Linksys WPC4400N User Manual

Business series wireless-n business notebook adapter
Hide thumbs Also See for WPC4400N:
Table of Contents

Advertisement

Quick Links

Wireless-N
Business Notebook Adapter
Model No. WPC4400N
Model No.
Model No.
Model No.
Model No.
USER GUIDE
BUSINESS SERIES

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WPC4400N

  • Page 1 USER GUIDE Wireless-N Business Notebook Adapter BUSINESS SERIES Model No. WPC4400N Model No. Model No. Model No. Model No.
  • Page 2 Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Other brands and product names are trademarks or registered trademarks of their respective holders.
  • Page 3: Table Of Contents

    Wireless-N Business Notebook Adapter Table of Contents Chapter 1: Introduction Welcome What’s in this User Guide? Chapter 2: Planning Your Wireless Network Network Topology Roaming Network Layout Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup...
  • Page 4 Wireless-N Business Notebook Adapter Appendix A: Troubleshooting Common Problems and Solutions Frequently Asked Questions Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration Appendix C: Wireless-N Interoperability Appendix D: Wireless Security Security Precautions Security Threats Facing Wireless Networks Appendix E: Windows Help Appendix F: Glossary Appendix G: Specifications...
  • Page 5 Wireless-N Business Notebook Adapter List of Figures Figure 3-1: Front Panel Figure 4-1: Setup Wizard’s Welcome Screen Figure 4-2: Setup Wizard’s License Agreement Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Network Figure 4-5: WEP Figure 4-6: WPA - Personal Figure 4-7: WPA2 - Personal Figure 4-8: Congratulations Figure 4-9: Creating a Profile...
  • Page 6 Wireless-N Business Notebook Adapter Figure 5-4: Link Information - Wireless Network Statistics Figure 5-5: Profiles Figure 5-6: Creating Profiles - Available Wireless Network Figure 5-7: Creating Profiles - WEP Key Needed Figure 5-8: Creating Profiles - WPA-Personal Figure 5-9: Creating Profiles - Congratulations Figure 5-10: Creating Profiles - Manual Setup - Network Settings Figure 5-11: Creating Profiles - Manual Setup - Wireless Mode Figure 5-12: Creating Profiles - Manual Setup - Wireless Security - WEP...
  • Page 7 Wireless-N Business Notebook Adapter Figure 5-24: Editing Profiles - Wireless Mode Figure 5-25: Editing Profiles - Ad Hoc Mode Figure 5-26: Editing Profiles - Wireless Security Figure 5-27: Editing Profiles - Wireless Security - WEP Figure 5-28: Editing Profiles - Wireless Security - WPA Personal Figure 5-29: Editing Profiles - Wireless Security -WPA2 Personal Figure 5-30: Editing Profiles - Wireless Security - WPA Enterprise - EAP-TLS 34 Figure 5-31: Editing Profiles - Wireless Security - WPA Enterprise - PEAP...
  • Page 8 Wireless-N Business Notebook Adapter Figure 6-7: Trusted Mac Address Figure 6-8: Allowed AP Vendor List Configuration Figure 6-9: Allowed SSID Configuration Figure 6-10: Allowed Channel Configuration Figure 6-11: Security Monitor - Channel Usage Figure 6-12: Security Monitor - AP Inventory Figure 6-13: Security Monitor - Client Inventory Figure 6-14: Security Monitor - Alert List Figure 6-15: Security Monitor - POP-UP Alert...
  • Page 9: Chapter 1: Introduction Welcome

    Wireless-N Business Notebook Adapter Chapter 1: Introduction Welcome adapter: a device that adds network functionality Thank you for choosing the Wireless-N Business Notebook Adapter. Setting up your network and your Wireless-N to your PC. Business Notebook Adapter is easier than ever. The Wireless-N Notebook Adapter is the simple way to add or upgrade wireless connectivity in your notebook network: a series of computers or devices computer.
  • Page 10: What's In This User Guide

    Wireless-N Business Notebook Adapter The Wireless-N Business Notebook Adapter has new security monitor functions. When the WPC4400N is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you when an AP is detected that has previously not been seen before and New Client detection for unknown clients, giving your business the visibility and protection it needs.
  • Page 11 Wireless-N Business Notebook Adapter • Appendix C: Wireless-N Interoperability This appendix troubleshooting if there communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. • Appendix D: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network.
  • Page 12: Chapter 2: Planning Your Wireless Network

