Linksys WPC4400N Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Linksys WPC4400N an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Linksys WPC4400N, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Linksys WPC4400N die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Linksys WPC4400N. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Linksys WPC4400N sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Linksys WPC4400N
- Den Namen des Produzenten und das Produktionsjahr des Geräts Linksys WPC4400N
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Linksys WPC4400N
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Linksys WPC4400N zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Linksys WPC4400N und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Linksys finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Linksys WPC4400N zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Linksys WPC4400N, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Linksys WPC4400N widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Model No. Model No. USER GUIDE BUSINESS SERIES Model No. Model No. W ir eless-N with Po r ts Model No . WPC4400N 4-portuter Business Note book A dapter Wirele ss[...]

  • Seite 2

    Wireless-N Business Notebook Adapter Copyright and T rademarks Specifications are subject to change without notice . L inksys is a registered trademark or trademark of Cisco Systems, Inc . and/or its affiliates in the U.S . and certain other countries. Co pyright © 2006 Cisco Systems, Inc . All rights reserved. Other brands and product names are t[...]

  • Seite 3

    Wireless-N Business Notebook Adapter Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this User Guide? 2 Chapter 2: Planning your Wireless Network 4 Network Topology 4 Roaming 4 Network Layout 5 Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter 6 The LED Indicators 6 Chapter 4: Setting up and Connecting the Wirele[...]

  • Seite 4

    Wireless-N Business Notebook Adapter Windows XP Wireless Zero Configuration 57 Appendix C: Wireless-N Interoperability 60 Appendix D: Wireless Security 61 Security Precautions 61 Security Threats Facing Wireless Networks 61 Appendix E: Windows Help 64 Appendix F: Glossary 65 Appendix G: Specifications 70 Appendix H: Warranty Information 72 Appendix[...]

  • Seite 5

    Wireless-N Business Noteb ook Adapter List of Figures Figure 3-1: Front Panel 6 Figure 4-1: Setup Wizard’s Welcome Screen 7 Figure 4-2: Setup Wizard’s License Agreement 7 Figure 4-3: Connecting the Adapter 8 Figure 4-4: Available Wireless Network 8 Figure 4-5: WEP 9 Figure 4-6: WPA - Personal 9 Figure 4-7: WPA2 - Personal 10 Figure 4-8: Congrat[...]

  • Seite 6

    Wireless-N Business Noteb ook Adapter Figure 5-10: Creating Profiles - Manua l Setup - Network Settings 24 Figure 5-11: Creating Profiles - Ma nual Setup - Wireless Mode 24 Figure 5-12: Creating Profiles - Manual Se tup - Wireless Security - WEP 25 Figure 5-13: Creating Profiles - Manual Setup - Wireless Security - WPA Personal 26 Figure 5-14: Crea[...]

  • Seite 7

    Wireless-N Business Noteb ook Adapter Figure 5-44: Administration - Modify Access Point Account 42 Figure 5-45: Administration - Security Monitor Account 43 Figure 6-1: Wireless Network Monitor Icon 44 Figure 6-2: Administration - Logi n Security Monitor Account 44 Figure 6-3: Classification 45 Figure 6-4: AP Classification 45 Figure 6-5: Client Cl[...]

  • Seite 8

    1 Chapter 1: Introductio n Welcome Wireless-N Business Notebook Adapter Chapter 1: Introduction We lc om e Thank you for choosing the Wireless-N Business Notebook Adap ter . Setting up your network and your Wireless-N Business Notebook Adapter is easier than ever . The Wireless-N Notebook Adapter is the simple way to add or upgrade wireless connect[...]

  • Seite 9

    2 Chapter 1: Introductio n What’s in this User Guide? Wireless-N Business Notebook Adapter The Wireless-N Business Notebook Adapter has new securi ty monitor functions. When the WPC4400N is used with a Linksys W AP4400N Access Point, the New AP Detection fu nctionality alerts you when an AP is detected that has previously not been seen before and[...]

