background image

ZyXEL G-570U User’s Guide

Chapter 6 Wireless Screens

63

6.3.2  Wireless Client Mode 

Select 

Wireless Client

 in the 

Operation Mode

 field to display the screen shown next. This 

mode has the device act as wireless client to connect to a wireless network.

Note: 

WPA, WPA2 and IEEE 802.1x wireless security are not available when you use 
Wireless Client, Bridge or AP+Repeater mode. 

Radio Enable

Turn on the wireless adapter to allow wireless communications between the device 

and other wireless devices.  Turn off the wireless adapter to stop wireless 

communications between the device and other wireless devices. 

Data Rate 

Management

Use this field to select a maximum data rate for the wireless connection(s). Please 

note that this is a total rate to be shared by all of the device’s wireless connections.

Preamble Type

Preamble is used to signal that data is coming to the receiver. 

Short

 and 

Long

 

refer to the length of the synchronization field in a packet. 
Short preamble increases performance as less time sending preamble means 

more time for sending data. All IEEE 802.11b compliant wireless adapters support 

long preamble, but not all support short preamble. 
Select 

Long

 preamble if you are unsure what preamble mode the wireless 

adapters support, and to provide more reliable communications in busy wireless 

networks. 
Select 

Dynamic

 to have the device automatically use short preamble when all 

wireless clients support it, otherwise the device uses long preamble.

Note: 

The device and the wireless stations MUST use the same 
preamble mode in order to communicate.

RTS/CTS 

Threshold

Enter a value between 0 and 2346. The default is

 2346

Fragmentation 

Enter a value between 256 and 2346. The default is 

2346

. It is the maximum data 

fragment size that can be sent.

Apply

Click 

Apply

 to save your changes back to the device.

Reset

Click 

Reset 

to begin configuring this screen afresh.

Table 11   

Wireless Settings: Access Point (continued)

LABEL

DESCRIPTION

Summary of Contents for G-570U

Page 1: ...ZyXEL G 570U IEEE 802 11a b g Wireless Access Point Bridge User s Guide Version 1 00 Edition 1 07 2006...

Page 2: ......

Page 3: ...XEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it con...

Page 4: ...be determined by turning the device off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increa...

Page 5: ...n and Switzerland with restrictions in France IEEE 802 11b or 802 11g operation of this product in the U S A is firmware limited to channels 1 through 11 This Class B digital apparatus complies with C...

Page 6: ...cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Connect the power adaptor or cord to the right supply voltage for example 110V...

Page 7: ...ZyXEL G 570U User s Guide Safety Warnings 7 This product is recyclable Dispose of it properly...

Page 8: ...ment as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or f...

Page 9: ...Modrany Cesk Republika info cz zyxel com 420 241 091 359 DENMARK support zyxel dk 45 39 55 07 00 www zyxel dk ZyXEL Communications A S Columbusvej 2860 Soeborg Denmark sales zyxel dk 45 39 55 07 07 FI...

Page 10: ...rt zyxel es 34 902 195 420 www zyxel es ZyXEL Communications Arte 21 5 planta 28033 Madrid Spain sales zyxel es 34 913 005 345 SWEDEN support zyxel se 46 31 744 7700 www zyxel se ZyXEL Communications...

Page 11: ...lications for the G 570U 26 1 3 1 Access Point for Internet Access 26 1 3 2 Corporate Network Access Application 26 1 3 3 Wireless Client Application 27 1 3 4 Bridge Repeater 27 1 3 5 Access Point and...

Page 12: ...4 Navigating the Advanced Screens 45 3 4 1 Navigation Panel 46 Chapter 4 Status Screens 49 4 1 System Status 49 4 1 1 Statistics 50 4 1 2 Association List 52 Chapter 5 System Screen 53 5 1 TCP IP Para...

Page 13: ...6 11 WPA 2 PSK Application Example 77 6 12 WPA 2 with RADIUS Application Example 77 6 13 Security Parameters Summary 78 6 14 Configuring Wireless Security 79 6 14 1 Wireless Security Disable 79 6 14 2...

Page 14: ...8 4 Problems with the Ethernet Interface 100 8 4 1 Pop up Windows JavaScripts and Java Permissions 101 8 4 1 1 Internet Explorer Pop up Blockers 101 8 4 1 2 JavaScripts 104 8 4 1 3 Java Permissions 10...

Page 15: ...gs 34 Figure 16 Wireless Connection 34 Figure 17 Web Configurator Address 38 Figure 18 Login Screen 38 Figure 19 Language Screen 38 Figure 20 Select Wizard or Advanced Setup Screen 39 Figure 21 Wizard...

Page 16: ...Figure 56 Security Key 89 Figure 57 OTIST in Progress AP 90 Figure 58 OTIST in Progress Client 90 Figure 59 No AP with OTIST Found 90 Figure 60 Start OTIST 91 Figure 61 Management Password 93 Figure...

Page 17: ...h OS X Apple Menu 125 Figure 94 Macintosh OS X Network 126 Figure 95 Red Hat 9 0 KDE Network Configuration Devices 127 Figure 96 Red Hat 9 0 KDE Ethernet Device General 127 Figure 97 Red Hat 9 0 KDE N...

