ZyXEL G-162/G-360 User’s Guide
802.11b/g Wireless LAN Adapter
ZyXEL G-162/G-360
Users Guide
Copyright
Copyright 2005 by ZyXEL Communications Corporation
Disclaimer
Trademarks
ZyXEL Limited Warranty
Online Registration
FCC Certification
Part 15, Class B
Federal Communications Commission FCC Interference Statement
Customer Support
Table of Contents
viii
2-15
Chapter 2 Wireless LAN Networking
Table Of Contents
ZyXEL G-162/G-360 User’s Guide
Preface
About This Users Guide
Syntax Conventions
Related Documentation
Graphics Icons Key
Preface
Wireless Access Point
Wireless Signal
Page
1.2 ZyXEL G-162/G-360 Hardware and Utility Installation
1.3 Using the ZyXEL Utility to Configure Your Network
Chapter Getting Started
1.1 About Your ZyXEL G-162/G-360
Double-clicking on the Z icon will display the following ZyXEL utility window
1.3.1 Site Survey
Use Windows Zero Configuration
Configure
Connect
Rescan
should use the same SSID whatever your choice is
e. Band shows you 802.11b and 802.11g on the 2.4GHz
2.2 Enable CCX Mode refers the Cisco Compatible Extension, which is the certificate-based authentications EAP-TLS, PEAP and LEAP using dynamic keys for data encryption. Check this box will enable PEAP-MS-CHAP-V2, PEAP-GTC, TLS and LEAP. Please see your MIS administrator for these settings when you are about to enable one of these mode. Please refer to Ch4-Configuring Wireless Security for detail WEP-802.1x and WPA-802.1x authentication information. Also, please see the User Guide of Funk Odyssey software for more WPA-enterprise security settings
Advanced Mode This screen Bottom Red Rectangle allows you to make changes to the default ways the card operates including advanced 802.11 settings. Unless you are an advanced user and have deep knowledge about each property on this page, it is recommended that you leave them at the default settings. For more information, please refer to section 2.3 and
1.3.2 Profile
Profile Pool
Active Profiles
1.3.3 Link Info
supporting OTIST, you must also make the same change here
Table 1.2 Link Info
Receive
Transmit
Connection Information
Network Information
1-13
1.3.4 About
ZyXEL Website
Chapter Wireless LAN Networking
2.1.4 Wireless Network Application
2.1 Overview
2.1.1 SSID
Ad-Hoc IBSS
Figure 2-1 IBSS Example
type and use the same SSID and channel Infrastructure BSS
Figure 2-2 BSS Example
2.1.5 Roaming
Figure 2-3 Infrastructure Network Example
2.2 Wireless LAN Security
Figure 2-5 Wireless LAN Security Levels
Figure 2-4 Roaming Example
2.2.1 Data Encryption with WEP
2.2.2 WPA-PSK and WPA2-PSK Application Example
Figure 2-6 WPA-PSK/WPA2-PSK Authentication
2.2.3 WPA and WPA2 with RADIUS Application Example
EAP Authentication
2.2.4 IEEE
Figure 2-7 WPA/WPA2 with RADIUS Application Example
2.3 Fragmentation Threshold
2.4 RTS/CTS Threshold
Figure 2-8 RTS Threshold
The wireless adapter must also support OTIST and have OTIST enabled
2.5 OTIST One Touch Intelligent Security Technology
negatively affect the throughput performance
Page
Chapter Maintenance
Maintenance
3.1 The About Screen
ZyXEL G-162/G-360 User’s Guide
3.2 Uninstalling the ZyXEL Utility
About
network configuration
3.3 Upgrading the ZyXEL Utility
Page
Chapter Configuring Wireless Security
4.1 Configuring Security
AP/Router, it will fail to connect the network
4.2 Configuring WEP
1. Select WEP under Security 2. Select Auto under Authentication Mode
3. Click Configure. You will then see the screen below
Wireless Security
6. Key Format Select either Hex or ASCII to enter the WEP key
4.3 Configuring WPA-PSK
4. Enter the same pass phrase used to configure WPA-PSK on your access point
4.4 Configuring WPA2-PSK
Wireless Security
ZyXEL G-162/G-360 User’s Guide
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.5 Configuring WEP-802.1x
4.5.1 Configuring WEP-802.1x EAP-LEAP
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-10
b. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.5.2 Configuring WEP-802.1x EAP-PEAP-MS-CHAPv2
4-11
Wireless Security
ZyXEL G-162/G-360 User’s Guide
8. Select a certificate from the list, and click OK
4.5.3 Configuring WEP-802.1x PEAP-GTC
4-13
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-14
b. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.5.4 Configuring WEP-802.1x EAP-TLS
4-15
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-16
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.6 Configuring WPA-802.1x
4.6.1 Configuring WPA-802.1x EAP-LEAP
4-18
7. Select WPA under Security 8. Select LEAP under Authentication Mode
9. Click Configure and then you will see the screen below
4-19
d. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.6.2 Configuring WPA-802.1x EAP-PEAP-MS-CHAPv2
4-20
10. Select PEAP MS-CHAP-V2 under Authentication protocol
11. Click Configure and then you will see the screen below
16. Select a certificate from the list, and click OK
4.6.3 Configuring WPA-802.1x PEAP-GTC
4-22
5. Select PEAP-GTC under Authentication Mode
6. Click Configure and then you will see the screen below
4-23
b. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.6.4 Configuring WPA-802.1x EAP-TLS
4-24
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-25
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.6.5 Configuring WPA2-802.1x EAP-TLS
4-26
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-27
Wireless Security
ZyXEL G-162/G-360 User’s Guide
Page
Chapter Troubleshooting
5.1 Problems Starting the ZyXEL Utility Program
Table 5-1 Troubleshooting Starting ZyXEL Utility Program
Troubleshooting
5.2 Problems with LED Status
5.3 Problems with the Link Status
5.4 Problems with Security Settings
Table 5-2 Troubleshooting LED Status
5.5 Problems Communicating With Other Computers
Table 5-5 Troubleshooting Communication Problems
Troubleshooting
ZyXEL G-162/G-360 User’s Guide
Page
Appendix A Types of EAP Authentication
EAP-TTLS Tunneled Transport Layer Service
EAP-MD5 Message-Digest Algorithm
EAP-TLS Transport Layer Security
Comparison of EAP Authentication Types
LEAP