Linksys WPC4400N User Manual

Wireless-n business notebook adapter
Hide thumbs Also See for WPC4400N:
Table of Contents

Advertisement

Wireless-N
Business Notebook Adapter
with Ports
4-portuter
Model No. WPC4400N
Wireless
Model No.
Model No.
Model No.
Model No.
USER GUIDE
BUSINESS SERIES

Advertisement

Table of Contents
loading

Summary of Contents for Linksys WPC4400N

  • Page 1 Wireless-N Business Notebook Adapter with Ports 4-portuter Model No. WPC4400N Wireless Model No. Model No. Model No. Model No. USER GUIDE BUSINESS SERIES...
  • Page 2 Wireless-N Business Notebook Adapter Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Copyright © 2006 Cisco Systems, Inc. All rights reserved.
  • Page 3: Table Of Contents

    Roaming Network Layout Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup Connecting the Adapter Setting up the Adapter Chapter 5: Using the Wireless Network Monitor...
  • Page 4 Wireless-N Business Notebook Adapter Windows XP Wireless Zero Configuration Appendix C: Wireless-N Interoperability Appendix D: Wireless Security Security Precautions Security Threats Facing Wireless Networks Appendix E: Windows Help Appendix F: Glossary Appendix G: Specifications Appendix H: Warranty Information Appendix I: Regulatory Information...
  • Page 5 List of Figures Figure 3-1: Front Panel Figure 4-1: Setup Wizard’s Welcome Screen Figure 4-2: Setup Wizard’s License Agreement Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Network Figure 4-5: WEP Figure 4-6: WPA - Personal Figure 4-7: WPA2 - Personal...
  • Page 6 Wireless-N Business Notebook Adapter Figure 5-10: Creating Profiles - Manual Setup - Network Settings Figure 5-11: Creating Profiles - Manual Setup - Wireless Mode Figure 5-12: Creating Profiles - Manual Setup - Wireless Security - WEP Figure 5-13: Creating Profiles - Manual Setup - Wireless Security - WPA Personal...
  • Page 7 Wireless-N Business Notebook Adapter Figure 5-44: Administration - Modify Access Point Account Figure 5-45: Administration - Security Monitor Account Figure 6-1: Wireless Network Monitor Icon Figure 6-2: Administration - Login Security Monitor Account Figure 6-3: Classification Figure 6-4: AP Classification...
  • Page 8: Chapter 1: Introduction Welcome

    Business Notebook Adapter is easier than ever. The Wireless-N Notebook Adapter is the simple way to add or upgrade wireless connectivity in your notebook computer. Just slide it into your notebook's PC Card slot and enjoy incredible high-speed wireless network access while retaining true mobility.
  • Page 9: What's In This User Guide

    The Wireless-N Business Notebook Adapter has new security monitor functions. When the WPC4400N is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you when an AP is detected that has previously not been seen before and New Client detection for unknown clients, giving your business the visibility and protection it needs.
  • Page 10 This appendix supplies the Adapter’s warranty information. • Appendix H: Regulatory Information This appendix supplies the Adapter’s regulatory information. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this User Guide?
  • Page 11: Chapter 2: Planning Your Wireless Network

    Linksys wireless adapters also provide users access to a wired network when using an access point or wireless router. An integrated wireless and wired network is called an infrastructure network. Each wireless PC in an infrastructure network can talk to any computer in a wired network infrastructure via the access point or wireless router.
  • Page 12: Network Layout

    When you wish to connect your wired network with your wireless network, the network ports on the access points and wireless routers can be connected to Linksys switches or routers. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about wireless products.
  • Page 13: Chapter 3: Getting To Know The Wireless-N Business Notebook Adapter

    The Network Adapter's LEDs display information about network activity. Figure 3-1: Front Panel Power Blue. The Power LED lights up when the Adapter's wireless networking is enabled. Link/Act Blue. The Link LED lights up when the Adapter has an active connection.
  • Page 14: Chapter 4: Setting Up And Connecting The Wireless-N Business Notebook Adapter

