Page 1
Wireless-N Business Notebook Adapter with Ports 4-portuter Model No. WPC4400N Wireless Model No. Model No. Model No. Model No. USER GUIDE BUSINESS SERIES...
Roaming Network Layout Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup Connecting the Adapter Setting up the Adapter Chapter 5: Using the Wireless Network Monitor...
Page 4
Wireless-N Business Notebook Adapter Windows XP Wireless Zero Configuration Appendix C: Wireless-N Interoperability Appendix D: Wireless Security Security Precautions Security Threats Facing Wireless Networks Appendix E: Windows Help Appendix F: Glossary Appendix G: Specifications Appendix H: Warranty Information Appendix I: Regulatory Information...
Page 5
List of Figures Figure 3-1: Front Panel Figure 4-1: Setup Wizard’s Welcome Screen Figure 4-2: Setup Wizard’s License Agreement Figure 4-3: Connecting the Adapter Figure 4-4: Available Wireless Network Figure 4-5: WEP Figure 4-6: WPA - Personal Figure 4-7: WPA2 - Personal...
Business Notebook Adapter is easier than ever. The Wireless-N Notebook Adapter is the simple way to add or upgrade wireless connectivity in your notebook computer. Just slide it into your notebook's PC Card slot and enjoy incredible high-speed wireless network access while retaining true mobility.
The Wireless-N Business Notebook Adapter has new security monitor functions. When the WPC4400N is used with a Linksys WAP4400N Access Point, the New AP Detection functionality alerts you when an AP is detected that has previously not been seen before and New Client detection for unknown clients, giving your business the visibility and protection it needs.
Page 10
This appendix supplies the Adapter’s warranty information. • Appendix H: Regulatory Information This appendix supplies the Adapter’s regulatory information. • Appendix I: Contact Information This appendix provides contact information for a variety of Linksys resources, including Technical Support. Chapter 1: Introduction What’s in this User Guide?
Linksys wireless adapters also provide users access to a wired network when using an access point or wireless router. An integrated wireless and wired network is called an infrastructure network. Each wireless PC in an infrastructure network can talk to any computer in a wired network infrastructure via the access point or wireless router.
When you wish to connect your wired network with your wireless network, the network ports on the access points and wireless routers can be connected to Linksys switches or routers. With these, and many other, Linksys products, your networking options are limitless. Go to the Linksys website at www.linksys.com for more information about wireless products.
The Network Adapter's LEDs display information about network activity. Figure 3-1: Front Panel Power Blue. The Power LED lights up when the Adapter's wireless networking is enabled. Link/Act Blue. The Link LED lights up when the Adapter has an active connection.
The Wireless-N Business Notebook Adapter Setup Wizard will guide you through the installation procedure. The Setup Wizard will install the driver and Wireless Network Monitor, as well as connect and configure the Adapter. IMPORTANT: Do not connect the Adapter until you are instructed to do so or the setup will not work correctly.
Connecting the Adapter 1. Locate an available CardBus slot on your notebook PC. 2. With the connector pin end facing the CardBus slot and the label facing up, slide the Adapter into the CardBus slot until it locks in place.
16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Network to connect to your network. For more information about the Wireless Network Monitor, refer to Chapter 5: Using the Wireless Network Monitor. Congratulations! The installation of the Wireless-N Business Notebook Adapter is complete. To check the link information, search for available wireless networks, or make additional configuration changes, proceed to Chapter 5: Using the Wireless Network Monitor.
IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Pre-shared Key - Enter a Pre-shared Key of 8-63 characters in the Pre-shared Key field. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
TKIP or AES, from the Encryption drop-down menu. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
Trust Any. Then select the authentication method used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
Trust Any. Then select the authentication method used inside the PEAP tunnel. Click the Next button to continue or the Back button to return to the previous screen. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter...
To check the link information, search for available wireless networks, or make additional configuration changes, proceed to Chapter 5: Using the Wireless Network Monitor. Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Setting up the Adapter Figure 4-21: Wireless Security - LEAP...
Accessing the Wireless Network Monitor After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
IP Address - The IP Address of the Adapter is displayed here. Subnet Mask - The Subnet Mask of the Adapter is shown here. Default Gateway - The Default Gateway address of the Adapter is displayed here. DNS - This is the DNS (Domain Name Service) address of the Adapter.
The Statistics screen provides statistics on your current network settings. Transmit Rate - This is the data transfer rate of the current connection. (In Auto mode, the Adapter dynamically shifts to the fastest data transfer rate possible at any given time.) Receive Rate - This is the rate at which data is received.
Wireless-N Business Notebook Adapter Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs. Profile - The name of the profile is displayed here.
16 alphanumeric characters. It must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.)
Wireless-N Business Notebook Adapter WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters. For 128-bit encryption, enter exactly 26 hexadecimal characters. Valid hexadecimal characters are “0” to “9” and “A” to “F”.
IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Wireless-N Business Notebook Adapter Authentication -The default is set to Auto, so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication. For Open System authentication, the sender and the recipient do not share a WEP key for authentication.