Page 18: ...ZyXEL G 570U User s Guide 18 List of Figures...

Page 19: ...7 Wireless Security Disable 79 Table 18 Wireless Security WEP 80 Table 19 Wireless Security WPA PSK 81 Table 20 Wireless Security WPA 2 82 Table 21 Wireless Security 802 1x 84 Table 22 MAC Filter 86 T...

Page 20: ...41 Natural Masks 147 Table 42 Alternative Subnet Mask Notation 147 Table 43 Two Subnets Example 148 Table 44 Subnet 1 148 Table 45 Subnet 2 149 Table 46 Subnet 1 149 Table 47 Subnet 2 150 Table 48 Su...

Page 21: ...on and installation information ZyXEL Web Site Please go to http www zyxel com for product news firmware updated documents and other support materials User Guide Feedback Help us help you E mail all U...

Page 22: ...ZyXEL G 570U User s Guide 22 Preface Graphics Icons Key G 570U Computer Notebook computer Server Modem Wireless Signal Telephone Switch Router...

Page 23: ...encryption WPA Wi Fi Protected Access WPA2 and MAC address filtering to give mobile users highly secured wireless connectivity IEEE 802 11a IEEE 802 11b and IEEE 802 11g compliant wireless devices can...

Page 24: ...s in either half duplex or full duplex mode depending on your Ethernet network Ethernet port connections can be in half duplex or full duplex mode Full duplex refers to a device s ability to send and...

Page 25: ...he protocol to obtain confidential user information such as credit card numbers By convention URLs that require an SSL connection start with https instead of http Wireless LAN MAC Address Filtering Yo...

Page 26: ...U Here are some application examples of how you can use your G 570U 1 3 1 Access Point for Internet Access The G 570U is an ideal access solution for wireless Internet connection A typical Internet ac...

Page 27: ...The AP provides access to the wired network and the Internet Figure 4 Wireless Client Application 1 3 4 Bridge Repeater The G 570U can act as a wireless network bridge and establish wireless links wi...

Page 28: ...Access Point and Repeater Set the G 570U to AP Repeater mode to have it simultaneously provide access for wireless clients and use the repeater function This allows you to extend the coverage of your...

Page 29: ...0U is not receiving power ETHN Green Blinking The G 570U is sending receiving data On The G 570U has a successful 10Mbps Ethernet connection Amber Blinking The G 570U is sending receiving data On The...

Page 30: ...Security Technology is in progress Both LEDs blinking simultaneously OTIST One Touch Intelligent Security Technology is complete and the G 570U is attempting to connect to an access point Table 1 Fron...

Page 31: ...et mask must be on the same subnet as the G 570U This can be done by setting up your computer s IP address The following figure shows you an example of accessing your G 570U via a wired connection wit...

Page 32: ...GUI theme 1 Click start Start in Windows 2000 NT Settings Control Panel 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 11 Control Pa...

Page 33: ...an IP address between 192 168 1 3 and 192 168 1 254 Type 255 255 255 0 as the Subnet mask Click Advanced1 Figure 14 Internet Protocol Properties 6 Remove any previously installed gateways in the IP Se...

Page 34: ...l Area Connection Properties window 9 Close the Network Connections window Network and Dial up Connections in Windows 2000 NT 2 3 Wireless Connection Ensure that the wireless stations have a compatibl...

Page 35: ...e G 570U you will need to reload the factory default using the RESET button Resetting the G 570U replaces the current configuration file with the factory default configuration file This means that you...

Page 36: ...ZyXEL G 570U User s Guide 36 Chapter 2 Management Computer Setup...

Page 37: ...ult Java permissions enabled by default See the Troubleshooting chapter if you want to make sure these functions are allowed in Internet Explorer or Netscape Navigator 3 2 Accessing the G 570U Web Con...

Page 38: ...gin Screen 6 Select your language and click Apply Figure 19 Language Screen 7 The following screen displays Select Go Wizard Setup and click Apply to use the wizard setup screens for initial configura...

Page 39: ...e background information 1 Enter a descriptive name to identify the device in the Ethernet network 2 Select Obtain IP Address Automatically if you want to put the device behind a router that assigns a...

Page 40: ...02 11g wireless modes are different wireless communications standards If you choose 802 11a only 802 11b only or 802 11g only in the Wireless Mode field you will be able to communicate with other wire...

Page 41: ...elect WEP or select WPA PSK if your wireless clients support WPA PSK Select WPA2 PSK if your wireless clients support WPA2 PSK Go to Wireless Security if you want to use WPA2 WPA or 802 1x See Chapter...

Page 42: ...128 bit from the WEP Encryption drop down list box The higher the WEP encryption the higher the security but the slower the throughput 2 You can generate or manually enter a WEP key Enter a Passphrase...

Page 43: ...WEP 3 3 3 3 WPA 2 PSK Select WPA PSK or WPA2 PSK only if your wireless clients support it Type a pre shared key from 8 to 63 ASCII characters including spaces and symbols This field is case sensitive...

