in bytes) of packets to be accumulated in the aggregate.
Linksys WES610N/WET610N ERP Protection Type This option configures protection of OFDM packets despite the presence of 802.11b stations within the wireless network. By sending RTS/CTS or CTS2Self packets in 802.11b rates, the bridge informs the wireless network that OFDM packets are going to be transferred and protects the packets in the wireless network. The RTS/CTS and CTS2Self packets create overhead, which may result in lower throughputs.
Linksys WES610N/WET610N Advanced Configuration Restore Click Browse and select the configuration file. Then click Restore Configurations. Administration > Upgrade Firmware System Reboot Use this screen to upgrade the bridge’s firmware. Do not upgrade the firmware unless you are experiencing problems with the bridge or the new firmware has a feature you want to use. Reboot To reboot or restart the bridge, click Start to Reboot.
Linksys WES610N/WET610N Advanced Configuration Bridge Information Radio Band The radio band of your wireless network is displayed. Firmware Version The bridge’s current firmware is displayed. Channel Width The channel width, in MHz, used by your wireless network is displayed. Local Network Local MAC Address The bridge’s MAC Address, as seen on your local, Ethernet network, is displayed. Wide Channel Depending on the channel settings of your network router, the Wide Channel is displayed.
Linksys WES610N/WET610N Troubleshooting Troubleshooting WES610N/WET610N Your computer or other wired, Ethernet device cannot communicate with the wireless router. 1. Access the bridge’s browser-based utility. •• Make sure all devices are on the same IP network, using compatible IP addresses. The browser-based utility does not accept your password. Check the following: 2. On the Basic Wireless Settings screen, make sure the Network Name (SSID) matches the name of your wireless network.
Linksys WES610N/WET610N Specifications Specifications WES610N Environmental Dimensions 6.97” x 5.04” x 2.68” (177 x 128 x 68 mm) IEEE 802.3u, 802.11g, 802.11b, 802.11a, 802.11n Weight 0.
Linksys WES610N/WET610N WET610N Specifications Environmental Dimensions 5.71” x 4.17” x 2.05” (145 x 106 x 52 mm) IEEE 802.3u, 802.11g, 802.11b, 802.11a, 802.11n Weight 5.
Linksys.com/support Cisco, the Cisco logo, and Linksys are trademarks or registered trademarks of Cisco and/or its affiliates in the United States and other countries. A listing of Cisco’s trademarks can be found at www.cisco.com/go/trademarks. All other trademarks mentioned in this document are the property of their respective owners. © 2011 Cisco and/or its affiliates. All rights reserved.