    Wireless-N Business Notebook Adapter Chapter 2: Planning Your Wireless Network Network Topology topology: the physical layout of a network. A wireless network is a group of computers, each equipped with one wireless adapter. Computers in a wireless network must be configured to share the same radio channel. Several PCs equipped with wireless cards or access point: a device that allows wireless- adapters can communicate with one another to form an ad-hoc network.
  • Page 13: Chapter 3: Getting To Know The Wireless-N Business Notebook Adapter

    Wireless-N Business Notebook Adapter Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity. Link/Act Power Figure 3-1: Front Panel Link/Act Blue. The Link LED lights up when the Adapter has an active connection. Power Blue.
  • Page 14: Chapter 4: Setting Up And Connecting The Wireless-N Business Notebook Adapter

    Wireless-N Business Notebook Adapter Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup The Wireless-N Business Notebook Adapter Setup Wizard will guide you through the installation procedure. The Setup Wizard will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. IMPORTANT: Do not connect the Adapter until you are instructed to do so or the setup will not work correctly.
  • Page 15: Connecting The Adapter

    Wireless-N Business Notebook Adapter Connecting the Adapter 1. Locate an available PCMCIA or CardBus slot on your notebook PC. 2. With the connector pin end facing the PCMCIA CardBus slot and the label facing up, slide the Adapter into the slot until it locks in place.
  • Page 16: Figure 4-5: Wep

    Wireless-N Business Notebook Adapter wep (wired equivalent privacy): a method of encrypting 2. Wireless Security If your network has WEP, WPA-Personal, or WPA2-Personal wireless security enabled, then network data transmitted on a wireless network for greater that security screen will appear. Continue to the screen for your wireless security. security.
  • Page 17: Figure 4-7: Wpa2 - Personal

    Wireless-N Business Notebook Adapter WPA2-Personal If your network has the wireless security WPA2 Personal enabled, this screen will appear. Passphrase - Enter a passphrase between 8 to 63 characters of ASCII text, or enter a 64-character hexadecimal string. Then click Connect and proceed to Step 3. 3.
  • Page 18: Figure 4-9: Creating A Profile

    Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually. 2. The Network Settings screen from the Wireless Network Monitor will appear. If your network has a router or other DHCP server, click the radio button next to Obtain network settings automatically (DHCP).
  • Page 19: Figure 4-11: Ad-Hoc Mode Settings

    Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode, go to Step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Select the correct operating channel for your wireless network. The channel you choose should match the channel set on the other devices in your wireless network.
  • Page 20: Figure 4-13: Wireless Security - Wpa Personal

    Wireless-N Business Notebook Adapter wpa (wi-fi protected access): a wireless security protocol Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System using TKIP (Temporal Key Integrity Protocol) encryption, authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for which can be used in conjunction with a RADIUS server.
  • Page 21: Figure 4-15: Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method can be used.
  • Page 22: Figure 4-17: Wireless Security - Wpa2 Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 23: Figure 4-19: Wireless Security - Radius - Eap-Tls

    Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field.
  • Page 24: Figure 4-21: Wireless Security - Leap

    Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a user name and password based system. Enter the username and password in the username and password field accordingly. Enter the password again in the confirm filed. Figure 4-21: Wireless Security - LEAP 6.
  • Page 25: Chapter 5: Using The Wireless Network Monitor

    Wireless-N Business Notebook Adapter Chapter 5: Using the Wireless Network Monitor Use the Wireless Network Monitor to check the link information, set up profiles of your wireless settings, search for available wireless networks, troubleshoot your wireless connections, or administer the accounts that hold privileges to access the Security Monitor.
  • Page 26: Figure 5-3: Link Information - Wireless Network Status

    Wireless-N Business Notebook Adapter Status Click the Status tab to view the Wireless Network Status screen. The Status screen provides information on your current network settings. Radio Band - This shows the radio band used on the wireless network. SSID - Service Set Identifier, a 32-character unique identifier attached to the header of packets sent over a WLAN.
  • Page 27: Figure 5-4: Link Information - Wireless Network Statistics

    Wireless-N Business Notebook Adapter Statistics The Statistics screen provides statistics on your current network settings. Transmit Rate - This is the data transfer rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transfer rate possible at any given time.) Receive Rate - This is the rate at which data is received.
  • Page 28: Profiles

