Users Guide
ZyXEL G-162/G-360 User’s Guide
802.11b/g Wireless LAN Adapter
ZyXEL G-162/G-360
Trademarks
Copyright
Copyright 2005 by ZyXEL Communications Corporation
Disclaimer
Online Registration
ZyXEL Limited Warranty
Part 15, Class B
FCC Certification
Federal Communications Commission FCC Interference Statement
Customer Support
Chapter 2 Wireless LAN Networking
Table of Contents
viii
2-15
ZyXEL G-162/G-360 User’s Guide
Table Of Contents
Related Documentation
Preface
About This Users Guide
Syntax Conventions
Wireless Signal
Graphics Icons Key
Preface
Wireless Access Point
Page
1.1 About Your ZyXEL G-162/G-360
1.2 ZyXEL G-162/G-360 Hardware and Utility Installation
1.3 Using the ZyXEL Utility to Configure Your Network
Chapter Getting Started
Double-clicking on the Z icon will display the following ZyXEL utility window
1.3.1 Site Survey
Rescan
Use Windows Zero Configuration
Configure
Connect
should use the same SSID whatever your choice is
e. Band shows you 802.11b and 802.11g on the 2.4GHz
2.2 Enable CCX Mode refers the Cisco Compatible Extension, which is the certificate-based authentications EAP-TLS, PEAP and LEAP using dynamic keys for data encryption. Check this box will enable PEAP-MS-CHAP-V2, PEAP-GTC, TLS and LEAP. Please see your MIS administrator for these settings when you are about to enable one of these mode. Please refer to Ch4-Configuring Wireless Security for detail WEP-802.1x and WPA-802.1x authentication information. Also, please see the User Guide of Funk Odyssey software for more WPA-enterprise security settings
Advanced Mode This screen Bottom Red Rectangle allows you to make changes to the default ways the card operates including advanced 802.11 settings. Unless you are an advanced user and have deep knowledge about each property on this page, it is recommended that you leave them at the default settings. For more information, please refer to section 2.3 and
1.3.2 Profile
Active Profiles
Profile Pool
1.3.3 Link Info
Table 1.2 Link Info
supporting OTIST, you must also make the same change here
Receive
1-13
Transmit
Connection Information
Network Information
ZyXEL Website
1.3.4 About
2.1.1 SSID
Chapter Wireless LAN Networking
2.1.4 Wireless Network Application
2.1 Overview
Figure 2-2 BSS Example
Ad-Hoc IBSS
Figure 2-1 IBSS Example
type and use the same SSID and channel Infrastructure BSS
Figure 2-3 Infrastructure Network Example
2.1.5 Roaming
Figure 2-5 Wireless LAN Security Levels
2.2 Wireless LAN Security
Figure 2-4 Roaming Example
2.2.2 WPA-PSK and WPA2-PSK Application Example
2.2.1 Data Encryption with WEP
2.2.3 WPA and WPA2 with RADIUS Application Example
Figure 2-6 WPA-PSK/WPA2-PSK Authentication
2.2.4 IEEE
EAP Authentication
Figure 2-7 WPA/WPA2 with RADIUS Application Example
2.4 RTS/CTS Threshold
2.3 Fragmentation Threshold
Figure 2-8 RTS Threshold
2.5 OTIST One Touch Intelligent Security Technology
The wireless adapter must also support OTIST and have OTIST enabled
negatively affect the throughput performance
Page
ZyXEL G-162/G-360 User’s Guide
Chapter Maintenance
Maintenance
3.1 The About Screen
About
3.2 Uninstalling the ZyXEL Utility
3.3 Upgrading the ZyXEL Utility
network configuration
Page
4.1 Configuring Security
Chapter Configuring Wireless Security
AP/Router, it will fail to connect the network
Wireless Security
4.2 Configuring WEP
1. Select WEP under Security 2. Select Auto under Authentication Mode
3. Click Configure. You will then see the screen below
6. Key Format Select either Hex or ASCII to enter the WEP key
4.3 Configuring WPA-PSK
4. Enter the same pass phrase used to configure WPA-PSK on your access point
Wireless Security
4.4 Configuring WPA2-PSK
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
Wireless Security
4.5 Configuring WEP-802.1x
Wireless Security
4.5.1 Configuring WEP-802.1x EAP-LEAP
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4-10
b. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.5.2 Configuring WEP-802.1x EAP-PEAP-MS-CHAPv2
4-11
Wireless Security
8. Select a certificate from the list, and click OK
ZyXEL G-162/G-360 User’s Guide
4.5.3 Configuring WEP-802.1x PEAP-GTC
4-13
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4-14
b. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.5.4 Configuring WEP-802.1x EAP-TLS
4-15
Wireless Security
Wireless Security
4-16
ZyXEL G-162/G-360 User’s Guide
4.6 Configuring WPA-802.1x
9. Click Configure and then you will see the screen below
4.6.1 Configuring WPA-802.1x EAP-LEAP
4-18
7. Select WPA under Security 8. Select LEAP under Authentication Mode
ZyXEL G-162/G-360 User’s Guide
4-19
d. Enter login name and password under the Login Name and Password
Wireless Security
11. Click Configure and then you will see the screen below
4.6.2 Configuring WPA-802.1x EAP-PEAP-MS-CHAPv2
4-20
10. Select PEAP MS-CHAP-V2 under Authentication protocol
16. Select a certificate from the list, and click OK
6. Click Configure and then you will see the screen below
4.6.3 Configuring WPA-802.1x PEAP-GTC
4-22
5. Select PEAP-GTC under Authentication Mode
ZyXEL G-162/G-360 User’s Guide
4-23
b. Enter login name and password under the Login Name and Password
Wireless Security
ZyXEL G-162/G-360 User’s Guide
4.6.4 Configuring WPA-802.1x EAP-TLS
4-24
Wireless Security
Wireless Security
4-25
ZyXEL G-162/G-360 User’s Guide
ZyXEL G-162/G-360 User’s Guide
4.6.5 Configuring WPA2-802.1x EAP-TLS
4-26
Wireless Security
Wireless Security
4-27
ZyXEL G-162/G-360 User’s Guide
Page
Troubleshooting
Chapter Troubleshooting
5.1 Problems Starting the ZyXEL Utility Program
Table 5-1 Troubleshooting Starting ZyXEL Utility Program
Table 5-2 Troubleshooting LED Status
5.2 Problems with LED Status
5.3 Problems with the Link Status
5.4 Problems with Security Settings
ZyXEL G-162/G-360 User’s Guide
5.5 Problems Communicating With Other Computers
Table 5-5 Troubleshooting Communication Problems
Troubleshooting
Page
EAP-TLS Transport Layer Security
Appendix A Types of EAP Authentication
EAP-TTLS Tunneled Transport Layer Service
EAP-MD5 Message-Digest Algorithm
LEAP
Comparison of EAP Authentication Types