background image

Model No.

Model No.

USER GUIDE

BUSINESS SERIES

Model No.

Model No.

Wireless-N Access Point 

with Ports

Model No. WAP4400N

4-portuter

with Power Over Ethernet

Wireless

Summary of Contents for WAP4400N

Page 1: ...Model No Model No USER GUIDE BUSINESS SERIES Model No Model No Wireless N Access Point with Ports Model No WAP4400N 4 portuter with Power Over Ethernet Wireless ...

Page 2: ... definitions for technical terms that are presented like this Also each figure diagram screenshot or other image is provided with a figure number and description like this Figure numbers and descriptions can also be found in the List of Figures section This exclamation point means there is a caution or warning and is something that could damage your property or the Access Point word definition Thi...

Page 3: ... Overview 11 Connection 11 Placement Options 12 Chapter 5 Setting Up the Wireless N Access Point 13 Overview 13 Accessing the Utility 13 Navigating the Utility 14 Chapter 6 Configuring the Wireless N Access Point 16 The Setup Basic Setup Tab 16 The Setup Time Tab 17 The Wireless Basic Wireless Settings Tab 18 The Wireless Wireless Security Tab 20 The Wireless Wireless Connection Control Tab 24 The...

Page 4: ...tem Performance Tab 37 Appendix A Troubleshooting 39 Frequently Asked Questions 39 Appendix B Wireless Security 44 Security Precautions 44 Security Threats Facing Wireless Networks 44 Appendix C Upgrading Firmware 47 Appendix D Windows Help 48 Appendix E Glossary 49 Appendix F Specifications 54 Appendix G Warranty Information 56 Appendix H Regulatory Information 57 Appendix I Contact Information 6...

Page 5: ...igure 6 3 Setup Time 17 Figure 6 4 Wireless Basic Wireless Settings 18 Figure 6 5 Pop up message on Auto Channel Selection 18 Figure 6 6 Wireless Wireless Security Disabled 20 Figure 6 7 Wireless Wireless Security WPA Personal 20 Figure 6 8 Wireless Wireless Security WPA2 Personal 21 Figure 6 9 Wireless Wireless Security WPA2 Personal Mixed 21 Figure 6 10 Wireless Wireless Security WPA Enterprise ...

Page 6: ...Log 30 Figure 6 20 Administration Factory Default 32 Figure 6 21 Administration Firmware Upgrade 32 Figure 6 22 Administration Reboot 33 Figure 6 23 Administration Config Management 34 Figure 6 24 Status Local Network 35 Figure 6 25 Status Wireless 36 Figure 6 26 Status System Performance 37 Figure C 1 Firmware Upgrade 47 ...

Page 7: ...bles which is why the network is called wired PCs equipped with wireless client cards or adapters can communicate without cumbersome cables By sharing the same wireless settings within their transmission radius they form a wireless network This is sometimes called a WLAN or Wireless Local Area Network The Access Point bridges wireless networks of 802 11n 802 11g and 802 11b standards and wired net...

Page 8: ...t This chapter explains how to perform the most basic setting changes through the Web based Utility Chapter 6 Configuring the Wireless G Exterior Access Point This chapter provides a reference for the available configuration through the Web based Utility Appendix A Troubleshooting This appendix describes some frequently asked questions regarding installation and use of the Wireless G Exterior Acce...

Page 9: ...ranty Information This appendix supplies the Access Point s warranty information Appendix H Regulatory Information This appendix supplies the Access Point s regulatory information Appendix I Contact Information This appendix provides contact information for a variety of Linksys resources including Technical Support ...

Page 10: ...gnal at higher power to the wireless space Roaming Infrastructure mode also supports roaming capabilities for mobile users Roaming means that you can move your wireless PC within your network and the access points will pick up the wireless PC s signal providing that they both share the same wireless network SSID and wireless security settings This Access Point has 802 11F Inter Access Point Protoc...

Page 11: ...nnect the Access Point s Ethernet network port to any switch or router with Power over Ethernet PoE or a PoE injector such as the Linksys WAPPOE or WAPPOE12 Note that the 12 VDC on the WAPPOE12 is for the splitter output Both PoE Injectors provide 48 VDC power output With these and many other Linksys products your networking options are limitless Go to the Linksys website at www linksys com for mo...

Page 12: ...k setup The wireless Access Points are connecting to a Linksys switch that provides power to the Access Points Each Access Point can connect multiple wireless devices to the network This network will provide connectivity among wireless network devices and PCs that have a wired connection to the switch The switch then can connect to a router that can connect to an ISP to reach global Internet ...

