Linksys WET54G Owner's Manual

USER GUIDE
Wireless-G Ethernet Bridge
Model: WET54G (EU)
About This Guide
While reading through the User Guide you may see various icons that call attention to specific items. Below is a description of these icons:
NOTE: This check mark indicates that there is
a note of interest and is something that you should pay special attention to while using the product.
WARNING: This exclamation point indicates
that there is a caution or warning and it is something that could damage your property or product.
About This Guide
WEB: This globe icon indicates a noteworthy
website address or e-mail address.
Online Resources
Website addresses in this document are listed without http:// in front of the address because most current web browsers do not require it. If you use an older web browser, you may have to add http:// in front of the web address.
Resource Website
Linksys www.linksys.com
Linksys International www.linksys.com/international
Glossary www.linksys.com/glossary
Network Security www.linksys.com/security
Copyright and Trademarks
Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2008 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
Wireless-G Ethernet Bridge
i
Table of Contents
Chapter 1: Product Overview 1
Front Panel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Back Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2: Wireless Security Checklist 2
General Network Security Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Additional Security Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Chapter 3: Conguration using the Web-based Utility 3
How to Access the Web-Based Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Setup Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Password Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Advanced Settings Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Status Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Help Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Appendix A: Troubleshooting 11
Appendix B: Specications 12
Appendix C: Warranty Information 13
Limited Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Appendix D: Regulatory Information 15
FCC Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Safety Notices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Industry Canada Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Avis d’Industrie Canada. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Wireless Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Avis de non-responsabilité concernant les appareils sans fil . . . . . . . . . . . . . . . . . .16
Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) . .17
Wireless Equipment (Wireless-N/G/A/B Products) . . . . . . . . . . . . . . . . . . . . . . . . .18
CE Marking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
National Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Product Usage Restrictions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
Technical Documents on www.linksys.com/international . . . . . . . . . . . . . . . . . . . .19
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste
Electric and Electronic Equipment (WEEE) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Wireless-G Ethernet Bridge
Appendix E: Software License Agreement 24
Software in Linksys Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
Software Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
ii
Chapter 1
Product Overview

Chapter 1: Product Overview

Thank you for choosing the Wireless-G Ethernet Bridge. The versatile Wireless-G Ethernet Bridge can make any wired Ethernet-equipped device a part of your wireless network. At home, use the Bridge to connect game consoles, set­top boxes, or computers to your Wireless-G network and its shared high-speed Internet connection. In the office, convert your Ethernet-wired printer, camera, notebook or desktop into a wireless networked device.

Front Panel

Wireless-G (Green) This LED will be lit steadily
when the Bridge is connected to the wireless network. The LED will flash when there is wireless network traffic.

Back Panel

Power (Green) This LED lights up when the
Bridge is powered on. The LED flashes while the Bridge is booting up and performing a self-test, and remains lit after the self-test has ended.
Ethernet (Green) This LED will be lit steadily
when the Bridge is connected to the wired network. The LED will flash when there is wired network traffic.
Wireless-G Ethernet Bridge
Reset When pressed, the Reset button resets
the Bridge to its factory default settings.
LAN The LAN port is where you will connect
the Ethernet network cable.
Power The Power port is where you will
connect the power adapter.
NOTE: If you reset the Wireless-G Ethernet
Bridge, you will erase all of your settings (WEP encryption, wireless settings, etc.) and replace them with the factory defaults. Do not reset the Wireless-G Ethernet Bridge if you want to retain these settings.
1
Chapter 2
Wireless Security Checklist

Chapter 2: Wireless Security Checklist

Wireless networks are convenient and easy to install, so homes with high-speed Internet access are adopting them at a rapid pace. Because wireless networking operates by sending information over radio waves, it can be more vulnerable to intruders than a traditional wired network. Like signals from your cellular or cordless phones, signals from your wireless network can also be intercepted. Since you cannot physically prevent someone from connecting to your wireless network, you need to take some additional steps to keep your network secure.
1. Change the default wireless network name or SSID
Wireless devices have a default wireless network name or Service Set Identifier (SSID) set by the factory. This is the name of your wireless network, and can be up to 32 characters in length. Linksys wireless products use linksys as the default wireless network name. You should change the wireless network name to something unique to distinguish your wireless network from other wireless networks that may exist around you, but do not use personal information (such as your Social Security number) because this information may be available for anyone to see when browsing for wireless networks.
2. Change the default password
For wireless products such as access points, routers, and gateways, you will be asked for a password when you want to change their settings. These devices have a default password set by the factory. The Linksys default password is admin. Hackers know these defaults and may try to use them to access your wireless device and change your network settings. To thwart any unauthorized changes, customize the device’s password so it will be hard to guess.
4. Enable encryption
Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Equivalency Privacy (WEP) offer different levels of security for wireless communication.
A network encrypted with WPA/WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2 uses dynamic key encryption. To protect the information as it passes over the airwaves, you should enable the highest level of encryption supported by your network equipment.
WEP is an older encryption standard and may be the only option available on some older devices that do not support WPA.

