Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Linksys WPC4400N manuale d’uso - BKManuals

Linksys WPC4400N manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Linksys WPC4400N. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Linksys WPC4400N o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Linksys WPC4400N descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Linksys WPC4400N dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Linksys WPC4400N
- nome del fabbricante e anno di fabbricazione Linksys WPC4400N
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Linksys WPC4400N
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Linksys WPC4400N non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Linksys WPC4400N e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Linksys in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Linksys WPC4400N, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Linksys WPC4400N, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Linksys WPC4400N. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Model No. Model No. USER GUIDE BUSINESS SERIES Model No. Model No. W ir eless-N with Po r ts Model No . WPC4400N 4-portuter Business Note book A dapter Wirele ss[...]

  • Pagina 2

    Wireless-N Business Notebook Adapter Copyright and T rademarks Specifications are subject to change without notice . L inksys is a registered trademark or trademark of Cisco Systems, Inc . and/or its affiliates in the U.S . and certain other countries. Co pyright © 2006 Cisco Systems, Inc . All rights reserved. Other brands and product names are t[...]

  • Pagina 3

    Wireless-N Business Notebook Adapter Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this User Guide? 2 Chapter 2: Planning your Wireless Network 4 Network Topology 4 Roaming 4 Network Layout 5 Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter 6 The LED Indicators 6 Chapter 4: Setting up and Connecting the Wirele[...]

  • Pagina 4

    Wireless-N Business Notebook Adapter Windows XP Wireless Zero Configuration 57 Appendix C: Wireless-N Interoperability 60 Appendix D: Wireless Security 61 Security Precautions 61 Security Threats Facing Wireless Networks 61 Appendix E: Windows Help 64 Appendix F: Glossary 65 Appendix G: Specifications 70 Appendix H: Warranty Information 72 Appendix[...]

  • Pagina 5

    Wireless-N Business Noteb ook Adapter List of Figures Figure 3-1: Front Panel 6 Figure 4-1: Setup Wizard’s Welcome Screen 7 Figure 4-2: Setup Wizard’s License Agreement 7 Figure 4-3: Connecting the Adapter 8 Figure 4-4: Available Wireless Network 8 Figure 4-5: WEP 9 Figure 4-6: WPA - Personal 9 Figure 4-7: WPA2 - Personal 10 Figure 4-8: Congrat[...]

  • Pagina 6

    Wireless-N Business Noteb ook Adapter Figure 5-10: Creating Profiles - Manua l Setup - Network Settings 24 Figure 5-11: Creating Profiles - Ma nual Setup - Wireless Mode 24 Figure 5-12: Creating Profiles - Manual Se tup - Wireless Security - WEP 25 Figure 5-13: Creating Profiles - Manual Setup - Wireless Security - WPA Personal 26 Figure 5-14: Crea[...]

  • Pagina 7

    Wireless-N Business Noteb ook Adapter Figure 5-44: Administration - Modify Access Point Account 42 Figure 5-45: Administration - Security Monitor Account 43 Figure 6-1: Wireless Network Monitor Icon 44 Figure 6-2: Administration - Logi n Security Monitor Account 44 Figure 6-3: Classification 45 Figure 6-4: AP Classification 45 Figure 6-5: Client Cl[...]

  • Pagina 8

    1 Chapter 1: Introductio n Welcome Wireless-N Business Notebook Adapter Chapter 1: Introduction We lc om e Thank you for choosing the Wireless-N Business Notebook Adap ter . Setting up your network and your Wireless-N Business Notebook Adapter is easier than ever . The Wireless-N Notebook Adapter is the simple way to add or upgrade wireless connect[...]

  • Pagina 9

    2 Chapter 1: Introductio n What’s in this User Guide? Wireless-N Business Notebook Adapter The Wireless-N Business Notebook Adapter has new securi ty monitor functions. When the WPC4400N is used with a Linksys W AP4400N Access Point, the New AP Detection fu nctionality alerts you when an AP is detected that has previously not been seen before and[...]