Page 13: ...o Know the Wireless G Exterior Access Point The LEDs The Access Point s LEDs where information about network activity is displayed are located on the front panel Power Green The Power LED lights up when the Access Point is powered on PoE Green The PoE LED lights up when the Access Point is powered through Ethernet cable Figure 3 1 Front Panel ...

Page 14: ...receiving data from a wireless device ETHERNET Green The ETHERNET LED lights up when the Access Point is successfully connected to a device through the Ethernet network port If the ETHERNET LED is flashing the Access Point is actively sending to or receiving data from one of the devices over the Ethernet network port The Ports The Access Point s port are located on the back of the device port the ...

Page 15: ...int s Web based Utility Antennas and Positions The Access Point s port are located on the back of the device The Access Point can be placed in three different positions It can be either stackable standalone or wall mount Antenna The Access Point has three non detachable 2dBi omni directional antennas The three antennas have a base that can rotate 90 degrees when in the standing position The three ...

Page 16: ...10 Chapter 3 Getting to Know the Wireless G Exterior Access Point Antennas and Positions Wireless N Access Point with Power Over Ethernet Figure 3 4 Standalone Position and its Antenna Setup ...

Page 17: ...work router or switch Then connect the other end of the network cable to the Access Point s Ethernet port 2 If you are using Power Over Ethernet POE proceed to the following section Placement Options If you are not using POE then connect the included power adapter to the Access Point s Power port Then plug the power adapter into an electrical outlet The LEDs on the front panel will light up as soo...

Page 18: ...d upward until it snaps into place Repeat this step with the other stand Now that the hardware installation is complete proceed to Chapter 5 Setting up the Wireless N Access Point for directions on how to set up the Access Point Wall Mount Option 1 On the Access Point s back panel are two criss cross wall mount slots 2 Determine where you want to mount the Access Point and install two screws that ...

Page 19: ...he Wireless screen change default SSID under the Basic Wireless Settings Tab Select the level of security under the Wireless Security Tab and complete the options for the selected security mode Accessing the Utility There are three ways to connect to your Access Point for the first time 1 If you have a 48VDC Power Injector e g Linksys WAPPOE power up your Access Point first then connect the Inject...

Page 20: ...Point to the desired network You will have to use the new IP address the next time you access the Web based Utility Navigating the Utility The Web based Utility consists of the following five main tabs Setup Wireless Security Monitor Administration and Status Additional screens sub tabs will be available from most of the main tabs The following briefly describes the main sub tabs of the Utility Se...

Page 21: ...actory Default Use this screen to reset the Access Point to its factory default settings Firmware Upgrade Upgrade the Access Point s firmware on this screen Reboot Use this screen to reboot the Access Point Config Management You can save the configuration file for the Access Point to your PC as well as restore the backup configuration file to the Access Point Status You will be able to view status...

Page 22: ...evice name is for the benefit of identifying your Access Point after you log in Host Name This is the host name assigned to the Access Point This host name will be published to your DNS server if the Access Point is configured to acquire the IP address through DHCP In that case Linksys recommends to follow the company policy on the host name assignment The default name is Linksys Device Name You m...

Page 23: ...t time setting can help the administrator to search the system log to identify problems Time You can set the time either manually or automatically from a time server if the Access Point can access the public Internet Manually Select this radio button to set the date and time manually The default is to set the time manually Automatically Select this option and time zone The Access Point will contac...

Page 24: ...ected in this mode N Only Only Wireless N client devices can be connected at Wireless N data rates with maximum speed at 300Mbps B G Mixed Both Wireless B and Wireless G client devices can be connected at their respective data rates Wireless N devices can be connected at Wireless G data rates G N Mixed Both Wireless G and Wireless N client devices can be connected at their respective data rates Wi...

Page 25: ... make sure that you disable it when you are finished With this enabled someone could easily obtain the SSID information with site survey software or Windows XP and gain unauthorized access to your network Click Enabled to broadcast the SSID to all wireless devices in range Click Disabled to increase network security and prevent the SSID from being seen on networked PCs The default is Enabled in or...

Page 26: ...ecurity for the Access Point refer to Appendix B Wireless Security To disable wireless security completely select Disabled The default is Disabled Wireless Isolation within SSID When disabled wireless PCs that are associated to the same network name SSID can see and transfer files between each other By enabling this feature Wireless PCs will not be able to see each other This feature is very usefu...