  • Seite 10

    3 Chapter 1: Introductio n What’s in this User Guide? Wireless-N Business Notebook Adapter • Appendix C: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix D: Windows Help This appendix describes how you can use Windows Help for in[...]

  • Seite 11

    4 Chapter 2: Planning your Wireless Network Network Topology Wireless-N Business Notebook Adapter Chapter 2: Planning your Wireless Network Network T opology A wireless network is a group of computers, each equipped with one wireless adapter . Computers in a wireless network must be configured to share the same radio channel. Several PCs equipped w[...]

  • Seite 12

    5 Chapter 2: Planning your Wireless Network Network Layout Wireless-N Business Notebook Adapter Network La yout Linksys wireless access points and wireless routers have been designed for use with 802.11a, 802.11b , and 802.11g products. With 802.11g products communicating with the 802.11b standard and some products incorporating both “a” and ?[...]

  • Seite 13

    6 Chapter 3: Getting to Know the Wireless-N Busin ess Notebook Adapter The LED Indicators Wireless-N Business Notebook Adapter Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity . Po we r Blue . The Power LED lights up when the Adapter&apo[...]

  • Seite 14

    7 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Starting the Setup Wireless-N Business Notebook Adapter Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup The Wireless-N Business Notebook Adapter Setup Wizard will guide you through the installation procedure. The Setup W[...]

  • Seite 15

    8 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Connecting the Adapter Wireless-N Business Notebook Adapter Connecting the Adapter 1. Locate an available CardBus slot on your notebook PC. 2. With the connector pin end facing the CardBus slot and the label facing up, slide the Adapter into the CardBus slot until it l[...]

  • Seite 16

    9 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter 2. Wireless Security If your network has WEP , WP A-Personal , or WPA2-Personal wireless security enabled, then that security screen will appear . Continue to the screen for your wireless security . WEP If you[...]

  • Seite 17

    10 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A2-P ersonal If your network has the wireless security WP A2 Personal enabled, this screen will appear . P assphrase - Enter a Passphrase , also called a Pre-shared Key , of 8-63 characters in the Passphra[...]

  • Seite 18

    11 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually . 2. The Network[...]

  • Seite 19

    12 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode , go to Step 5 no w . If you chose Ad-Hoc Mode , the Ad-Hoc Mode Settings screen will appear . Select the correct operating channel for your wireless network. The channel y[...]

  • Seite 20

    13 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter Authentication -The default is set to Auto , so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentic[...]

  • Seite 21

    14 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A Enterprise WP A Enterprise features WP A security used in coordination with a RADIUS ser ver . (This shou ld only be used when a RADIUS server is connected to the Router .) WPA Enterprise offers two auth[...]

  • Seite 22

    15 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS serv er . (This should only be used when a RADIUS server is connected to the Router .) WP A2 Enterprise offers two [...]

  • Seite 23

    16 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP . Authentication - Select[...]

  • Seite 24

    17 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mut ual authentication method that uses a user name and password based system. Login met hod - Select the login method your network is using, Manual Lo[...]

  • Seite 25

    18 Chapter 5: Using the Wireless Network Monito r Accessing the Wireless Network Monitor Wireless-N Business Notebook Adapter Chapter 5: Using the Wireless Network Monitor Use the Wireless Network Monitor to check the link information, set up profiles of your wireless setting s, searc h for available wireless networks, troubleshoot your wireless co[...]

  • Seite 26

    19 Chapter 5: Using the Wireless Network Monito r Link Information Wireless-N Business Notebook Adapter Status Click the Statu s tab to view the Wireless Network Status screen. The Status scr een p rovides information on your current network settings. Radio Band - This shows the r adio band used o n the wireless network. SSID - Ser vice Set Identif[...]

  • Seite 27

    20 Chapter 5: Using the Wireless Network Monito r Link Information Wireless-N Business Notebook Adapter Statistics The Statistics screen provides statistics on your current network settings. T ransmit Rate - This is the d ata transfer rate of the current connection. (In Auto mode , the Adapter dynamically shifts to the fastest data transfer rate po[...]