Wireless-N Business Notebook Adapter WPA Enterprise WPA Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP- TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method that uses a username and password based system. Login method - Select the login method your network is using, Manual Login or Windows Login. If you select manual login, enter the username and password in the username and password field accordingly.
Wireless-N Business Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
Wireless-N Business Notebook Adapter Editing a Profile Select the profile that you would like to edit in the profile list and click on Edit button. The next screen would be the Wireless Mode. Following the steps below to complete the task: 1.
16 alphanumeric characters. This passphrase must match the passphrase of your other wireless network devices and is compatible with Linksys wireless products only. (If you have any non-Linksys wireless products, enter the WEP key manually on those products.) WEP Key - The WEP key you enter must match the WEP key of your wireless network.
Wireless-N Business Notebook Adapter WPA Personal WPA Personal offers two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal. Then enter a Passphrase that is 8-63 characters in length.
Wireless-N Business Notebook Adapter WPA Enterprise WPA/WPA2 Enterprise features WPA security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA Enterprise offers two authentication methods, EAP-TLS and PEAP, as well as two encryption methods, TKIP and AES, with dynamic encryption keys. WPA2 Enterprise offers two authentication methods, EAP-TLS and PEAP, but only AES encryption method is used.
Wireless-N Business Notebook Adapter WPA2 Enterprise WPA2 Enterprise features WPA2 security used in coordination with a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) WPA2 Enterprise offers two authentication methods, EAP- TLS and PEAP.
Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server. (This should only be used when a RADIUS server is connected to the Router.) RADIUS offers two authentication types: EAP-TLS and PEAP. Authentication - Select the authentication method your network is using, EAP-TLS or PEAP.
IP Address - This IP Address must be unique to your network. Subnet Mask - The Adapter’s Subnet Mask must be the same as your wired network’s Subnet Mask. Default Gateway - Enter the IP address of your network’s Gateway here.
Wireless-N Business Notebook Adapter 5. The Confirm New Settings screen will appear next and show the new settings. To save the new settings, click the Save button. To edit the new settings, click the Back button. To exit the Manual Setup through the Wireless Network Monitor, click Exit.
The Site Survey screen displays a list of available networks in the table on the left. The table shows each network’s SSID, Channel, and the quality of the wireless signal the Adapter is receiving. You may click SSID, CH (Channel), or Signal, to sort by that field.
You may click Repair to troubleshoot your connection to the wireless network. Repair will disconnect your client from the network and then reconnect, in order to re-establish an IP address. You may also click FAQ to view the FAQ pages from the Linksys website. Figure 5-41: Troubleshooting Administration The Administration screen lets you administer your Security Monitor account and modify your Access Point’s...
Wireless-N Business Notebook Adapter Log in as the Access Point's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin). Click Next to continue to the administrative options.
Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account. The Security Monitor account gives access to the administrative functions of the Wireless Network Monitor.
Figure 6-1: Wireless Network Monitor Icon After installing the Adapter, the Wireless Network Monitor icon will appear in the system tray of your computer. If the Wireless Network Monitor is enabled, then the icon will be green. If the Wireless Network Monitor is disabled or the Adapter is not connected, then the icon will be gray.
Wireless-N Business Notebook Adapter Classification The Classification screen displays a summary of classified devices. The table shows the number of access points and clients classified as trusted and untrusted by MAC addresses in your networks. It also shows the number of allowed vendors, SSIDs, and channels.
The Client Classification Screen lets you classify the existing wireless clients into trusted networks and untrusted networks. New Client information is received from Linksys Business Series Access Points. New Clients start off as Unclassified until the System Administrator classifies them. A Trusted Client is one that has been identified by the System Administrator to be known and legitimate.
Wireless-N Business Notebook Adapter Allowed SSID Configuration The Allowed SSID table shows the SSID of the allowed AP on your network. APs from SSIDs not on the allowed SSIDs list will be automatically classified as untrusted. A blank list indicates that all SSIDs are allowed for classification.
Wireless-N Business Notebook Adapter Allowed Channel Configuration The Allowed Channel Configuration shows the allowed channels for using in your wireless networks. You may check individual channels or click Check All to check all of the channels. Unclassified access points on unchecked channels will be automatically classified as untrusted.
Wireless-N Business Notebook Adapter Security Monitor The Security Monitor screen displays the statistics of your wireless network and alerts you of network activity. You may click Channel Usage, AP Inventory, Client Inventory, or Alert to proceed with more security Monitor functions.
Wireless-N Business Notebook Adapter Client Inventory The Client Inventory screen provides statistics of Trusted, Untrusted, and Unknown Clients. The pie chart shows the percentage and number of each wireless client’s classification. Click the radio buttons to show the specified period of time for the data calculated. You may select Real Time for current data, 24 hours for data within the last 24 hours, 7 days for data within the last 7 days or select days for a range of days.
Wireless-N Business Notebook Adapter NOTE: You will be alerted when an Access Point is detected. Alert Information The alert information screen shows the detailed message of each alert event. Message - This indicates the description of the event. MAC Address - This shows the MAC Address of the wireless client or Access Point that performed the action.
IMPORTANT: DO NOT select Don’t allow exceptions or the security monitor will not work correctly. Windows XP users may see a Windows Firewall screen when using the WPC4400N security monitor. Select On (recommended) to use the firewall. Do not select the Don't allow exceptions or the Adapter’s security monitor will not work properly.
Wireless-N Business Notebook Adapter. Read the description below to solve your problems. If you can't find an answer here, check the Linksys website at www.linksys.com.
Keeping your business connected in the internet and managing networking in your office without wires give you the freedom to create a dynamic office environment that changes and grows as your business needs. The Linksys Wirelees–N Business Notebook Adapter will not only let you communicate sensitive data in a wireless setting but also give you the security and management options within your monitored networks.
Page 62
Wireless-N Business Notebook Adapter What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming • Automatic Rate Selection • RTS/CTS feature • Fragmentation • Power Management...
Page 63
Wireless-N Business Notebook Adapter What is ISM band? The FCC and their counterparts outside of the U.S. have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band. Spectrum in the vicinity of 2.4 GHz, in particular, is being made available worldwide.
If you want to switch back to the Wireless Network Monitor, right-click the Wireless Network Monitor icon, and select Use Linksys Wireless Network Monitor. 1. After installing the Adapter, the Windows XP Wireless Zero Configuration icon will appear in your computer’s system tray. Double-click the icon.
Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wireless network. Select the network you want. Click the Connect button. If your network does not have wireless security enabled, go to step 3. If your network does have wireless security enabled, go to step 4.
Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP, enter the WEP Key used into the Network Key and Confirm network key fields. If your network uses wireless security WPA Personal, enter the Passphrase used into the Network Key and Confirm network key fields. Click the Connect button.
Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperability There may be communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.11n (Wireless-N) products. If your network is experiencing these problems, follow these instructions. 1. Click the Start button, select Control Panel, then click System .
Wireless-N Business Notebook Adapter Appendix D: Wireless Security Linksys wants to make wireless networking as safe and easy for you as possible. The current generation of Linksys products provide several network security features, but they require specific action on your part for implementation.
Page 69
This includes hackers. So, don’t broadcast the SSID. Wireless networking products come with a default SSID set by the factory. (The Linksys default SSID is “linksys”.) Hackers know these defaults and can check these against your network. Change your SSID to something unique and not something related to your company or the networking products you use.
Page 70
These security recommendations should help keep your mind at ease while you are enjoying the most flexible and convenient technology Linksys has to offer. Appendix D: Wireless Security Security Threats Facing Wireless Networks...
Wireless-N Business Notebook Adapter Appendix E: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier. These features can be accessed through Windows Help and are described in this appendix.
This glossary contains some basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www.linksys.com/glossary. Access Point - A device that allows wireless-equipped computers and other devices to communicate with a wired network.
Page 73
Wireless-N Business Notebook Adapter DMZ (Demilitarized Zone) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS (Domain Name Server) - The IP address of your ISP's server, which translates the names of websites into IP addresses.
Page 74
Passphrase - Used much like a password, a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products. Ping (Packet INternet Groper) - An Internet utility used to determine whether a particular IP address is online.
Page 75
Wireless-N Business Notebook Adapter PPTP (Point-to-Point Tunneling Protocol) - A VPN protocol that allows the Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe.
Page 76
Wireless-N Business Notebook Adapter TCP/IP (Transmission Control Protocol/Internet Protocol) - A set of instructions PCs use to communicate over a network. Telnet - A user command and TCP/IP protocol used for accessing remote PCs. TFTP (Trivial File Transfer Protocol) - A version of the TCP/IP FTP protocol that has no directory or password capability.
Page 78
Wireless-N Business Notebook Adapter Dimensions 4.88" x 0.53" x 2.13" (124 mm x 13.5 mm x 54 mm) Unit Weight 1.76 oz (0.05 kg) Certifications FCC, WHQL Operating Temp. 32ºF to 140ºF (0ºC to 60ºC) Storage Temp. -4ºF to 176ºF (-20ºC to 80ºC)
Your exclusive remedy and Linksys' entire liability under this warranty will be for Linksys at its option to repair or replace the Product or refund Your purchase price less any rebates.
Wireless-N Business Notebook Adapter Appendix I: Regulatory Information FCC Statement This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 81
User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains important information for users with regards to the proper disposal and recycling of Linksys products. Consumers are required to comply with this notice for all electronic products bearing the following symbol:...
Page 82
Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
Page 83
Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
Page 84
Wireless-N Business Notebook Adapter Appendix I: Regulatory Information...
Page 85
Wireless-N Business Notebook Adapter For more information, visit www.linksys.com. Appendix I: Regulatory Information...
Can't find information about a product you want to buy on the web? Do you want to know more about networking with Linksys products? Give our advice line a call at: Or fax your request in to: If you experience problems with any Linksys product,...