Page 27: ... security mode supports the transition from WPA Personal to WPA2 Personal You can have client devices that use either WPA Personal or WPA2 Personal The Access Point will automatically choose the encryption algorithm used by each client device WPA Algorithms Mixed Mode automatically chooses TKIP or AES for data encryption WPA Shared Key Enter a WPA Shared Key of 8 63 characters Key Renewal Timeout ...

Page 28: ...rver Key Renewal Timeout Enter a Key Renewal Timeout period which instructs the Access Point how often it should change the encryption keys The default is 3600 seconds WPA2 Enterprise This option features WPA2 used in coordination with a RADIUS server for client authentication This should only be used when a RADIUS server is connected to the Access Point RADIUS Server IP Address Enter the RADIUS s...

Page 29: ...mended now due to its weak security protection Users are urged to migrate to WPA or WPA2 Authentication Type Choose the 802 11 authentication type as either Open System or Shared Key The default is Open System Default Transmit Key Select the key to be used for data encryption WEP Encryption Select a level of WEP encryption 64 bits 10 hex digits or 128 bits 26 hex digits Passphrase If you want to g...

Page 30: ... connect to the Access Point The client devices are specified by their MAC addresses The default is to allow only specific client devices Wireless Client List Instead of manually entering the MAC addresses of each client the Access Point provides a convenient way to select a specific client device from the client association table Click this button and a window appears to let you select a MAC addr...

Page 31: ...ts This option provides rate limiting on Wireless B connections Wireless B clients can be limited to data rate specified by IEEE 802 11b The default is Auto Tx Rate Limiting 11g clients This option provides rate limiting on Wireless G connections Wireless G clients can be limited to data rates specified by IEEE 802 11g and 802 11b The default is Auto Tx Rate Limiting 11n clients This option provid...

Page 32: ...he Access Point address the Broadcast destination addresses a time stamp Delivery Traffic Indicator Maps and the Traffic Indicator Message TIM The default is 100 ms DTIM Interval This value indicates how often the Access Point sends out a Delivery Traffic Indication Message DTIM Lower settings result in more efficient networking while preventing your PC from dropping into power saving sleep mode H...

Page 33: ...k If you don t plan to use the client utility to actively monitor your network you can disable this feature to improve your wireless network performance The default is Disabled Security Monitor Accounts The section allows the system administrator to create accounts for the purpose of wireless security monitoring You can create one account at a time The administrator will be able to use his WPC4400...

Page 34: ...s admin Re enter to confirm To confirm the new password enter it again in this field Web Access To increase the security on accessing the Web based Utility you can enable HTTPS Once enabled users need to use https when accessing the Web based Utility Web HTTPS Access The default is Disabled Wireless Web Access Allow or deny wireless clients to access Web based Utility The default is Enabled SNMP S...

Page 35: ... encryption on administrator s management traffic Get Community Enter the password that allows read only access to the Access Point s SNMP information The default is public Set Community Enter the password that allows read write access to the Access Point s SNMP information The default is private SNMP Trap Community Enter the password required by the remote host computer that will receive trap mes...

Page 36: ...fault is 600 seconds 10 minutes Syslog Notification Syslog is a standard protocol used to capture information about network activity The Access Point supports this protocol and sends its activity logs to an external server To enable Syslog select Enabled The default is Disabled Syslog Server IP Address Enter the IP address of the Syslog server In addition to the standard event log the Access Point...

Page 37: ...log system error messages click the checkbox Configuration Changes If you want to log any configuration changes click the checkbox Change these settings as described here and click Save Settings to apply your changes or click Cancel Changes to cancel your changes Help information is displayed on the right hand side of the screen and click More for additional details ...

Page 38: ...ht hand side of the screen The Administration Firmware Upgrade Tab On this screen you can upgrade the Access Point s firmware Do not upgrade the firmware unless you are experiencing problems with the Access Point or the new firmware has a feature you want to use Firmware Upgrade Before you upgrade the Access Point s firmware note all of your custom settings After you upgrade its firmware you will ...

Page 39: ... the Access Point Reboot This feature is useful when you need to remotely reboot the Access Point Device Reboot To reboot the Access Point click the Yes radio button Click Save Settings to apply your change and the Access Point will reboot itself or click Cancel Changes to cancel your change Help information is displayed on the right hand side of the screen Figure 6 22 Administration Reboot ...

