Gebruiksaanwijzing /service van het product WPC4400N van de fabrikant Linksys
Ga naar pagina of 86
Model No. Model No. USER GUIDE BUSINESS SERIES Model No. Model No. W ir eless-N with Po r ts Model No . WPC4400N 4-portuter Business Note book A dapter Wirele ss.
Wireless-N Business Notebook Adapter Copyright and T rademarks Specifications are subject to change without notice . L inksys is a registered trademark or trademark of Cisco Systems, Inc . and/or its affiliates in the U.S . and certain other countries.
Wireless-N Business Notebook Adapter Table of Contents Chapter 1: Introduction 1 Welcome 1 What’s in this User Guide? 2 Chapter 2: Planning your Wireless Network 4 Network Topology 4 Roaming 4 Netwo.
Wireless-N Business Notebook Adapter Windows XP Wireless Zero Configuration 57 Appendix C: Wireless-N Interoperability 60 Appendix D: Wireless Security 61 Security Precautions 61 Security Threats Faci.
Wireless-N Business Noteb ook Adapter List of Figures Figure 3-1: Front Panel 6 Figure 4-1: Setup Wizard’s Welcome Screen 7 Figure 4-2: Setup Wizard’s License Agreement 7 Figure 4-3: Connecting th.
Wireless-N Business Noteb ook Adapter Figure 5-10: Creating Profiles - Manua l Setup - Network Settings 24 Figure 5-11: Creating Profiles - Ma nual Setup - Wireless Mode 24 Figure 5-12: Creating Profi.
Wireless-N Business Noteb ook Adapter Figure 5-44: Administration - Modify Access Point Account 42 Figure 5-45: Administration - Security Monitor Account 43 Figure 6-1: Wireless Network Monitor Icon 4.
1 Chapter 1: Introductio n Welcome Wireless-N Business Notebook Adapter Chapter 1: Introduction We lc om e Thank you for choosing the Wireless-N Business Notebook Adap ter . Setting up your network and your Wireless-N Business Notebook Adapter is easier than ever .
2 Chapter 1: Introductio n What’s in this User Guide? Wireless-N Business Notebook Adapter The Wireless-N Business Notebook Adapter has new securi ty monitor functions.
3 Chapter 1: Introductio n What’s in this User Guide? Wireless-N Business Notebook Adapter • Appendix C: Wireless Security This appendix discusses security issues regarding wireless networking and measures you can take to help protect your wireless network.
4 Chapter 2: Planning your Wireless Network Network Topology Wireless-N Business Notebook Adapter Chapter 2: Planning your Wireless Network Network T opology A wireless network is a group of computers, each equipped with one wireless adapter . Computers in a wireless network must be configured to share the same radio channel.
5 Chapter 2: Planning your Wireless Network Network Layout Wireless-N Business Notebook Adapter Network La yout Linksys wireless access points and wireless routers have been designed for use with 802.11a, 802.11b , and 802.11g products. With 802.11g products communicating with the 802.
6 Chapter 3: Getting to Know the Wireless-N Busin ess Notebook Adapter The LED Indicators Wireless-N Business Notebook Adapter Chapter 3: Getting to Know the Wireless-N Business Notebook Adapter The LED Indicators The Network Adapter's LEDs display information about network activity .
7 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Starting the Setup Wireless-N Business Notebook Adapter Chapter 4: Setting up and Connecting the Wireless-N Business Notebook Adapter Starting the Setup The Wireless-N Business Notebook Adapter Setup Wizard will guide you through the installation procedure.
8 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Connecting the Adapter Wireless-N Business Notebook Adapter Connecting the Adapter 1.
9 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter 2. Wireless Security If your network has WEP , WP A-Personal , or WPA2-Personal wireless security enabled, then that security screen will appear .
10 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A2-P ersonal If your network has the wireless security WP A2 Personal enabled, this screen will appear .
11 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually .
12 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode , go to Step 5 no w . If you chose Ad-Hoc Mode , the Ad-Hoc Mode Settings screen will appear .
13 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter Authentication -The default is set to Auto , so it will auto-detect for Shared Key or Open System authentication.
14 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A Enterprise WP A Enterprise features WP A security used in coordination with a RADIUS ser ver . (This shou ld only be used when a RADIUS server is connected to the Router .
15 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS serv er . (This should only be used when a RADIUS server is connected to the Router .
16 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .
17 Chapter 4: Setting up and Conn ecting the Wireless-N Business Notebook Adapter Setting up the Adapter Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mut ual authentication method that uses a user name and password based system.
18 Chapter 5: Using the Wireless Network Monito r Accessing the Wireless Network Monitor Wireless-N Business Notebook Adapter Chapter 5: Using the Wireless Network Monitor Use the Wireless Network Mon.
19 Chapter 5: Using the Wireless Network Monito r Link Information Wireless-N Business Notebook Adapter Status Click the Statu s tab to view the Wireless Network Status screen. The Status scr een p rovides information on your current network settings.
20 Chapter 5: Using the Wireless Network Monito r Link Information Wireless-N Business Notebook Adapter Statistics The Statistics screen provides statistics on your current network settings. T ransmit Rate - This is the d ata transfer rate of the current connection.
21 Chapter 5: Using the Wireless Network Monito r Profiles Wireless-N Business Notebook Adapter Profiles The Profiles screen lets you save different configuration profiles for different network setups. The table on the left displays a list of available profiles with their profile names and SSIDs.
22 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Create a New Pr ofile The next screen to appear will be the Av ailable Wireless Network screen. This screen provides two options for setting up the Adapter .
23 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WEP Key - The WEP key you enter must match the WEP key of your wireless network. For 64-bit encryption, enter exactly 10 hexadecimal characters.
24 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Manual Setup If your network is not listed with the available networks, you can use Manual Setup. 1. Click Manual Setup on the Available Wireless Network screen to set up the adapter manually .
25 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter 4. If you chose Infrastructure Mode , go to Step 5 no w . If you chose Ad-Hoc Mode , the Ad-Hoc Mode Settings screen will appear . Select the correct operating channel for your wireless network.
26 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter Authentication -The default is set to Auto , so it will auto-detect for Shared Key or Open System authentication. For Shared Key authentication, both the sender and the recipient share a WEP key for authentication.
27 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WP A Enterprise WP A Enterprise features WPA security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is con nected to the Router .
28 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is con nected to the Router .
29 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP .
30 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutu a l authentication method that uses a username and password based system. Login method - Select the login method your network is using , Manual Login or Windows Login .
31 Chapter 5: Using the Wireless Network Monito r Create a New Profile Wireless-N Business Notebook Adapter 6. The Confirm New Settings screen will appear next and show the new settings. T o save the new settings, click the Save button. T o edit the new settings, click the Back button.
32 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter Editing a Profile Select the profile that you would like to edit in the profile list and click on Edit button. The next screen would be the Wireless Mode .
33 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter 3. If your wireless network doesn’t have wireless security , select Disabled and then click the Next button to continue .
34 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A Personal WP A Personal offers two encr yption methods, TKIP and AES, with dynamic encryption keys. WPA2 only uses AES for encryption. Select TKIP or AES for encryption for WPA Personal.
35 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A Enterprise WP A/WP A2 Enterprise features WPA security used in coordination with a RADIUS server . (This should only be used when a RADIUS server is connecte d to the Router .
36 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter WP A2 Enterprise WP A2 Enterprise features WP A2 security used in coordination with a RADIUS serv er . (This should only be used when a RADIUS server is connected to the Router .
37 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter RADIUS RADIUS features use of a RADIUS server . (This should only be used when a RADIUS server is connected to the Router .) RADIUS offers two aut hentication types: EAP-TLS and PEAP .
38 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter LEAP Lightweight Extensible Authentication Protocol is a mutual authentication method t hat uses a user name and password based system. Login met hod - Select the login method your network is using, Manual Login or Windows Login .
39 Chapter 5: Using the Wireless Network Monito r Editing a Profile Wireless-N Business Notebook Adapter 5. The Confirm New Settings screen will appear next and show the new settings. T o save the new settings, click the Sav e button. T o edit the new settings, click the Back button.
40 Chapter 5: Using the Wireless Network Monito r Site Survey Wireless-N Business Notebook Adapter Figure 5-40: Site Survey Site Survey The Site Sur vey screen displays a list of av ailable networks in the table o n the left. The table shows each network’ s SSID , Channel, and the quality of the wireless signal the Adapter is receiving.