    The Wireless-N Business Notebook Adapter Setup Wizard will guide you through the installation procedure. The Setup Wizard will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. IMPORTANT: Do not connect the Adapter until you are instructed to do so or the setup will not work correctly.
  • Page 15: Connecting The Adapter

    Connecting the Adapter 1. Locate an available CardBus slot on your notebook PC. 2. With the connector pin end facing the CardBus slot and the label facing up, slide the Adapter into the CardBus slot until it locks in place.
  • Page 16: Figure 4-5: Wep

    16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 17: Figure 4-7: Wpa2 - Personal

    Network to connect to your network. For more information about the Wireless Network Monitor, refer to Chapter 5: Using the Wireless Network Monitor. Congratulations! The installation of the Wireless-N Business Notebook Adapter is complete. To check the link information, search for available wireless networks, or make additional configuration changes, proceed to Chapter 5: Using the Wireless Network Monitor.
  • Page 18: Figure 4-9: Creating A Profile

    IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
  • Page 19: Figure 4-11: Ad-Hoc Mode Settings

    16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 20: Figure 4-13: Wireless Security - Wpa Personal

    Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
  • Page 21: Figure 4-15: Wireless Security - Wpa Enterprise-Eap-Tls

    TKIP or AES, from the Encryption drop-down menu. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
  • Page 22: Figure 4-17: Wireless Security - Wpa2 Enterprise-Eap

    Trust Any. Then select the authentication method used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
  • Page 23: Figure 4-19: Wireless Security - Radius - Eap-Tls

    Trust Any. Then select the authentication method used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
  • Page 24: Figure 4-21: Wireless Security - Leap

    To check the link information, search for available wireless networks, or make additional configuration changes, proceed to Chapter 5: Using the Wireless Network Monitor. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-21: Wireless Security - LEAP...
  • Page 25: Chapter 5: Using The Wireless Network Monitor

    Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
  • Page 26: Figure 5-3: Link Information - Wireless Network Status

    IP Address - The IP Address of the Adapter is displayed here. Subnet Mask - The Subnet Mask of the Adapter is shown here. Default Gateway - The Default Gateway address of the Adapter is displayed here. DNS - This is the DNS (Domain Name Service) address of the Adapter.
  • Page 27: Figure 5-4: Link Information - Wireless Network Statistics

    The Statistics screen provides statistics on your current network settings. Transmit Rate - This is the data transfer rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transfer rate possible at any given time.) Receive Rate - This is the rate at which data is received.
  • Page 28: Profiles

    Wireless-N Business Notebook Adapter Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here.
  • Page 29: Create A New Profile

    16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
  • Page 30: Figure 5-8: Creating Profiles - Wpa-Personal

    Wireless-N Business Notebook Adapter WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.
  • Page 31: Figure 5-10: Creating Profiles - Manual Setup - Network Settings

    IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
  • Page 32: Figure 5-12: Creating Profiles - Manual Setup - Wireless Security - Wep

    16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 33: Figure 5-13: Creating Profiles - Manual Setup - Wireless Security - Wpa Personal

    Wireless-N Business Notebook Adapter Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication.
  • Page 34: Figure 5-15: Creating Profiles - Manual Setup - Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
  • Page 35: Figure 5-17: Creating Profiles - Manual Setup - Wireless Security - Wpa2 Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
  • Page 36: Figure 5-19: Creating Profiles - Manual Setup - Wireless Security - Radius - Eap-Tls

    Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 37: Figure 5-21: Creating Profiles - Manual Setup - Wireless Security - Leap

    Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password based system. Login method - Select the login method your network is using, Manual Login or Windows Login. If you select manual login, enter the username and password in the username and password field accordingly.
  • Page 38: Figure 5-22: Creating Profiles - Manual Setup - Confirm New Settings

    Wireless-N Business Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
  • Page 39: Editing A Profile

    Wireless-N Business Notebook Adapter Editing a Profile Select the profile that you would like to edit in the profile list and click on Edit button. The next screen would be the Wireless Mode. Following the steps below to complete the task: 1.
  • Page 40: Figure 5-26: Editing Profiles - Wireless Security