Page 40: ...load or download configuration files for the Access Point Save Configuration To save a backup configuration file on a computer click the Save Configuration to File button and follow the on screen instructions Restore Configuration To upload a configuration file to the Access Point enter the location of the configuration file in the field provided or click the Browse button to find the file Then cl...

Page 41: ...ersion This is the version of the Access Point s current software Local MAC Address The MAC address of the Access Point s Local Area Network LAN interface is displayed here System Up Time This is the length of time the Access Point has been running Local Network IP Address This shows the Access Point s IP Address as it appears on your local network Subnet Mask This shows the Access Point s Subnet ...

Page 42: ...twork s Wireless Network MAC Address The MAC Address of the Access Point s wireless interface is displayed here SSID The Access Point s SSID is displayed here Mode The Access Point s wireless network mode is displayed here Channel The Access Point s Channel setting for the SSID is shown here To update the status information click the Refresh button Help information is displayed on the right hand s...

Page 43: ... the number of packets received Packets Sent This shows the number of packets sent Bytes Received This shows the number of bytes received Bytes Sent This shows the number of bytes sent Error Packets Received This shows the number of error packets received Drop Received Packets This shows the number of packets being dropped after they were received Wireless Name This indicates the wireless network ...

Page 44: ...reless network Bytes Sent This shows the number of bytes sent for each wireless network Error Packets Received This shows the number of error packets received for each wireless network Drop Received Packets This shows the number of packets being dropped after they were received To update the status information click the Refresh button Help information is displayed on the right hand side of the scr...

Page 45: ...ntation for more information What is the IEEE 802 11b standard It is one of the IEEE standards for wireless networks The 802 11b standard allows wireless networking hardware from different manufacturers to communicate provided that the hardware complies with the 802 11b standard The 802 11b standard states a maximum data transfer rate of 11Mbps and an operating frequency of 2 4GHz What is the IEEE...

Page 46: ...puter user to communicate continuously while moving freely throughout an area greater than that covered by a single Access Point Before using the roaming function the workstation must make sure that it is set to the same channel number as the Access Point of the dedicated coverage area To achieve true seamless connectivity the wireless LAN must incorporate a number of different functions Each node...

Page 47: ...e background noise There are two main alternatives Direct Sequence Spread Spectrum DSSS and Frequency Hopping Spread Spectrum FHSS What is DSSS What is FHSS And what are their differences Frequency Hopping Spread Spectrum FHSS uses a narrowband carrier that changes frequency in a pattern that is known to both transmitter and receiver Properly synchronized the net effect is to maintain a single log...

Page 48: ...or about ten seconds This will reset the unit to its default settings How do I resolve issues with signal loss There is no way to know the exact range of your wireless network without testing Every obstacle placed between an Access Point and wireless PC will create signal loss Leaded glass metal concrete floors water and walls will inhibit the signal and reduce range Start with your Access Point a...

Page 49: ...roubleshooting Frequently Asked Questions Wireless N Access Point with Power Over Ethernet No more than 63 but this depends on the volume of data and may be fewer if many users create a large amount of network traffic ...

Page 50: ...erformance 7 Change the WEP encryption keys periodically To ensure network security steps one through five should be followed at least Security Threats Facing Wireless Networks Wireless networks are easy to find Hackers know that in order to join a wireless network wireless networking products first listen for beacon messages These messages can be easily decrypted and contain much of the network s...

Page 51: ...ccess to only those wireless nodes with certain MAC Addresses This makes it harder for a hacker to access your network with a random MAC Address WEP Encryption Wired Equivalent Privacy WEP is often looked upon as a cure all for wireless security concerns This is overstating WEP s ability Again this can only provide enough security to make a hacker s job more difficult There are several ways that W...

Page 52: ...tion System for stronger data encryption WPA2 Personal If you do not have a RADIUS server enter a password in the Pre Shared key field of 8 63 characters and enter a Group Key Renewal period time between 0 and 99 999 seconds which instructs the AP or other device how often it should change the encryption keys WPA2 Enterprise WPA2 used in coordination with a RADIUS server This should only be used w...

Page 53: ...firmware upgrade file from the Linksys website www linksys com 2 Extract the firmware upgrade file on your computer 3 Open the Access Point s Web based Utility 4 Click the Administration tab 5 Click the Upgrade Firmware tab 6 On the Firmware Upgrade screen enter the location of the firmware upgrade file in the field provided or click the Browse button to find the file 7 Click the Upgrade button an...

Page 54: ...structions or protocol all PCs follow to communicate over a network This is true for wireless networks as well Your PCs will not be able to utilize wireless networking without having TCP IP enabled Windows Help provides complete instructions on enabling TCP IP Shared Resources If you wish to share printers folder or files over your network Windows Help provides complete instructions on utilizing s...

Page 55: ...t a device and cause it to start executing instructions Broadband An always on fast Internet connection Browser An application program that provides a way to look at and interact with all the information on the World Wide Web Byte A unit of data that is usually eight bits long Cable Modem A device that connects a computer to the cable television network which in turn connects to the Internet Daisy...

Page 56: ...ork Ethernet IEEE standard network protocol that specifies how data is placed on and retrieved from a common transmission medium Firewall A set of related programs located at a network gateway server that protects the resources of a network from users from other networks Firmware The programming code that runs a networking device FTP File Transfer Protocol A protocol used to transfer files over a ...

Page 57: ...haring storage and or transmission between users Packet A unit of data sent over a network Passphrase Used much like a password a passphrase simplifies the WEP encryption process by automatically generating the WEP encryption keys for Linksys products Ping Packet INternet Groper An Internet utility used to determine whether a particular IP address is online POP3 Post Office Protocol 3 A standard m...

Page 58: ...less network s name Static IP Address A fixed address assigned to a computer or device that is connected to a network Static Routing Forwarding data in a network via a fixed path Subnet Mask An address code that determines the size of the network Switch 1 A data switch that connects computing devices to host computers allowing a large number of devices to share a limited number of ports 2 A device...

Page 59: ...r The address of a file located on the Internet VPN Virtual Private Network A security measure to protect data as it leaves one network and goes to another over the Internet WAN Wide Area Network The Internet WEP Wired Equivalent Privacy A method of encrypting network data transmitted on a wireless network for greater security WLAN Wireless Local Area Network A group of computers and associated de...

Page 60: ...2VDC Power Buttons Reset Cabling Type UTP CAT 5 LEDs Power PoE Ethernet Wireless Transmit Power 19 dBm for 802 11b 16 dBm for 802 11g 802 11n Security Features WEP WPA WPA2 RADIUS WEP Key Bits 64 128 Dimensions 7 8 x 5 16 x 7 8 in W x H x D 198 mm x 131 mm x 198 mm Unit Weight 13 4 oz 380 g Power IEEE802 3af Compliant PoE Certifications FCC IC 03 CE Operating Temp 0ºC to 40ºC 32ºF to 104ºF Storage...

Page 61: ...55 Appendix F Specifications Wireless N Access Point with Power Over Ethernet Operating Humidity 10 to 85 Non Condensing Storage Humidity 5 to 90 Non Condensing ...

Page 62: ...PRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF NON INFRINGEMENT ARE DISCLAIMED Some jurisdictions do not allow limitations on how long an implied warranty lasts so the above limitation may not apply to You This warranty gives You specific legal rights and You may also have other rights which vary by jurisdiction This warranty does not apply if the Product a has been altered except ...

Page 63: ...t the equipment to an outlet other than the receiver s Consult a dealer or an experienced radio TV technician for assistance FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator and your body This transmitter must not be co...

Page 64: ...s aux conditions suivantes 1 Ce périphérique ne doit pas causer d interférences 2 Ce périphérique doit accepter toutes les interférences reçues y compris celles qui risquent d entraîner un fonctionnement indésirable User Information for Consumer Products Covered by EU Directive 2002 96 EC on Waste Electric and Electronic Equipment WEEE This document contains important information for users with re...

Page 65: ...59 Appendix H Regulatory Information Wireless N Access Point with Power Over Ethernet ...

Page 66: ...60 Appendix H Regulatory Information Wireless N Access Point with Power Over Ethernet ...

Page 67: ...61 Appendix H Regulatory Information Wireless N Access Point with Power Over Ethernet ...

Page 68: ...62 Appendix H Regulatory Information Dual Band Wireless Access Point For more information visit www linksys com ...

Page 69: ...about networking with Linksys products Give our advice line a call at 800 546 5797 LINKSYS Or fax your request in to 949 823 3002 If you experience problems with any Linksys product you can call us at 800 326 7114 Don t wish to call You can e mail us at support linksys com If any Linksys product proves defective during its warranty period you can call the Linksys Return Merchandise Authorization d...

Reviews: