ZyXEL G-162/G-360
ZyXEL G-162/G-360 User’s Guide
802.11b/g Wireless LAN Adapter
Users Guide
Disclaimer
Copyright
Copyright 2005 by ZyXEL Communications Corporation
Trademarks
ZyXEL Limited Warranty
Online Registration
Federal Communications Commission FCC Interference Statement
FCC Certification
Part 15, Class B
Customer Support
2-15
Table of Contents
viii
Chapter 2 Wireless LAN Networking
Table Of Contents
ZyXEL G-162/G-360 User’s Guide
Syntax Conventions
Preface
About This Users Guide
Related Documentation
Wireless Access Point
Graphics Icons Key
Preface
Wireless Signal
Page
Chapter Getting Started
1.2 ZyXEL G-162/G-360 Hardware and Utility Installation
1.3 Using the ZyXEL Utility to Configure Your Network
1.1 About Your ZyXEL G-162/G-360
Double-clicking on the Z icon will display the following ZyXEL utility window
1.3.1 Site Survey
Connect
Use Windows Zero Configuration
Configure
Rescan
should use the same SSID whatever your choice is
e. Band shows you 802.11b and 802.11g on the 2.4GHz
2.2 Enable CCX Mode refers the Cisco Compatible Extension, which is the certificate-based authentications EAP-TLS, PEAP and LEAP using dynamic keys for data encryption. Check this box will enable PEAP-MS-CHAP-V2, PEAP-GTC, TLS and LEAP. Please see your MIS administrator for these settings when you are about to enable one of these mode. Please refer to Ch4-Configuring Wireless Security for detail WEP-802.1x and WPA-802.1x authentication information. Also, please see the User Guide of Funk Odyssey software for more WPA-enterprise security settings
Advanced Mode This screen Bottom Red Rectangle allows you to make changes to the default ways the card operates including advanced 802.11 settings. Unless you are an advanced user and have deep knowledge about each property on this page, it is recommended that you leave them at the default settings. For more information, please refer to section 2.3 and
1.3.2 Profile
Profile Pool
Active Profiles
1.3.3 Link Info
Receive
supporting OTIST, you must also make the same change here
Table 1.2 Link Info
Network Information
Transmit
Connection Information
1-13
1.3.4 About
ZyXEL Website
2.1 Overview
Chapter Wireless LAN Networking
2.1.4 Wireless Network Application
2.1.1 SSID
type and use the same SSID and channel Infrastructure BSS
Ad-Hoc IBSS
Figure 2-1 IBSS Example
Figure 2-2 BSS Example
2.1.5 Roaming
Figure 2-3 Infrastructure Network Example
Figure 2-4 Roaming Example
2.2 Wireless LAN Security
Figure 2-5 Wireless LAN Security Levels
2.2.1 Data Encryption with WEP
2.2.2 WPA-PSK and WPA2-PSK Application Example
Figure 2-6 WPA-PSK/WPA2-PSK Authentication
2.2.3 WPA and WPA2 with RADIUS Application Example
Figure 2-7 WPA/WPA2 with RADIUS Application Example
EAP Authentication
2.2.4 IEEE
Figure 2-8 RTS Threshold
2.3 Fragmentation Threshold
2.4 RTS/CTS Threshold
negatively affect the throughput performance
The wireless adapter must also support OTIST and have OTIST enabled
2.5 OTIST One Touch Intelligent Security Technology
Page
3.1 The About Screen
Chapter Maintenance
Maintenance
ZyXEL G-162/G-360 User’s Guide
3.2 Uninstalling the ZyXEL Utility
About
network configuration
3.3 Upgrading the ZyXEL Utility
Page
AP/Router, it will fail to connect the network
Chapter Configuring Wireless Security
4.1 Configuring Security
3. Click Configure. You will then see the screen below
4.2 Configuring WEP
1. Select WEP under Security 2. Select Auto under Authentication Mode
Wireless Security
6. Key Format Select either Hex or ASCII to enter the WEP key
4.3 Configuring WPA-PSK
4. Enter the same pass phrase used to configure WPA-PSK on your access point
ZyXEL G-162/G-360 User’s Guide
4.4 Configuring WPA2-PSK
Wireless Security
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.5 Configuring WEP-802.1x
ZyXEL G-162/G-360 User’s Guide
4.5.1 Configuring WEP-802.1x EAP-LEAP
Wireless Security
Wireless Security
4-10
b. Enter login name and password under the Login Name and Password
ZyXEL G-162/G-360 User’s Guide
Wireless Security
4.5.2 Configuring WEP-802.1x EAP-PEAP-MS-CHAPv2
4-11
ZyXEL G-162/G-360 User’s Guide
8. Select a certificate from the list, and click OK
Wireless Security
4.5.3 Configuring WEP-802.1x PEAP-GTC
4-13
ZyXEL G-162/G-360 User’s Guide
Wireless Security
4-14
b. Enter login name and password under the Login Name and Password
ZyXEL G-162/G-360 User’s Guide
Wireless Security
4.5.4 Configuring WEP-802.1x EAP-TLS
4-15
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-16
Wireless Security
4.6 Configuring WPA-802.1x
7. Select WPA under Security 8. Select LEAP under Authentication Mode
4.6.1 Configuring WPA-802.1x EAP-LEAP
4-18
9. Click Configure and then you will see the screen below
Wireless Security
4-19
d. Enter login name and password under the Login Name and Password
ZyXEL G-162/G-360 User’s Guide
10. Select PEAP MS-CHAP-V2 under Authentication protocol
4.6.2 Configuring WPA-802.1x EAP-PEAP-MS-CHAPv2
4-20
11. Click Configure and then you will see the screen below
16. Select a certificate from the list, and click OK
5. Select PEAP-GTC under Authentication Mode
4.6.3 Configuring WPA-802.1x PEAP-GTC
4-22
6. Click Configure and then you will see the screen below
Wireless Security
4-23
b. Enter login name and password under the Login Name and Password
ZyXEL G-162/G-360 User’s Guide
Wireless Security
4.6.4 Configuring WPA-802.1x EAP-TLS
4-24
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-25
Wireless Security
Wireless Security
4.6.5 Configuring WPA2-802.1x EAP-TLS
4-26
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-27
Wireless Security
Page
Table 5-1 Troubleshooting Starting ZyXEL Utility Program
Chapter Troubleshooting
5.1 Problems Starting the ZyXEL Utility Program
Troubleshooting
5.4 Problems with Security Settings
5.2 Problems with LED Status
5.3 Problems with the Link Status
Table 5-2 Troubleshooting LED Status
Troubleshooting
5.5 Problems Communicating With Other Computers
Table 5-5 Troubleshooting Communication Problems
ZyXEL G-162/G-360 User’s Guide
Page
EAP-MD5 Message-Digest Algorithm
Appendix A Types of EAP Authentication
EAP-TTLS Tunneled Transport Layer Service
EAP-TLS Transport Layer Security
Comparison of EAP Authentication Types
LEAP