  • Pagina 10

    3 Chapter 1: Introductio n What’s in this User Guide? Wireless-N Business Notebook Adapter • Appendix C: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network. • Appendix D: Windows Help This appendix describes how you can use Windows Help for in[...]

  • Pagina 11

    4 Chapter 2: Planning your Wireless Network Network Topology Wireless-N Business Notebook Adapter Chapter 2: Planning your Wireless Network Network T opology A wireless network is a group of computers, each equipped with one wireless adapter . Computers in a wireless network must be configured to share the same radio channel. Several PCs equipped w[...]

  • Pagina 12

    5 Chapter 2: Planning your Wireless Network Network Layout Wireless-N Business Notebook Adapter Network La yout Linksys wireless access points and wireless routers have been designed for use with 802.11a, 802.11b , and 802.11g products. With 802.11g products communicating with the 802.11b standard and some products incorporating both “a” and ?[...]

  • Pagina 13

    6 Chapter 3: Getting to Know the Wireless-N Busin ess Notebook Adapter The LED Indicators Wireless-N Business Notebook Adapter Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity . Po we r Blue . The Power LED lights up when the Adapter&apo[...]

  • Pagina 14

    7 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Starting the Setup Wireless-N Business Notebook Adapter Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup The Wireless-N Business Notebook Adapter Setup Wizard will guide you through the installation procedure. The Setup W[...]

  • Pagina 15

    8 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Connecting the Adapter Wireless-N Business Notebook Adapter Connecting the Adapter 1. Locate an available CardBus slot on your notebook PC. 2. With the connector pin end facing the CardBus slot and the label facing up, slide the Adapter into the CardBus slot until it l[...]

  • Pagina 16

    9 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter 2. Wireless Security If your network has WEP , WP A-Personal , or WPA2-Personal wireless security enabled, then that security screen will appear . Continue to the screen for your wireless security . WEP If you[...]

  • Pagina 17

    10 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A2-P ersonal If your network has the wireless security WP A2 Personal enabled, this screen will appear . P assphrase - Enter a Passphrase , also called a Pre-shared Key , of 8-63 characters in the Passphra[...]

  • Pagina 18

    11 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually . 2. The Network[...]

  • Pagina 19

    12 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode , go to Step 5 no w . If you chose Ad-Hoc Mode , the Ad-Hoc Mode Settings screen will appear . Select the correct operating channel for your wireless network. The channel y[...]

  • Pagina 20

    13 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter Authentication -The default is set to Auto , so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentic[...]

  • Pagina 21

    14 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A Enterprise WP A Enterprise features WP A security used in coordination with a RADIUS ser ver . (This shou ld only be used when a RADIUS server is connected to the Router .) WPA Enterprise offers two auth[...]

  • Pagina 22

    15 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS serv er . (This should only be used when a RADIUS server is connected to the Router .) WP A2 Enterprise offers two [...]

  • Pagina 23

    16 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP . Authentication - Select[...]

  • Pagina 24

    17 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mut ual authentication method that uses a user name and password based system. Login met hod - Select the login method your network is using, Manual Lo[...]

  • Pagina 25

    18 Chapter 5: Using the Wireless Network Monito r Accessing the Wireless Network Monitor Wireless-N Business Notebook Adapter Chapter 5: Using the Wireless Network Monitor Use the Wireless Network Monitor to check the link information, set up profiles of your wireless setting s, searc h for available wireless networks, troubleshoot your wireless co[...]

  • Pagina 26

    19 Chapter 5: Using the Wireless Network Monito r Link Information Wireless-N Business Notebook Adapter Status Click the Statu s tab to view the Wireless Network Status screen. The Status scr een p rovides information on your current network settings. Radio Band - This shows the r adio band used o n the wireless network. SSID - Ser vice Set Identif[...]

  • Pagina 27

    20 Chapter 5: Using the Wireless Network Monito r Link Information Wireless-N Business Notebook Adapter Statistics The Statistics screen provides statistics on your current network settings. T ransmit Rate - This is the d ata transfer rate of the current connection. (In Auto mode , the Adapter dynamically shifts to the fastest data transfer rate po[...]