    16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
  • Page 41: Figure 5-28: Editing Profiles - Wireless Security - Wpa Personal

    Wireless-N Business Notebook Adapter WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in length.
  • Page 42: Figure 5-30: Editing Profiles - Wireless Security - Wpa Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA Enterprise WPA/WPA2 Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
  • Page 43: Figure 5-32: Editing Profiles - Wireless Security -Wpa2 Enterprise - Eap-Tls

    Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
  • Page 44: Figure 5-34: Editing Profiles - Wireless Security - Radius - Eap-Tls

    Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
  • Page 45: Figure 5-36: Editing Profiles - Wireless Security - Leap

    IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
  • Page 46: Figure 5-38: Editing Profiles - Confirm New Settings

    Wireless-N Business Notebook Adapter 5. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
  • Page 47: Site Survey

    The Site Survey screen displays a list of available networks in the table on the left. The table shows each network’s SSID, Channel, and the quality of the wireless signal the Adapter is receiving. You may click SSID, CH (Channel), or Signal, to sort by that field.
  • Page 48: Troubleshooting

    You may click Repair to troubleshoot your connection to the wireless network. Repair will disconnect your client from the network and then reconnect, in order to re-establish an IP address. You may also click FAQ to view the FAQ pages from the Linksys website. Figure 5-41: Troubleshooting Administration The Administration screen lets you administer your Security Monitor account and modify your Access Point’s...
  • Page 49: Figure 5-43: Administration - Login Access Point Account

    Wireless-N Business Notebook Adapter Log in as the Access Point's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin). Click Next to continue to the administrative options.
  • Page 50: Figure 5-45: Administration - Security Monitor Account

    Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions of the Wireless Network Monitor.
  • Page 51: Chapter 6: The Administrative Functions In The Wireless Network Monitor

    Figure 6-1: Wireless Network Monitor Icon After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
  • Page 52: Classification

    Wireless-N Business Notebook Adapter Classification The Classification screen displays a summary of classified devices. The table shows the number of access points and clients classified as trusted and untrusted by MAC addresses in your networks. It also shows the number of allowed vendors, SSIDs, and channels.
  • Page 53: Figure 6-5: Client Classification

    The Client Classification Screen lets you classify the existing wireless clients into trusted networks and untrusted networks. New Client information is received from Linksys Business Series Access Points. New Clients start off as Unclassified until the System Administrator classifies them. A Trusted Client is one that has been identified by the System Administrator to be known and legitimate.
  • Page 54: Figure 6-7: Allowed Ssid Configuration

    Wireless-N Business Notebook Adapter Allowed SSID Configuration The Allowed SSID table shows the SSID of the allowed AP on your network. APs from SSIDs not on the allowed SSIDs list will be automatically classified as untrusted. A blank list indicates that all SSIDs are allowed for classification.
  • Page 55: Figure 6-9: Allowed Channel Configuration

    Wireless-N Business Notebook Adapter Allowed Channel Configuration The Allowed Channel Configuration shows the allowed channels for using in your wireless networks. You may check individual channels or click Check All to check all of the channels. Unclassified access points on unchecked channels will be automatically classified as untrusted.
  • Page 56: Security Monitor

    Wireless-N Business Notebook Adapter Security Monitor The Security Monitor screen displays the statistics of your wireless network and alerts you of network activity. You may click Channel Usage, AP Inventory, Client Inventory, or Alert to proceed with more security Monitor functions.
  • Page 57: Figure 6-12: Security Monitor - Client Inventory

    Wireless-N Business Notebook Adapter Client Inventory The Client Inventory screen provides statistics of Trusted, Untrusted, and Unknown Clients. The pie chart shows the percentage and number of each wireless client’s classification. Click the radio buttons to show the specified period of time for the data calculated. You may select Real Time for current data, 24 hours for data within the last 24 hours, 7 days for data within the last 7 days or select days for a range of days.
  • Page 58: Figure 6-14: Security Monitor - Pop-Up Alert

