User Guide
Page 9
.... adapter: a device that specifies a maximum data rate of up your network and your notebook's PC Card slot and enjoy incredible high-speed wireless network access while retaining true mobility. By overlaying the signals of bandwidth to 600Mbps (300Mbps is the simple way to communicate with other resources such as much radio band. Get your PC. Access the web or use instant messaging to add or upgrade wireless connectivity in a network...
.... adapter: a device that specifies a maximum data rate of up your network and your notebook's PC Card slot and enjoy incredible high-speed wireless network access while retaining true mobility. By overlaying the signals of bandwidth to 600Mbps (300Mbps is the simple way to communicate with other resources such as much radio band. Get your PC. Access the web or use instant messaging to add or upgrade wireless connectivity in a network...
User Guide
Page 10
... 4: Setting up and Connecting the Wireless-N Business Notebook Adapter This chapter instructs you on how to install and configure the Adapter. • Chapter 5: Using the Wireless Network Monitor This chapter shows you how to use the Windows XP Zero Configuration. Use the instructions in this User Guide? These instructions should be all you when an AP is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you need to use the Adapter's Wireless Network Monitor...
... 4: Setting up and Connecting the Wireless-N Business Notebook Adapter This chapter instructs you on how to install and configure the Adapter. • Chapter 5: Using the Wireless Network Monitor This chapter shows you how to use the Windows XP Zero Configuration. Use the instructions in this User Guide? These instructions should be all you when an AP is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you need to use the Adapter's Wireless Network Monitor...
User Guide
Page 14
... Click Here to exit the Setup Wizard. Click the Click Here to Start button to do so or the setup will begin the software installation process. Windows will not work correctly. IMPORTANT: Do not connect the Adapter until you have the following choices: Click Here to open the PDF file of your CD-ROM drive. User Guide - Click the User Guide button to Start- Figure 4-1: Setup Wizard's Welcome Screen 1. After reading the...
... Click Here to exit the Setup Wizard. Click the Click Here to Start button to do so or the setup will begin the software installation process. Windows will not work correctly. IMPORTANT: Do not connect the Adapter until you have the following choices: Click Here to open the PDF file of your CD-ROM drive. User Guide - Click the User Guide button to Start- Figure 4-1: Setup Wizard's Welcome Screen 1. After reading the...
User Guide
Page 15
... Adapter. If Windows asks you wish to set up the adapter manually. Click Exit to close the Setup Wizard, if you for Advanced Users only. If your network is not listed on this screen, select Manual Setup to set up the Adapter. • Available Wireless Network. (For most users.) Use this screen. Available Wireless Network The available networks are listed in place. 3. You can click the Refresh button to bring the list up and Connecting the Wireless...
... Adapter. If Windows asks you wish to set up the adapter manually. Click Exit to close the Setup Wizard, if you for Advanced Users only. If your network is not listed on this screen, select Manual Setup to set up the Adapter. • Available Wireless Network. (For most users.) Use this screen. Available Wireless Network The available networks are listed in place. 3. You can click the Refresh button to bring the list up and Connecting the Wireless...
User Guide
Page 17
... about the Wireless Network Monitor, refer to 63 characters of the Wireless-N Business Notebook Adapter is complete. Then click Connect and proceed to "Chapter 5: Using the Wireless Network Monitor". Personal Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-8: Congratulations 9 Congratulations! Wireless-N Business Notebook Adapter WPA2-Personal If your network. Passphrase - To check the link information, search for available wireless networks, or make additional configuration changes, proceed...
... about the Wireless Network Monitor, refer to 63 characters of the Wireless-N Business Notebook Adapter is complete. Then click Connect and proceed to "Chapter 5: Using the Wireless Network Monitor". Personal Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-8: Congratulations 9 Congratulations! Wireless-N Business Notebook Adapter WPA2-Personal If your network. Passphrase - To check the link information, search for available wireless networks, or make additional configuration changes, proceed...