General Network Security Guidelines

Wireless network security is useless if the underlying network is not secure.
Password protect all computers on the network and individually password protect sensitive files.
Change passwords on a regular basis.
Install anti-virus software and personal firewall software.
Disable file sharing (peer-to-peer). Some applications may open file sharing without your consent and/or knowledge.

Additional Security Tips

Keep wireless routers, access points, or gateways away from exterior walls and windows.
Turn wireless routers, access points, or gateways off when they are not being used (at night, during vacations).
Use strong passphrases that are at least eight characters in length. Combine letters and numbers to avoid using standard words that can be found in the dictionary.
3. Enable MAC address filtering
Linksys routers and gateways give you the ability to enable Media Access Control (MAC) address filtering. The MAC address is a unique series of numbers and letters assigned to every networking device. With MAC address filtering enabled, wireless network access is provided solely for wireless devices with specific MAC addresses. For example, you can specify the MAC address of each computer in your home so that only those computers can access your wireless network.
Wireless-G Ethernet Bridge
WEB: For more information on wireless
security, visit www.linksys.com/security
2
Chapter 3
Configuration using the Web-based Utility

Chapter 3: Configuration using the Web-based Utility

The Bridge is designed to function properly after you configure it using the Setup Wizard. However, if you would like to change these basic settings or make advanced configuration changes, use your web browser and the Wireless-G Ethernet Bridge Web-based Utility. This chapter explains how to use the Utility.

How to Access the Web-Based Utility

Open your web browser, and enter the IP address 1. of the Wireless-G Ethernet Bridge (the default is
192.168.1.226) in the browser’s Address field. Then press Enter.
Internet Explorer Address Bar
The 2. Password screen will appear. In lowercase letters, enter the default password, admin, in the Password field. Click OK. You can set a new password on the Password screen later.