  • Seite 28

    21 Chapter 5: Using the Wireless Network Monito r Profiles Wireless-N Business Notebook Adapter Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here [...]

  • Seite 29

    22 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Create a New Pr ofile The next screen to appear will be the Av ailable Wireless Network screen. This screen provides two options for setting up the Adapter . • Av ailable Wireless Network. (For most users.) Use this option if you alread y h[...]

  • Seite 30

    23 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, en ter exactly 26 hexadecimal char acters. Valid hexadecimal char acters [...]

  • Seite 31

    24 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually . 2. The Network Settings screen from the Wireless[...]

  • Seite 32

    25 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode , go to Step 5 no w . If you chose Ad-Hoc Mode , the Ad-Hoc Mode Settings screen will appear . Select the correct operating channel for your wireless network. The channel you choose should match the channel[...]

  • Seite 33

    26 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Authentication -The default is set to Auto , so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authent ica[...]

  • Seite 34

    27 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WP A Enterprise WP A Enterprise features WPA security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is con nected to the Router .) WPA Enterprise offers two authentication methods, EAP- TLS and PEA[...]

  • Seite 35

    28 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is con nected to the Router .) WPA2 Enterprise offers two authentication methods, EAP- TLS an[...]

  • Seite 36

    29 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP . Authentication - Select the authen tication method your n[...]

  • Seite 37

    30 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutu a l authentication method that uses a username and password based system. Login method - Select the login method your network is using , Manual Login or Windows Login . If you sele[...]

  • Seite 38

    31 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. T o save the new settings, click the Save button. T o edit the new settings, click the Back button. T o exit the Manual Setup through the Wireless Network Monitor [...]

  • Seite 39

    32 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter Editing a Profile Select the profile that you would like to edit in the profile list and click on Edit button. The next screen would be the Wireless Mode . Following the steps below to complete the task: 1. The Wireless Mode screen shows a choic[...]

  • Seite 40

    33 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter 3. If your wireless network doesn’t have wireless security , select Disabled and then click the Next button to continue . Proceed to Step 4 . If your wireless network has wireless security , select the method of security used : WEP , WP A/WP A[...]

  • Seite 41

    34 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A Personal WP A Personal offers two encr yption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in len[...]

  • Seite 42

    35 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A Enterprise WP A/WP A2 Enterprise features WPA security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is connecte d to the Router .) WPA Enterprise offers two authentication methods, EAP-TLS and P[...]

  • Seite 43

    36 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS serv er . (This should only be used when a RADIUS server is connected to the Router .) WP A2 Enterprise offers two authentication methods, EAP- TLS and [...]

  • Seite 44

    37 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP . Authentication - Select the authen tication method your netw[...]

  • Seite 45

    38 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method t hat uses a user name and password based system. Login met hod - Select the login method your network is using, Manual Login or Windows Login . If you select [...]

  • Seite 46

    39 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter 5. The Confirm New Settings screen will appear next and show the new settings. T o save the new settings, click the Sav e button. T o edit the new settings, click the Back button. T o exit the Manual Setup through the Wireless Network Monitor , [...]

  • Seite 47

    40 Chapter 5: Using the Wireless Network Monito r Site Survey Wireless-N Business Notebook Adapter Figure 5-40: Site Survey Site Survey The Site Sur vey screen displays a list of av ailable networks in the table o n the left. The table shows each network’ s SSID , Channel, and the quality of the wireless signal the Adapter is receiving. Y ou may [...]

  • Seite 48

    41 Chapter 5: Using the Wireless Network Monito r Troubleshooting Wireless-N Business Notebook Adapter T roubleshooting The T roubleshooting screen lets you troubleshoot your wireless connection. Address T ype - This shows the addressing method of your client. IP Address - This shows the current IP Address of your client. Subnet Mask - This shows t[...]

  • Seite 49

    42 Chapter 5: Using the Wireless Network Monito r Administration Wireless-N Business Notebook Adapter Log in as the Access P oint's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin ). Click Next to continue to the a[...]