    Wireless-N Business Notebook Adapter NOTE: You will be alerted when an Access Point is detected. Alert Information The alert information screen shows the detailed message of each alert event. Message - This indicates the description of the event. MAC Address - This shows the MAC Address of the wireless client or Access Point that performed the action.
  • Page 59: Figure 6-16: Security Monitor - Advice

    IMPORTANT: DO NOT select Don’t allow exceptions or the security monitor will not work correctly. Windows XP users may see a Windows Firewall screen when using the WPC4400N security monitor. Select On (recommended) to use the firewall. Do not select the Don't allow exceptions or the Adapter’s security monitor will not work properly.
  • Page 60: Appendix A: Troubleshooting

    Wireless-N Business Notebook Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
  • Page 61: Frequently Asked Questions

    Keeping your business connected in the internet and managing networking in your office without wires give you the freedom to create a dynamic office environment that changes and grows as your business needs. The Linksys Wirelees–N Business Notebook Adapter will not only let you communicate sensitive data in a wireless setting but also give you the security and management options within your monitored networks.
  • Page 62 Wireless-N Business Notebook Adapter What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management...
  • Page 63 Wireless-N Business Notebook Adapter What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide.
  • Page 64: Appendix B: Windows Xp Wireless Zero Configuration

    If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. 1. After installing the Adapter, the Windows XP Wireless Zero Configuration icon will appear in your computer’s system tray. Double-click the icon.
  • Page 65: Figure B-4: Available Wireless Network

    Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wireless network. Select the network you want. Click the Connect button. If your network does not have wireless security enabled, go to step 3. If your network does have wireless security enabled, go to step 4.
  • Page 66: Figure B-6: Network Connection - Wireless Security

    Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Click the Connect button.
  • Page 67: Appendix C: Wireless-N Interoperability

    Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperability There may be communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. If your network is experiencing these problems, follow these instructions. 1. Click the Start button, select Control Panel, then click System .
  • Page 68: Appendix D: Wireless Security

    Wireless-N Business Notebook Adapter Appendix D: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
  • Page 69 This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
  • Page 70 These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix D: Wireless Security Security Threats Facing Wireless Networks...
  • Page 71: Appendix E: Windows Help

    Wireless-N Business Notebook Adapter Appendix E: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
  • Page 72: Appendix F: Glossary

    This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network.
  • Page 73 Wireless-N Business Notebook Adapter DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses.
  • Page 74 Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
  • Page 75 Wireless-N Business Notebook Adapter PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.
  • Page 76 Wireless-N Business Notebook Adapter TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.
  • Page 77: Appendix G: Specifications

    Wireless-N Business Notebook Adapter Appendix G: Specifications Standards Draft IEEE802.11n, IEEE802.11g, IEEE802.11b, 802.1x (Security Authentication), (802.1i) Channels 802.11b/802.11g/Wireless-N (20MHz/40MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Power, Link/Act Protocols 802.11b: DSSS: CCK, QPSK, BPSK 802.11g: OFDM Wireless-N: OFDM Transmitted Power 802.11b: 17 dBm@1TX;...
  • Page 78 Wireless-N Business Notebook Adapter Dimensions 4.88" x 0.53" x 2.13" (124 mm x 13.5 mm x 54 mm) Unit Weight 1.76 oz (0.05 kg) Certifications FCC, WHQL Operating Temp. 32ºF to 140ºF (0ºC to 60ºC) Storage Temp. -4ºF to 176ºF (-20ºC to 80ºC)
  • Page 79: Appendix H: Warranty Information

    Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
  • Page 80: Appendix I: Regulatory Information

    Wireless-N Business Notebook Adapter Appendix I: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 81 User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol:...
  • Page 82 Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
  • Page 83 Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
  • Page 84 Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
  • Page 85 Wireless-N Business Notebook Adapter For more information, visit www.linksys.com. Appendix I: Regulatory Information...
  • Page 86: Appendix J: Contact Information

    Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...

Table of Contents