Home

ZyXEL ZyAIR G-360 User's Manual

image

Contents

1. M 1 1 LT About YOURGES BOE A A EO EE vi 1 1 1 27 Syntax ET OE A EE EE a sac 1 1 1 3 Graphics Teons Key soete EE 1 2 ED SE Ie EA Weiss EE EE EE ceri e re ie 1 2 1 4 1 Infrastr ct re N ER On De RO ith EE e 1 2 1 4 2 Ee liar EE KA gH dete 1 3 1 5 G 360 Hardware and Utility Installation eee 1 3 L6 Confieurdtion Methods usate dove RE EE cte bei sos sone 1 3 I Accessing the ZoXEL BG EE EE dide e eee inte leen 1 4 1 7 1 ZyXEL Utility Screen Summary esses eee eene nennen nennen 1 4 1 8 Network Connection Methods s eet eie t 1 5 1 8 1 Su AVE Y 1 6 1 8 2 Isl AE AE RO EE RE EE Ed 1 8 Chapter 2 Mk OE N EA EE ER ER EE EE N EE EE 2 1 2 1 Transmission Rate Transfer Rate se se Re Ge Re Ge eene Ge ee E ee Ge ee ee 2 1 2 1 1 cn EE ah dose E 2 1 2 2 Configuring the Link Info screen ee Re Ge Re GR GR Ge Re Ge Re GR ee GR Ge Ge Re Ge ee ee 2 1 2 2 1 Trend CHAPE EE AA OR ER EE N NEE GR CN ay don 2 4 Chapter 3 Site SUryey RE E 3 1 3 1 Configuring the Site Survey screen sss eene Ge ee Ge ee GR Ge ee GR ee RA Ge ee 3 1 Chapter 4 Security Settings cc cscissssscssssssesosasesnvs sevsestavosseseauessoscesonss soswesdonssoovsesussosse Ge Ee WE REG Ge ee Ge Ek eke ee d 1 4 1 Wireless LAN SC CV ia 4 1 4 1 1 Data Encryption with WEP se esse esse ee ee ee Ge eene enne nenne nenne nennen nnne 4 1 42 Au
2. order that you specify Refer to the section on ordering the preferred networks for detailed information alll This denotes the signal strength of the wireless network Move your cursor to the icon to see details on the signal strength Windows XP SP1 Click Refresh to reload and search for available wireless devices within transmission range Select a wireless network in the Available networks list click Configure and set the related fields to the same security settings as the associated AP to add the selected network into the Preferred networks table Click OK to join the selected wireless network Refer to the section on security settings discussed later for more information Wireless Network Connection 6 Properties General Wireless Networks Advanced Use Windows to configure my wireless network settings Available networks To connect to an available network click Configure i cpe swi 5275 A cpe 5254 g2kplus Es sj Preferred networks Automatically connect to available networks in the order listed below zw701 A pqa 3225 p334w Learn about setting up wireless network confiquration Diagram 15 Windows XP SP1 Wireless Network Connection Properties P Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Windows XP SP2 If the wireless security is activated for the selected wireless network the Wireless Network Connection screen displays You must set the related
3. Table 5 1 Profile LABEL DESCRIPTION Profile List Click a column heading to sort the entries A triangle indicates ascending or descending sort order T N or cM J ti denotes that the wireless device is in infrastructure mode L denotes that the wireless device is in Ad Hoc mode displays with the previous two icons if the wireless devices are using security Profile Name This is the name of the profile SSID This is the SSID of the wireless network to which the G 360 connects using this profile Connect To use a previously saved network profile select a profile name in the table and click Connect Add To add a new profile into the table click Add Delete To delete an existing wireless network configuration select a profile in the table and click Delete Edit To edit an existing wireless network configuration select a profile in the table and click Edit Profile Info The following field s display detailed information about the selected profile in the Profile List table Network Type This field displays the network type Infrastructure or Ad Hoc of the profile Channel A radio frequency used by a wireless device is called a channel This field displays the channel number used by the profile Security This field shows whether data encryption is activated WEP WPA PSK WPA2 PSK WPA RADIUS WPA2 RADIUS or RADIUS or inactive Disabled 5 1 1 A
4. Technology Setup Key Enter the same setup key of exactly eight ASCII characters as the OTIST enabled AP or wireless router to which you want to associate The default OTIST setup key is 01234567 If you change the OTIST setup key on the OTIST enabled AP you must also make the same change here Start Click Start to encrypt the wireless security data using the setup key and have the OTIST enabled AP set your G 360 to use the same wireless settings as the OTIST enabled AP or wireless router You must also activate and start OTIST on the OTIST enabled AP at the same time The process takes about three minutes to complete Save Click Save to save the changes Adapter 6 5 ZyXEL G 360 User s Guide Chapter 7 Maintenance This chapter describes how to uninstall or upgrade the ZyXEL Utility 7 1 The About Screen The About screen displays related version numbers of the G 360 To display the screen as shown next click the about button ZyXEL Wireless LAN Adapter Utility Copyright C 2004 ZyXEL Communications Corp All rights reserved Security by Odyssey Driver Version 7 0 1 33 Utility Version 3 0 0 10 Figure 7 1 About The following table describes the read only fields in this screen Table 7 1 About LABEL DESCRIPTION Driver Version This field displays the version number of the ZyXEL driver Utility Version This field displays the version number of the
5. Activate Later Figure 1 14 Profile Activate 10 If you clicked Activate Now check the network information in the Link Info screen to see if you have successfully connected to the specified network If the G 360 is not connected to a network the fields in this screen are blank Getting Started ZyXEL G 360 User s Guide Activating a Profile If you have more than one profile you can use one of the pre configured profiles to connect to a wireless network by activating it Follow the steps below to activate a profile Only one profile can be activated and used at any given time 1 Inthe ZyXEL Utility click the Profile tab to open the screen as shown next 2 Select a profile and click Activate to use the selected profile M Linkinfo Site Survey Profile W Adapter Profile List Profile Info Profile Name l SSID T default any Network Type Infrastructure T ex1 test Channel 1 gt ex ZyXEL Security WPA2 PSK Add Delete Edit Figure 1 15 Profile 1 14 Getting Started ZyXEL G 360 User s Guide Chapter 2 Link Info This chapter shows you detailed information about the Link Info screen 2 1 Transmission Rate Transfer Rate The G 360 provides various transmission data rate options for you to select Options include Fully Auto 1 Mbps 2 Mbps 5 5 Mbps 11 Mbps 6 Mbps 9 Mbps 12 Mbps 18 Mbps 22 Mbps 24
6. L1 C amp W HKT SecureNet CA Class A DO C amp W HKT SecureNet CA Class B v lt gt L1 Do not prompt user to authorize new servers or trusted certification authorities Select Authentication Method Secured password EAP MSCHAP v2 vi C Enable Fast Reconnect Diagram 20 Windows XP Protected EAP Properties Management with Wireless Zero Configuration U ZyXEL G 360 User s Guide The following table describes the labels in this screen Chart 6 Windows XP Protected EAP Properties LABEL DESCRIPTION Validate server Select the check box to verify the certificate of the authentication server certificate Connect to Select the check box and specify a domain in the field below to have your computer these servers connect to a server which resides only within this domain Trusted Root Certification Authorities Select a trusted certification authority from the list below You must first have a wired connection to a network and obtain the certificate s from a certificate authority CA Consult your network administrator for more information Do not prompt user to authorize new server or trusted Select this check box to verify a new authentication server or trusted CA without prompting This field is available only if you installed the Windows XP server pack 2 certification authorities Select Select an authentication method from the drop down list
7. Network Name This field displays the name SSID of the wireless network to which the G 360 SSID belongs The SSID Service Set Identity is a unique name shared among all wireless devices in a wireless network Wireless devices must have the same SSID to communicate with each other 2 2 Link Info ZyXEL G 360 User s Guide Table 2 1 Link Info LABEL DESCRIPTION AP MAC Address This field displays the MAC address of the wireless device to which the G 360 is associated Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters for example 00 A0 C5 00 00 02 Network Type This field displays the network type Infrastructure or Ad Hoc of the wireless network Transmission Rate This field displays the current transmission rate of the G 360 in megabits per second Mbps Security This field displays whether data encryption is activated WEP WPA PSK WPA2 PSK WPA RADIUS WPA2 RADIUS or RADIUS or not Disabled Channel This field displays the radio channel the G 360 is currently using A radio frequency used by a wireless device is called a channel Statistics The following fields show the connection status with the associated network If there is no associated wireless network they are blank Transmit Rate This field displays the current data transmission rate in ki
8. Configuration Tool ZyXEL G 360 User s Guide L Wireless Network Connection 7 Properties JE EE General Wireless Networks Advanced Available networks To connect to disconnect from or find out more information about wireless networks in range click the button below View Wireless Networks Preferred networks Learn about setting up wireless network Diagram 9 Windows XP SP2 Wireless Network Connection Properties Disable Windows XP Wireless LAN Configuration Tool ZyXEL G 360 User s Guide Appendix C Management with Wireless Zero Configuration This appendix shows you how to manage your G 360 using the Windows XP wireless zero configuration tool Be sure you have the Windows XP service pack 2 installed on your computer Otherwise you should at least have the Windows XP service pack 1 already on your computer and download the support patch for WPA from the Microsoft web site Windows XP SP2 screen shots are shown unless otherwise specified Click the help icon a in most screens move the cursor to the item that you want the information about and click to view the help Activating Wireless Zero Configuration Make sure the Use Windows to configure my wireless network settings check box is selected in the Wireless Network Connection Properties screen Refer to Appendix B If you see the following screen refer to article 871122 on the Microsoft web site for information on starting WZC i W
9. ZyXEL Utility Troubleshooting 7 1 ZyXEL G 360 User s Guide 7 2 Uninstalling the ZyXEL Utility Follow the steps below to remove or uninstall the ZyXEL Utility from your computer 1 Click Start Programs ZyXEL G 360 802 11g Wireless PCI Card Uninstall 2 When prompted click OK to remove the driver and the utility software Confirm Uninstallation E Do you want to uninstall this application E Cancel Figure 7 2 Confirm Uninstall 3 Restart your computer if prompted 7 3 Upgrading the ZyXEL Utility Before you install the new ZyXEL Utility take note of the current network configuration and uninstall the existing utility on your computer To perform the upgrade follow the steps below 1 Download the latest version of the utility from the ZyXEL web site and save the file on your computer Follow the steps in Section 7 2 to remove the current ZyXEL Utility from your computer Restart your computer if prompted After restarting refer to the procedure in the Quick Start Guide to install the new utility MR IN Check the version numbers in the About screen to make sure the new utility is installed properly 7 2 Troubleshooting ZyXEL G 360 User s Guide Chapter Troubleshooting This chapter covers potential problems and the possible remedies After each problem description some instructions are provided to help you to diagnose and to solve the problem 8 1 Problems Starting the Zy
10. channel and security Infrastructure BSS A Basic Service Set BSS exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point AP Wireless LANs AA ZyXEL G 360 User s Guide t _ Diagram 25 BSS Example A series of overlapping BSS and a network medium such as an Ethernet forms an Extended Service Set ESS or infrastructure network All communication is done through the AP which relays data packets to other wireless clients or devices connected to the wired network Wireless clients can then access resource such as the printer on the wired network a X o N BSS 1 S BSS 2 pace e Sd Diagram 26 Infrastructure Network Example IEEE 802 1x The IEEE 802 1x standard outlines enhanced security methods for both the authentication of wireless clients and encryption key management Authentication can be done using an external RADIUS server EAP Authentication BB Wireless LANs ZyXEL G 360 User s Guide EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE802 1x transport mechanism in order to support multiple types of user authentication By using EAP to interact with an EAP compatible RADIUS server an access point helps a wireless client and a RADIUS server perform authentication The type of authentication you use depends on the RADI
11. chapter discusses how to configure wireless security on the G 360 4 1 Wireless LAN Security Wireless LAN security is vital to protect wireless communications The figure below shows the possible wireless security levels on your G 360 EAP Extensible Authentication Protocol is used for authentication and utilizes dynamic WEP key exchange It requires interaction with a RADIUS Remote Authentication Dial In User Service server either on the WAN or your LAN to provide authentication service for wireless clients Table 4 1 Wireless LAN Security Levels SECURITY LEVEL SECURITY TYPE Least Secure Unique SSID Default Unique SSID with SSID Hidden MAC Address Filtering WEP Encryption IEEE802 1x EAP with RADIUS Server Authentication Wi Fi Protected Access WPA WPA2 IEEE 802 11i Most Secure Configure the wireless LAN security using the Profile Security Settings screen If you do not enable any wireless security on your G 360 the G 360 s wireless communications are accessible to any wireless networking device that is in the coverage area 4 1 1 Data Encryption with WEP WEP Wired Equivalent Privacy encryption scrambles all data packets transmitted between the G 360 and the AP or other peer wireless device to keep them private Both the wireless clients and the access points must use the same WEP key for data encryption and decryption There are two ways to create WEP keys in your G 360 e Automat
12. fields in the Wireless Network Connection screen to the same security settings as the associated AP Refer to Section 0 for more information Otherwise click Cancel and connect to another wireless network without data encryption If there is no security activated for the selected wireless network a warning screen appears Click Connect Anyway if wireless security is not your concern Wireless Network Connection The network cpe_5236 requires a network key also called a WEP key or WPA key A network key helps prevent unknown intruders From connecting to this network Type the key and then click Connect Network key eeeeeeee Confirm network key eeccccee Connect Cancel Diagram 16 Windows XP SP2 Wireless Network Connection WEP or WPA PSK Wireless Network Connection sent over this network is not encrypted and might be visible to other A You are connecting to the unsecured network CPE 5242 Information people Connect Anyway Cancel Diagram 17 Windows XP SP2 Wireless Network Connection No Security Verify that you have successfully connected to the selected network and check the connection status in the wireless network list or the connection icon in the Preferred networks or Available networks list The following table describes the connection icons Chart 3 Windows XP Wireless Networks ICON DESCRIPTION This denotes the wireless network is an available wireless network This denot
13. for more information EAP MD5 Message Digest Algorithm 5 MDS authentication is the simplest one way authentication method The authentication server sends a challenge to the wireless client The wireless client proves that it knows the password by encrypting the password with the challenge and sends back the information Password is not sent in plain text However MDS authentication has some weaknesses Since the authentication server needs to get the plaintext passwords the passwords must be stored Thus someone other than the authentication server may access the password file In addition it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication Finally MD5 authentication method does not support data encryption with dynamic session key You must configure WEP encryption keys for data encryption EAP TLS Transport Layer Security With EAP TLS digital certifications are needed by both the server and the wireless clients for mutual authentication The server presents a certificate to the client After validating the identity of the server the client sends a different certificate to the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable to passive attacks A digital certificate is an electronic ID card that authenticates the sender s identity However to implement EAP TLS you need a Certifi
14. or 802 1x The following table describes the labels in this screen Table 4 4 Security Settings WPA WPA2 or 802 1x FIELD DESCRIPTION Authentication Type Select the authentication method that the RADIUS server uses from the drop down list Options are EAP TLS EAP TTLS and EAP PEAP Login Name Enter a user name This is the user name that is set up on a RADIUS server Password This field is not available when you select EAP TLS in the Authentication Type field Enter the password associated with the login name above 4 6 Security Settings ZyXEL G 360 User s Guide Table 4 4 Security Settings WPA WPA2 or 802 1x FIELD DESCRIPTION Certificate This field is only available when you select EAP TLS in the Authentication Type field Specify the location and name of a certificate in the Certificate field or click Browse to locate it You must first have a wired connection to a network and obtain the certificate s from a certificate authority CA Consult your network administrator for more information Browse This field is only available when you select EAP TLS in the Authentication Type field Click this button to display the Select Certificate screen select a certificate and click OK If you didn t get the certificate first via a wired connection no certificate displays in the Select Certificate screen Validate Server Certificate Select the check box to c
15. to the next screen Click Back to return to the previous screen Otherwise click Exit to go back to the Profile screen without saving Link Info Site Survey Profile Adapter Confirm New Settings gt Network Name SSID test gt Network Type Infrastructure gt Channel Auto gt Security WPAZ PSK 5 8 Profile ZyXEL G 360 User s Guide Step 6 To use this network profile click the Activate Now button Otherwise click the Activate Later button Once you activate a profile the ZyXEL Utility will use that profile the next time it is started p Link Info Site Survey Profile Adapter Your network has been configured successfully Activate Now Activate Later Figure 5 7 Profile Activate the Profile Profile 5 9 ZyXEL G 360 User s Guide Chapter 6 Adapter This chapter discusses OTIST and how to configure the Adapter screen 6 1 Introduction to OTIST In a wireless network the wireless clients must have the same SSID and security settings as the access point AP or wireless router we will refer to both as AP here in order to associate with it Traditionally this meant that you have to configure the settings on the AP and then manually configure the exact same settings on each wireless client OTIST One Touch Intelligent Security Technology allows you to transfer your AP s SSID and WEP or WPA 2
16. types Comparison of EAP Authentication Types EAP MD5 EAP TLS EAP TTLS PEAP LEAP Mutual No Yes Yes Yes Yes Authentication Certificate Client No Yes Optional Optional No Certificate Server No Yes Yes Yes No Dynamic Key No Yes Yes Yes Yes Exchange Credential Integrity None Strong Strong Strong Moderate Deployment Easy Hard Moderate Moderate Moderate Difficulty Client Identity No No Yes Yes No Protection HH Types of EAP Authentication ZyXEL G 360 User s Guide A About en oom teen 7 1 About the ZyXEL Utility sss 7 1 Accessing the ZyXEL Utility 1 4 Activating a Profile esses 1 14 Add a New Profile ee ee ee ee 5 2 Application Overview sse 1 2 Authentication Mode ee ee ee 4 2 O Pin td 4 2 A RE EE EE dya 4 2 Automatic WEP key generation 4 2 C CA OER EE EE an GG Certificate Authority sea se ee See CA Communication Problem Ad hoc IBSS see 8 3 Infrastruct re eee 8 2 Configuration Methods se se ee 1 3 Configuring the Link Info screen 2 2 Connecting to a Network ee ee ee ee ee 1 5 Copyright EERS a il Disclaimer aie eee 11 Trademarks ecc dia 11 Create WEP key with passphrase 4 5 4 6 Customer Support eeeceeceeesteeeeeesteceeeeens 8 3 D Data encryption sie eee 4
17. you can access the Internet or the wired network behind the AP ON Internet Figure 1 1 Infrastructure Example 1 2 Getting Started ZyXEL G 360 User s Guide 1 4 2 Ad Hoc In case you prefer to set up a small independent wireless workgroup without an AP use the Ad Hoc mode Ad hoc mode does not require an AP or a wired network Two or more wireless clients communicate directly to each other Y 1 1 Ad Hoc I i Figure 1 2 Ad Hoc Example To set up an Ad Hoc network configure all wireless clients in Ad Hoc network type and use the same SSID channel and security 1 5 G 360 Hardware and Utility Installation Follow the instructions in the Quick Start Guide to install the ZyXEL Utility and make hardware connections The ZyXEL Utility is a program that lets you configure wireless parameters in the G 360 These parameters must be the same as the access point AP or peer WLAN device that you are connecting with 1 6 Configuration Methods To configure your G 360 use one of the following applications gt ZyXEL Utility This guide shows you how to configure the G 360 using the ZyXEL Utility gt Wireless Zero Configuration WZC recommended for Windows XP In Windows XP you must disable WZC if you want to use the ZyXEL Utility Refer to the appendices on how to deactivate WZC or how to use WZC to manage the G 360 gt Odyssey Client Manager not supplied Refer to the Odyssey Client d
18. 1 REPUBLIC info cz zyxel com 420 241 091 359 143 01 Praha 4 Modrany Ceska Republika CZECH 4 is the prefix number you enter to make an international telephone call Troubleshooting 8 3 ZyXEL G 360 User s Guide SUPPORT E MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E MAIL FTP SITE support zyxel dk 45 39 55 07 00 www zyxel dk ZyXEL Communications A S DENMARK Columbusvej 5 sales zyxel dk 45 39 55 07 07 2860 Soeborg Denmark support zyxel fi www zyxel fi ZyXEL Communications Oy FINLAND Malminkaari 10 sales zyxel fi 358 9 4780 8448 00700 Helsinki Finland info zyxel fr www zyxel fr ZyXEL France 1 rue des Vergers FRANCE Bat 1 C 33 04 72 52 19 20 69760 Limonest France support zyxel de 49 2405 6909 0 www zyxel de ZyXEL Deutschland GmbH GERMANY sales zyxel de 49 2405 6909 99 o ee Germany support zyxel com 1 800 255 4101 www us zyxel com ZyXEL Communications Inc NORTH 1 714 632 0882 1130 N Miller St AMERICA Anaheim sales zyxel com 1 714 632 0858 p us zyxel com CA 92806 2001 U S A pport zyxel no 47 22 80 61 80 www zyxel no ZyXEL Communications A S Nils Hansens vei 13 NORWAY sales zyxel n 47 22 80 61 81 0667 Oslo Norway pport zyxel es 34 902 195 420 www zyxel es ZyXEL Communications Alejandro Villegas 33 SPAIN sales zyxel es 34 913 005 345 1 28043 Madrid Spain support zyxel se 46 31 744 7700 yxel se ZyXEL Communications A S SWEDEN Sj porten 4 41764 G teborg S E upport z
19. 1 E EAP Authentication MDS latent emo egi ne GG Appendix F Index PEAP ti nn ens eg GG 1M EN EE dee LLL SM GG TELS re ettet tret at RE GG Encryption essere CC ESS TAS BB Extended Service Set cesses See ESS F Federal Communications Commission FCC Interference Statement sss iv G CMS ME AE bie Moot aah elite e tisi 2 1 Graphics Icons Key ees 1 2 L LEAP RSA ARE EE EG AE Ge RS e iat HH Lightweight Extensible Authentication Protocol e ae HH M MDI and dad GG Message Digest Algorithm 5 See MD5 Message Integrity Check CC Mita aso See Message Integrity Check N Network Type iese se se RR RA RA RA Re ee AA Ad Hoc IBS S ieena 1 3 AA O One Touch Intelligent Security Technology 6 1 Index ZyXEL G 360 User s Guide Online Registration 111 Troubleshooting sss 8 1 Open authentication mode 4 2 Checking Hardware Conflict 8 1 OTIS E o 6 1 Problem with link status 8 2 Radio interference esses 8 2 P Starting ZyXEL Utility sss 8 1 Troubleshooting jo ees EE AE orders 4 2 Communication problems ese 8 2 PEAP eet renonse tenn soon ee ee RR ee ee ee Re semenn ee ee GG PERS ss ee ee D ed sa GG problem description ee sesse ee Ee ee 8 1 Tunneled Transport Layer Service See TTLS
20. EER e e ER OE lees ten 8 3 Appendix A Product SpecifiCatiONS eereeeeesseeoooosooooooooooovooooooooooooooooonoooooonooonooonooanoonnooonoonnoooooonooeoooenooonon A Appendix B Disable Windows XP Wireless LAN Configuration Tool se ee Ee ee Ee ee C Appendix C Management with Wireless Zero Configuration eereoreeooooooonsonsoonsooosooooooooooooooooonooeononnne K ENXIISnDSUMANICBRNCE AA Appendix E Types of EAP Authentication sees sees sees sees ses sees sees se esse ee ee ee tnn Se Ge tns BRA tassa seta stessa se ee GG Appendix F Index AAA H vi Table of Contents ZyXEL G 360 User s Guide List of Figures Figure l Infrastructure EA bis 1 2 Figure 1 2 Ad Hoc Example iii aci 1 3 Figure 1 3 ZyXEL Utility System Tray Icon esse ese ee se Re Ge Re e Gee Ee ee Ge ee ee ee ee ee ee ee nnns 1 4 Figure 1 4 Screen aA AR RR EE 1 5 Figure 125 US EE AN RE EE EE EE sa 1 6 Figure 1 6 S1ite Survey ECU sa 1 7 Figure ls7 Eike Info eet ee gre 1 7 Er aos 1 8 Figure 129 Profile Add iii RE EE ER EE OE EE a 1 9 Figure 1 10 Profile Channel EE Ee tek n ta De rt DEALER EUER QU E IRURE Rat pas da dan 1 10 Figure 1 1 Profile EtiCtyption sei ere d e OR N EH e oat Ober s 1 11 Figure 1 12 Profile Security nee GER d ettet e t ei m ei Rae 1 12 Figure 1 13 Profile Confirms 2 ese es De D t eire e p patruo ele RU DOR PRU RE don 1 13 Figure 1 14 Profle Activate s ooo tua ee p
21. Mbps 36 Mbps 48 Mbps 54 Mbps and 125 Mbps In most networking scenarios the factory default Fully Auto setting is the most efficient This setting allows your G 360 to operate at the highest possible transmission data rate When the communication quality drops below a certain level the G 360 automatically switches to a lower transmission data rate Transmission at lower data speeds is usually more reliable However when the communication quality improves again the G 360 gradually increases the transmission data rate again until it reaches the highest available transmission rate If you want to select a specific transmission rate select one that the AP or peer wireless device supports 1 Mbps or 2 Mbps are often used in networking environments where the range of the wireless connection is more important than speed Your G 360 can transmit at 22Mbps or up to 125 Mbps when connected to a ZyXEL gt AP or wireless router Actual speeds attained also depend on the distance from the AP noise etc 2 1 1 G plus G plus is an enhancement to the IEEE 802 11g wireless standard G plus combines multiple frames into a larger frame size This increases wireless transmission speeds by allowing larger frames up to 4 KB to be sent G plus speed applies only to unicast traffic not broadcast or multicast G plus is automatically disabled if wireless transmission speeds fall below 11 Mbps 2 2 Configuring the Link Info screen When the Zy
22. PSK security settings to wireless clients that support OTIST and are within transmission range manually You can also choose to have OTIST generate a WPA 2 PSK key for you if you didn t configure one 6 1 1 Enabling OTIST You must enable OTIST on both the AP and wireless client before you start transferring settings The AP and wireless client s MUST use the same Setup Key Wireless Client Link Info Start the ZyXEL Utility and click the Adapter tab Select the OTIST check box enter the same Setup Key as your AP s and click Save Site Survey Profile Adapter Adapter Setting gt Transfer Rate Fully Auto gt Power Saving Mode Disabled w v OTIST One Touch Intelligent Security Technology Setup Key 01234567 Sat A Adapter 6 1 ZyXEL G 360 User s Guide AP You can enable OTIST using the reset button or the web configurator If you use the reset button the default 01234567 or previous saved through the web configurator Setup Key is used to encrypt the settings that you want to transfer Hold in the Reset button for one or two seconds If you hold in the Reset button too long the device will reset to the factory defaults In the web configurator go to the Wireless LAN main screen and then select OTIST To change the Setup Key enter up to eight printable characters To have OTIST automatically generate a WPA 2 PSK key select the Yes check box I
23. Profil ie tete ies 5 1 Protected BAP nette See PEAP U R User Authentication eese DD Related Documentation ssss 8 3 W S Waranty RR EE det ette iii NOUS ER OR EE iii Security Settings E 4 1 WEP Encryption esse esse esse see ee ee ee ee ee ae 4 3 WEP Data Encryption With see se ee 4 1 WPA WPAZ eers RR ER EE RR SEER EER 4 6 WEP GY A GR EES 4 1 WPA PSK WPA2 PSK esee 4 5 Windows XP Requirement sess C Security SENOS vocero t eben seek Uer 4 1 Wired Equivalent Privacy See WEP Shared authentication mode 4 2 Wireless LAN Parameters Site SUIVEYsi tien de dee RORIS 3 1 Network Typ c i eee de AA S SID TEM 5 3 Transfer Rate 2 1 Starting OTIST LS 6 2 Transmission k Rate es 2 1 Syntax Conventions esee 1 1 Wireless LAN Security ee 4 1 Data Encryption with WEP 4 1 T Wireless Network Basics sees C Temporal Key Integrity Protocol CC PADS ici ec The Adapter Screen sss 6 4 WP A PSK ALONE AU ORDRE A MENN DD TKIP an SO Temp ral Key Integrity Erotocol WPA PSK Application DD TES aa ae e e GG Transmission Speed 6 5 Transmission Speeds ssssss 2 1 Z Transport Layer Security See TLS ZyXEL Utility Trend Chart decns ee ki dos Me et A ah 2 4 WPA PSK WPA2 PSK ie 4 5 T
24. US server and an intermediary AP s that supports IEEE802 1x The G 360 supports EAP TLS EAP TTLS and EAP PEAP Refer to the Types of EAP Authentication appendix for descriptions For EAP TLS authentication type you must first have a wired connection to the network and obtain the certificate s from a certificate authority CA A certificate also called digital IDs can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner WPA 2 Wi Fi Protected Access WPA is a subset of the IEEE 802 111 standard WPA 2 IEEE 802 111 is a wireless security standard that defines stronger encryption authentication and key management than WPA Key differences between WPA 2 and WEP are improved data encryption and user authentication Encryption Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol TKIP Message Integrity Check MIC and IEEE 802 1x In addition to TKIP WPA2 also uses Advanced Encryption Standard AES in the Counter mode with Cipher block chaining Message authentication code Protocol CCMP to offer stronger encryption Temporal Key Integrity Protocol TKIP uses 128 bit keys that are dynamically generated and distributed by the authentication server It includes a per packet key mixing function a Message Integrity Check MIC named Michael an extended initialization vector IV with sequencing rules and a re keying mechanism TKIP regularly cha
25. XEL Utility Program Table 8 1 Troubleshooting Starting ZyXEL Utility Program PROBLEM CORRECTIVE ACTION Cannot start the ZyXEL Utility Make sure the G 360 is properly inserted and the LED s is on Refer to the Quick Start Guide for the LED descriptions Use the Device Manager to check for possible hardware conflicts Click Start Settings Control Panel System Hardware and Device Manager Verify the status of the G 360 under Network Adapter Steps may vary depending on the version of Windows Install the G 360 in another computer If the error persists you may have a hardware problem In this case you should contact your local vendor The ZyXEL Utility icon does not display If you install the Funk Odyssey Client software on the computer uninstall remove both the Funk Odyssey Client software and ZyXEL Utility and then install the ZyXEL utility again after restarting the computer If you use the Windows XP configuration tool and the ZyXEL Utility to configure the G 360 at the same time the ZyXEL Utility icon does not display You need to disable the Windows XP configuration tool refer to Appendix B for more information Troubleshooting 8 1 ZyXEL G 360 User s Guide 8 2 Problem with the Link Status Table 8 2 Troubleshooting Link Quality PROBLEM CORRECTIVE ACTION The link quality and or signal strength is poor all the time Search and connect to anoth
26. XEL Utility starts the Link Info screen displays showing the current configuration and connection status of your G 360 You can also click the Link Info tab to display the screen as shown next Link Info 2 1 ZyXEL G 360 User s Guide m Linkinfo Site Survey Profile Adapter Wireless Network Status Statistics gt Profile Name default Transmit Rate 0 0 kbps gt Network Name SSID ZyXEL Receive Rate 0 0 kbps gt AP MAC Address 00 40 C5 01 23 45 Authentication Open gt Network Type Infrastructure Wireless Mode G Mode Transmission Rate 54 Mbps Total Transmit 5 Packets gt Security Disabled Total Receive 0 Packets gt Channel 6 Signal Strength 49 dBm Trend Chart Signal Strength SO OS SLEE Link Quality 6 0 660 6 6 0 6 Figure 2 1 Link Info The following table describes the labels in this screen Table 2 1 Link Info LABEL DESCRIPTION Wireless Network Status The following fields show the information of the network to which the G 360 is connected If there is no associated wireless network they are blank Profile Name This is the name of the profile you are currently using A profile is a set of wireless parameters that you need to connect to a wireless network If you do not configure and activate a new profile each time you start the G 360 the G 360 uses the default profile to associate with an available network
27. XEL to the corresponding return address Postage Paid This warranty gives you specific legal rights and you may also have other rights that vary from country to country Online Registration Register online at www zyxel com for free future product updates and information ZyXEL Limited Warranty iii ZyXEL G 360 User s Guide Federal Communications Commission FCC Interference Statement The device complies with Part 15 of FCC rules Operation is subject to the following two conditions e This device may not cause harmful interference e This device must accept any interference received including interference that may cause undesired operations This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications If this equipment does cause harmful interference to radio television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment and the receiv
28. XP System Tray Icon Disable Windows XP Wireless LAN Configuration Tool C ZyXEL G 360 User s Guide 2 Windows XP SP1 When a Wireless Network Connection window displays click Advanced Wireless Network Connection 29 The following wireless network s are available To access a wireless network select it from the list and then click Connect Available wireless networks cpe 5235 g3000 4 4 CPE 5246 wi 4 CPE 5656 35 This wireless network requires the use of a network key WEP To access this network type the key then click Connect Network key Enable IEEE 802 1x authentication for this network lf you are having difficulty connecting to a network click Advanced Fm Diagram 2 Windows XP SP1 Wireless Network Connection Windows XP SP2 When a Wireless Network Connection window displays click Change advanced settings under Related Tasks and then the Wireless Networks tab 1 Wireless Network Connection 7 Network Tai Choose a wireless network gt Refresh network list Click an item in the list below to connect to a wireless network in range or to get more information F 3 Set up a wireless network for a home or small office Unsecured wireless network Related Tasks VH 100VR N 5278AB d Learn about wireless Unsecured wireless network networking CPE 5242 fe Change the order of prefe petworks Unsecured wireless network CPE_5243_B500 fy Change advanced
29. ZyXEL G 360 802 11g Wireless PCI Adapter User s Guide ersion 3 8 2005 ZyXEL G 360 User s Guide Copyright Copyright 02005 by ZyXEL Communications Corporation The contents of this publication may not be reproduced in any part or as a whole transcribed stored in a retrieval system translated into any language or transmitted in any form or by any means electronic mechanical magnetic optical chemical photocopying manual or otherwise without the prior written permission of ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patents rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subject to change without notice Trademarks Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners ii Copyright ZyXEL G 360 User s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user purchaser that this product is free from any defects in materials or workmanship for a period of up to two 2 years from the date of purchase During the warranty period and upon proof of purchase should the product hav
30. able Windows XP Wireless LAN Configuration Tool ZyXEL G 360 User s Guide 2 Double click on the icon for wireless network connection to display a status window as shown below Wireless Network Connection 6 Status a General Support l Connection Status Connected Duration 00 16 40 Speed 54 0 Mbps Signal Strenath Tal Sent R Received L Bytes 7164 2 078 Activity Diagram 6 Windows XP SP1 Wireless Network Connection Status i Wireless Network Connection 6 Status General Support Connection Status Connected Network Z2w70 1 Duration 00 01 56 Speed 48 0 Mbps Signal Strength alll Activity D c Received 1 676 Disable View Wireless Networks Diagram 7 Windows XP SP2 Wireless Network Connection Status Disable Windows XP Wireless LAN Configuration Tool G ZyXEL G 360 User s Guide 3 Click Properties and click the Wireless Networks tab 4 Inthe Wireless Network Connection Properties window make sure the Use Windows to configure my wireless network settings check box is not selected Click OK 1 Wireless Network Connection Properties PIE General Wireless Networks Authentication Advanced Available networks iA i SOC TEST i CPESW3 Preferred networks Leam about setting up wireless network confiquration Diagram 8 Windows XP SP1 Wireless Network Connection Properties H Disable Windows XP Wireless LAN
31. ay have made Authentication Click the Authentication tab in the Wireless network properties screen to display the screen shown next The fields on this screen are grayed out when the network is in Ad Hoc mode or data encryption is disabled Management with Wireless Zero Configuration S ZyXEL G 360 User s Guide Wireless properties Wireless network properties prop Association Authentication Connection Association Authentication Select this option to provide authenticated network access for wireless Ethemet networks EAP type Smart Card or other Certificate v EAP type Smart Card or other Certificate v MI C Authenticate as quest when user or computer information is C Authenticate as guest when user or computer information is unavailable Authenticate as computer when computer information is available unavailable Diagram 19 Windows XP Wireless network properties Authentication The following table describes the labels in this screen Chart 5 Windows XP Wireless network properties Authentication LABEL DESCRIPTION Enable IEEE This field displays whether the IEEE 802 1x authentication is active 802 1x P If the network authentication is set to Open in the previous screen you can choose to authentication disable or enable this feature for this network EAP Type Select the type of EAP authentication Options are Protected EAP PEAP and Smart Card or other Cert
32. bes the labels in this screen Table 1 2 Screen Summary SCREEN DESCRIPTION Link Info Use this screen to see your current connection status configuration and data rate statistics Site Survey Use this screen to gt scan for a wireless network gt configure wireless security if activated on the selected network gt connect to a wireless network Profile Use this screen to add delete edit or activate a profile with a set of wireless and security settings Adapter Use this screen to configure a transfer rate enable power saving and use OTIST One Touch Intelligent Security Technology Use this screen to view the ZyXEL Utility and driver versions About P 18 Network Connection Methods The following sections show you how to associate with a network using the ZyXEL Utility You can either manually connect to a network or configure a profile to have the G 360 automatically connect to a specific network Otherwise configure nothing and leave the G 360 to automatically scan for and connect to any other available network without security See the next chapters for detailed field descriptions Getting Started 1 5 ZyXEL G 360 User s Guide 1 8 1 Site Survey After you insert the G 360 and install the ZyXEL Utility follow the steps below to connect to a network using the Site Survey screen 1 Make sure a wireless network is available and within range 2 Open the ZyXEL Utility and
33. box and click Configure to do Authentication settings Method Enable Fast Select the check box to automatically reconnect to the network without re Reconnect authentication if the wireless connection goes down OK Click OK to save your changes Cancel Click Cancel to leave this screen without saving any changes you may have made V Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Smart Card or other Certificate Properties Smart Card or other Certificate Properties When connecting O Use my smart card Use simple certificate selection Recommended Validate server certificate C Connect to these servers Trusted Root Certification Authorities C ABA ECOM Root CA C Autoridad Certificadora de la Asociacion Nacional del Notariar C Autoridad Certificadora del Colegio Nacional de Correduria Pu C Baltimore EZ by DST C Belgacom E Trust Primary CA C C amp W HKT SecureNet CA Class A C C amp W HKT SecureNet CA Class B C C amp W HKT SecureNet CA Root lt View Certificate C Use a different user name for the connection Diagram 21 Windows XP Smart Card or other Certificate Properties The following table describes the labels in this screen Chart 7 Windows XP Smart Card or other Certificate Properties LABEL DESCRIPTION Use my smart card Select this check box to use the smart card for authentication Use a certificate on this computer Se
34. cate Authority CA to handle certificates which imposes a management overhead EAP TTLS Tunneled Transport Layer Service EAP TTLS is an extension of the EAP TLS authentication that uses certificates for only the server side authentications to establish a secure connection Client authentication is then done by sending username and password through the secure connection thus client identity is protected For client authentication EAP TTLS supports EAP methods and legacy authentication methods such as PAP CHAP MS CHAP and MS CHAP v2 PEAP Protected EAP Like EAP TTLS server side certificate authentication is used to establish a secure connection then use simple username and password methods through the secured connection to authenticate the clients thus hiding client identity However PEAP only supports EAP methods such as EAP MD5 EAP MSCHAPv2 and EAP GTC EAP Generic Token Card for client authentication EAP GTC is implemented only by Cisco Types of EAP Authentication GG ZyXEL G 360 User s Guide LEAP LEAP Lightweight Extensible Authentication Protocol is a Cisco implementation of IEEE802 1x For added security certificate based authentications EAP TLS EAP TTLS and PEAP use dynamic keys for data encryption They are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical The following table is a comparison of the features of five authentication
35. click the Site Survey tab to open the screen as shown next 3 Click Scan to search for available wireless networks Pink info Sie Survey T Profile w Adapter Available Network List Site Information SSID Channel Signal In ZyXEL 6 78 Network Type Infrastructure f p2 b3000 6 63 Chamet 6 T ZyXEL 6 61 Encryption Disabled f zweL wis 3 23 MAC Address 00 13 49 00 00 01 T Wireless 6 23 Surveyed at 09 29 15 0 hungbill 11 23 M ZEL mis 2 6 Connect Figure 1 5 Site Survey 4 Tojoin a network either click an SSID in the table and then click Connect or double click an SSID 5 If the wireless security is activated for the selected wireless network the Security Settings screen displays This screen varies according to the network s encryption method Configure the same security settings as the associated network Getting Started ZyXEL G 360 User s Guide If the selected network is unavailable or security settings are not correct the G 360 will be disconnected Security Settings Confirm New Settings gt Encryption Type TKIP w gt Pass Phrase dwer1234 Figure 1 6 Site Survey Security Settings 6 Verify that you have successfully connected to the selected network and check the network information in the Link Info screen If the G 360 is not connected to a network the fields in this screen are blan
36. dding a New Profile Follow the steps below to add a new profile Step 1 Click Add in the Profile screen to display the screen as shown next Click Next to continue Profile ZyXEL G 360 User s Guide Profile Adapter Link Info Site Survey Confirm New Settings Si gt SSID Infrastructure Connect to an Access Point gt Profile Name gt Network Type C Ad Hoc Connect directly to other computers an Info E SSID ml Mie ZyXEL ZyXEL Wireless morrie sw1 5238 AA13 PM2 b3000 v T T T T T T exit Nex scan Select Figure 5 2 Profile Add New Profile The following table describes the labels in this screen Table 5 2 Profile Add New Profile LABEL DESCRIPTION Profile Name Enter a descriptive name of up to 32 printable ASCII characters in this field SSID Select an available wireless device in the Scan Info table and click Select or enter the SSID Service Set IDentifier of the AP or the peer ad hoc device to which you want to associate in this field To associate with an ad hoc network you must enter the same SSID as the peer ad hoc device Otherwise leave this field blank or enter any to have the G 360 associate with or roam between any infrastructure wireless networks Network Type Select the Infrastructure radio button to associate with an AP Select the Ad Hoc radio button
37. denotes that the wireless device is in Ad Hoc mode v displays with the previous two icons if the wireless devices are using security SSID This field displays the SSID Service Set IDentifier of each wireless network The SSID is a unique name shared among all wireless devices in a wireless network Wireless devices must have the same SSID to communicate with each other Channel This field displays the channel number used by each wireless network A radio frequency used by a wireless device is called a channel Signal This field displays the signal strength of each wireless network Scan Click Scan to search for available wireless networks within transmission range Connect Click Connect to associate with the selected wireless network Site Info Click an entry in the Available Network List table to display the information of the selected wireless network Network Type This field displays the network type Infrastructure or Ad Hoc of the wireless network Channel This field displays the channel number used by each wireless network Encryption This field shows whether data encryption is activated WEP WPA PSK WPA2 PSK WPA RADIUS WPA2 RADIUS or RADIUS or inactive Disabled MAC address This field displays the MAC address of the AP or peer wireless device Surveyed at This field displays the time when the G 360 scanned the wireless network Site Survey ZyXEL G 360 User s Guide Chapter 4 Security Settings This
38. e indications of failure due to faulty workmanship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product is modified misused tampered with damaged by an act of God or subjected to abnormal working conditions NOTE Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser To obtain the services of this warranty contact ZyXEL s Service Center for your Return Material Authorization RMA number Products must be returned Postage Prepaid It is recommended that the unit be insured when shipped Any returned products without proof of purchase or those with an out dated warranty will be repaired or replaced at the discretion of ZyXEL and the customer will be billed for parts and labor All repaired or replaced products will be shipped by Zy
39. er Profile List Profile Info Profile Name SSID T default any Network Type Infrastructure T exi test Channek 1 Vo ex ZyXEL Security WPA2 PSK _Delete Edit l A Figure 1 8 Profile 1 8 Getting Started ZyXEL G 360 User s Guide 4 Give the profile a descriptive name of up to 32 printable ASCII characters If you want to connect to an AP select Infrastructure and enter the AP s SSID If you want to connect to another peer wireless device directly without an AP select Ad Hoc and enter the same SSID as that device Link Info Site Survey Profile Adapter Confirm New Settings Scan Info ZyXEL MIS ZyXEL ZyXEL T gt Network Type T Wireless_morrie T T gt SSID Infrastructure Connect to an Access Point w1 5238 AA13 PM2 b3000 C Ad Hoc Connect directly to other computers ext Net Figure 1 9 Profile Add Getting Started 1 9 ZyXEL G 360 User s Guide 5 If you selected Infrastructure skip to the next step If you selected Ad Hoc use the same channel as the peer wireless device 7 Link Info 1 Site Survey Profile 7 Adapter Confirm New Settings Figure 1 10 Profile Channel 1 10 Getting Started ZyXEL G 360 User s Guide 6 If you selected Infrastructure choose the same e
40. er 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio TV technician for help Notice 1 Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This product has been designed for the WLAN 2 4 GHz network throughout the EC region and Switzerland with restrictions in France This Class B digital apparatus complies with Canadian ICES 003 Cet appareil num rique de la classe B est conforme a la norme NMB 003 du Canada Caution 1 This Transmitter must not be co located or operating in conjunction with any other antenna or transmitter C ertifications Trade Name Model Number C Tested To Comply With FCC Standards Refer to the product page at www zyxel com FOR HOME OR OFFICE USE iv FCC Statement ZyXEL G 360 User s Guide Table of Contents A NO li ZyXEL Limited Warranty P Ge Ge See iii Federal Communications Commission FCC Interference Statement SEG ee SEG EE Ge iv List of Figure esse esse esse see see See SE RE BEE Bee Bee Be Ee Ee Ee Ee EE SG SEG DRA Bee Bee Bee Be ee Ee Ee Ee Ee Ee Ee Ee Ge ee ee vii List Of E i o viii Chapter 1 Getting Started i EP
41. er AP with a better link quality using the Site Survey screen Move your computer closer to the AP or the peer computer s within the transmission range There may be too much radio interference for example microwave or another AP using the same channel around your wireless network Relocate or reduce the radio interference 8 3 Problems Communicating With Other Computers Table 8 3 Troubleshooting Communication Problems PROBLEM CORRECTIVE ACTION The G 360 computer cannot communicate with another computer Make sure you are connected to the network A Infrastructure Make sure that the AP and the associated computers are turned on and working properly Make sure the G 360 computer and the associated AP use the same SSID Change the AP and the associated wireless clients to use another radio channel if interference is high Make sure that the computer and the AP share the same security option and key Verify the settings in the Security Settings screen B Ad Hoc IBSS Verify that the peer computer s is turned on Make sure the G 360 computer and the peer computer s are using the same SSID and channel Make sure that the computer and the peer computer s share the same security option and key Change the wireless clients to use another radio channel if interference is high Troubleshooting ZyXEL G 360 User s Guide 8 4 Related Documentation gt Support Disk Refer to t
42. es the G 360 is associated to the wireless network This denotes the wireless network is not available Management with Wireless Zero Configuration Q ZyXEL G 360 User s Guide Security Settings When you configure the G 360 to connect to a secure network but the security settings are not yet enabled on the G 360 you will see different screens according to the authentication and encryption methods used by the selected network Association Select a network in the Preferred networks list and click Properties to view or configure security Wireless properties LA Wireless network properties Association Authentication Connection Association Authentication Network name SSID Network name SSID Zw70 Wireless network key Wireless network key This network requires a key for the following This network requires a key for the following Network Authentication Shared Network Authentication Shared Data encryption WEP Data encryption WEP Network key Network key Confirm network key Confirm network key Key index advanced Key index advanced 1 C This is a computer to computer ad hoc network wireless access points are not used Diagram 18 Windows XP Wireless network properties Association The following table describes the labels in this screen Chart 4 Windows XP Wireless network properties Association LABEL DESCRIPTION Networ
43. f you manually configured a WEP key or a WPA 2 PSK key and you also selected this check box then the key you manually configured is used WIRELESS LAN Wireless MAC Filter Roaming OTIST One touch Intelligent Security Technology Setup Key 01234567 Iv Yes Please enhance the Wireless Security Level to WPA PSK automatically if no any WLAN security has been set This will generate a random PSK key later for your convenience San 6 1 2 Starting OTIST You must click Start in the AP OTIST web configurator screen and in the wireless client s Adapter screen all within three minutes at the time of writing You can start OTIST in the wireless clients and AP in any order but they must all be within range and have OTIST enabled 1 In the AP a web configurator screen pops up showing you the security settings to transfer After reviewing the settings click OK Microsoft Internet Explorer 2 This screen appears while OTIST settings are being transferred It closes when the transfer is complete 6 2 Adapter ZyXEL G 360 User s Guide OTIST OTIST in progress please wait for 3 minutes Auto Security in Process Please wait a moment about 149 Seconds gt In the wireless client you see this screen if it can t find an OTIST enabled AP with the same Setup Key Click OK to go back to the ZyXEL Utility main screen Please make sure you have ZyXEL g APs or wireless r
44. he included CD for support documents and device drivers gt Quick Start Guide Our Quick Start Guide is designed to help you get your G 360 up and running right away It contains a detailed easy to follow connection diagram and information on installing your G 360 gt ZyXEL Glossary and Web Site Please refer to www zyxel com for an online glossary of networking terms and additional support documentation 8 5 User Guide Feedback Help us help you E mail all User s Guide related comments questions or suggestions for improvement to techwriters zyxel com tw or send regular mail to The Technical Writing Team ZyXEL Communications Corp 6 Innovation Road Il Science Based Industrial Park Hsinchu 300 Taiwan Thank you 8 6 Customer Support When contacting your Customer Support Representative please have the following information ready Product model and serial number Warranty Information Date you received your product VV VV Brief description of the problem and the steps you took to solve it SUPPORT E MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E MAIL FTP SITE CORPORATE support zyxel com tw 886 3 578 3942 www zyxel com ZyXEL Communications Corp HEADQUARTERS www europe zyxel com 6 Innovation Road II Science Park WORLDWIDE sales zyxel com tw 886 3 578 2439 ftp zyxel com Hsinchu 300 ftp europe zyxel com Taiwan info cz zyxel com 420 241 091 350 www zyxel cz ZyXEL Communications Czech s r o Modranska 62
45. heck the certificate of the authentication server TTLS Protocol This field is only available when you select EAP TTLS in the Authentication Type field Use the drop down list box to select a TTLS protocol that the RADIUS server uses Options are PAP CHAP MS CHAP MS CHAP v2 and EAP PEAP Inner EAP This field is only available when you select EAP PEAP in the Authentication Type field Use the drop down list box to select a PEAP protocol that the RADIUS server uses Options are EAP GTC and MS CHAP v2 Save Click Save to save the changes and display the Link Info screen Otherwise click the close EI button to discard changes and go back to the previous screen Security Settings 4 7 ZyXEL G 360 User s Guide Chapter 5 Profile This chapter describes how to configure and use a profile 5 1 Configuring the Profile Screen Click the Profile tab in the ZyXEL Utility program to display the Profile screen as shown next The profile function allows you to save a wireless network s settings so you can use them again later 4 Link Info Site Survey Profile Mi Adapter Profile List Profile Info Profile Name E ssp T default any Network Type Infrastructure T ext test Channel 1 yo ex2 ZyXEL Security WPAZ PSK Figure 5 1 Profile The following table describes the labels in this screen Profile 5 1 ZyXEL G 360 User s Guide
46. ic WEP key generation based on a password phrase called a passphrase The passphrase Is case sensitive You must use the same passphrase for all WLAN adapters with this feature in the same WLAN Security Settings 4 1 ZyXEL G 360 User s Guide For WLAN adapters without the passphrase feature you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the ZyXEL Utility and entering them manually as the WEP keys in the other WLAN adapter s e Enter the WEP keys manually Your G 360 allows you to configure up to four 64 bit 128 bit or 256 bit WEP keys Only one key is used as the default key at any one time See the wireless LANs appendix for more information about WPA WPA2 and IEEE 802 1x 4 2 Authentication Type The IEEE 802 11b standard describes a simple authentication method between the wireless clients and AP Two authentication modes are defined Open and Share Open authentication mode is implemented for ease of use and when security is not an issue The wireless client and the AP do not share a secret key Thus the wireless clients can associate with any AP and listen to any data transmitted plaintext Share authentication mode involves a shared secret key to authenticate the wireless client to the AP This requires you to enable wireless LAN security and use the same settings on both the wireless client and the AP 4 3 Configuring Sec
47. ices within transmission range Select a wireless network in the list and click Connect to join the selected wireless network i Wireless Network Connection 7 Naak T Choose a wireless network w Refresh network list Click an item in the list below to connect to a wireless network in range or to get more information Wees meted 2 Set up 4 wireless network E for a home or small office i B Unsecured wireless network ull E Related Tasks TI demo Automatic e WD Learn about wireless Unsecured wireless network antl networking Change the order of preferred networks Security enabled wireless network WPA aal Change advanced cpe_sw1_5275 settings Unsecured wireless network ail CPE 5242 Unsecured wireless network antl YH 100VR N 5278AB Unsecured wireless network all v Diagram 14 Windows XP SP2 Wireless Network Connection The following table describes the icons in the wireless network list Chart 2 Windows XP SP2 Wireless Network Connection ICON DESCRIPTION This denotes that wireless security is activated for the wireless network Management with Wireless Zero Configuration O ZyXEL G 360 User s Guide Chart 2 Windows XP SP2 Wireless Network Connection ICON DESCRIPTION iy This denotes that this wireless network is your preferred network Ordering your preferred networks is important because the G 360 tries to associate to the preferred network first in the
48. ificate Properties Click this button to open the properties screen and configure certificates The screen varies depending on what you select in the EAP type field Authenticate as Select this check box to have the computer send its information to the network for computer when authentication when a user is not logged on computer information is available T Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Chart 5 Windows XP Wireless network properties Authentication LABEL DESCRIPTION Authenticate as guest when user or computer information is Select this check box to have the computer access to the network as a guest when a user is not logged on or computer information is not available unavailable OK Click OK to save your changes Cancel Click Cancel to close this screen without saving any changes you may have made Authentication Properties Select an EAP authentication type in the Wireless network properties Authentication screen and click the Properties button to display the following screen Protected EAP Properties Protected EAP Properties When connecting Connect to these servers Trusted Root Certification Authorities C ABA ECOM Root CA A C Autoridad Certificadora de la Asociacion Nacional del Notaria C Autoridad Certificadora del Colegio Nacional de Correduria P C Baltimore EZ by DST C Belgacom E Trust Primary CA
49. ifications in the appendix for detailed features e Automatic rate adjustment to that of the associated wireless network e Security WEP Wired Equivalent Privacy IEEE 802 1x WPA PSK WPA Wi Fi Protected Access WPA2 PSK and WPA2 e A built in antenna e Driver support for Windows 98 Second Edition Windows Me Windows 2000 and Windows XP 1 2 Syntax Conventions e Type or Enter means for you to type one or more characters Select or Choose means for you to use one of the predefined choices e Mouse action sequences are denoted using a comma For example click Start Settings and then Control Panels means first click Start then point your mouse pointer to Settings and then click Control Panels e Window and command choices are in Bold Times New Roman font Predefined field choices are in Bold Arial font e The ZyXEL 360 802 11g Wireless PCI Adapter is referred to as the G 360 in this guide e The ZyXEL Wireless LAN Utility may be referred to as the ZyXEL WLAN Utility or simply as the ZyXEL Utility in this guide Getting Started 1 1 ZyXEL G 360 User s Guide 1 3 Graphics Icons Key N Li m Sa X Wireless Access Point Computer Notebook computer a Du j N Modem or Router Wireless Signal Server 1 4 Application Overview 1 4 1 Infrastructure To connect to a network via an Access Point AP set the G 360 network type to Infrastructure Through the AP
50. ireless Network Connection 7 Network Tass Choose a wireless network gt Refresh network list Click an item in the list below to connect to a wireless network in range or to get more information 2 Set up a wireless network for a home or small office Related Tasks dy Learn about wireless Windows cannot configure this wireless connection networking If you have enabled another program to manage this wireless connection te Change the order of use that software preferred networks Tf you want Windows to configure this wireless connection start the Wireless Zero Change advanced Configuration W2C service For information about starting the WZC service see settings article 871122 in the Microsoft Knowledge Base on the microsoft com Web site Diagram 10 Windows XP SP2 WZC Not Available Management with Wireless Zero Configuration K ZyXEL G 360 User s Guide Connecting to a Wireless Network 1 Double click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen 1 x 11 40 AM Diagram 11 Windows XP SP2 System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the G 360 Refer to the following table for details Chart 1 Windows XP SP2 System Tray Icon ICON DESCRIPTION Dan The G 360 is connected to a wireless network L n The G 360 is in the process of connecting to a wireles
51. k Link info Site Survey Profile Adapter gt Profile Name Transmit Rate 0 0 kbps gt Network Name SSID ZyXEL Receive Rate 0 0 kbps 3 gt AP MAC Address 00 13 49 00 00 01 Authentication Open gt Network Type Infrastructure Wireless Mode G Mode gt Transmission Rate 54 Mbps Total Transmit 2 Packets gt Security Disabled Total Receive 0 Packets gt Channel 6 Signal Strength 46 dBm EI Signal Strength 000000090900 Link Quality 40400000000 Figure 1 7 Link Info Getting Started 1 7 ZyXEL G 360 User s Guide 1 8 2 Profiles A profile is a set of wireless parameters that you need to connect to a wireless network With a profile activated each time you start the G 360 it automatically scans for the specific SSID and joins that network with the pre defined wireless security settings If the specified network is not available the G 360 will be disconnected If you do not configure and activate a profile each time you start the G 360 the G 360 uses the default profile to connect to any available network with security disabled The default profile is a profile that allows you to connect to any SSID without security Creating a Profile 1 Make sure a wireless network is available 2 Open the ZyXEL Utility and click the Profile tab to open the screen as shown 3 Click Add to configure a new profile M Link info Site Survey Profile bos Adapt
52. k name This field displays the SSID Service Set IDentifier of each wireless network SSID R Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Chart 4 Windows XP Wireless network properties Association LABEL DESCRIPTION Network This field automatically shows the authentication method Share Open WPA or WPA Authentication PSK used by the selected network Refer to Section 4 2 for more information Data Encryption This field automatically shows the encryption type TKIP WEP or Disable used by the selected network Network Key Enter the pre shared key or WEP key The values for the keys must be set up exactly the same on all wireless devices in the same wireless LAN Confirm network key Enter the key again for confirmation Key index Select a default WEP key to use for data encryption advanced This field is available only when the network use WEP encryption method and the The key is provided for me automatically check box is not selected The key is If this check box is selected the wireless AP assigns the G 360 a key provided for me automatically This is a computer to computer ad hoc network wireless access points are not used If this check box is selected you are connecting to another computer directly OK Click OK to save your changes Cancel Click Cancel to leave this screen without saving any changes you m
53. lays in the field below Security Settings 4 3 ZyXEL G 360 User s Guide Table 4 2 Security Settings WEP LABEL DESCRIPTION Key x If you want to manually set the WEP keys enter the WEP key same as the AP or peer where x is a device in the field provided number between 1 and 4 If you select 64 Bits in the WEP field Enter either 10 hexadecimal digits in the range of A F a f and 0 9 for example 11AA22BB33 for HEX key type or Enter 5 ASCII characters case sensitive ranging from a z A Z and 0 9 for example MyKey for ASCII key type If you select 128 Bits in the WEP field Enter either 26 hexadecimal digits in the range of A F a f and 0 9 for example 00112233445566778899AABBCC for HEX key type or Enter 13 ASCII characters case sensitive ranging from a z A Z and 0 9 for example MyKey12345678 for ASCII key type If you select 256 Bits in the WEP field Enter either 58 hexadecimal digits in the range of A F a f and 0 9 for example 00001 11122223333444455556666777788889999AAAABBBBCCCC000011 for HEX key type or Enter 29 ASCII characters case sensitive ranging from a z A Z and 0 9 for example MyKey111122223333444455556678 for ASCII key type The values for the WEP keys must be set up exactly the same on all wireless devices in the same wireless LAN ASCII WEP keys are case
54. le power saving and activate OTIST AT Link Info 7 gt Site Survey T Profile Adapter EL Adapter Setting gt Transfer Rate Fully Auto gt Power Saving Mode Disabled v 7 OTIST One Touch Intelligent Security Technology Setup Key 01234557 Start Figure 6 1 Adapter The following table describes the labels in this screen Table 6 1 Adapter LABEL DESCRIPTION Adapter Setting 6 4 Adapter ZyXEL G 360 User s Guide Table 6 1 Adapter LABEL DESCRIPTION Transfer Rate Select a transmission speed from the drop down list box Options are Fully Auto default 1 Mbps 2 Mbps 5 5 Mbps 11 Mbps 6 Mbps 9 Mbps 12 Mbps 18 Mbps 22 Mbps 24 Mbps 36 Mbps 48 Mbps 54 Mbps and 125 Mbps Select Fully Auto to allow your G 360 to operate at the maximum available transmission rate Otherwise select a number based on your network environment Power Saving Mode Power consumption is reduced especially good for notebooks that use batteries in power saving mode Select Enabled and then click Save to immediately cut wireless transmission to from the G 360 If the G 360 resides in a Windows 98 computer it may also reboot The G 360 remains in power saving mode until there is traffic to transmit or receive Otherwise select Disabled OTIST One Select this check box to enable OTIST Touch Intelligent Security
55. lect this check box to use a certificate on your computer for authentication Validate server certificate Select the check box to check the certificate of the authentication server Connect to these servers Select the check box and specify a domain in the field below to have your computer connect to a server which resides only within this domain Management with Wireless Zero Configuration W ZyXEL G 360 User s Guide Chart 7 Windows XP Smart Card or other Certificate Properties LABEL DESCRIPTION Trusted Root Select a trusted certification authority from the list below Certification Authorities You must first have a wired connection to a network and obtain the certificate s from a certificate authority CA Consult your network administrator for more information View Certificate Click this button if you want to verify the selected certificate Use a different user name for the connection Select the check box to use a different user name when the user name in the smart card or certificate is not the same as the user name in the domain that you are logged on to OK Click OK to save your changes Cancel Click Cancel to leave this screen without saving any changes you may have made Ordering the Preferred Networks Follow the steps below to manage your preferred networks 1 Windows XP SP2 Click Change the order of preferred networks in the Wireless Ne
56. lobits per second Kbps Receive Rate This field displays the current data receiving rate in kilobits per second Kbps Authentication This field displays the authentication method of the G 360 Wireless Mode This field indicates the wireless standard 802 11b or 802 11g of the wireless device This field displays G Mode B Mode or Mixed Mode Total Transmit This field displays the total number of data frames transmitted since the G 360 was associated with the wireless network Total Receive This field displays the total number of data frames received since the G 360 was associated with the wireless network Signal Strength This field displays the signal strength of the G 360 Trend Chart Click this button to display the real time statistics of the data rate in kilobits per second Kbps Signal Strength The status bar shows the strength of the signal Link Quality The status bar shows the quality of the signal Link Info 2 3 ZyXEL G 360 User s Guide 2 2 1 Trend Chart Click Trend Chart in the Link Info screen to open the read only screen as shown next Date Rate Transmit 0 Kbps gt Receive 3 Kbps 10000 1000 b Figure 2 2 Link Info Trend Chart The following table describes the labels in this screen Table 2 2 Link Info Trend Chart LABEL DESCRIPTION Transmit This field displays the c
57. mA max Voltage 3 3V15 Weight 105g Dimension 120 mm L x 13 mm H x 84 mm W Product Specifications ZyXEL G 360 User s Guide 17 dBm typical at 11Mbps DBPSK DQPSK CCK 14 dBm typical at 54Mbps OFDM 802 11g OFDM 54 Mbps lt 68 dBm typ 69 dBM max Output Power RX Sensitivity 802 11b PBCC 22 Mbps lt 83 dBm typ lt 88 dBM max O ting 0 50 C Temperature las Storage 30 60 C Relative Humidity 20 to 95 non condensing B Product Specifications ZyXEL G 360 User s Guide Appendix B Disable Windows XP Wireless LAN Configuration Tool Windows XP includes a configuration tool also known as Wireless Zero Configuration WZC for wireless devices Follow the steps below to disable the configuration tool in Windows XP after you install the ZyXEL Utility The screen varies depending on the version of Windows XP service pack Via the Wireless Network System Tray Icon If the network icon for wireless connections is not present in the system tray see the next section 1 Double click the network icon for wireless connections in the system tray Wireless Network Connection Wireless Network Connection 7 Wireless Speed 11 0 Mbps Signal Strength Good One or more wireless networks are available To see a list of available networks click here E Status Connected w 4 2 19PM Diagram 1 Windows
58. ncryption method Disable WEP WPA WPA2 WPA PSK WPA2 PSK or 802 1x as the AP to which you want to connect If you selected Ad Hoc you can only use WEP Link Info Site Survey Profile b Adapter gt Confirm New Settings gt Encryption Method EEA gt Figure 1 11 Profile Encryption Getting Started 1 11 ZyXEL G 360 User s Guide 7 This screen varies depending on the encryption method you selected in the previous screen Enter the same settings as the associated network Link Info Site Survey Profile b Adapter EER Confirm New Settings Encryption Type AES Pass Phrase qwerfe2931 1 12 Getting Started ZyXEL G 360 User s Guide 8 Verify the profile settings in the ready only screen Click Save to save and go to the next screen Click Back to return to the previous screen M Link Info Site Survey Profile Adapter Confirm New Settings gt Network Name SSID test gt Network Type Infrastructure gt Channel Auto gt Security WPAZ PSK Back Save Exit Figure 1 13 Profile Confirm 9 Click Activate Now to use the new profile immediately Otherwise click Activate Later and go back to the Profile screen You can follow the previous steps to create another profile Your network has been configured successfully Activate Now
59. nfirm Uninstall id 7 2 List of Figures vii ZyXEL G 360 User s Guide List of Table Table 1 1ZyXEL Utility System Tray Icon nennen nnne nennen nennen ener ee ee 1 4 Table 182 Sereen SUMANMAN Ye e kivet 1 5 Table 221 E Sn 2 2 Table 2 2 Link Info Trend Chart ete eI o 2 4 Table 341 Site O A M 3 2 Table 4 1 Wirel ss LAN Security iia 4 1 Table 4 2 Security Settings aa 4 3 Table 4 3 Security Settings WPA PSK WPA2 PSK cccsccssecseeseeesseeseeseceeceseenseenseensecsaecsaecaeeeaeeneeenneeaes 4 5 Table 4 4 Security Settings WPA WPA2 or 802 1x sse nnns 4 6 E NN 5 2 Tabl 5 2 Profile Add New Profiles ici oso eshte 5 3 Table OLA dt e he OE ies 6 4 Table YE JA ONS e ue io ae ana EE ae EA Poet es Ta MC bat at at ei ae hae 7 1 Table 8 1 Troubleshooting Starting ZyXEL Utility Program esse sesse esse ee ee ee Re Ge Re GR nooo Re GRA Gee ens 8 1 Table 8 2 Troubleshooting Link Quality ooooonconnnninnnoonoonconnconconncnnnonn nono nono ee ee Re Re Ge Re enne 8 2 Table 8 3 Troubleshooting Communication Problems ee ee sse 8 2 viii List of Tables ZyXEL G 360 User s Guide Chapter 1 Getting Started This chapter introduces the G 360 and prepares you to use the ZyXEL Utility 1 1 About Your G 360 The G 360 is an IEEE 802 11g compliant wireless LAN adapter The following lists the main features of your G 360 See the product spec
60. nges and rotates the encryption keys so that the same encryption key is never used twice The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients This all happens in the background automatically WPA2 AES Advanced Encryption Standard is a block cipher that uses a 256 bit mathematical algorithm called Rijndael The Message Integrity Check MIC is designed to prevent an attacker from capturing data packets altering them and resending them The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC If they do not match it is assumed that the data has been tampered with and the packet is dropped By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism MIC TKIP makes it much more difficult to decode data on a Wi Fi network than WEP making it difficult for an intruder to break into the network Wireless LANs CC ZyXEL G 360 User s Guide The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials The common password approach makes WPA PSK suscep
61. ocumentation for more information Getting Started ZyXEL G 360 User s Guide DO NOT use WZC or the Odyssey Client Manager and the ZyXEL Utility at the same time 1 7 Accessing the ZyXEL Utility After you install and start the ZyXEL Utility an icon for the ZyXEL Utility appears in the system tray When the ZyXEL Utility system tray icon displays the G 360 is installed properly FAN 5 11PM Figure 1 3 ZyXEL Utility System Tray Icon The color of the ZyXEL Utility system tray icon indicates the status of the G 360 Refer to the following table for details Table 1 1ZyXEL Utility System Tray Icon COLOR DESCRIPTION Red The G 360 is not connected to a wireless network or is searching for an available wireless network Green The G 360 is connected to a wireless network Double click on the ZyXEL Utility icon in the system tray to open the ZyXEL Utility The ZyXEL Utility screens are similar in all supported Microsoft Windows operating systems Screens for Windows XP are shown in this guide Click the icon located in the top right corner to display the on line help window 1 7 1 ZyXEL Utility Screen Summary This summarizes the ZyXEL Utility screens 1 4 Getting Started ZyXEL G 360 User s Guide F4 ZyXEL G 360 Wireless Adapter Utility H 5 xj OGE Link Info Site Survey Adapter Figure 1 4 Screen Overview The following table descri
62. ofile Select a Channel Profile 5 5 ZyXEL G 360 User s Guide Step 3 If you select Infrastructure network type in the first screen select the same encryption method as the AP WEP WPA PSK WPA2 PSK WPA WPA2 or 802 1x from the drop down list box to enable data encryption If you select Ad Hoc network type in the first screen you can only use WEP encryption method Otherwise select Disabled to allow the G 360 to communicate with the access points or other peer wireless devices without any data encryption and skip to Step 5 Link Info Site Survey Profile 3 Adapter Confirm New Settings gt Encryption Method EEN M Figure 5 4 Profile Wireless Settings 5 6 Profile ZyXEL G 360 User s Guide Step 4 The screen varies depending on the encryption method you select in the previous screen The settings must be exactly the same on the APs or other peer wireless devices as they are on the G 360 Refer to Section 1 1 for detailed information on wireless security configuration Link Info Site Survey Profile Adapter Confirm New Settings gt Encryption Type AES gt Pass Phrase qwerfe2931 Figure 5 5 Profile Security Settings Profile 5 7 ZyXEL G 360 User s Guide Step 5 This read only screen shows a summary of the new profile settings Verify that the settings are correct Click Save to save and go
63. outers with OTIST function enabled OK gt If there is more than one OTIST enabled AP within range you see a screen asking you to select one AP to get settings from 6 1 3 Notes on OTIST 1 If you enabled OTIST in the wireless client you see this screen each time you start the ZyXEL Utility Click Yes for it to search for an OTIST enabled AP Do you wantto start OTIST function Don t show me this window again 2 Ifan OTIST enabled wireless client loses its wireless connection for more than ten seconds it will search for an OTIST enabled AP for up to one minute If you manually have the wireless client search for an OTIST enabled AP there is no timeout click Cancel in the OTIST progress screen to stop the search 3 When the wireless client finds an OTIST enabled AP you must still click Start in the AP OTIST web configurator screen or hold in the Reset button for one or two seconds for the AP to transfer settings Adapter 6 3 ZyXEL G 360 User s Guide 4 If you change the SSID or the keys on the AP after using OTIST you need to run OTIST again or enter them manually in the wireless client s 5 Ifyou configure OTIST to generate a WPA 2 PSK key this key changes each time you run OTIST Therefore if a new wireless client joins your wireless network you need to run OTIST on the AP and ALL the wireless clients again 6 2 Configuring the Adapter Screen Use the Adapter screen to set a transfer rate enab
64. rd te ed sU epi ROB oe eg den 1 13 Figure 1 15 Profile 4 a rose ha EE ani d tte vat a dte E ps 1 14 Figure 2 1 Emk Info tees os o d eio ni a WI SEHR e neret a E exe 2 2 Figure 2 2 Link Inf9 Trerid Chart en EE ERE RENE UE ERE REG 2 4 Figure 3 10 Site NN 3 1 Figure 431 Security Settings WEP s sonent dte o e e o RO ER EE RC bein end 4 3 Figure 4 2 Security Settings WPA PSK WPAQ2 PSK sesse ee ese se ee ge ee Gee eene ne Ge ee ek ee inneren 4 5 Figure 4 3 Security Settings WPA WPA2 or 802 1 XK cc ccescesescesseeceseceeesecaeesecueeeeceaecaeaecaeeaeesecaeeereneeereess 4 6 Figure 5 1 Profile ti os E o ti ee e o AR O 5 1 Figure 5 2 Profile Add New Profile see se Ge Ge ee anoeie Ge AR Ge Re ennt eke AA Ge Re tente nee 5 3 Figure 5 3 Profile Selecta Chantel se GE is 5 5 Figure 54 Profile Wireless Settings eiser sesse se riase se e bee sg AA Re AO Se ee Bee Se NEES eek de ee ESE Se ee de Ee eret 5 6 Figure 5 5 Profile Security Settings isise se se Re GR Re tea GRA GRA GR GRA GRA GRA Gee ee ee ee ee ee ee nn ee Re ee Re ee ee RA 5 7 Figure 5 6 Profile Confirm New Settings iese sesse ss se ee Ge ee GR ek Re GR ee eene Ge Re ek ee GRA Ge cre Ge nennen nens 5 8 Figure 5 7 Profile Activate the Profile sesse sesse se Ge ee Ge GR ee GR Ge AR Ge Re GR ee GRA Ge AR Ge Ge Re GRA Ge ek Ge 5 9 Figure 61 Adapters o e e ee tete Se iei etae diet 6 4 Figure 7 15 5 DOUE ri N SG AE ttr E MH SENE n T ee N 7 1 Figure 7 2 Co
65. roubleshooting ZyXEL Utility Communication problem with other computers TUM p 22 E 8 2 Trend Chart DA JJ Index ZyXEL G 360 User s Guide ZyXEL Utility ZyXEL Utility Removing ZyXEL Utility Before you upgrade 7 2 ZyXEL Utility Maintenance sss 7 1 ZyXEL Utility Upgrading sesse ese see se ee 7 2 Index KK
66. s network gl The connection to a wireless network is limited because the network did not assign a network address to the computer Ch The G 360 is not connected to a wireless network Management with Wireless Zero Configuration ZyXEL G 360 User s Guide 2 Windows XP SP2 In the Wireless Network Connection Status screen click View Wireless Networks to open the Wireless Network Connection screen i Wireless Network Connection 6 Status PR General Support Connection Status Connected Network Zw70 1 Duration 00 01 56 Speed 48 0 Mbps Signal Strength ani Activity Received AN sd a 1 676 Disable K View Wireless Networks D Snn T d Diagram 12 Windows XP SP2 Wireless Network Connection Status Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Windows XP SP1 In the Wireless Network Connection Status screen click Properties and the Wireless Networks tab to open the Wireless Network Connection Properties screen Wireless Network Connection 6 Status PIE General 5 upport Connection Status Connected Duration 01 18 28 Speed 48 0 Mbps Signal Strength Tann Sent R Received Bytes 2 819 0 Activity Diagram 13 Windows XP SP1 Wireless Network Connection Status N Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Windows XP SP2 Click Refresh network list to reload and search for available wireless dev
67. s use the TKIP or AES encryption process to encrypt data exchanged between them DD Wireless LANs ZyXEL G 360 User s Guide Internet JJ Na Diagram 27 WPA 2 PSK Authentication WPA 2 with RADIUS Application Example You need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA 2 application example with an external RADIUS server looks as follows A is the RADIUS server DS is the distribution system 1 The AP passes the wireless client s authentication request to the RADIUS server 2 The RADIUS server then checks the user s identification against its database and grants or denies network access accordingly 3 The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients Wireless LANs EE ZyXEL G 360 User s Guide J TI Internet 3 J Diagram 28 WPA 2 with RADIUS Application Example FF Wireless LANs ZyXEL G 360 User s Guide Appendix E Types of EAP Authentication This appendix discusses the five popular EAP authentication types EAP MDS EAP TLS EAP TTLS PEAP and LEAP The type of authentication you use depends on the RADIUS server Consult your network administrator
68. sensitive Save Click Save to save the changes and display the Link Info screen Otherwise click the close EI button to discard changes and go back to the previous screen 4 4 Security Settings ZyXEL G 360 User s Guide 4 3 2 WPA PSK WPA2 PSK Security Settings Confirm New Settings gt Encryption Type TKIP E gt Pass Phrase qwerl 234 Figure 4 2 Security Settings WPA PSK WPA2 PSK The following table describes the labels in this screen Table 4 3 Security Settings WPA PSK WPA2 PSK FIELD DESCRIPTION Encryption Type WPA uses TKIP and WPA2 uses AES to improve data encryption Pass Phrase The encryption mechanisms used for WPA 2 and WPA 2 PSK are the same The only difference between the two is that WPA 2 PSK uses a simple common password instead of user specific credentials Type the passphrase same as the AP or peer device from 8 to 63 case sensitive ASCII characters including spaces and symbols Save Click Save to save the changes and display the Link Info screen Otherwise click the close EI button to discard changes and go back to the previous screen Security Settings 4 5 ZyXEL G 360 User s Guide 4 3 3 WPA WPAZ or 802 1x Security Settings gt Authentication Type EAP TTLS validate server certificate Click to Enable or Disable gt TILS Protocal PAP X Figure 4 3 Security Settings WPA WPA2
69. settings Unsecured wireless network cpe 5236 amp Security enabled wireless network WPA CPE 5257 02 amp Security enabled wireless network WPA Diagram 3 Windows XP SP2 Wireless Network Connection D Disable Windows XP Wireless LAN Configuration Tool ZyXEL G 360 User s Guide 3 Inthe Wireless Network Connection Properties window make sure the Use Windows to configure my wireless network settings check box is not selected Click OK 4 Wireless Network Connection Properties Id General Wireless Networks Authentication Advanced Available networks SOC TEST 4 CPESW3 Preferred networks Learn about setting up wireless network confiquration Diagram 4 Windows XP SP1 Wireless Network Connection Properties Disable Windows XP Wireless LAN Configuration Tool E ZyXEL G 360 User s Guide Wireless Network Connection 7 Properties E General Wireless Networks Advanced Ayailable networks To connect to disconnect from or find out more information about wireless networks in range click the button below View Wireless Networks Preferred networks Learn about setting up wireless network configuration Diagram 5 Windows XP SP2 Wireless Network Connection Properties Via the Control Panel 1 If the icon for the wireless network connection is not in the system tray click Start Control Panel and double click Network Connections Dis
70. thentication Type sd i hse tices Casas Here ee iet ee E e i eee ete Reina 4 2 4 3 Configuring Security Settings sese eene eerte tnnt Ge Ge ee GR Ge ee RA ge AA Ge roeal 4 2 4 3 1 WEP Enchy pl a da cas Ea 4 3 4 3 2 WPA PSK WPAJ2 PSK cinc cate 4 5 4 3 3 WPA WPA2 Or 802 lirica pe donk Re Geen SE Pe eed ee qd 4 6 Chapter 5 Profile 5 1 5 1 Configuring the Profile screen esee GR ee Re RA Ge Re Ge Re Ge ee ee Ge RA Ge ee Gee 5 1 5 1 1 Adding New Profile iii acidos 5 2 Chapter h Adi sida 6 1 6 1 Introduction to DTS este t o ee e t e ce RU das 6 1 Table of Contents V ZyXEL G 360 User s Guide 6 1 1 Enabling OTIS Tasso dada 6 1 6 1 2 Starting OTIS Toco dabas 6 2 6 1 3 Notes on Q TIS E nite enter e n e b 6 3 6 2 Configuring the De KG EO RE EE N i 6 4 Chapter AAA OER OE ER N OR OE EE osoo 7 1 7 1 EER NE i i EE CoD 7 1 7 2 Uninstalling the ZyXEL Utility se es se ee Ge Ge Re Ge Re Ge ee GR Ge cananea ee SR be AA Ge Re Ge ee ee 7 2 7 3 Upgrading the ZyXEL EG EE ee EE OE besa ni n 7 2 Chapter 8 Troubleshooting ss iese SN 8 1 8 1 Problems Starting the ZyXEL Utility Program eese 8 1 8 amp 2 Problem withthe Link Status ii satis 8 2 8 3 Problems Communicating With Other Computers esee eere 8 2 4 Related Documentation ee GE ais 8 3 8 5 User Guide Feed bach ii t dtes otn 8 3 8 6 BANE
71. tible to brute force password guessing attacks but it s still an improvement over WEP as it employs an easier to use consistent single alphanumeric password User Authentication WPA or WPA2 applies IEEE 802 1x and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database If both an AP and the wireless clients support WPA2 and you have an external RADIUS server use WPA2 for stronger data encryption If you don t have an external RADIUS server you should use WPA2 PSK WPA2 Pre Shared Key that only requires a single identical password entered into each access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS server or not Select WEP only when the AP and or wireless clients do not support WPA or WPA2 WEP is less secure than WPA or WPA2 WPA 2 PSK Application Example A WPA 2 PSK application looks as follows 1 First enter identical passwords into the AP and all wireless clients The Pre Shared Key PSK must consist of between 8 and 63 ASCII characters including spaces and symbols 2 The AP checks each wireless client s password and only allows it to join the network if the password matches 3 The AP derives and distributes keys to the wireless clients 4 The AP and wireless client
72. to associate with a peer device Next Click Next to go to the next screen Profile 5 3 ZyXEL G 360 User s Guide Table 5 2 Profile Add New Profile LABEL DESCRIPTION Exit Click Exit to go back to the previous screen without saving Scan Info This table displays the information of the available wireless networks within the transmission range T A Ti denotes that the wireless device is in infrastructure mode a or a denotes that the wireless device is in Ad Hoc mode displays with the previous two icons if the wireless devices are using security SSID This field displays the SSID Service Set IDentifier of each wireless device Scan Click Scan to search for available wireless devices within transmission range Select Select an available wireless device in the table and click Select to add it to this profile Whenever you activate this profile the G 360 associates with the selected wireless network only 5 4 Profile ZyXEL G 360 User s Guide Step 2 If you select the Infrastructure network type in the previous screen skip to Step 3 If you select the Ad Hoc network type in the previous screen a screen displays as follows Select the same channel number as the peer device and click Next to continue Link Info Site Survey Profile Adapter Confirm New Settings channel gt Figure 5 3 Pr
73. twork Connection screen see Diagram 14 The screen displays as shown Management with Wireless Zero Configuration ZyXEL G 360 User s Guide 1 Wireless Network Connection 7 Properties General Wireless Networks Advanced Use Windows to configure my wireless network settings Available networks To connect to disconnect from or find out more information about wireless networks in range click the button below View Wireless Networks Preferred networks Automatically connect to available networks in the order listed 1 ZIXEL MIS Automatic below cpe 5236 Automatic Q Wireless Automatic A TI demo Automatic Add Properties Learn about setting up wireless network configuration Diagram 22 Windows XP SP2 Wireless Networks Preferred Networks Windows XP SP1 In the Wireless Network Connection Status screen click Properties and the Wireless Networks tab to open the screen as shown Management with Wireless Zero Configuration Y ZyXEL G 360 User s Guide Diagram 23 Windows XP SP1 Wireless Networks Preferred Networks 2 Whenever the G 360 tries to connect to a new network the new network is added in the Preferred networks table automatically Select a network and click Move up or Move down to change it s order click Remove to delete it or click Properties to view the security authentication or connection information of the selected network Click Add to add a preferred net
74. urity Settings The Security Settings screen displays when you configure the G 360 to connect to a network with wireless security activated This screen also displays when you add a new profile or edit an existing profile The screen varies according to the selected encryption method Enter the exact same settings for example the encryption type key or certificate as the wireless network you want to join 4 2 Security Settings ZyXEL G 360 User s Guide 4 3 1 WEP Encryption Security Settings Confirm New Settings gt WEP fi28biis e gt Authentication open wi gt Pass Phrase gt Transmit Key fi o Figure 4 1 Security Settings WEP The following table describes the labels in this screen Table 4 2 Security Settings WEP LABEL DESCRIPTION WEP Select 64 Bits 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields Authentication Select Share to authenticate the G 360 to an AP or peer WLAN device using the key s configured below Otherwise select Open if you want to connect to any AP or peer device without sharing a key Refer to Section 4 2 for more information Pass Phrase As you enter the passphrase the G 360 automatically generates four different WEP keys and displays one in the key field below Refer to Section 4 1 1 for more information Transmit Key Select a default WEP key to use for data encryption The key disp
75. urrent data transmission rate in kilobits per second Kbps Receive This field displays the current data receiving rate in kilobits per second Kbps 2 4 Link Info ZyXEL G 360 User s Guide Chapter 3 Site Survey This chapter provides a detailed description about the Site Survey screen See the Getting Stated chapter for how to connect to a network using the Site Survey screen 3 1 Configuring the Site Survey screen Click the Site Survey tab and use this screen to scan for a wireless network and connect to it Tink Info Site Survey Profile Adapter Available Network List Site Information sw Chanel signal SA T ZyXEL 6 78 Network Type Infrastructure PM2 b3000 B 53 Channel 6 ZyXEL B B1 Encryption Disabled T ZyXEL MIS 3 23 MAC Address 00 13 49 00 00 01 Wireless_ 6 23 Surveyed at 09 29 15 hungbil 11 23 Tile ZWEL MIS 3 2 Y Scan Connect Figure 3 1 Site Survey The following table describes the labels in this screen Site Survey 3 1 ZyXEL G 360 User s Guide Table 3 1 Site Survey LABEL DESCRIPTION Available Network List The wireless network to which the G 360 is associated is bolded Click a column heading to sort the entries A triangle indicates ascending or descending sort order T ay denotes that the wireless device is in infrastructure mode L or L
76. work into the list manually 4 Wireless Network Connection 6 Properties General Wireless Networks Advanced Use Windows to configure my wireless network settings Available networks To connect to an available network click Configure L cpe swi 5275 A cpe 5254 g2kplus zw 04 E Preferred networks Automatically connect to available networks in the order listed below Q Zw704 3225 p334 E Learn about setting up wireless network configuration Management with Wireless Zero Configuration ZyXEL G 360 User s Guide Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad hoc and infrastructure wireless LAN topologies Ad Hoc IBSS The simplest WLAN configuration is an independent Ad hoc WLAN that connects a set of computers with wireless clients Any time two or more wireless adapters are within range of each other they can set up an independent network which is commonly referred to as an Ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an Ad hoc wireless LAN Ad hoc mode does not require an AP or a wired network sr an gt I 1 l Ad hoc i IBSS m AE Diagram 24 IBSS Example To set up an ad hoc network configure all wireless clients in ad hoc network type and use the same SSID
77. yxel co uk 44 0 1344 303044 www zyxel co uk ZyXEL Communications UK Ltd 08707 555779 UK 11 The Courtyard Eastern Road only Bracknell Berkshire RG12 2XB zyxel co u 44 0 1344 303034 fto zyxel co uk United Kingdom UK UNITED KINGDOM 8 4 Troubleshooting ZyXEL G 360 User s Guide Appendix A Product Specifications Product Name ZyXEL G 360 802 11g Wireless PCI Adapter Type 3 3V 32 bit PCI V2 2 IEEE 802 11b Standards IEEE 802 11g Infrastructure Network Architectures Ad Hoc Operating Frequencies 2 412 2 483GHz Industrial Scientific Medical Band Operating Channels IEEE 802 11b 11 Channels North America IEEE 802 11g 11 Channels North America IEEE 802 11b 13 Channels Europe IEEE 802 11g 13 Channels Europe IEEE 802 11b 22 11 5 5 2 1Mbps Data Rate IEEE 802 119 125 54 48 36 24 18 12 9 6 Mbps IEEE 802 11g Orthogonal Frequency Division Multiplexing 64QAM 16QAM y QPSK and BPSK Modulation IEEE 802 11b PBCC Direct Sequence Spread Spectrum CCK DQPSK DBPSK Security 64 128 256 bit WEP 802 1x WPA PSK WPA WPA2 PSK WPA2 Operating Temperature 0 50 degrees Centigrade Storage Temperature 30 60 degrees Centigrade Operating Humidity 20 95 non condensing Storage Humidity 20 95 non condensing Power Consumption IEEE 802 119 TX 600mA IEEE 802 11b TX 600mA RX 450mA max RX 450

Download Pdf Manuals

image

Related Search

Related Contents

VIESMANN - Viessmann  Italiano - to site  Blanco 501-117-A User's Manual  Model 6390 User guide - Fitch Security Integration  ITW Devcon Material Safety Data Sheet  Ultra Bar 12 User Manual  OM, 254 XP, 257, 262 XP, 2002-02  69081-Batidora con jarra de cristal.qxd  

Copyright © All rights reserved.
Failed to retrieve file