  • Seite 50

    43 Chapter 5: Using the Wireless Network Monito r Administration Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions o f the Wireless Network Monit[...]

  • Seite 51

    44 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Accessing the Wireless Network Monitor Wireless-N Business Notebook Adapter Chapter 6: The Administrative Functions in the Wireless Network Monitor Use the administration functions in the Wireless Network Monitor to classify your wireless networks into different groups and [...]

  • Seite 52

    45 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Classification The Classification screen displays a summary o f classified devices. The table shows the number of access points and clients classified as trusted and untrusted by MAC addr esses in your networks. It also sh[...]

  • Seite 53

    46 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Client Classification The Cli ent Classification Screen lets you classify the existing wir eless clients into truste d networks and untrusted networks. New Client information is received from Linksys Business Series Access[...]

  • Seite 54

    47 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Allowed SSID Configuration The Allowed SSID table shows the SSID of the allowed AP on your network. APs from SSIDs not on the allowed SSIDs list will be automatically classified as untrusted. A blank list indicates th at a[...]

  • Seite 55

    48 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Allowed Channel Configuration The Allowed Cha nnel Configuration shows the allowed channels for using in your wireless networks. Y ou may check individual channels or click Check All to check all of the channels. Unclassif[...]

  • Seite 56

    49 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Security Monitor The Security Monitor screen displays the statistics of your wirele ss network and alerts you of network activity . Y ou may click Channel Usage, AP Inventory , Client Inventory , or Alert to proceed with[...]

  • Seite 57

    50 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Client Inventory The Client Inventory screen provides statistics of T ru sted, Un trusted, and Unknown Clients. The pie chart shows the percentage and number of each wireless client’ s classifi cation. Click the radio [...]

  • Seite 58

    51 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Alert Information The alert informa tion screen shows the detailed message of each alert event. Message - This indicates the description of the event. MAC Address - This shows the MAC Addr ess of the wireless c lient or [...]

  • Seite 59

    52 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Advice The Advice scr een shows the advice message of each alert event. Y ou may adjust your wireless network settings according to the advice to better protect your networks. Windows Firewall Windows XP users may see a [...]

  • Seite 60

    53 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-N Business Notebook Adapter Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “F requently Asked Questions. ” This appendix provides solutions to problems that may occur d uring the installation and operation of the Wir[...]

  • Seite 61

    54 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter Frequently Ask ed Questions Can I run an ap plication from a remote computer over the wireless network? This will depend on whether or not the application is des igned to be used over a network. Consult the application’ s user guide to determine if it [...]

  • Seite 62

    55 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter What IEEE 802.11g feat ures ar e suppo rted? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation ?[...]

  • Seite 63

    56 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter What is ISM b and? The FCC and their counterparts outside of the U.S . have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particula r , is being made available worldwi[...]

  • Seite 64

    57 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zer o Configuration If your computer is running Windows XP , then this c hoice will be available . If you want to use Windows XP Wireless Zero Configuration to control the Adapter , inst [...]

  • Seite 65

    58 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wirele ss network. Select the network you w ant. Click the Connect button. If your network does not have wireless security enabled, go to step 3. If your network does have wireless security enabled, go to st[...]

  • Seite 66

    59 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP , enter the WEP Key used into the Network Key and Confir m network key fields. If your network uses wireless security WP A Personal, enter the Passphrase used into the Network Key and Confirm network key fields. [...]

  • Seite 67

    60 Appendix C: Wireless-N In teroperability Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperabilit y There may be communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. If your network is experiencing these problems, follow these instructi[...]

  • Seite 68

    61 Appendix D: Wireless Security Security Precautions Wireless-N Business Notebook Adapter Appendix D: Wireless Securit y Linksys wants to make wir eless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementat[...]

  • Seite 69

    62 Appendix D: Wireless Security Security Threats Facing Wireless Netwo rks Wireless-N Business Notebook Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the optio n of broadcasting the SSID . While this option may be more convenient, it allows anyone to log into your wireless network.[...]