  • Pagina 28

    21 Chapter 5: Using the Wireless Network Monito r Profiles Wireless-N Business Notebook Adapter Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here [...]

  • Pagina 29

    22 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Create a New Pr ofile The next screen to appear will be the Av ailable Wireless Network screen. This screen provides two options for setting up the Adapter . • Av ailable Wireless Network. (For most users.) Use this option if you alread y h[...]

  • Pagina 30

    23 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, en ter exactly 26 hexadecimal char acters. Valid hexadecimal char acters [...]

  • Pagina 31

    24 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually . 2. The Network Settings screen from the Wireless[...]

  • Pagina 32

    25 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode , go to Step 5 no w . If you chose Ad-Hoc Mode , the Ad-Hoc Mode Settings screen will appear . Select the correct operating channel for your wireless network. The channel you choose should match the channel[...]

  • Pagina 33

    26 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Authentication -The default is set to Auto , so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authent ica[...]

  • Pagina 34

    27 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WP A Enterprise WP A Enterprise features WPA security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is con nected to the Router .) WPA Enterprise offers two authentication methods, EAP- TLS and PEA[...]

  • Pagina 35

    28 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is con nected to the Router .) WPA2 Enterprise offers two authentication methods, EAP- TLS an[...]

  • Pagina 36

    29 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP . Authentication - Select the authen tication method your n[...]

  • Pagina 37

    30 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutu a l authentication method that uses a username and password based system. Login method - Select the login method your network is using , Manual Login or Windows Login . If you sele[...]

  • Pagina 38

    31 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. T o save the new settings, click the Save button. T o edit the new settings, click the Back button. T o exit the Manual Setup through the Wireless Network Monitor [...]

  • Pagina 39

    32 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter Editing a Profile Select the profile that you would like to edit in the profile list and click on Edit button. The next screen would be the Wireless Mode . Following the steps below to complete the task: 1. The Wireless Mode screen shows a choic[...]

  • Pagina 40

    33 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter 3. If your wireless network doesn’t have wireless security , select Disabled and then click the Next button to continue . Proceed to Step 4 . If your wireless network has wireless security , select the method of security used : WEP , WP A/WP A[...]

  • Pagina 41

    34 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A Personal WP A Personal offers two encr yption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in len[...]

  • Pagina 42

    35 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A Enterprise WP A/WP A2 Enterprise features WPA security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is connecte d to the Router .) WPA Enterprise offers two authentication methods, EAP-TLS and P[...]

  • Pagina 43

    36 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS serv er . (This should only be used when a RADIUS server is connected to the Router .) WP A2 Enterprise offers two authentication methods, EAP- TLS and [...]

  • Pagina 44

    37 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP . Authentication - Select the authen tication method your netw[...]

  • Pagina 45

    38 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method t hat uses a user name and password based system. Login met hod - Select the login method your network is using, Manual Login or Windows Login . If you select [...]

  • Pagina 46

    39 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter 5. The Confirm New Settings screen will appear next and show the new settings. T o save the new settings, click the Sav e button. T o edit the new settings, click the Back button. T o exit the Manual Setup through the Wireless Network Monitor , [...]

  • Pagina 47

    40 Chapter 5: Using the Wireless Network Monito r Site Survey Wireless-N Business Notebook Adapter Figure 5-40: Site Survey Site Survey The Site Sur vey screen displays a list of av ailable networks in the table o n the left. The table shows each network’ s SSID , Channel, and the quality of the wireless signal the Adapter is receiving. Y ou may [...]

  • Pagina 48

    41 Chapter 5: Using the Wireless Network Monito r Troubleshooting Wireless-N Business Notebook Adapter T roubleshooting The T roubleshooting screen lets you troubleshoot your wireless connection. Address T ype - This shows the addressing method of your client. IP Address - This shows the current IP Address of your client. Subnet Mask - This shows t[...]

  • Pagina 49

    42 Chapter 5: Using the Wireless Network Monito r Administration Wireless-N Business Notebook Adapter Log in as the Access P oint's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin ). Click Next to continue to the a[...]

