User Guide
Page 2
...to do while using the Notebook Adapter. In addition to change without notice. WPC4400N-UG-70215A JL Also, each figure (diagram, screenshot, or other image) is something you should pay special attention to while using the Notebook Adapter. Wireless-N Business Notebook Adapter Copyright and Trademarks Specifications ...or the Notebook Adapter. WARNING: This product contains chemicals, including lead, known to the State of Cisco Systems, Inc. This question mark provides you might need to cause cancer, and birth defects or other countries. All rights reserved. Linksys is ...
...to do while using the Notebook Adapter. In addition to change without notice. WPC4400N-UG-70215A JL Also, each figure (diagram, screenshot, or other image) is something you should pay special attention to while using the Notebook Adapter. Wireless-N Business Notebook Adapter Copyright and Trademarks Specifications ...or the Notebook Adapter. WARNING: This product contains chemicals, including lead, known to the State of Cisco Systems, Inc. This question mark provides you might need to cause cancer, and birth defects or other countries. All rights reserved. Linksys is ...
User Guide
Page 9
...the signals of Wireless-N makes it into your virtual office from Linksys. Get your notebook connected to add or upgrade wireless connectivity in the wireless coverage area. It works great with the Wireless-N Business Notebook Adapter from wherever you get. The incredible speed of multiple radios, Wireless-N's "Multiple In... rate. Access the web or use instant messaging to increase the range and reduce "dead spots" in your Wireless-N Business Notebook Adapter is protected by using twice as printers and network storage with your e-mail, access the Internet, and share files...
...the signals of Wireless-N makes it into your virtual office from Linksys. Get your notebook connected to add or upgrade wireless connectivity in the wireless coverage area. It works great with the Wireless-N Business Notebook Adapter from wherever you get. The incredible speed of multiple radios, Wireless-N's "Multiple In... rate. Access the web or use instant messaging to increase the range and reduce "dead spots" in your Wireless-N Business Notebook Adapter is protected by using twice as printers and network storage with your e-mail, access the Internet, and share files...
User Guide
Page 10
... user guide covers the steps for unknown clients, giving your wireless network settings, step by step. What's in this User Guide? When the WPC4400N is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you through configuring the Adapter to your business the visibility and protection it needs. The included Setup Wizard...
... user guide covers the steps for unknown clients, giving your wireless network settings, step by step. What's in this User Guide? When the WPC4400N is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you through configuring the Adapter to your business the visibility and protection it needs. The included Setup Wizard...
User Guide
Page 11
Wireless-N Business Notebook Adapter • Appendix C: Wireless-N Interoperability This appendix troubleshooting if there communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. • Appendix D: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix E: Windows Help This appendix describes how you...
Wireless-N Business Notebook Adapter • Appendix C: Wireless-N Interoperability This appendix troubleshooting if there communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. • Appendix D: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix E: Windows Help This appendix describes how you...
User Guide
Page 12
... a wired network via the access point or wireless router. Network Layout The Wireless-N Business Notebook Adapter uses draft 802.11n, the latest wireless networking technology. access point: a device that is bridged to share the same radio channel. Several PCs equipped with each equipped with a wired network ad-hoc: a group of Linksys's switches or routers. It is called...
... a wired network via the access point or wireless router. Network Layout The Wireless-N Business Notebook Adapter uses draft 802.11n, the latest wireless networking technology. access point: a device that is bridged to share the same radio channel. Several PCs equipped with each equipped with a wired network ad-hoc: a group of Linksys's switches or routers. It is called...
User Guide
Page 16
... Connect and proceed to Step 3. Figure 4-5: WEP WPA-Personal If your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - Then... to 63 characters of encrypting network data transmitted on page 10. Passphrase - Wireless-N Business Notebook Adapter 2. For 128-bit encryption, enter exactly 26 hexadecimal characters. wpa (wi-fi protected access): a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be longer...
... Connect and proceed to Step 3. Figure 4-5: WEP WPA-Personal If your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - Then... to 63 characters of encrypting network data transmitted on page 10. Passphrase - Wireless-N Business Notebook Adapter 2. For 128-bit encryption, enter exactly 26 hexadecimal characters. wpa (wi-fi protected access): a wireless security protocol using TKIP (Temporal Key Integrity Protocol) encryption, which can be longer...
User Guide
Page 19
...Linksys wireless products, enter the WEP key manually on a wireless network for your wireless network has wireless security, select the method of encrypting network data transmitted on those products.) WEP Key - WEP Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter 11 Setting up the Adapter... select the appropriate number from the TX Key drop-down box. Wireless-N Business Notebook Adapter 4. Select the correct operating channel for greater security. WEP - If you have wireless security, select Disabled and then click the Next button to the ...
...Linksys wireless products, enter the WEP key manually on a wireless network for your wireless network has wireless security, select the method of encrypting network data transmitted on those products.) WEP Key - WEP Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter 11 Setting up the Adapter... select the appropriate number from the TX Key drop-down box. Wireless-N Business Notebook Adapter 4. Select the correct operating channel for greater security. WEP - If you have wireless security, select Disabled and then click the Next button to the ...
User Guide
Page 29
... shown. Then enter a passphrase or WEP key. Passphrase - WEP Key Needed 21 Wireless-N Business Notebook Adapter Create a New Profile The next screen to the Congratulations screen. 1. The setup for each option is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on the center of your network, continue...
... shown. Then enter a passphrase or WEP key. Passphrase - WEP Key Needed 21 Wireless-N Business Notebook Adapter Create a New Profile The next screen to the Congratulations screen. 1. The setup for each option is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on the center of your network, continue...
User Guide
Page 32
...in the Passphrase field, so a WEP key is automatically generated. If you chose Infrastructure Mode, go to change any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - WPA uses a stronger security method than WEP and...a RADIUS server. If your wireless network has wireless security, select the method of your wireless network. The default transmit key number is casesensitive and should match the channel set on a wireless network for Remote Authentication Dial-In User Service. Wireless-N Business Notebook Adapter 4. Click the Next button...
...in the Passphrase field, so a WEP key is automatically generated. If you chose Infrastructure Mode, go to change any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - WPA uses a stronger security method than WEP and...a RADIUS server. If your wireless network has wireless security, select the method of your wireless network. The default transmit key number is casesensitive and should match the channel set on a wireless network for Remote Authentication Dial-In User Service. Wireless-N Business Notebook Adapter 4. Click the Next button...
User Guide
Page 40
... 4. Authentication -The default is set to the appropriate section for your wireless network doesn't have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - Wireless Security WEP 32 WEP WEP - Proceed to Auto, so it will auto.... Valid hexadecimal characters are not sure which authentication method to the previous screen. Wireless Security Figure 5-27: Editing Profiles - Wireless-N Business Notebook Adapter 3. This passphrase must match the WEP key of your wireless network. Advanced Users TX Key - Click the Next button to continue, or ...
... 4. Authentication -The default is set to the appropriate section for your wireless network doesn't have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - Wireless Security WEP 32 WEP WEP - Proceed to Auto, so it will auto.... Valid hexadecimal characters are not sure which authentication method to the previous screen. Wireless Security Figure 5-27: Editing Profiles - Wireless-N Business Notebook Adapter 3. This passphrase must match the WEP key of your wireless network. Advanced Users TX Key - Click the Next button to continue, or ...
User Guide
Page 48
...Repair will disconnect your client from the network and then reconnect, in order to view the FAQ pages from the Linksys website. You may click Repair to troubleshoot your connection to either the Security Monitor account or Account Management as the ...options. This shows the subnet mask of your client. After a successful login, the Classification and Security Monitor tab appears. Wireless-N Business Notebook Adapter Troubleshooting The Troubleshooting screen lets you administer your Security Monitor account and classification functions, and modify your Access Point's username ...
...Repair will disconnect your client from the network and then reconnect, in order to view the FAQ pages from the Linksys website. You may click Repair to troubleshoot your connection to either the Security Monitor account or Account Management as the ...options. This shows the subnet mask of your client. After a successful login, the Classification and Security Monitor tab appears. Wireless-N Business Notebook Adapter Troubleshooting The Troubleshooting screen lets you administer your Security Monitor account and classification functions, and modify your Access Point's username ...
User Guide
Page 53
...available unclassified clients with MAC Access control of your wireless networks by the System Administrator to that you classify the existing wireless clients into the Unclassified Clients table. You may also select any items from Linksys Business Series access points. Click the MAC tab to ... Refresh to refresh the list, Clear to clear selected items on the list, or Back to go to add the entry. Wireless-N Business Notebook Adapter Client Classification The Client Classification Screen lets you enter on this client could be a malicious client or simply a neighborhood client not...
...available unclassified clients with MAC Access control of your wireless networks by the System Administrator to that you classify the existing wireless clients into the Unclassified Clients table. You may also select any items from Linksys Business Series access points. Click the MAC tab to ... Refresh to refresh the list, Clear to clear selected items on the list, or Back to go to add the entry. Wireless-N Business Notebook Adapter Client Classification The Client Classification Screen lets you enter on this client could be a malicious client or simply a neighborhood client not...
User Guide
Page 60
... can't find the Wireless-N Business Notebook Adapter if it is properly inserted into the notebook's PCMCIA or CardBus slot. The Wireless-N Business Notebook Adapter does not work properly. You will find an answer here, check the Linksys website at www.linksys.com. Make sure that the Wireless-N Business Notebook Adapter is powered on the Network Adapter. Wireless-N Business Notebook Adapter Appendix A: Troubleshooting This appendix consists of the Wireless-N Business Notebook Adapter. Then click on...
... can't find the Wireless-N Business Notebook Adapter if it is properly inserted into the notebook's PCMCIA or CardBus slot. The Wireless-N Business Notebook Adapter does not work properly. You will find an answer here, check the Linksys website at www.linksys.com. Make sure that the Wireless-N Business Notebook Adapter is powered on the Network Adapter. Wireless-N Business Notebook Adapter Appendix A: Troubleshooting This appendix consists of the Wireless-N Business Notebook Adapter. Then click on...
User Guide
Page 61
... the pop-up to five minutes for new AP and new client alerts to enjoy the benefits of the network. The Linksys Wireless-N Business Notebook Adapter will wireless networking technology help with an Untrusted AP. Can non-administrative users have pop-up alerts appear on whether or not the ...application is not used to report alerts, so the AP and wireless client won't be able to appear in the alert lists? Wireless-N Business Notebook Adapter Frequently Asked Questions Can I try to the Internet and managing networking in the alert lists.
... the pop-up to five minutes for new AP and new client alerts to enjoy the benefits of the network. The Linksys Wireless-N Business Notebook Adapter will wireless networking technology help with an Untrusted AP. Can non-administrative users have pop-up alerts appear on whether or not the ...application is not used to report alerts, so the AP and wireless client won't be able to appear in the alert lists? Wireless-N Business Notebook Adapter Frequently Asked Questions Can I try to the Internet and managing networking in the alert lists.
User Guide
Page 65
Wireless-N Business Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will appear in your computer's system tray. NOTE: For more information about Wireless Zero Configuration, refer to control the Adapter, instead of using the Wireless Network Monitor, then rightclick on the Wireless Network Monitor and select...
Wireless-N Business Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will appear in your computer's system tray. NOTE: For more information about Wireless Zero Configuration, refer to control the Adapter, instead of using the Wireless Network Monitor, then rightclick on the Wireless Network Monitor and select...
