Zoom 4410B User Manual Download Page 20

 

TTLS

 (

T

unneled 

T

ransport 

L

ayer 

S

ecurity). With TTLS, 

you can select from four authentication extensions: 

 

PAP 

(

P

assword 

A

uthentication 

P

rotocol) 

CHAP

 (

C

hallenge 

H

andshake 

A

uthentication 

P

rotocol) 

MS-CHAP

 (Microsoft’s version of CHAP). 

MS-CHAPV2 

(the default).  

 

SIM 

(

S

ubscriber

 I

dentity 

M

odule).

 

A SIM card stores the 

key used to identify a subscriber to a wireless service. 

5

 

Click the 

Certification

 tab and enter the required information 

(see page 23). 

6

 

Click 

OK

 to save your settings and return to the 

Configuration

 tab. 

7

 

On the 

Configuration

 tab, click 

Apply.

 

8

 

Click the 

Close

 box to exit the configuration software. 

That’s it! You have configured WPA2 security for your wireless 
connection, and you’re ready to use the Internet. 

WPA 

Select WPA if you are linking to a corporate network that uses a 
RADIUS (

R

emote 

A

uthentication 

D

ial-

I

U

ser 

S

ervice) server 

that does not support WPA2. 

1

 

In the 

Privacy Configuration

 window, click the 

Authentication Mode

 drop-down arrow and select 

WPA

20   

 

Wireless-G USB Adapter 

Summary of Contents for 4410B

Page 1: ...Wireless G USB Adapter U S E R G U I D E...

Page 2: ...Wireless G USB Adapter 2...

Page 3: ...re Shared Key 15 WEP Wired Equivalent Privacy 16 WPA2 18 WPA 20 Certificate WPA2 and WPA 23 WiFi Protected Setup WPS 24 Changing your Security Setting 26 3 Advanced Options 27 Creating Profiles 27 Mon...

Page 4: ...tures of the Wireless G USB configuration software Chapters 1 and 2 cover the basics what you need to get connected and to enable security If you are interested in the more advanced features of the Wi...

Page 5: ...art guide you can skip this chapter and begin with Chapter 2 Setting Security What s in the Package The adapter package includes the following Wireless G USB adapter CD containing the Installation Wiz...

Page 6: ...ars click Run Setup exe If a message appears saying An unidentified program wants access to your computer click Allow 2 On the Language Selection screen select your language 3 On the next screen selec...

Page 7: ...he USB Adapter and turn your computer back on To connect to a network 1 Double click the Zoom Wireless G USB icon on your desktop to open the Zoom Wireless G Configuration window Note that you also ha...

Page 8: ...s not have security you should now be connected To check your connection open your Web browser and go to your favorite site We highly recommend security Chapter 2 Setting Security on page 10 has descr...

Page 9: ...the LED on the Wireless G USB adapter are explained below LED Status Meaning Flashing The Wireless G USB adapter is attempting to connect to a wireless network Steady The Wireless G USB adapter is co...

Page 10: ...of six ways to configure and implement security for your wireless network WPA2 PSK WiFi Protected Access 2 Pre Shared Key This is the option we recommend if it is supported by the access point and the...

Page 11: ...DIUS Remote Authentication Dial In User Service authentication server and if the devices in the network support WPA2 select WPA2 This option provides security with AES Advanced Encryption Standard AES...

Page 12: ...pe is correct There are two types of wireless networks Infrastructure and Ad Hoc In an Infrastructure network wireless devices communicate with each other via a wireless access point router or ADSL mo...

Page 13: ...network you must set up Static IP addressing See Appendix A TCP IP Settings 4 Select the Enable Security check box to open the Security Configuration window For configuration instructions consult this...

Page 14: ...r the same network key that is used on the wireless access point We advise you to enter a key with a minimum of 20 random characters 4 Click OK to save your settings and return to the Configuration ta...

Page 15: ...2 At Encryption Mode accept the default TKIP Temporal Key Integrity Protocol 3 In the Pre shared key WPA area enter the same network key that is used on the wireless access point We advise a key with...

Page 16: ...guration window click the Authentication Mode drop down arrow and select Open recommended or Shared The USB Adapter automatically selects WEP as the Encryption Mode 2 In the Preconfigured key WEP area...

Page 17: ...xt box enter a key using the table below as a guide The key must be the same for all the devices on your network If you selected key type Enter exactly Hexadecimal digits 256 bits 58 Hexadecimal chara...

Page 18: ...ess connection and you re ready to use the Internet WPA2 Select WPA2 if you are linking to a corporate network that uses a RADIUS Remote Authentication Dial In User Service authentication server all o...

Page 19: ...ess access point which in turn sends the signal to the RADIUS server The server determines whether or not the client is allowed to join the network 4 Click the EAP Extensible Authentication Protocol T...

Page 20: ...r the required information see page 23 6 Click OK to save your settings and return to the Configuration tab 7 On the Configuration tab click Apply 8 Click the Close box to exit the configuration softw...