    Wireless-N Business Notebook Adapter Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here. SSID - The SSID or unique name of the wireless network is displayed here.
  • Page 29: Create A New Profile

    Wireless-N Business Notebook Adapter Create a New Profile The next screen to appear will be the Available Wireless Network screen. This screen provides two options for setting up the Adapter. • Available Wireless Network. (For most users.) Use this option if you already have a network set up. The networks available to this Adapter will be listed on this screen.
  • Page 30: Figure 5-8: Creating Profiles - Wpa-Personal

    Wireless-N Business Notebook Adapter WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”. Then click Connect and proceed to Step 3.
  • Page 31: Figure 5-10: Creating Profiles - Manual Setup - Network Settings

    Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually. 2. The Network Settings screen from the Wireless Network Monitor will appear. If your network has a router or other DHCP server, click the radio button next to Obtain network settings automatically (DHCP).
  • Page 32: Figure 5-12: Creating Profiles - Manual Setup - Wireless Security - Wep

    Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode, go to Step 5 now. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings encryption: encoding data transmitted in a network. screen will appear. Select the correct operating channel for your wireless network. The channel you choose should match the wep (wired equivalent privacy): a method of encrypting channel set on the other devices in your wireless network.
  • Page 33: Figure 5-13: Creating Profiles - Manual Setup - Wireless Security - Wpa Personal

    Wireless-N Business Notebook Adapter Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication.
  • Page 34: Figure 5-15: Creating Profiles - Manual Setup - Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
  • Page 35: Figure 5-17: Creating Profiles - Manual Setup - Wireless Security - Wpa2 Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 36: Figure 5-19: Creating Profiles - Manual Setup - Wireless Security - Radius - Eap-Tls

    Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field.
  • Page 37: Figure 5-21: Creating Profiles - Manual Setup - Wireless Security - Leap

    Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password based system. Enter the username and password in the username and password field accordingly. Enter the password again in the confirm filed. Figure 5-21: Creating Profiles - Manual Setup - Wireless Security - LEAP Chapter 5: Using the Wireless Network Monitor...
  • Page 38: Figure 5-22: Creating Profiles - Manual Setup - Confirm New Settings

    Wireless-N Business Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
  • Page 39: Editing A Profile

    Wireless-N Business Notebook Adapter Editing a Profile Select the profile that you would like to edit in the profile list and click on Edit button. The next screen would be the Wireless Mode. Following the steps below to complete the task: 1.
  • Page 40: Figure 5-26: Editing Profiles - Wireless Security

    Wireless-N Business Notebook Adapter 3. If your wireless network doesn’t have wireless security, select Disabled and then click the Next button to continue. Proceed to Step 4. If your wireless network has wireless security, select the method of security used: WEP, WPA/WPA2 Personal, WPA/WPA2 Enterprise, RADIUS or LEAP.
  • Page 41: Figure 5-28: Editing Profiles - Wireless Security - Wpa Personal

    Wireless-N Business Notebook Adapter WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in length.
  • Page 42: Figure 5-30: Editing Profiles - Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA Enterprise WPA/WPA2 Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
  • Page 43: Figure 5-32: Editing Profiles - Wireless Security -Wpa2 Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 44: Figure 5-34: Editing Profiles - Wireless Security - Radius - Eap-Tls

    Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Login Name field.
  • Page 45: Figure 5-36: Editing Profiles - Wireless Security - Leap

    Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password based system. Enter the username and password in the username and password field accordingly. Enter the password again in the confirm filed. Figure 5-36: Editing Profiles - Wireless Security - 4.
  • Page 46: Figure 5-38: Editing Profiles - Confirm New Settings

    Wireless-N Business Notebook Adapter 5. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
  • Page 47: Site Survey

    Wireless-N Business Notebook Adapter Site Survey The Site Survey screen displays a list of available networks in the table on the left. The table shows each network’s SSID, Channel, and the quality of the wireless signal the Adapter is receiving. You may click SSID, CH (Channel), or Signal, to sort by that field.
  • Page 48: Troubleshooting

    Wireless-N Business Notebook Adapter Troubleshooting The Troubleshooting screen lets you troubleshoot your wireless connection. Address Type - This shows the addressing method of your client. IP Address - This shows the current IP Address of your client. Subnet Mask - This shows the subnet mask of your IP addressing. Default Gateway - This shows the default gateway of your IP addressing.
  • Page 49: Figure 5-43: Administration - Login Access Point Account