User Guide
Page 68
... problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. Click the Start button, select Control Panel, then click System. 2. If your network is experiencing these problems, follow these instructions. 1. Select the Advanced Tab. Click the OK button. Figure C-1: Advanced Tab Appendix C: Wireless-N Interoperability 60 Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperability There...
... problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. Click the Start button, select Control Panel, then click System. 2. If your network is experiencing these problems, follow these instructions. 1. Select the Advanced Tab. Click the OK button. Figure C-1: Advanced Tab Appendix C: Wireless-N Interoperability 60 Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperability There...
User Guide
Page 69
...): 1. The current generation of these security features are stored in mind whenever you as possible. There are easy to find. Change the default SSID. 2. Wireless-N Business Notebook Adapter Appendix D: Wireless Security Linksys wants to make it is a complete list of the administrator's password, he, too, can take (at least steps 1 through the network router or access...
...): 1. The current generation of these security features are stored in mind whenever you as possible. There are easy to find. Change the default SSID. 2. Wireless-N Business Notebook Adapter Appendix D: Wireless Security Linksys wants to make it is a complete list of the administrator's password, he, too, can take (at least steps 1 through the network router or access...
User Guide
Page 70
.... Use the highest level of broadcasting the SSID. Use "Shared Key" authentication 3. WPA-Personal gives you the option of encryption possible 2. Wireless-N Business Notebook Adapter 1. Make it allows anyone to your WEP key regularly WPA. While this can only provide enough security to make a hacker's job more ... WEP's ability. This is often looked upon as a cure-all for authentication. Wi-Fi Protected Access (WPA) is "linksys".) Hackers know these defaults and can be more difficult. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for...
.... Use the highest level of broadcasting the SSID. Use "Shared Key" authentication 3. WPA-Personal gives you the option of encryption possible 2. Wireless-N Business Notebook Adapter 1. Make it allows anyone to your WEP key regularly WPA. While this can only provide enough security to make a hacker's job more ... WEP's ability. This is often looked upon as a cure-all for authentication. Wi-Fi Protected Access (WPA) is "linksys".) Hackers know these defaults and can be more difficult. RADIUS (Remote Authentication Dial-In User Service) utilizes a RADIUS server for...
User Guide
Page 71
...Wireless Security 63 Security Threats Facing Wireless Networks If you do not have a negative impact on your network's performance, but if you are transmitting sensitive data over your mind at ease while you are enjoying the most flexible and convenient technology Linksys...used when a RADIUS server is a wireless security standard that defines stronger encryption, authentication and key management than WPA. These security recommendations should help keep your network, encryption should be used . RADIUS. Wireless-N Business Notebook Adapter WPA-Personal. WPA used in coordination ...
...Wireless Security 63 Security Threats Facing Wireless Networks If you do not have a negative impact on your network's performance, but if you are transmitting sensitive data over your mind at ease while you are enjoying the most flexible and convenient technology Linksys...used when a RADIUS server is a wireless security standard that defines stronger encryption, authentication and key management than WPA. These security recommendations should help keep your network, encryption should be used . RADIUS. Wireless-N Business Notebook Adapter WPA-Personal. WPA used in coordination ...
User Guide
Page 73
... the World Wide Web. A method used to the Internet. A networking protocol that uses symmetric 128-bit block data encryption. Wireless-N Business Notebook Adapter Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this product. To start executing instructions....of data that forwards Internet traffic from your local area network. Daisy Chain - For more advanced terms, see the complete Linksys glossary at and interact with a wired network. Access Point - A security method that allows administrators to assign temporary IP ...
... the World Wide Web. A method used to the Internet. A networking protocol that uses symmetric 128-bit block data encryption. Wireless-N Business Notebook Adapter Appendix F: Glossary This glossary contains some basic networking terms you may come across when using this product. To start executing instructions....of data that forwards Internet traffic from your local area network. Daisy Chain - For more advanced terms, see the complete Linksys glossary at and interact with a wired network. Access Point - A security method that allows administrators to assign temporary IP ...