41 Chapter 5: Using the Wireless Network Monito r Troubleshooting Wireless-N Business Notebook Adapter T roubleshooting The T roubleshooting screen lets you troubleshoot your wireless connection. Address T ype - This shows the addressing method of your client.
42 Chapter 5: Using the Wireless Network Monito r Administration Wireless-N Business Notebook Adapter Log in as the Access P oint's administrator: Enter the Access Point's administrative account and password and retype the password in the confirm field (default account name is admin and password is admin ).
43 Chapter 5: Using the Wireless Network Monito r Administration Wireless-N Business Notebook Adapter Security Monitor Account The Security Monitor Account screen provides you with the function to create and modify your Security Monitor account.
44 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Accessing the Wireless Network Monitor Wireless-N Business Notebook Adapter Chapter 6: The Administrative Functions in the W.
45 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Classification The Classification screen displays a summary o f classified devices. The table shows the number of access points and clients classified as trusted and untrusted by MAC addr esses in your networks.
46 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Client Classification The Cli ent Classification Screen lets you classify the existing wir eless clients into truste d networks and untrusted networks.
47 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Allowed SSID Configuration The Allowed SSID table shows the SSID of the allowed AP on your network. APs from SSIDs not on the allowed SSIDs list will be automatically classified as untrusted.
48 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Classification Wireless-N Business Notebook Adapter Allowed Channel Configuration The Allowed Cha nnel Configuration shows the allowed channels for using in your wireless networks.
49 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Security Monitor The Security Monitor screen displays the statistics of your wirele ss network and alerts you of network activity .
50 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Client Inventory The Client Inventory screen provides statistics of T ru sted, Un trusted, and Unknown Clients. The pie chart shows the percentage and number of each wireless client’ s classifi cation.
51 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Alert Information The alert informa tion screen shows the detailed message of each alert event. Message - This indicates the description of the event.
52 Chapter 6: The Administrative Fun ctions in the Wireless Network Monitor Security Monitor Wireless-N Business Notebook Adapter Advice The Advice scr een shows the advice message of each alert event. Y ou may adjust your wireless network settings according to the advice to better protect your networks.
53 Appendix A: Troublesh ooting Common Problems and So lutions Wireless-N Business Notebook Adapter Appendix A: Troubleshooting This appendix consists of two parts: “Common Problems and Solutions” and “F requently Asked Questions.
54 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter Frequently Ask ed Questions Can I run an ap plication from a remote computer over the wireless network? This will depend on whether or not the application is des igned to be used over a network.
55 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter What IEEE 802.11g feat ures ar e suppo rted? The product supports the following IEEE 802.
56 Appendix A: Troublesh ooting Frequently Asked Questions Wireless-N Business Notebook Adapter What is ISM b and? The FCC and their counterparts outside of the U.S . have set aside bandwidth for unlicensed use in the ISM (Industrial, Scientific and Medical) band.
57 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter Appendix B: Windows XP Wireless Zero Configuration Windows XP Wireless Zer o Configuration If your computer is running Windows XP , then this c hoice will be available .
58 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter 2. The screen that appears will show any available wirele ss network. Select the network you w ant. Click the Connect button. If your network does not have wireless security enabled, go to step 3.
59 Appendix B: Windows XP Wireless Zero Configuratio n Wireless-N Business Notebook Adapter 4. If your network uses wireless security WEP , enter the WEP Key used into the Network Key and Confir m network key fields. If your network uses wireless security WP A Personal, enter the Passphrase used into the Network Key and Confirm network key fields.
60 Appendix C: Wireless-N In teroperability Wireless-N Business Notebook Adapter Appendix C: Wireless-N Interoperabilit y There may be communication problems between some Linksys draft 802.11n (Wireless-N) products and Linksys Business Series draft 802.
61 Appendix D: Wireless Security Security Precautions Wireless-N Business Notebook Adapter Appendix D: Wireless Securit y Linksys wants to make wir eless networking as safe and easy for you as possible.
62 Appendix D: Wireless Security Security Threats Facing Wireless Netwo rks Wireless-N Business Notebook Adapter 1. Disable Broadcast 2. Make it unique 3. Change it often Most wireless networking devices will give you the optio n of broadcasting the SSID .