    Wireless-N Business Notebook Adapter Log in as the Access Point's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin). Click Next to continue to the administrative options. Figure 5-43: Administration - Login Access Point Access Point Account Account...
  • Page 50: Figure 5-45: Administration - Security Monitor Account

    Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions of the Wireless Network Monitor. Enter the administrator’s username and password and retype the password in the confirm field.
  • Page 51: Chapter 6: The Administrative Functions In The Wireless Network Monitor

    Wireless-N Business Notebook Adapter Chapter 6: The Administrative Functions in the Wireless Network Monitor Figure 6-1: Wireless Network Monitor Icon When used with the WAP4400N Access Point, you can use the administration functions in the Wireless Network Monitor to classify your wireless networks into different groups and monitor the activities and resources within your networks.
  • Page 52: Classification

    Wireless-N Business Notebook Adapter Classification The Classification tab displays a summary of classified devices. The Classification Summary table shows the number of access points and clients classified as trusted and untrusted by MAC addresses in your networks. It also shows the number of allowed vendors, SSIDs, and channels. You may uncheck Receive classification rules to disable a client from receiving the network's current classification rules.
  • Page 53: Figure 6-6: Client Classification

    Wireless-N Business Notebook Adapter Client Classification The Client Classification Screen lets you classify the existing wireless clients into trusted networks and untrusted networks. New client information is received from Linksys Business Series access points. New clients start off as Unclassified until the System Administrator classifies them. A Trusted Client is one that has been identified by the System Administrator to be known and legitimate.
  • Page 54: Figure 6-8: Allowed Ap Vendor List Configuration

    Wireless-N Business Notebook Adapter Allowed Vendor List Configuration The Allowed Vendor List Configuration table lists the OUI (Organization Unique Identification) and vendor name of your trusted and allowed AP Vendor OUIs. A OUI is the three-octet (first six hexadecimal characters) used to generate LAN MAC Addresses for hardware manufacturers.
  • Page 55: Security Monitor

    Wireless-N Business Notebook Adapter Allowed Channel Configuration The Allowed Channel Configuration screen shows the channels that are allowed to be used in your wireless networks. You may select individual channels or click Check All to check all of the channels. Unclassified access points on unchecked channels will be automatically classified as untrusted.
  • Page 56: Figure 6-12: Security Monitor - Ap Inventory

    Wireless-N Business Notebook Adapter AP Inventory The AP Inventory screen provides statistics of the distribution grouped by your AP’s classification of your wireless networks. The pie chart shows the percentage of each classification type, so you can easily view the number of trusted, untrusted, and unknown APs in the airspace.
  • Page 57: Figure 6-14: Security Monitor - Alert List

    Wireless-N Business Notebook Adapter Alert Overview Both the WAP4400N Access Point and client Notebook Adapter monitor the state of your wireless network and report on new devices in the airspace. The Access Point can detect new clients while the client Notebook Adapter can detect new access points.
  • Page 58: Figure 6-16: Alert Information

    Wireless-N Business Notebook Adapter Alert Details The Details screen shows the detailed message of each alert event. Alert - This indicates the description of the event. MAC Address - This shows the MAC Address of the wireless client or Access Point that performed the action. Date/Time - This shows the Date/Time of the alert.
  • Page 59: Figure 6-17: Security Monitor - Advice

    Wireless-N Business Notebook Adapter Advice The Advice screen gives advice, when applicable, on what can be done for each alert event. You may need to adjust your wireless network settings according to the advice to better protect your networks. Windows Firewall Figure 6-17: Security Monitor - Advice Windows XP users may see a Windows Firewall screen when using the security monitor.
  • Page 60: Appendix A: Troubleshooting

    Wireless-N Business Notebook Adapter Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-N Business Notebook Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
  • Page 61: Frequently Asked Questions

    Wireless-N Business Notebook Adapter Frequently Asked Questions Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network. How will wireless networking technology help with my business? Keeping your business connected to the Internet and managing networking in your office without wires give you the freedom to create a dynamic office environment that changes and grows as your business needs change and...
  • Page 62 Wireless-N Business Notebook Adapter What is Draft 802.11n? Draft 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased data throughput and increased operating ranges. What is the 802.11b standard? It is one of the standards for wireless networks.
  • Page 63 Wireless-N Business Notebook Adapter What is infrastructure mode? When a wireless network is set to infrastructure mode, the wireless network is configured to communicate with a wired network through a wireless access point. What is roaming? Roaming is the ability of a portable computer user to communicate continuously while moving freely throughout an area greater than that covered by a single access point.
  • Page 64 Wireless-N Business Notebook Adapter What is DSSS? What is FHSS? And what are their differences? Frequency-Hopping Spread-Spectrum (FHSS) uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver. Properly synchronized, the net effect is to maintain a single logical channel.
  • Page 65: Appendix B: Windows Xp Wireless Zero Configuration