  • Pagina 50

    43 Chapter 5: Using the Wireless Network Monito r Administration Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions o f the Wireless Network Monit[...]

  • Pagina 51

    44 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Accessing the Wireless Network Monitor Wireless-N Business Notebook Adapter Chapter 6: The Administrative Functions in the Wireless Network Monitor Use the administration functions in the Wireless Network Monitor to classify your wireless networks into different groups and [...]

  • Pagina 52

    45 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Classification The Classification screen displays a summary o f classified devices. The table shows the number of access points and clients classified as trusted and untrusted by MAC addr esses in your networks. It also sh[...]

  • Pagina 53

    46 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Client Classification The Cli ent Classification Screen lets you classify the existing wir eless clients into truste d networks and untrusted networks. New Client information is received from Linksys Business Series Access[...]

  • Pagina 54

    47 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Allowed SSID Configuration The Allowed SSID table shows the SSID of the allowed AP on your network. APs from SSIDs not on the allowed SSIDs list will be automatically classified as untrusted. A blank list indicates th at a[...]

  • Pagina 55

    48 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Allowed Channel Configuration The Allowed Cha nnel Configuration shows the allowed channels for using in your wireless networks. Y ou may check individual channels or click Check All to check all of the channels. Unclassif[...]

  • Pagina 56

    49 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Security Monitor The Security Monitor screen displays the statistics of your wirele ss network and alerts you of network activity . Y ou may click Channel Usage, AP Inventory , Client Inventory , or Alert to proceed with[...]

  • Pagina 57

    50 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Client Inventory The Client Inventory screen provides statistics of T ru sted, Un trusted, and Unknown Clients. The pie chart shows the percentage and number of each wireless client’ s classifi cation. Click the radio [...]

  • Pagina 58

    51 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Alert Information The alert informa tion screen shows the detailed message of each alert event. Message - This indicates the description of the event. MAC Address - This shows the MAC Addr ess of the wireless c lient or [...]

  • Pagina 59

    52 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Advice The Advice scr een shows the advice message of each alert event. Y ou may adjust your wireless network settings according to the advice to better protect your networks. Windows Firewall Windows XP users may see a [...]

  • Pagina 60

    53 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-N Business Notebook Adapter Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “F requently Asked Questions. ” This appendix provides solutions to problems that may occur d uring the installation and operation of the Wir[...]

  • Pagina 61

    54 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter Frequently Ask ed Questions Can I run an ap plication from a remote computer over the wireless network? This will depend on whether or not the application is des igned to be used over a network. Consult the application’ s user guide to determine if it [...]

  • Pagina 62

    55 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter What IEEE 802.11g feat ures ar e suppo rted? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation ?[...]

  • Pagina 63

    56 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter What is ISM b and? The FCC and their counterparts outside of the U.S . have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particula r , is being made available worldwi[...]

  • Pagina 64

    57 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zer o Configuration If your computer is running Windows XP , then this c hoice will be available . If you want to use Windows XP Wireless Zero Configuration to control the Adapter , inst [...]

  • Pagina 65

    58 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wirele ss network. Select the network you w ant. Click the Connect button. If your network does not have wireless security enabled, go to step 3. If your network does have wireless security enabled, go to st[...]

  • Pagina 66

    59 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP , enter the WEP Key used into the Network Key and Confir m network key fields. If your network uses wireless security WP A Personal, enter the Passphrase used into the Network Key and Confirm network key fields. [...]

  • Pagina 67

    60 Appendix C: Wireless-N In teroperability Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperabilit y There may be communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. If your network is experiencing these problems, follow these instructi[...]

  • Pagina 68

    61 Appendix D: Wireless Security Security Precautions Wireless-N Business Notebook Adapter Appendix D: Wireless Securit y Linksys wants to make wir eless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementat[...]

  • Pagina 69

    62 Appendix D: Wireless Security Security Threats Facing Wireless Netwo rks Wireless-N Business Notebook Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the optio n of broadcasting the SSID . While this option may be more convenient, it allows anyone to log into your wireless network.[...]