63 Appendix D: Wireless Security Security Threats Facing Wireless Netwo rks Wireless-N Business Notebook Adapter WP A-P ersonal . If you do not have a RADIUS server , Select the type of algorithm, TKIP or AES, and enter a password in the Passphrase field of 8-63 char acters.
64 Appendix E: Windows Help Wireless-N Business Notebook Adapter Appendix E: Windows Help All wireless products require Microsoft Windows. Windows is the most used operating system in the world and comes with many features that help make networking easier .
65 Appendix F: Glossary Wireless-N Business Notebook Adapter Appendix F: Glossar y This glossary contains som e basic networking terms you may come across when using this product. For more advanced terms, see the complete Linksys glossary at http://www .
66 Appendix F: Glossary Wireless-N Business Notebook Adapter DMZ ( D e m ilitarized Z one) - Removes the Router's firewall protection from one PC, allowing it to be "seen" from the Internet. DNS ( D omain N ame S erver) - The IP address of your ISP's server , which translates the names of websites into IP addresses.
67 Appendix F: Glossary Wireless-N Business Notebook Adapter Intrusion attack - A type of inte rnet attacks in which an attacker tries to gain or access the information transimitted through the networks. IP ( I nternet P rotocol) - A protocol used to send data over a network.
68 Appendix F: Glossary Wireless-N Business Notebook Adapter PPTP ( P oint-to- P oint T u nneling P rotocol) - A VPN protocol that allows t he Point to Point Protocol (PPP) to be tunneled through an IP network. This protocol is also used as a type of broadband connection in Europe .
69 Appendix F: Glossary Wireless-N Business Notebook Adapter TCP/IP ( T ransmission C ontrol P rotocol/ I nternet P rotocol) - A set of instructions PCs use to commu nicate over a network. Te l n e t - A user command and TCP/IP proto col used for accessing remote PCs.
70 Appendix G: Specification s Wireless-N Business Notebook Adapter Appendix G: Specifications Standards Draft IEEE802.11n, IEEE802.11g , IEEE802.11b , 802.1x (Security Authentication), (802.1i) Channels 802.11b/802.11g/Wireless-N (20MHz/40MHz) 11 Channels (USA, Canada) 13 Channels (Europe) LEDs Power , Link/Act Protocols 802.
71 Appendix G: Specification s Wireless-N Business Notebook Adapter Dimensions 4.88" x 0.53" x 2.13 " (124 mm x 13.5 mm x 54 mm) Unit Weight 1.76 oz (0.05 kg) Certifications FCC, WHQL Operating T emp. 32ºF to 140ºF (0ºC to 60ºC) Storage T emp.
72 Appendix H: Warranty Informat ion Wireless-N Business Noteb ook Adapter Appendix H: Warrant y Information LIMITED WARRANTY Linksys warrants to Y ou that, for a period of th ree y ears (the “Warranty Period”), your Linksys Product will b e substantially free of defects in materials and workmanship under normal use .
73 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter Appendix I: Regulator y Information FCC Statement This product has been tested and complies with the specifications fo r a Class B digital device , pursuant to Part 15 of the FCC Rules.
74 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter User Information for Consumer Products Covered by EU Directive 2002/96/EC on Waste Electric and Electronic Equipment (WEEE) This document contains importa nt information for users with regards to the proper disposal and recycling of Linksys products.
75 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter.
76 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter.
77 Appendix I: Regulatory Informa tion Wireless-N Business Noteb ook Adapter.
78 Appendix I: Regulato ry Information Wireless-N Business Notebook Adapter For more information, visit www .linksys.com..
79 Appendix J: Contact Informa tion Wireless-N Business Noteb ook Adapter Appendix J: Contact Information Need to contact Linksys? Visit us online for information on the latest products and updates to your existing products at: http://www .linksys.com or ftp.
Een belangrijk punt na aankoop van elk apparaat Linksys WPC4400N (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Linksys WPC4400N heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Linksys WPC4400N vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Linksys WPC4400N leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Linksys WPC4400N krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Linksys WPC4400N bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Linksys WPC4400N kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Linksys WPC4400N . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.