802.11b/g Wireless LAN Adapter
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360
Users Guide
Copyright 2005 by ZyXEL Communications Corporation
Copyright
Disclaimer
Trademarks
Online Registration
ZyXEL Limited Warranty
Federal Communications Commission FCC Interference Statement
FCC Certification
Part 15, Class B
Customer Support
viii
Table of Contents
2-15
Chapter 2 Wireless LAN Networking
ZyXEL G-162/G-360 User’s Guide
Table Of Contents
About This Users Guide
Preface
Syntax Conventions
Related Documentation
Preface
Graphics Icons Key
Wireless Access Point
Wireless Signal
Page
1.3 Using the ZyXEL Utility to Configure Your Network
1.2 ZyXEL G-162/G-360 Hardware and Utility Installation
Chapter Getting Started
1.1 About Your ZyXEL G-162/G-360
Double-clicking on the Z icon will display the following ZyXEL utility window
1.3.1 Site Survey
Configure
Use Windows Zero Configuration
Connect
Rescan
should use the same SSID whatever your choice is
e. Band shows you 802.11b and 802.11g on the 2.4GHz
2.2 Enable CCX Mode refers the Cisco Compatible Extension, which is the certificate-based authentications EAP-TLS, PEAP and LEAP using dynamic keys for data encryption. Check this box will enable PEAP-MS-CHAP-V2, PEAP-GTC, TLS and LEAP. Please see your MIS administrator for these settings when you are about to enable one of these mode. Please refer to Ch4-Configuring Wireless Security for detail WEP-802.1x and WPA-802.1x authentication information. Also, please see the User Guide of Funk Odyssey software for more WPA-enterprise security settings
Advanced Mode This screen Bottom Red Rectangle allows you to make changes to the default ways the card operates including advanced 802.11 settings. Unless you are an advanced user and have deep knowledge about each property on this page, it is recommended that you leave them at the default settings. For more information, please refer to section 2.3 and
1.3.2 Profile
Active Profiles
Profile Pool
1.3.3 Link Info
Receive
supporting OTIST, you must also make the same change here
Table 1.2 Link Info
Connection Information
Transmit
Network Information
1-13
ZyXEL Website
1.3.4 About
2.1.4 Wireless Network Application
Chapter Wireless LAN Networking
2.1 Overview
2.1.1 SSID
Figure 2-1 IBSS Example
Ad-Hoc IBSS
type and use the same SSID and channel Infrastructure BSS
Figure 2-2 BSS Example
Figure 2-3 Infrastructure Network Example
2.1.5 Roaming
Figure 2-4 Roaming Example
2.2 Wireless LAN Security
Figure 2-5 Wireless LAN Security Levels
2.2.2 WPA-PSK and WPA2-PSK Application Example
2.2.1 Data Encryption with WEP
2.2.3 WPA and WPA2 with RADIUS Application Example
Figure 2-6 WPA-PSK/WPA2-PSK Authentication
Figure 2-7 WPA/WPA2 with RADIUS Application Example
EAP Authentication
2.2.4 IEEE
Figure 2-8 RTS Threshold
2.3 Fragmentation Threshold
2.4 RTS/CTS Threshold
negatively affect the throughput performance
The wireless adapter must also support OTIST and have OTIST enabled
2.5 OTIST One Touch Intelligent Security Technology
Page
Maintenance
Chapter Maintenance
3.1 The About Screen
ZyXEL G-162/G-360 User’s Guide
About
3.2 Uninstalling the ZyXEL Utility
3.3 Upgrading the ZyXEL Utility
network configuration
Page
AP/Router, it will fail to connect the network
Chapter Configuring Wireless Security
4.1 Configuring Security
1. Select WEP under Security 2. Select Auto under Authentication Mode
4.2 Configuring WEP
3. Click Configure. You will then see the screen below
Wireless Security
6. Key Format Select either Hex or ASCII to enter the WEP key
4.3 Configuring WPA-PSK
4. Enter the same pass phrase used to configure WPA-PSK on your access point
ZyXEL G-162/G-360 User’s Guide
4.4 Configuring WPA2-PSK
Wireless Security
ZyXEL G-162/G-360 User’s Guide
Wireless Security
4.5 Configuring WEP-802.1x
ZyXEL G-162/G-360 User’s Guide
4.5.1 Configuring WEP-802.1x EAP-LEAP
Wireless Security
b. Enter login name and password under the Login Name and Password
4-10
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-11
4.5.2 Configuring WEP-802.1x EAP-PEAP-MS-CHAPv2
Wireless Security
ZyXEL G-162/G-360 User’s Guide
8. Select a certificate from the list, and click OK
4-13
4.5.3 Configuring WEP-802.1x PEAP-GTC
Wireless Security
ZyXEL G-162/G-360 User’s Guide
b. Enter login name and password under the Login Name and Password
4-14
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-15
4.5.4 Configuring WEP-802.1x EAP-TLS
Wireless Security
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-16
Wireless Security
4.6 Configuring WPA-802.1x
4-18
4.6.1 Configuring WPA-802.1x EAP-LEAP
7. Select WPA under Security 8. Select LEAP under Authentication Mode
9. Click Configure and then you will see the screen below
d. Enter login name and password under the Login Name and Password
4-19
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-20
4.6.2 Configuring WPA-802.1x EAP-PEAP-MS-CHAPv2
10. Select PEAP MS-CHAP-V2 under Authentication protocol
11. Click Configure and then you will see the screen below
16. Select a certificate from the list, and click OK
4-22
4.6.3 Configuring WPA-802.1x PEAP-GTC
5. Select PEAP-GTC under Authentication Mode
6. Click Configure and then you will see the screen below
b. Enter login name and password under the Login Name and Password
4-23
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-24
4.6.4 Configuring WPA-802.1x EAP-TLS
Wireless Security
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-25
Wireless Security
4-26
4.6.5 Configuring WPA2-802.1x EAP-TLS
Wireless Security
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-27
Wireless Security
Page
5.1 Problems Starting the ZyXEL Utility Program
Chapter Troubleshooting
Table 5-1 Troubleshooting Starting ZyXEL Utility Program
Troubleshooting
5.3 Problems with the Link Status
5.2 Problems with LED Status
5.4 Problems with Security Settings
Table 5-2 Troubleshooting LED Status
Table 5-5 Troubleshooting Communication Problems
5.5 Problems Communicating With Other Computers
Troubleshooting
ZyXEL G-162/G-360 User’s Guide
Page
EAP-TTLS Tunneled Transport Layer Service
Appendix A Types of EAP Authentication
EAP-MD5 Message-Digest Algorithm
EAP-TLS Transport Layer Security
LEAP
Comparison of EAP Authentication Types