  • Pagina 70

    63 Appendix D: Wireless Security Security Threats Facing Wireless Netwo rks Wireless-N Business Notebook Adapter WP A-P ersonal . If you do not have a RADIUS server , Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 char acters. WP A Enter prise . WPA used in coordination with a RADIUS server . (This s[...]

  • Pagina 71

    64 Appendix E: Windows Help Wireless-N Business Notebook Adapter Appendix E: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier . These features can be accessed through Windows Help and are described in this appendix. TCP/[...]

  • Pagina 72

    65 Appendix F: Glossary Wireless-N Business Notebook Adapter Appendix F: Glossar y This glossary contains som e basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www .linksys.com/glossar y . Access P oint - A device that allows wireless-equipped computers and oth[...]

  • Pagina 73

    66 Appendix F: Glossary Wireless-N Business Notebook Adapter DMZ ( D e m ilitarized Z one) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS ( D omain N ame S erver) - The IP address of your ISP's server , which translates the names of websites into IP addresses. Domain - A s[...]

  • Pagina 74

    67 Appendix F: Glossary Wireless-N Business Notebook Adapter Intrusion attack - A type of inte rnet attacks in which an attacker tries to gain or access the information transimitted through the networks. IP ( I nternet P rotocol) - A protocol used to send data over a network. IP Address - The address used to identify a computer or device on a netwo[...]

  • Pagina 75

    68 Appendix F: Glossary Wireless-N Business Notebook Adapter PPTP ( P oint-to- P oint T u nneling P rotocol) - A VPN protocol that allows t he Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe . QoS ( Q uality of S er vice) - A mechanism which gives priorities [...]

  • Pagina 76

    69 Appendix F: Glossary Wireless-N Business Notebook Adapter TCP/IP ( T ransmission C ontrol P rotocol/ I nternet P rotocol) - A set of instructions PCs use to commu nicate over a network. Te l n e t - A user command and TCP/IP proto col used for accessing remote PCs. TFTP ( T rivial F ile T ransfer P rotocol) - A version of the TCP/IP FTP protocol[...]

  • Pagina 77

    70 Appendix G: Specification s Wireless-N Business Notebook Adapter Appendix G: Specifications Standards Draft IEEE802.11n, IEEE802.11g , IEEE802.11b , 802.1x (Security Authentication), (802.1i) Channels 802.11b/802.11g/Wireless-N (20MHz/40MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Power , Link/Act Protocols 802.11b: DSSS: CCK, QPSK, [...]

  • Pagina 78

    71 Appendix G: Specification s Wireless-N Business Notebook Adapter Dimensions 4.88" x 0.53" x 2.13 " (124 mm x 13.5 mm x 54 mm) Unit Weight 1.76 oz (0.05 kg) Certifications FCC, WHQL Operating T emp. 32ºF to 140ºF (0ºC to 60ºC) Storage T emp. -4ºF to 176ºF (-20ºC to 80ºC) Operating Humidity 10 to 80%, Non-Condensing Storage [...]

  • Pagina 79

    72 Appendix H: Warranty Informat ion Wireless-N Business Noteb ook Adapter Appendix H: Warrant y Information LIMITED WARRANTY Linksys warrants to Y ou that, for a period of th ree y ears (the “Warranty Period”), your Linksys Product will b e substantially free of defects in materials and workmanship under normal use . Y our exclusive remedy and[...]

  • Pagina 80

    73 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter Appendix I: Regulator y Information FCC Statement This product has been tested and complies with the specifications fo r a Class B digital device , pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interfe renc[...]

  • Pagina 81

    74 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains importa nt information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required[...]

  • Pagina 82

    75 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter[...]

  • Pagina 83

    76 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter[...]

  • Pagina 84

    77 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter[...]

  • Pagina 85

    78 Appendix I: Regulato ry Information Wireless-N Business Notebook Adapter For more information, visit www .linksys.com.[...]

  • Pagina 86

    79 Appendix J: Contact Informa tion Wireless-N Business Noteb ook Adapter Appendix J: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www .linksys.com or ftp.linksys.com Can't find information about a product you want to buy on the web? Do you [...]