Page 21: ...network is selected With IEEE 802 1X authentication each wireless device client sends a signal to the wireless access point which in turn sends the signal to the RADIUS server The server determines wh...

Page 22: ...ication Protocol the most basic form of authentication CHAP Challenge Handshake Authentication Protocol MS CHAP Microsoft s version of CHAP MS CHAPV2 SIM Subscriber Identity Module A SIM card stores t...

Page 23: ...work administrator to confirm the user s identity and thereby maintain the security of the network If you are linking to a corporate network that uses an authentication server and you have configured...

Page 24: ...2 PSK or WPA PSK security To access WPS on the Configuration tab click the WPS button to open the WPS Config screen 1 If you are like most users you will want to join a wireless network WLAN so select...

Page 25: ...set up on the access point If security has not been set on the access point a random SSID and WPA key will be used b You can select PIN configuration if the access point does not have a hard or soft...

Page 26: ...ity Setting If the type of security on your wireless network changes you need to modify your security settings On the Configuration tab click the Configure Security button to select a different securi...

Page 27: ...want to connect to that particular network For example you may want to set up profiles for a work network and a home network each of which has different configuration settings By creating two profile...

Page 28: ...o to avoid interference it is desirable to have a 5 channel difference between your channel and the channel being used by another network within range Click Site Survey then Rescan to check the channe...

Page 29: ...p an ad hoc network as in this example only WEP security is available to you After you enter your security settings click OK to return to the Configuration tab 4 In the Configuration area click the Ap...

Page 30: ...oughput Packets sec TX number of packets transmitted per second without errors RX number of packets received per second without errors Link Quality Infrastructure only The transmission quality of the...

Page 31: ...y the MAC address BSSID of your wireless access point or wireless router Check the channel difference between your network and other networks within range Check the network type infrastructure or ad h...

Page 32: ...Basic Service Set Identifier A Basic Service Set consists of a wireless access point connected to wired network and a set of wireless devices In an infrastructure network the BSSID is the MAC address...

Page 33: ...point that it is in Power Save mode The access point buffers all packets until it is polled by the adapter Note The access point you use must also support Power Save Frag Data fragmentation Threshold...

Page 34: ...dvanced users will know other ways to set up their networks Please go to the section that corresponds to your Windows operating system Windows Vista 1 Follow these steps to open the TCP IPv4 or TCP IP...

Page 35: ...c In the Network Connections window double click the Wireless Network Connection option d In the Wireless Network Connection Status dialog box click the Properties button Appendix A TCP IP Settings 35...

Page 36: ...fer to page 12 2 For Ad Hoc Networks In the TCP IPv4 or TCP IPv6 Properties dialog box on the General tab complete the following to set static IP addressing a Ensure that Obtain an IP address automati...

Page 37: ...c network e Click OK twice That s it You have set static IP addressing for a Windows Vista computer in an ad hoc network 3 For Infrastructure Networks To verify your DHCP settings complete the followi...

Page 38: ...ructure network continue with step 3a If you re not sure what kind of network you have refer to page 12 2 For Ad Hoc Networks Complete the following to set static IP addressing a Ensure that Obtain an...

Page 39: ...be blank c Click OK twice to exit That s it You have verified your DHCP settings for a Windows XP computer in an infrastructure network Windows 2000 1 Follow these steps to open the Internet Protocol...

Page 40: ...ains the same for each computer in your ad hoc network d Enter 10 0 0 5 for Default gateway and Preferred DNS server This is the IP address of the first computer that was set up in your ad hoc network...

Page 41: ...gain to connect your wireless adapter to a network If you are using the short USB cable try changing the orientation of the USB adapter Turn the computer off then on and then check to see if the adapt...

Page 42: ...s the same remember that the keys are case sensitive 3 Check your TCP IP settings as discussed in Appendix A of the User Guide 4 If the adapter still does not work uninstall the software and then re i...

Page 43: ...t Name __________________________________ Product Model Number __________________________________ Product Serial Number __________________________________ Date Installed _______________________ The se...

Page 44: ...Smart Facts is an automated intelligent database of Frequently Asked Questions FAQ s about Zoom products It allows you to search for solutions to your Technical Support questions by product or via a p...

Page 45: ...www zoom com techmail When emailing Zoom be sure to include the following Serial number of your adapter Your full name and address A detailed description of your problem Contact Zoom by Phone You can...

Page 46: ...t the customer is responsible for any charges including brokerage or customs and duties associated with shipping the defective unit to Zoom for repair During the first year Zoom will pay return shippi...

Page 47: ...quipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the F...

Page 48: ...n operation not in accordance with local regulations and may cause harmful interference to other systems The user is obligated to ensure that the device is operating according to the channel limitatio...

Page 49: ...die bereinstimmung des Ger tes modem mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999 5 EC Dieses Produkt ist das gekennzeichnete CE 1999 5 C CE Il forn...

Page 50: ...s and makes no warranty or representation either expressed or implied with respect to the quality performance merchantability or fitness for a particular purpose of the software or documentation The m...

Reviews: