User Guide
Page 2
... definition. Linksys is a note of Figures" section. and certain other image) is something that are trademarks or registered trademarks of Cisco Systems, Inc. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Wireless-N Business Notebook Adapter Copyright and Trademarks Specifications are subject to cause cancer, and birth defects or other reproductive harm. In...make understanding networking with a figure number and description, like this User Guide: This checkmark means there is a registered trademark or trademark of their respective holders. WPC4400N-UG-70215A JL
... definition. Linksys is a note of Figures" section. and certain other image) is something that are trademarks or registered trademarks of Cisco Systems, Inc. Copyright © 2007 Cisco Systems, Inc. All rights reserved. Wireless-N Business Notebook Adapter Copyright and Trademarks Specifications are subject to cause cancer, and birth defects or other reproductive harm. In...make understanding networking with a figure number and description, like this User Guide: This checkmark means there is a registered trademark or trademark of their respective holders. WPC4400N-UG-70215A JL
User Guide
Page 3
... Notebook Adapter 6 Starting the Setup 6 Connecting the Adapter 7 Setting up the Adapter 7 Chapter 5: Using the Wireless Network Monitor 17 Accessing the Wireless Network Monitor 17 Using the Wireless Network Monitors 17 Link Information 17 Profiles 20 Create a New Profile 21 Editing a Profile 31 Site Survey 39 Troubleshooting 40 Administration 40 Chapter 6: The Administrative...
... Notebook Adapter 6 Starting the Setup 6 Connecting the Adapter 7 Setting up the Adapter 7 Chapter 5: Using the Wireless Network Monitor 17 Accessing the Wireless Network Monitor 17 Using the Wireless Network Monitors 17 Link Information 17 Profiles 20 Create a New Profile 21 Editing a Profile 31 Site Survey 39 Troubleshooting 40 Administration 40 Chapter 6: The Administrative...
User Guide
Page 4
Wireless-N Business Notebook Adapter Appendix A: Troubleshooting 52 Common Problems and Solutions 52 Frequently Asked Questions 53 Appendix B: Windows XP Wireless Zero Configuration 57 Windows XP Wireless Zero Configuration 57 Appendix C: Wireless-N Interoperability 60 Appendix D: Wireless Security 61 Security Precautions 61 Security Threats Facing Wireless Networks 61 Appendix E: Windows Help 64 Appendix F: Glossary 65 Appendix G: Specifications 70 Appendix H: Warranty Information 72 Appendix I: Regulatory Information 73 Appendix J: Contact Information 80
Wireless-N Business Notebook Adapter Appendix A: Troubleshooting 52 Common Problems and Solutions 52 Frequently Asked Questions 53 Appendix B: Windows XP Wireless Zero Configuration 57 Windows XP Wireless Zero Configuration 57 Appendix C: Wireless-N Interoperability 60 Appendix D: Wireless Security 61 Security Precautions 61 Security Threats Facing Wireless Networks 61 Appendix E: Windows Help 64 Appendix F: Glossary 65 Appendix G: Specifications 70 Appendix H: Warranty Information 72 Appendix I: Regulatory Information 73 Appendix J: Contact Information 80
User Guide
Page 5
... Screen 6 Figure 4-2: Setup Wizard's License Agreement 6 Figure 4-3: Connecting the Adapter 7 Figure 4-4: Available Wireless Network 7 Figure 4-5: WEP 8 Figure 4-6: WPA - Wireless Mode 10 Figure 4-11: Ad-Hoc Mode Settings 11 Figure 4-12: Wireless Security - RADIUS - Personal 8 Figure 4-7: WPA2 - WPA Enterprise - PEAP 14 Figure 4-19: Wireless Security - Personal 9 Figure 4-8: Congratulations 9 Figure 4-9: Creating a Profile 10 Figure 4-10: Network...
... Screen 6 Figure 4-2: Setup Wizard's License Agreement 6 Figure 4-3: Connecting the Adapter 7 Figure 4-4: Available Wireless Network 7 Figure 4-5: WEP 8 Figure 4-6: WPA - Wireless Mode 10 Figure 4-11: Ad-Hoc Mode Settings 11 Figure 4-12: Wireless Security - RADIUS - Personal 8 Figure 4-7: WPA2 - WPA Enterprise - PEAP 14 Figure 4-19: Wireless Security - Personal 9 Figure 4-8: Congratulations 9 Figure 4-9: Creating a Profile 10 Figure 4-10: Network...
User Guide
Page 6
... 29 Figure 5-22: Creating Profiles - WEP Key Needed 21 Figure 5-8: Creating Profiles - WPA2 Personal 25 Figure 5-15: Creating Profiles - Wireless Security - WPA2 Enterprise - EAP-TLS 27 Figure 5-18: Creating Profiles - Manual Setup - PEAP 27 Figure 5-19: Creating Profiles - ...Profiles - WPA-Personal 22 Figure 5-9: Creating Profiles - Network Settings 23 Figure 5-11: Creating Profiles - Manual Setup - Wireless Security - Wireless Security - EAP-TLS 28 Figure 5-20: Creating Profiles - PEAP 28 Figure 5-21: Creating Profiles - Manual Setup - Congratulations 22 ...
... 29 Figure 5-22: Creating Profiles - WEP Key Needed 21 Figure 5-8: Creating Profiles - WPA2 Personal 25 Figure 5-15: Creating Profiles - Wireless Security - WPA2 Enterprise - EAP-TLS 27 Figure 5-18: Creating Profiles - Manual Setup - PEAP 27 Figure 5-19: Creating Profiles - ...Profiles - WPA-Personal 22 Figure 5-9: Creating Profiles - Network Settings 23 Figure 5-11: Creating Profiles - Manual Setup - Wireless Security - Wireless Security - EAP-TLS 28 Figure 5-20: Creating Profiles - PEAP 28 Figure 5-21: Creating Profiles - Manual Setup - Congratulations 22 ...
User Guide
Page 8
... 50 Figure 6-17: Security Monitor - Client Inventory 48 Figure 6-14: Security Monitor - Wireless Security 59 Figure B-7: Wireless Network Connected 59 Figure C-1: Advanced Tab 60 Alert List 49 Figure 6-15: Security Monitor - Windows Firewall Screen ...51 Figure 6-18: Security Monitor - Use Windows XP Wireless Configuration 57 Figure B-3: Windows XP Wireless Zero Configuration Icon 57 Figure B-4: Available Wireless Network 58 Figure B-5: No Wireless Security 58 Figure B-6: Network Connection - Wireless-N Business Notebook Adapter Figure 6-7: Trusted Mac Address 45 ...
... 50 Figure 6-17: Security Monitor - Client Inventory 48 Figure 6-14: Security Monitor - Wireless Security 59 Figure B-7: Wireless Network Connected 59 Figure C-1: Advanced Tab 60 Alert List 49 Figure 6-15: Security Monitor - Windows Firewall Screen ...51 Figure 6-18: Security Monitor - Use Windows XP Wireless Configuration 57 Figure B-3: Windows XP Wireless Zero Configuration Icon 57 Figure B-4: Available Wireless Network 58 Figure B-5: No Wireless Security 58 Figure B-6: Network Connection - Wireless-N Business Notebook Adapter Figure 6-7: Trusted Mac Address 45 ...
User Guide
Page 9
...media-centric applications like streaming video and Voice over IP telephony; The incredible speed of bandwidth to Wireless-N, Wireless-G, and Wireless-B networks with no degradation in the wireless coverage area. encryption: encoding data transmitted in your virtual office from Linksys. It works great ...with other resources such as much radio band. Unlike ordinary wireless networking technologies that specifies a maximum data rate of the wireless link are Wireless-N, the throughput can communicate without cables. Setting up to your notebook's PC Card...
...media-centric applications like streaming video and Voice over IP telephony; The incredible speed of bandwidth to Wireless-N, Wireless-G, and Wireless-B networks with no degradation in the wireless coverage area. encryption: encoding data transmitted in your virtual office from Linksys. It works great ...with other resources such as much radio band. Unlike ordinary wireless networking technologies that specifies a maximum data rate of the wireless link are Wireless-N, the throughput can communicate without cables. Setting up to your notebook's PC Card...
User Guide
Page 10
... Zero Configuration. Chapter 1: Introduction 2 What's in this User Guide? When the WPC4400N is detected that has previously not been seen before and New Client detection for setting up and Connecting the Wireless-N Business Notebook Adapter This chapter instructs you on how to install and configure the ...how to your business the visibility and protection it needs. This user guide covers the steps for unknown clients, giving your wireless network settings, step by step. What's in this Guide to help you through configuring the Adapter to use the administration features ...
... Zero Configuration. Chapter 1: Introduction 2 What's in this User Guide? When the WPC4400N is detected that has previously not been seen before and New Client detection for setting up and Connecting the Wireless-N Business Notebook Adapter This chapter instructs you on how to install and configure the ...how to your business the visibility and protection it needs. This user guide covers the steps for unknown clients, giving your wireless network settings, step by step. What's in this Guide to help you through configuring the Adapter to use the administration features ...
User Guide
Page 11
... troubleshooting if there communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. • Appendix D: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix E: Windows Help This appendix describes how you can...
... troubleshooting if there communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. • Appendix D: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix E: Windows Help This appendix describes how you can...
User Guide
Page 12
...for mobile users. It is called an infrastructure network. An infrastructure configuration extends the accessibility of a wireless PC to a wired network, and can move your wireless PC within a network, the effective transmission range in an infrastructure network can be doubled. Before ...networking options are limitless. roaming: the ability to take a wireless device from one wireless adapter. Several PCs equipped with wireless cards or adapters can talk to any of an access point. An integrated wireless and wired network is backward compatible with one access point's range...
...for mobile users. It is called an infrastructure network. An infrastructure configuration extends the accessibility of a wireless PC to a wired network, and can move your wireless PC within a network, the effective transmission range in an infrastructure network can be doubled. Before ...networking options are limitless. roaming: the ability to take a wireless device from one wireless adapter. Several PCs equipped with wireless cards or adapters can talk to any of an access point. An integrated wireless and wired network is backward compatible with one access point's range...
User Guide
Page 13
Power Blue. The Power LED lights up when the Adapter has an active connection. Wireless-N Business Notebook Adapter Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter 5 The LED Indicators Link/Act Power Figure 3-1: Front Panel Link/Act Blue. Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity. The Link LED lights up when the Adapter is powered on.
Power Blue. The Power LED lights up when the Adapter has an active connection. Wireless-N Business Notebook Adapter Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter 5 The LED Indicators Link/Act Power Figure 3-1: Front Panel Link/Act Blue. Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity. The Link LED lights up when the Adapter is powered on.
User Guide
Page 14
...is the letter of this User Guide. Click the Click Here to Start button to end the installation. 3. Windows will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. Insert the Setup Wizard CD-ROM into your CD-ROM drive). On the Welcome ...- To install the Adapter, click the Click Here to exit the Setup Wizard. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup The Wireless-N Business Notebook Adapter Setup Wizard will not work correctly. If it does not, click the Start button and choose Run....
...is the letter of this User Guide. Click the Click Here to Start button to end the installation. 3. Windows will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. Insert the Setup Wizard CD-ROM into your CD-ROM drive). On the Welcome ...- To install the Adapter, click the Click Here to exit the Setup Wizard. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup The Wireless-N Business Notebook Adapter Setup Wizard will not work correctly. If it does not, click the Start button and choose Run....
User Guide
Page 15
..., step by SSID. If your network is intended for the original Windows CD-ROM, insert the CD-ROM, and direct Windows to step 2. Available Wireless Network The available networks are listed in place. 3. This method of the screen by step, under the appropriate heading on this screen. If you for... the Adapter is not listed on the following pages. You can click the Refresh button to bring the list up the Adapter. • Available Wireless Network. (For most users.) Use this Adapter will be taken directly to step 3. The setup for setting up again.) If the network utilizes...
..., step by SSID. If your network is intended for the original Windows CD-ROM, insert the CD-ROM, and direct Windows to step 2. Available Wireless Network The available networks are listed in place. 3. This method of the screen by step, under the appropriate heading on this screen. If you for... the Adapter is not listed on the following pages. You can click the Refresh button to bring the list up the Adapter. • Available Wireless Network. (For most users.) Use this Adapter will be taken directly to step 3. The setup for setting up again.) If the network utilizes...
User Guide
Page 16
... a WEP key is case-sensitive and should not be used in a network. wep (wired equivalent privacy): a method of your wireless security. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-6: WPA - Personal 8 Select WEP. Passphrase - Then click Connect and proceed to... screen for greater security. For 128-bit encryption, enter exactly 26 hexadecimal characters. WEP If your network has the wireless security WPA Personal (Wi-Fi Protected Access) enabled, this screen will appear. The WEP key you have any non-Linksys...
... a WEP key is case-sensitive and should not be used in a network. wep (wired equivalent privacy): a method of your wireless security. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-6: WPA - Personal 8 Select WEP. Passphrase - Then click Connect and proceed to... screen for greater security. For 128-bit encryption, enter exactly 26 hexadecimal characters. WEP If your network has the wireless security WPA Personal (Wi-Fi Protected Access) enabled, this screen will appear. The WEP key you have any non-Linksys...
User Guide
Page 17
... text, or enter a 64-character hexadecimal string. Click Connect to Network to connect to your network has the wireless security WPA2 Personal enabled, this screen will appear. Personal Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-8: Congratulations 9 Passphrase - Then click Connect and proceed to 63...