Setup Tab

The Setup screen lets you configure the wired and wireless network settings for the Bridge.
Setup
Firmware The version number of the Bridge’s firmware is
displayed here. Firmware should be upgraded ONLY if you experience problems with the Bridge. Firmware updates are posted at www.linksys.com.
Password Screen
The utility’s Setup screen will appear. The Utility 3. provides a convenient, web-browser-based way to alter the Bridge’s settings. It offers five main tabs
Setup - Enables you to configure the IP address and
wireless settings.
Password - Allows you to change the password or
reset all settings to factory defaults.
Advanced - Lets you change the advanced wireless
settings and clone a MAC address onto the Bridge.
Status - Displays the Bridge’s current settings.
Help - Provides explanations of various configuration
settings and links to online technical support resources. You can also upgrade the Bridge’s firmware using the Help screen.
MAC Address
The Bridge’s MAC address is displayed here
.
LAN
Device Name You may assign any name to the Bridge.
Unique, memorable names are helpful, especially if you are using multiple bridges on the same wireless network.
Configuration Type If the Bridge will obtain an IP
address automatically from a DHCP server, such as a router, then select Automatic Configuration-DHCP. If you are assigning the Bridge a static IP address, then select Static IP Address, and enter an IP Address, Subnet Mask, and Gateway address in the IP Address, Subnet Mask, and Gateway fields.
Wireless
SSID The SSID is the network name shared among all
devices in a wireless network. The SSID must be identical for all devices in the wireless network. It is case-sensitive and must not exceed 32 alphanumeric characters (A-Z, a-z, 0-9; do not use spaces). Make sure this setting is the same for all devices in your wireless network. For added security, Linksys recommends that you change the default SSID (linksys) to a name of your choice.
Wireless-G Ethernet Bridge
3
Chapter 3
Configuration using the Web-based Utility
Site Survey To search for available wireless networks, click
Site Survey. The Wireless Site Survey screen will appear.
This screen shows all the wireless networks detected by the Bridge and their general information. You can use this screen to connect to one of these networks.
Wireless Site Survey
For each wireless network detected, the following information is displayed:
Security To enable security, select Enable, then click
Edit Security Settings. To disable security, select Disable. If you have not enabled security before clicking Edit Security Settings, you will be asked if you want to enable
security settings; click OK to edit the security settings, or click Cancel to cancel.
Enable Security Settings
If you click Edit Security Settings, the Security screen will appear.
The network name. To join a wireless network,
SSID
click its SSID.
MAC Address The MAC address of the network’s
access point.
Channel
The channel setting.
Signal Strength (%) The percentage of wireless
signal strength.
Mode The type of wireless standard, network mode,
and status of WEP encryption.
Click Refresh to obtain the most up-to-date data. Click Cancel to close this screen. Click Help for additional on­screen information.
Network Type Choose a wireless operating mode for
the Bridge. Keep the default setting, Infrastructure, if you want your wireless-equipped device to communicate with computers and other devices on your wired network using a wireless access point. Select Ad-Hoc if you want multiple wireless-equipped devices to communicate directly with each other.
If you chose Ad-Hoc mode, then select the correct operating channel for your network from the Channel drop-down menu. This should match the channel setting of the other devices in your wireless network.
Select the appropriate network mode from the Mode drop-down menu. Keep the default, Mixed, if you have Wireless-G (802.11g) and Wireless-B (802.11b) devices in your network. Select G-Only if you have only Wireless-G devices in your network
Security
From the Security Mode drop-down menu, select one of the four wireless security modes supported by the Bridge:
WPA (Wi-Fi Protected Access) Pre-Shared Key
WPA RADIUS
RADIUS (Remote Authentication Dial-In User Service)
WEP (Wired Equivalent Privacy)
WPA is a security standard stronger than WEP encryption. The four security modes are briefly discussed here. For detailed instructions on configuring wireless security for the Bridge, refer to the “Wireless Security” chapter.
Wireless-G Ethernet Bridge
4
Chapter 3
Configuration using the Web-based Utility
WEP
Use the WEP screen to configure the WEP encryption for the Bridge.
WEP encryption, then each key must consist of exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”-“9” and “A”-“F”.
Click Apply to save your changes. If your page does not automatically refresh itself, then click Refresh on your web browser.
WPA Pre-Shared Key
WPA gives you TKIP for the encryption method.
Security > WEP
Select a Default Transmit Key (choose which Key to use), and a level of WEP Encryption, 64 bits (10 hex digits) or 128 bits (26 hex digits). Then either generate a WEP Key using a Passphrase or enter the WEP key manually.
Default Transmit Key Select which WEP key (1-4) will be
used when the Bridge sends data. Make sure the other wireless-equipped devices are using the same key.
WEP Encryption In order to use WEP encryption, select
64-Bit (10 hex digits) or 128-Bit (26 hex digits) from the
drop-down menu.
Passphrase Instead of manually entering WEP keys,
