ZyXEL G-162 User’s Guide

Table of Contents

Copyright.......................................................................................................................................................

ii

ZyXEL Limited Warranty ..........................................................................................................................

iii

Information for Canadian Users.................................................................................................................

iv

Federal Communications Commission (FCC) Interference Statement....................................................

v

Customer Support........................................................................................................................................

vi

List of Figures...............................................................................................................................................

xi

List of Tables ...............................................................................................................................................

xii

Preface.........................................................................................................................................................

xiii

Chapter 1 Getting Started.........................................................................................................................

1-1

1.1

About Your G-162 ........................................................................................................................

1-1

1.2

G-162 Hardware and Utility Installation.....................................................................................

1-1

1.3

Configuration Methods ................................................................................................................

1-1

1.4

Windows XP Users Only ..............................................................................................................

1-2

1.5

Accessing the ZyXEL Utility.........................................................................................................

1-2

Chapter 2 Wireless LAN Network............................................................................................................

2-1

2.1

Overview ......................................................................................................................................

2-1

2.1.1

SSID.....................................................................................................................................

2-1

2.1.2

Channel ................................................................................................................................

2-1

2.1.3

Transmission Rate (Transfer Rate).......................................................................................

2-1

2.1.4

Wireless Network Application .............................................................................................

2-1

2.1.5

Roaming ...............................................................................................................................

2-3

2.2

Wireless LAN Security..................................................................................................................

2-4

2.2.1

Data Encryption with WEP ..................................................................................................

2-5

2.2.2

IEEE 802.1x .........................................................................................................................

2-5

2.2.3

WPA.....................................................................................................................................

2-5

2.2.4

WPA-PSK Application Example .........................................................................................

2-6

2.2.5

WPA with RADIUS Application Example ..........................................................................

2-7

2.3

Fragmentation Threshold.............................................................................................................

2-8

2.4

RTS/CTS Threshold......................................................................................................................

2-8

2.5

Authentication Type .....................................................................................................................

2-9

2.6

OTIST (One-Touch Intelligent Security Technology).................................................................

2-10

Chapter 3 Using the ZyXEL Utility..........................................................................................................

3-1

3.1

The Link Info Screen ....................................................................................................................

3-1

3.1.1

Trend Chart ..........................................................................................................................

3-3

3.2

The Site Survey Screen .................................................................................................................

3-3

3.2.1

Connecting to a Network......................................................................................................

3-5

3.2.2

Security Settings...................................................................................................................

3-6

3.3

The Profile Screen......................................................................................................................

3-12

3.3.1

Adding a New Profile.........................................................................................................

3-14

Table of Contents

ix