  • Seite 70

    63 Appendix D: Wireless Security Security Threats Facing Wireless Netwo rks Wireless-N Business Notebook Adapter WP A-P ersonal . If you do not have a RADIUS server , Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 char acters. WP A Enter prise . WPA used in coordination with a RADIUS server . (This s[...]

  • Seite 71

    64 Appendix E: Windows Help Wireless-N Business Notebook Adapter Appendix E: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier . These features can be accessed through Windows Help and are described in this appendix. TCP/[...]

  • Seite 72

    65 Appendix F: Glossary Wireless-N Business Notebook Adapter Appendix F: Glossar y This glossary contains som e basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www .linksys.com/glossar y . Access P oint - A device that allows wireless-equipped computers and oth[...]

  • Seite 73

    66 Appendix F: Glossary Wireless-N Business Notebook Adapter DMZ ( D e m ilitarized Z one) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS ( D omain N ame S erver) - The IP address of your ISP's server , which translates the names of websites into IP addresses. Domain - A s[...]

  • Seite 74

    67 Appendix F: Glossary Wireless-N Business Notebook Adapter Intrusion attack - A type of inte rnet attacks in which an attacker tries to gain or access the information transimitted through the networks. IP ( I nternet P rotocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a netwo[...]

  • Seite 75

    68 Appendix F: Glossary Wireless-N Business Notebook Adapter PPTP ( P oint-to- P oint T u nneling P rotocol) - A VPN protocol that allows t he Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe . QoS ( Q uality of S er vice) - A mechanism which gives priorities [...]

  • Seite 76

    69 Appendix F: Glossary Wireless-N Business Notebook Adapter TCP/IP ( T ransmission C ontrol P rotocol/ I nternet P rotocol) - A set of instructions PCs use to commu nicate over a network. Te l n e t - A user command and TCP/IP proto col used for accessing remote PCs. TFTP ( T rivial F ile T ransfer P rotocol) - A version of the TCP/IP FTP protocol[...]

  • Seite 77

    70 Appendix G: Specification s Wireless-N Business Notebook Adapter Appendix G: Specifications Standards Draft IEEE802.11n, IEEE802.11g , IEEE802.11b , 802.1x (Security Authentication), (802.1i) Channels 802.11b/802.11g/Wireless-N (20MHz/40MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Power , Link/Act Protocols 802.11b: DSSS: CCK, QPSK, [...]

  • Seite 78

    71 Appendix G: Specification s Wireless-N Business Notebook Adapter Dimensions 4.88" x 0.53" x 2.13 " (124 mm x 13.5 mm x 54 mm) Unit Weight 1.76 oz (0.05 kg) Certifications FCC, WHQL Operating T emp. 32ºF to 140ºF (0ºC to 60ºC) Storage T emp. -4ºF to 176ºF (-20ºC to 80ºC) Operating Humidity 10 to 80%, Non-Condensing Storage [...]

  • Seite 79

    72 Appendix H: Warranty Informat ion Wireless-N Business Noteb ook Adapter Appendix H: Warrant y Information LIMITED WARRANTY Linksys warrants to Y ou that, for a period of th ree y ears (the “Warranty Period”), your Linksys Product will b e substantially free of defects in materials and workmanship under normal use . Y our exclusive remedy and[...]

  • Seite 80

    73 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter Appendix I: Regulator y Information FCC Statement This product has been tested and complies with the specifications fo r a Class B digital device , pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interfe renc[...]

  • Seite 81

    74 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains importa nt information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required[...]

  • Seite 82

    75 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter[...]

  • Seite 83

    76 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter[...]

  • Seite 84

    77 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter[...]

  • Seite 85

    78 Appendix I: Regulato ry Information Wireless-N Business Notebook Adapter For more information, visit www .linksys.com.[...]

  • Seite 86

    79 Appendix J: Contact Informa tion Wireless-N Business Noteb ook Adapter Appendix J: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www .linksys.com or ftp.linksys.com Can't find information about a product you want to buy on the web? Do you [...]