Wireless-N Business Notebook Adapter Log in as the Access Point's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin). Click Next to continue to the administrative options. Access Point Account This will let you modify your Access Point’s username and password.
Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions of the Wireless Network Monitor. Please enter the administrator’s username and password for modifying the Security Monitor account.
Wireless-N Business Notebook Adapter Chapter 6: The Admi ni strati ve Functi ons i n the Wi rel ess Network Moni tor Use the administration functions in the Wireless Network Monitor to classify your wireless networks into different groups and monitor the activities and resources within your networks. The following functions under Classification and Security Monitor screens are only enabled after an administrator or privileged user enters a valid username and password.
Wireless-N Business Notebook Adapter Classification The Classification screen displays a summary of classified networks. The table shows the number of classified clients in your networks. It also shows the number of classified Access Points based on their Vendor, Network’s SSID, and Channel. You may uncheck the Receive classification rules to disable this station from receiving the network's current classification rules.
Wireless-N Business Notebook Adapter Client Classification The Client Classification Screen lets you classify the existing wireless clients into trusted networks and untrusted networks. New Client information is received from Linksys Business Series Access Points. New Clients start off as Unclassified until the System Administrator classifies them. A Trusted Client is one that has been identified by the System Administrator to be known and legitimate.
Wireless-N Business Notebook Adapter Allowed SSID Configuration The Existing SSID table shows the SSID of your trusted or allowed AP’s SSID. You may check any item and click delete to delete it from the list. SSID - This is the unique name of the wireless network. It is a 32-character unique identifier attached to the header of packets sent over a WLAN that acts a password when a mobile device tries to connect to the Access Point.
Wireless-N Business Notebook Adapter Allowed Channel Configuration The Trusted Channel Configuration shows the available channels for using in your wireless networks. You may check the channels or click Check All to check all of the channels and click Save to save your choice. Unclassified APs on unchecked channels will be automatically classified as untrusted.
Wireless-N Business Notebook Adapter Security Monitor The Security Monitor screen displays the statistics of your wireless network and alerts you of network activity. You may click Channel Usage, AP Inventory, Client Inventory, or Alert to proceed with more security Monitor functions. Channel Usage The Channel Usage screen provides statistics of the distribution on your channel’s usages. The histogram shows the number of Access Points in each channel.
Wireless-N Business Notebook Adapter Client Inventory The Client Inventory screen provides statistics of Trusted, Untrusted, and Unknown Clients. The pie chart shows the percentage and number of each wireless client’s classification. Click the radio buttons to show the specified period of time for the data calculated. You may select on 24 hours for data within the last 24 hours, 7 days for data within the last 7 days or select days for a range of days.
Wireless-N Business Notebook Adapter You will be alerted when an Access Point is detected. Figure 6-14: Security Monitor - POP-UP Alert Alert Information The alert information screen shows the detailed message of each alert event. Message - This indicates the description of the event. MAC Address - This shows the MAC Address of the wireless client or Access Point that performed the action. Severity - This shows the level of the security severity of the action.
Wireless-N Business Notebook Adapter Advice The Advice screen shows the advice message of each alert event. You may adjust your wireless network settings according to the advice to better protect your networks.
Wireless-N Business Notebook Adapter Appendi x A: Troubl eshooti ng This appendix consists of two parts: “Common Problems and Solutions” and “Frequently Asked Questions.” This appendix provides solutions to problems that may occur during the installation and operation of the Wireless-N Business Notebook Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com. Common Problems and Solutions 1.
Wireless-N Business Notebook Adapter Frequently Asked Questions Can I run an application from a remote computer over the wireless network? This will depend on whether or not the application is designed to be used over a network. Consult the application’s user guide to determine if it supports operation over a network.
Wireless-N Business Notebook Adapter What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to communicate directly with each other.
Wireless-N Business Notebook Adapter What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide. This presents a truly revolutionary opportunity to place convenient high-speed wireless capabilities in the hands of users around the globe.
Wireless-N Business Notebook Adapter Appendi x B: Wi ndows XP Wi rel ess Zero Confi gurati on Windows XP Wireless Zero Configuration If your computer is running Windows XP, then this choice will be available. If you want to use Windows XP Wireless Zero Configuration to control the Adapter, instead of using the Wireless Network Monitor, then rightclick on the Wireless Network Monitor and select Use Windows XP Wireless Configuration.
Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wireless network. Select the network you want. Click the Connect button. NOTE: Steps 2 and 3 are the instructions and screenshots for Windows XP with Service Pack 2 installed. If your network does not have wireless security enabled, go to step 3. If your network does have wireless security enabled, go to step 4. Figure B-4: Available Wireless Network 3.
Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Click the Connect button. Figure B-6: Network Connection - Wireless Security NOTE: Windows XP Wireless Zero Configuration does not support the use of a passphrase. Enter the exact WEP key used by your access point. 5.
Wireless-N Business Notebook Adapter Appendi x C: Wi rel ess Securi t y Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation. So, keep the following in mind whenever you are setting up or using your wireless network.
Wireless-N Business Notebook Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the option of broadcasting the SSID. While this option may be more convenient, it allows anyone to log into your wireless network. This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network.
Wireless-N Business Notebook Adapter WPA-Personal. If you do not have a RADIUS server, Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 characters. WPA Enterprise. WPA used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router or other device.) WPA Enterprise offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2.
Wireless-N Business Notebook Adapter Appendi x D: Wi ndows Hel p All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix. TCP/IP Before a computer can communicate with an access point or wireless router, TCP/IP must be enabled.
Wireless-N Business Notebook Adapter Appendi x E: Gl ossar y This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network. Also used to expand the range of a wireless network.
Wireless-N Business Notebook Adapter DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses. Domain - A specific name for a network of computers.
Wireless-N Business Notebook Adapter Intrusion attack - A type of internet attacks in which an attacker tries to gain or access the information transimitted through the networks. IP (Internet Protocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a network. IPCONFIG - A Windows 2000 and XP utility that displays the IP address for a particular networking device.
Wireless-N Business Notebook Adapter PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe. QoS (Quality of Service) - A mechanism which gives priorities to certain types of traffic to ensure the throughput; for example, the streaming multimedia.
Wireless-N Business Notebook Adapter TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability. Throughput - The amount of data moved successfully from one node to another in a given time period.
Wireless-N Business Notebook Adapter Appendi x F: Speci fi cati ons Standards IEEE 802.11g, IEEE 802.11b, draft IEEE 802.11n Channels 802.11b/802.11g/Wireless-N (20MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Wireless, Activity Protocols 802.11b: CCK (11 Mbps), DQPSK (2 Mbps), DBPSK (1 Mbps); 802.11g: OFDM Wireless-N: BPSK, QPSK, 16-QAM, 64-QAM Transmitted Power 802.11g: 23 ± 1 dBm (Typical) 802.
Wireless-N Business Notebook Adapter Operating Humidity 90% Maximum, Non-Condensing Storage Humidity 90% Maximum, Non-Condensing Appendix F: Specifications 67
Wireless-N Business Notebook Adapter Appendi x G: Warrant y Informati on LIMITED WARRANTY Linksys warrants to You that, for a period of three years (the “Warranty Period”), your Linksys Product will be substantially free of defects in materials and workmanship under normal use. Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
Wireless-N Business Notebook Adapter Appendi x H: Regul ator y Informati on Appendix H: Regulatory Information 69
Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This equipment has been SAR-evaluated for use in laptops (notebooks) with side slot configuration. To maintain compliance with FCC RF exposure compliance requirements, please follow operation instruction as documented in this manual. Linksys declares that WPC4400N ( FCC ID: Q87-WPC4400N ) is limited in CH1~CH11 for 2.4 GHz by specified firmware controlled in U.S.A.
Règlement d’Industry Canada Les conditions de fonctionnement sont sujettes à deux conditions: 1) Ce périphérique ne doit pas causer d’interférence et. 2) Ce périphérique doit accepter toute interférence, y compris les interférences pouvant perturber le bon fonctionnement de ce périphérique.
Wireless-N Business Notebook Adapter User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products.
Wireless-N Business Notebook Adapter Appendix H: Regulatory Information 71
Wireless-N Business Notebook Adapter Appendix H: Regulatory Information 72
Wireless-N Business Notebook Adapter Appendix H: Regulatory Information 73
Wireless-N Business Notebook Adapter For more information, visit www.linksys.com.
Wireless-N Business Notebook Adapter Appendi x I: Contact Informati on Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www.linksys.com or ftp.linksys.