    Wireless-N Business Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the Adapter, instead of using the Wireless Network Monitor, then right- Figure B-1: Wireless Network Monitor Icon click on the Wireless Network Monitor and select Use Windows XP Wireless Configuration.
  • Page 66: Figure B-4: Available Wireless Network

    Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wireless network. Select the network you want. Click the NOTE: Steps 2 and 3 are the instructions and Connect button. screenshots for Windows XP with Service Pack 2 installed.
  • Page 67: Figure B-6: Network Connection - Wireless Security

    Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Click the Connect button. Figure B-6: Network Connection - Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase.
  • Page 68: Appendix C: Wireless-N Interoperability

    Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperability There may be communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. If your network is experiencing these problems, follow these instructions. 1. Click the Start button, select Control Panel, then click System. 2.
  • Page 69: Appendix D: Wireless Security

    Wireless-N Business Notebook Adapter Appendix D: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
  • Page 70 Wireless-N Business Notebook Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID.
  • Page 71 Wireless-N Business Notebook Adapter WPA-Personal. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters. WPA Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys.
  • Page 72: Appendix E: Windows Help

    Wireless-N Business Notebook Adapter Appendix E: Windows Help Almost wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 73: Appendix F: Glossary

    Wireless-N Business Notebook Adapter Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network.
  • Page 74 Wireless-N Business Notebook Adapter DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be “seen” from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses.
  • Page 75 Wireless-N Business Notebook Adapter Intrusion attack - A type of internet attacks in which an attacker tries to gain or access the information transimitted through the networks. IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network.
  • Page 76 Wireless-N Business Notebook Adapter PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe. QoS (Quality of Service) - A mechanism which gives priorities to certain types of traffic to ensure the throughput;...
  • Page 77 Wireless-N Business Notebook Adapter TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.
  • Page 78: Appendix G: Specifications

    Wireless-N Business Notebook Adapter Appendix G: Specifications Standards Draft 802.11n, IEEE 802.11g, IEEE 802.11b, IEEE 802.1x (Security Authentication), IEEE 802.11i Channels 802.11b/802.11g/Wireless-N (20MHz/40MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Power, Link/Act Protocols 802.11b: DSSS: CCK, QPSK, BPSK 802.11g: OFDM Wireless-N: OFDM Transmitted Power 802.11b: 17 dBm@1TX;...
  • Page 79 Wireless-N Business Notebook Adapter Dimensions 4.88" x 0.53" x 2.13" (124 mm x 13.5 mm x 54 mm) Unit Weight 1.76 oz (0.05 kg) Certifications FCC, WHQL Operating Temp. 32ºF to 140ºF (0ºC to 60ºC) Storage Temp. -4ºF to 176ºF (-20ºC to 80ºC) Operating Humidity 10 to 80%, Non-Condensing Storage Humidity...
  • Page 80: Appendix H: Warranty Information

    Wireless-N Business Notebook Adapter Appendix H: Warranty Information LIMITED WARRANTY Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 81: Appendix I: Regulatory Information

    Wireless-N Business Notebook Adapter Appendix I: Regulatory Information FCC Statement This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
  • Page 82 Wireless-N Business Notebook Adapter Industry Canada Statement This device complies with Industry Canada ICES-003 and RSS210 rules. Déclaration d’Industrie Canada Cet appareil est conforme aux normes NMB003 et RSS210 d'Industrie Canada. Industry Canada Statement Operation is subject to the following two conditions: 1.
  • Page 83 Wireless-N Business Notebook Adapter User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol: Appendix I: Regulatory Information...
  • Page 84 Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
  • Page 85 Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
  • Page 86 Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
  • Page 87 Wireless-N Business Notebook Adapter For more information, visit www.linksys.com. Appendix I: Regulatory Information...
  • Page 88: Appendix J: Contact Information

    Wireless-N Business Notebook Adapter Appendix J: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or ftp.linksys.com Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: 800-546-5797 (LINKSYS)

Table of Contents