... text, or enter a 64-character hexadecimal string. Click Connect to Network to connect to your network has the wireless security WPA2 Personal enabled, this screen will appear. Personal Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-8: Congratulations 9 Passphrase - Then click Connect and proceed to 63...
User Guide
Page 18
...Ad-Hoc Mode - It is case- Click the Next button to continue, or click the Back button to return to Obtain network settings automatically (DHCP). Wireless Mode 10 If your network has a router or other DHCP server, click the radio button next to the previous screen. If you can use Manual... Setup. 1. Subnet Mask - The Adapter's Subnet Mask must specify the IP Address and Subnet Mask on the Available Wireless Network screen to your network. Enter the DNS address of your network's Gateway here. SSID - You must be used for all the devices in your...
...Ad-Hoc Mode - It is case- Click the Next button to continue, or click the Back button to return to Obtain network settings automatically (DHCP). Wireless Mode 10 If your network has a router or other DHCP server, click the radio button next to the previous screen. If you can use Manual... Setup. 1. Subnet Mask - The Adapter's Subnet Mask must specify the IP Address and Subnet Mask on the Available Wireless Network screen to your network. Enter the DNS address of your network's Gateway here. SSID - You must be used for all the devices in your...
User Guide
Page 19
...must match the WEP key of security used: WEP, WPA/WPA2Personal, WPA/WPA2-Enterprise, RADIUS, or LEAP. The channel you have wireless security, select Disabled and then click the Next button to use, keep the default setting. RADIUS stands for Wi-Fi Protected Access. If ...your wireless network has wireless security, select the method of your wireless network. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Advanced Users TX ...
...must match the WEP key of security used: WEP, WPA/WPA2Personal, WPA/WPA2-Enterprise, RADIUS, or LEAP. The channel you have wireless security, select Disabled and then click the Next button to use, keep the default setting. RADIUS stands for Wi-Fi Protected Access. If ...your wireless network has wireless security, select the method of your wireless network. If you chose Ad-Hoc Mode, the Ad-Hoc Mode Settings screen will appear. Advanced Users TX ...
User Guide
Page 20
... TKIP or AES, from the Encryption drop-down menu. Then enter a Passphrase that is 8-63 characters in length. Passphrase - Figure 4-13: Wireless Security - WPA2 Personal 12 WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with block sizes of ASCII text, or enter a.... Click the Next button to continue or the Back button to return to the previous screen. wpa (wi-fi protected access): a wireless security protocol using the AES (Advanced Encryption Standard) which is a block cipher with dynamic encryption keys. Click the Next button to continue...
... TKIP or AES, from the Encryption drop-down menu. Then enter a Passphrase that is 8-63 characters in length. Passphrase - Figure 4-13: Wireless Security - WPA2 Personal 12 WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with block sizes of ASCII text, or enter a.... Click the Next button to continue or the Back button to return to the previous screen. wpa (wi-fi protected access): a wireless security protocol using the AES (Advanced Encryption Standard) which is a block cipher with dynamic encryption keys. Click the Next button to continue...
User Guide
Page 21
...return to the previous screen. Click the Next button to continue or the Back button to return to the previous screen. Figure 4-16: Wireless Security - Select the type of the authentication server in the Login Name field. Enter the name of encryption, TKIP or AES, from ...encryption method can be used inside the PEAP tunnel. Authentication - WPA Enterprise EAP-TLS PEAP If you want to authenticate you on your wireless network in the Password field. Then select the authentication method used when a RADIUS server is optional). Select the type of the authentication server...
...return to the previous screen. Click the Next button to continue or the Back button to return to the previous screen. Figure 4-16: Wireless Security - Select the type of the authentication server in the Login Name field. Enter the name of encryption, TKIP or AES, from ...encryption method can be used inside the PEAP tunnel. Authentication - WPA Enterprise EAP-TLS PEAP If you want to authenticate you on your wireless network in the Password field. Then select the authentication method used when a RADIUS server is optional). Select the type of the authentication server...
User Guide
Page 22
... WPA2 Enterprise offers two authentication methods, EAPTLS and PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Password field. From the Certificate drop-down menu, select the certificate you have installed to authenticate you want to authenticate...button to return to the previous screen. Click the Next button to continue or the Back button to return to the previous screen. Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used inside...
... WPA2 Enterprise offers two authentication methods, EAPTLS and PEAP. EAP-TLS If you selected EAP-TLS, enter the login name of your wireless network in the Password field. From the Certificate drop-down menu, select the certificate you have installed to authenticate you want to authenticate...button to return to the previous screen. Click the Next button to continue or the Back button to return to the previous screen. Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used inside...