User Guide
Page 18
... Obtain network settings automatically (DHCP). If you can use Manual Setup. 1. Default Gateway - Use this mode if you want to connect to set up the Adapter Figure 4-9: Creating a Profile Figure 4-10: Network Settings - SSID - This is the wireless network name that must specify the IP Address and Subnet Mask on the Available Wireless Network screen to a wireless router or access point. Wireless Mode 10 Click Manual Setup on this mode if you want to connect to a wireless router or access point. IP Address - Click the Ad-Hoc Mode radio button...
... Obtain network settings automatically (DHCP). If you can use Manual Setup. 1. Default Gateway - Use this mode if you want to connect to set up the Adapter Figure 4-9: Creating a Profile Figure 4-10: Network Settings - SSID - This is the wireless network name that must specify the IP Address and Subnet Mask on the Available Wireless Network screen to a wireless router or access point. Wireless Mode 10 Click Manual Setup on this mode if you want to connect to a wireless router or access point. IP Address - Click the Ad-Hoc Mode radio button...
User Guide
Page 19
... your wireless network. Passphrase - The WEP key you are "0" to "9" and "A" to the appropriate section for Remote Authentication Dial-In User Service. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. The default transmit key number is automatically generated. WEP Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter 11 Setting up the Adapter It uses username and password-based authentication between a wireless client and a RADIUS server. Click the Next button...
... your wireless network. Passphrase - The WEP key you are "0" to "9" and "A" to the appropriate section for Remote Authentication Dial-In User Service. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. The default transmit key number is automatically generated. WEP Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter 11 Setting up the Adapter It uses username and password-based authentication between a wireless client and a RADIUS server. Click the Next button...
User Guide
Page 24
... Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter 16 Setting up the Adapter LEAP Congratulations! Figure 4-21: Wireless Security - Click Return to Profile screen to return to the Creating a Profile screen. Your manual setup through the Wireless Network Monitor is a mutual authentication method that uses a user name and password based system. Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is complete. Enter the username and password in the confirm filed. 6.
... Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter 16 Setting up the Adapter LEAP Congratulations! Figure 4-21: Wireless Security - Click Return to Profile screen to return to the Creating a Profile screen. Your manual setup through the Wireless Network Monitor is a mutual authentication method that uses a user name and password based system. Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is complete. Enter the username and password in the confirm filed. 6.
User Guide
Page 25
... access the Security Monitor. To view the available wireless networks, click the Site Survey tab. The Link Quality bar indicates the quality of the wireless network connection with Red, Yellow, and Green colors to differentiate among low, medium and high quality. From this screen, you can also perform configuration changes or create connection profiles by clicking the Profiles tab. Wireless-N Business Notebook Adapter Chapter 5: Using the Wireless Network...
... access the Security Monitor. To view the available wireless networks, click the Site Survey tab. The Link Quality bar indicates the quality of the wireless network connection with Red, Yellow, and Green colors to differentiate among low, medium and high quality. From this screen, you can also perform configuration changes or create connection profiles by clicking the Profiles tab. Wireless-N Business Notebook Adapter Chapter 5: Using the Wireless Network...
User Guide
Page 26
SSID - Wireless Mode - Wide Channel - This displays the Wireless-N primary channel used by your current network settings. Security - Subnet Mask - DNS - This is shown here. The MAC address of the wireless network's access point or wireless router is the DNS (Domain Name Service) address of the Adapter. Click the Save to Profile button to save the currently active connection settings to the header of the wireless network currently in use is displayed here. Figure 5-3: Link Information - Radio Band - Service Set Identifier, a 32-character unique identifier attached...
SSID - Wireless Mode - Wide Channel - This displays the Wireless-N primary channel used by your current network settings. Security - Subnet Mask - DNS - This is shown here. The MAC address of the wireless network's access point or wireless router is the DNS (Domain Name Service) address of the Adapter. Click the Save to Profile button to save the currently active connection settings to the header of the wireless network currently in use is displayed here. Figure 5-3: Link Information - Radio Band - Service Set Identifier, a 32-character unique identifier attached...