you can enter a Passphrase. This Passphrase is used to generate one or more WEP keys. It is case-sensitive and should not be longer than 16 alphanumeric characters. (The Passphrase function is compatible with Linksys wireless products only. If you want to communicate with non-Linksys wireless products, you will need to enter your WEP key manually on the non-Linksys wireless products.) After you enter the Passphrase, click Generate to create WEP key(s).
Keys 1-4 If you are not using a Passphrase, then you can
enter one or more WEP keys manually.
In each key field, manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes. These are not valid key values.) If you are using 64-bit WEP encryption, then each key must consist of exactly 10 hexadecimal characters in length. If you are using 128-bit
Wireless-G Ethernet Bridge
Security > WPA Pre-Shared Key
WPA Shared Key Enter a WPA Shared Key of 8-32
characters. This is a key shared between the Bridge and the server.
View Log Click View Log to display the Log Table screen.
This screen displays a log of the authentication process.
Log Table
Click Refresh to refresh the Log Table screen. Click Close to return to the the WPA Pre-Shared Key screen.
Click Apply to save your changes. If your page does not automatically refresh itself, then click Refresh on your web browser.
5
Chapter 3
Configuration using the Web-based Utility
RADIUS
This option features WEP used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) It offers three authentication methods: MD5, TLS, and TTLS.
EAP Type Select the authentication method: MD5, TLS,
or TTLS. The appropriate screen appears depending on the selection. The screens are described below.
MD5
should not be longer than 32 alphanumeric characters. (This Passphrase function is compatible with Linksys wireless products only and cannot be used with Windows XP Zero Configuration. If you want to communicate with non-Linksys wireless products or Windows XP Zero Configuration, make a note of the WEP key generated in the Key 1 field, and enter it manually in the wireless client.) After you enter the Passphrase, click Generate to create WEP keys.
Keys 1-4 WEP keys enable you to create an encryption
scheme for wireless network transmissions. If you are not using a Passphrase, then manually enter a set of values. (Do not leave a key field blank, and do not enter all zeroes; they are not valid key values.) If you are using 64-bit WEP encryption, the key must be exactly 10 hexadecimal characters in length. If you are using 128-bit WEP encryption, the key must be exactly 26 hexadecimal characters in length. Valid hexadecimal characters are “0”­“9” and “A”-“F”.
User ID and Password A user identification and password
are required for your security. Enter the ID in the User ID field, then the password in the Password field.
Click Apply to save your changes. If your page does not automatically refresh itself, then click Refresh on your web browser. Click View Log to view a log.
Security > RADIUS-MD5
Select a Default Key (choose which Key to use), and a level of WEP encryption, 64 bits 10 hex digits or 128 bits 26 hex digits. Then either generate a WEP key using a Passphrase or enter the WEP key manually.
Default Transmit Key Select which WEP key (1-4) will
be used when the Bridge sends data. Make sure that the receiving device (wireless client) is using the same key.
WEP Encryption An acronym for Wired Equivalent
Privacy, WEP is an encryption method used to protect your wireless data communications. WEP uses 64-bit or 128-bit keys to provide access control to your network and encryption security for every data transmission. To decode data transmissions, all devices in a network must use an identical WEP key. Higher encryption levels offer higher levels of security, but due to the complexity of the encryption, they may decrease network performance. Select 64 bits (10 hex digits) or 128 bits (26 hex digits).
Passphrase Instead of manually entering WEP keys,
you can enter a passphrase. This passphrase is used to generate one or more WEP keys. It is case-sensitive and
TLS
TLS is a mutual authentication method that uses digital certificates.
Security > RADIUS-TLS
Enter the Login name of your wireless network in the User ID field. Enter the User Certificate and Root Certificate in
Wireless-G Ethernet Bridge
6
Chapter 3
Configuration using the Web-based Utility
the fields or click Browse to browse for it, then upload it.
User ID Your User ID is the Login name of your wireless
network. Enter the Login name of your wireless network in the User ID field.
User Certificate Enter the user certificate you have
installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.
Root Certificate Enter the root certificate you have
installed to authenticate you on your wireless network or click the Browse button to browse for it. Click the Upload button to upload the certificate.
Click Apply to save your changes. If your page does not automatically refresh itself, then click Refresh on your web browser. Click View Log to view a log.
TTLS
TTLS is a mutual authentication method that uses digital certificates.
Root Certificate Enter the root certificate you have
installed to authenticate you on your wireless network or click Browse to browse for it. Click Upload to upload the certificate.
Click Apply to save your changes. If your page does not automatically refresh itself, then click Refresh on your web browser. Click View Log to view a log.
To save your changes, click Apply. Click Cancel to cancel your changes. Click Help for additional on-screen information.

Password Tab

The Password screen lets you change the Bridge’s Password and restore the factory default settings.
Security > RADIUS-TTLS
Enter the Login name of your wireless network in the User
ID field and the password in the Password field. Enter the Root Certificate in the field or click Browse to browse for it,
then upload it.
EAP Type The authentication method that your network
uses. Select TTLS from the drop-down menu.
User ID Your User ID is the Login name of your wireless
network. Enter the Login name of your wireless network in the User ID field.
Password This is the password used for your wireless
network. Enter the password in the Password field.
Password
Administrative Password It is strongly recommended
that you change the factory default password of the Bridge from admin to a new password that you create. All users who try to access the Bridge’s Web-based Utility will be prompted for the Bridge’s Password. The new Password must not exceed 12 characters in length and must not include any spaces. Enter the new Password a second time to confirm it.
NOTE: Any settings you have saved will be lost
if the default settings are restored.
Restore Factory Defaults Click Yes to reset all
configuration settings to their default values. If you do not want to restore the factory defaults, then keep the default setting, No.
To save your changes, click Apply. Click Cancel to cancel your changes. Click Help for additional on-screen information.
Wireless-G Ethernet Bridge
7
Chapter 3
Configuration using the Web-based Utility

Advanced Settings Tab

Use the Advanced Settings screen to customize advanced wireless settings and clone a MAC address onto the Bridge.
Advanced Settings
Wireless
Transmission Rate The default setting is Auto. The range
is from 1 to 54Mbps.The rate of data transmission should be set depending on the speed of your wireless network. You can select from a range of transmission speeds, or you can keep the default setting, Auto, to have the Bridge automatically use the fastest possible data rate and enable the Auto-Fallback feature. Auto-Fallback will negotiate the best possible connection speed between the Bridge and another wireless-equipped device.
not be enabled. The Router sends Request to Send (RTS) frames to a particular receiving station and negotiates the sending of a data frame. After receiving an RTS, the wireless station responds with a Clear to Send (CTS) frame to acknowledge the right to begin transmission.
Fragmentation Threshold This value should remain at
its default setting of 2346. The range is 256-2346 bytes. It specifies the maximum size for a packet before data is fragmented into multiple packets. If you experience a high packet error rate, you may slightly increase the Fragmentation Threshold. Setting the Fragmentation Threshold too low may result in poor network performance. Only minor modifications of this value are recommended.
MAC Address
Cloning Mode You can clone the MAC address of any
network device onto the Bridge. To disable MAC address cloning, keep the default setting, Disable. To use the MAC cloning feature, select Enable.
If you have enabled MAC cloning, then select Auto if you want to clone the MAC address of the device currently connected to the Bridge’s LAN port. The Bridge will actively scan for a new MAC address to be cloned whenever you disconnect and re-connect the Bridge through its LAN port. Select Manual if you want to specify a MAC address in the Enter MAC Address field. This is useful when the Bridge is connected to multiple devices through a switch or a hub.
Click Apply to save your changes. If your page does not automatically refresh itself, then click Refresh on your web browser. Click Cancel to cancel your changes. Click
Help for additional on-screen information.
Authentication Type The default setting is Auto. The
choices are Auto, Open, and Shared. This setting allows the Bridge to authenticate communication with the wireless devices in your network. With the Shared key setting, all wireless devices must have the same WEP keys so that the Bridge and the client can authenticate each other and start transmitting data. With the Open system setting, any device can join a network without performing any security check. Using the Auto setting, the Bridge will automatically detect whether a wireless device uses shared key or open system authentication, and then it will transmit data using the appropriate authentication type.
RTS Threshold This value should remain at its default
setting of 2347. The range is 0-2347 bytes. Should you encounter inconsistent data flow, only minor modifications are recommended. If a network packet is smaller than the preset RTS threshold size, the RTS/CTS mechanism will
Wireless-G Ethernet Bridge
8
Chapter 3
Configuration using the Web-based Utility

Status Tab

The Status screen displays the Bridge’s current status and settings. All information is read-only.
Wireless RX The number of packets received from the
wireless network is displayed here.
Wireless Settings
SSID The Bridge’s SSID is displayed here.
Network Type The Bridge’s mode is displayed here.
Channel The Bridge’s channel setting is displayed here.
Security The status of the Bridge’s security is displayed
here.
TX Rate The Bridge’s transmission rate is displayed here.
Link Quality The quality of the Bridge’s connection is
displayed here.
Click Refresh to obtain the most up-to-date settings and statistics. Click Help for additional on-screen information.

Help Tab

The Help screen offers links to all of the help information for the Web-based Utility’s screens and the Bridge’s online technical support resources (all information is read-only). You can also upgrade the Bridge’s firmware.
Status
Device Name The name you have assigned to the Bridge
is displayed here.
Firmware Version The version number of the Bridge’s
firmware is displayed here. Firmware updates are posted at www.linksys.com. Firmware should be upgraded ONLY if you experience problems with the Bridge. To upgrade the Bridge’s firmware, use the Help screen.
MAC Address The MAC Address of the Bridge is displayed
here.
LAN Settings
IP Address The Bridge’s IP Address is displayed here.
Subnet Mask The Bridge’s Subnet Mask is displayed
here.
Gateway The Gateway address for the Bridge is displayed
here.
Statistics
Ethernet TX The number of packets transmitted to the
Ethernet network is displayed here.
Ethernet RX The number of packets received from the
Ethernet network is displayed here.
Wireless TX The number of packets transmitted to the
wireless network is displayed here.
Wireless-G Ethernet Bridge
Help
Linksys Website Click the link to visit Linksys’s website,
www.linksys.com.
Online manual in PDF format Click the link to view this
User Guide on-screen. It is in Adobe Acrobat Portable Document File (.pdf) format, so you will need the free Adobe Acrobat Reader to view the pdf. If you do not have the Reader, click the Adobe Website link to download it.
Adobe Website
you need to download the Adobe Acrobat Reader to view the User Guide pdf, then click the this link.
Firmware Upgrade The version number of the Bridge’s
firmware is displayed here. Firmware updates are posted
(software for viewing PDF documents)
If
9
Loading...
+ 26 hidden pages