User Guide
Page 28
... wireless network currently in use. Profile Information For each profile selected, the following are set. See the section, "Editing a New Profile," for different network setups. Select the appropriate file, and click the Open button. Profile - Click the New button to the appropriate folder, and click the Save button. Direct Windows to create a new profile. This is the mode of the profile is displayed here. To connect to a wireless network using a specific...
... wireless network currently in use. Profile Information For each profile selected, the following are set. See the section, "Editing a New Profile," for different network setups. Select the appropriate file, and click the Open button. Profile - Click the New button to the appropriate folder, and click the Save button. Direct Windows to create a new profile. This is the mode of the profile is displayed here. To connect to a wireless network using a specific...
User Guide
Page 29
... is not listed on the center of setting up the Adapter. • Available Wireless Network. (For most users.) Use this screen, select Manual Setup to set up. Passphrase - If you will be taken directly to the Congratulations screen. 1. If you already have any non-Linksys wireless products, enter the WEP key manually on the following pages. Click the Refresh button to update the Available Wireless Network list. • Manual Setup. This method...
... is not listed on the center of setting up the Adapter. • Available Wireless Network. (For most users.) Use this screen, select Manual Setup to set up. Passphrase - If you will be taken directly to the Congratulations screen. 1. If you already have any non-Linksys wireless products, enter the WEP key manually on the following pages. Click the Refresh button to update the Available Wireless Network list. • Manual Setup. This method...
User Guide
Page 30
... Connect and proceed to the Link Information screen. The profile has been successfully configured. Click Connect to Network to connect to your network has the wireless security WPA Personal (Wi-Fi Protected Access) enabled, this screen will appear. Figure 5-8: Creating Profiles - Congratulations 22 After the software has been successfully installed, the Congratulations screen will appear. WPA-Personal Chapter 5: Using the Wireless Network Monitor Create a New Profile Figure 5-9: Creating Profiles - Enter...
... Connect and proceed to the Link Information screen. The profile has been successfully configured. Click Connect to Network to connect to your network has the wireless security WPA Personal (Wi-Fi Protected Access) enabled, this screen will appear. Figure 5-8: Creating Profiles - Congratulations 22 After the software has been successfully installed, the Congratulations screen will appear. WPA-Personal Chapter 5: Using the Wireless Network Monitor Create a New Profile Figure 5-9: Creating Profiles - Enter...
User Guide
Page 31
... a DHCP server, click the radio button next to Specify network settings. Manual Setup - Click the Next button to continue, or click the Back button to return to help prevent others from the Wireless Network Monitor will appear. Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you want to connect to a wireless router or access point. Default Gateway - Enter the SSID for your network's Gateway here. If your network. Enter the IP address of two wireless modes. The Adapter's Subnet Mask...
... a DHCP server, click the radio button next to Specify network settings. Manual Setup - Click the Next button to continue, or click the Back button to return to help prevent others from the Wireless Network Monitor will appear. Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you want to connect to a wireless router or access point. Default Gateway - Enter the SSID for your network's Gateway here. If your network. Enter the IP address of two wireless modes. The Adapter's Subnet Mask...
User Guide
Page 32
.... If your wireless network. Click the Next button. It uses username and password-based authentication between a wireless client and a RADIUS server. WEP WEP - Manual Setup Wireless Security - Select the correct operating channel for your wireless network. The default transmit key number is automatically generated. WPA uses a stronger security method than WEP and WPA2 defines an even stronger encryption, authentication, and key management than 16 alphanumeric characters. For 64-bit encryption, enter exactly 10 hexadecimal characters. The channel you chose...
.... If your wireless network. Click the Next button. It uses username and password-based authentication between a wireless client and a RADIUS server. WEP WEP - Manual Setup Wireless Security - Select the correct operating channel for your wireless network. The default transmit key number is automatically generated. WPA uses a stronger security method than WEP and WPA2 defines an even stronger encryption, authentication, and key management than 16 alphanumeric characters. For 64-bit encryption, enter exactly 10 hexadecimal characters. The channel you chose...
User Guide
Page 45
... your network has a router or other DHCP server, click the radio button next to the previous screen. Default Gateway - Enter the DNS address of your network. The Network Settings screen from the Wireless Network Monitor will appear. Enter the username and password in the confirm filed. 4. This IP Address must specify the IP Address and Subnet Mask on this screen. DNS 1 and DNS 2 - Subnet Mask - Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password...
... your network has a router or other DHCP server, click the radio button next to the previous screen. Default Gateway - Enter the DNS address of your network. The Network Settings screen from the Wireless Network Monitor will appear. Enter the username and password in the confirm filed. 4. This IP Address must specify the IP Address and Subnet Mask on this screen. DNS 1 and DNS 2 - Subnet Mask - Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password...
User Guide
Page 61
... the administrator can turn off the Linksys wireless network monitor utility and only uses the Windows Zero Configuration to connect to the wireless network? Pop-up alerts? Only someone with monitoring the airspace. Keeping your business connected to the Internet and managing networking in a wireless setting, but also give you the security and management options within your business needs change and grow. For example, if the wireless network monitor utility is the first...
... the administrator can turn off the Linksys wireless network monitor utility and only uses the Windows Zero Configuration to connect to the wireless network? Pop-up alerts? Only someone with monitoring the airspace. Keeping your business connected to the Internet and managing networking in a wireless setting, but also give you the security and management options within your business needs change and grow. For example, if the wireless network monitor utility is the first...
User Guide
Page 67
... on a Windows XP computer, click the Start button, select Help, and choose Support. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used by your connection is complete. Click the Connect button. 5. The installation of a passphrase. Wireless-N Business Notebook Adapter 4. Enter the keyword wireless in the field provided, and press the Enter key. Your wireless network will appear as Connected when your access point. Enter the...
... on a Windows XP computer, click the Start button, select Help, and choose Support. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used by your connection is complete. Click the Connect button. 5. The installation of a passphrase. Wireless-N Business Notebook Adapter 4. Enter the keyword wireless in the field provided, and press the Enter key. Your wireless network will appear as Connected when your access point. Enter the...
User Guide
Page 69
... Disable SSID Broadcast. 3. Use WPA/WPA2 if it harder for a hacker to the router or access point's documentation for more information. 61 If a hacker gets a hold of the network's information, such as possible. Change the administrator's password regularly. Change the default password for implementation. Security Threats Facing Wireless Networks Wireless networks are several network security features, but they require specific action on your part for the Administrator account. 4. SSID. With every wireless networking device you as the network's SSID (Service Set...
... Disable SSID Broadcast. 3. Use WPA/WPA2 if it harder for a hacker to the router or access point's documentation for more information. 61 If a hacker gets a hold of the network's information, such as possible. Change the administrator's password regularly. Change the default password for implementation. Security Threats Facing Wireless Networks Wireless networks are several network security features, but they require specific action on your part for the Administrator account. 4. SSID. With every wireless networking device you as the network's SSID (Service Set...
User Guide
Page 75
... Office Protocol 3) - PPPoE (Point to the Internet. A Windows 2000 and XP utility that provides access to Point Protocol over a network. IPSec (Internet Protocol Security) - Ping (Packet INternet Groper) - A type of computers or devices connected for Linksys products. MAC (Media Access Control) Address - A series of broadband connection that provides authentication (username and password) in which an attacker tries to deliver both data and power. Power over a network. A VPN protocol used for a particular networking device. NAT (Network Address Translation...
... Office Protocol 3) - PPPoE (Point to the Internet. A Windows 2000 and XP utility that provides access to Point Protocol over a network. IPSec (Internet Protocol Security) - Ping (Packet INternet Groper) - A type of computers or devices connected for Linksys products. MAC (Media Access Control) Address - A series of broadband connection that provides authentication (username and password) in which an attacker tries to deliver both data and power. Power over a network. A VPN protocol used for a particular networking device. NAT (Network Address Translation...