Page 44: ...igure 25 Wizard 3 WPA 2 PSK 3 3 4 Wizard Confirm Your Settings This read only screen shows the status of the current settings Use the summary table to check whether what you have configured is correct...

Page 45: ...ore detailed background information see the rest of this User s Guide 3 4 Navigating the Advanced Screens The STATUS screen is the first advanced screen that displays This section explains how to navi...

Page 46: ...st screens 3 4 1 Navigation Panel After you enter the password use the links on the navigation panel to go to the various advanced screens Table 4 Global Icon Key ICON DESCRIPTION Click the Wizard ico...

Page 47: ...address assignment settings Wireless Wireless Settings Use this screen to configure the wireless LAN Security Use this screen to configure wireless LAN security settings MAC Filter Use the MAC filter...

Page 48: ...ZyXEL G 570U User s Guide 48 Chapter 3 Introducing the Web Configurator...

Page 49: ...poses Figure 28 Status The following table describes the labels in this screen Table 6 Status LABEL DESCRIPTION Refresh Interval Use the drop down list box to select how often you want the device to r...

Page 50: ...IP address Subnet Mask This is the Ethernet port subnet mask Gateway IP Address This is the IP address of a gateway Leave this field as 0 0 0 0 if you do not know it Wireless Settings SSID This is the...

Page 51: ...roadcast Packets This row displays the numbers of broadcast packets received and transmitted by the wireless adapter Multicast Packets This row displays the numbers of multicast packets received and t...

Page 52: ...s of the access point to which the device is associated Figure 30 Status View Association List The following table describes the labels in this screen Table 8 Status View Association List LABEL DESCRI...

Page 53: ...dresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Note Regardless of your p...

Page 54: ...umber identifies an individual computer on that network Once you have decided on the network number pick an IP address that is easy to remember for instance 192 168 1 2 for your device but make sure t...

Page 55: ...low IP Address Enter the IP address of your device in dotted decimal notation Subnet Mask Enter the subnet mask Gateway IP Address Type the IP address of the gateway The gateway is a router or switch...

Page 56: ...ZyXEL G 570U User s Guide 56 Chapter 5 System Screen...

Page 57: ...eless adapters within range of each other that from an independent wireless network without the need of an access point AP Figure 32 IBSS Ad hoc Wireless LAN 6 1 2 BSS A Basic Service Set BSS exists w...

Page 58: ...ing BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution System DS An ESSID ESS IDentification u...

Page 59: ...interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To avoid interferenc...

Page 60: ...en a data frame exceeds the RTS CTS value you set between 0 to 2432 bytes the station that wants to transmit this frame must first send an RTS Request To Send message to the AP for permission to send...

Page 61: ...ference If the Fragmentation Threshold value is smaller than the RTS CTS value see previously you set then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be f...

Page 62: ...ow only IEEE 802 11b compliant WLAN devices to associate with the device Select 802 11g only to allow only IEEE 802 11g compliant WLAN devices to associate with the device Select Auto 11g 11b to allow...

Page 63: ...eiver Short and Long refer to the length of the synchronization field in a packet Short preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b c...

Page 64: ...tings of your computer to match the device s new settings Advanced Settings Radio Enable Turn on the wireless adapter to allow wireless communications between the device and other wireless devices Tur...

Page 65: ...ic between APs Figure 38 Bridging Example Be careful to avoid bridge loops when you enable bridging in the G 570U Bridge loops cause broadcast traffic to circle the network endlessly resulting in poss...

Page 66: ...nicating with another wireless bridge that is also connected to the same wired LAN as shown next Figure 40 Bridge Loop Bridge Connected to Wired LAN To prevent bridge loops ensure that your G 570U is...

Page 67: ...t Bridge and AP Repeater Note If you are configuring the device from a computer connected to the wireless LAN and you change the device to use bridge mode you will lose your wireless connection when y...

Page 68: ...en the device and other wireless devices Data Rate Management Use this field to select a maximum data rate for the wireless connection s Please note that this is a total rate to be shared by all of th...

Page 69: ...ces are allowed Note If you are configuring the device from a computer connected to the wireless LAN and you change the device s SSID channel or security settings you will lose your wireless connectio...

Page 70: ...aiting delivery The interval is a multiple of the beacon interval For example if the beacon interval is 100 milliseconds and the DTIM interval is 2 the AP includes a DTIM with every second beacon or e...

Page 71: ...e WP 2 A aware wireless clients and a RADIUS server WPA 2 has user authentication and improved data encryption over WEP Use WPA 2 PSK if you have WPA 2 aware wireless clients but no RADIUS server If y...

Page 72: ...hiding the G 570U may be inconvenience for some valid WLAN clients 6 5 WEP Overview WEP Wired Equivalent Privacy as specified in the IEEE 802 11 standard provides methods for both data encryption and...

Page 73: ...nge text and return it to the AP which attempts to decrypt the message using the AP s default WEP key If the decrypted message matches the challenge text the wireless station is authenticated When you...

Page 74: ...cess point requesting authentication Access Reject Sent by a RADIUS server rejecting access Access Accept Sent by a RADIUS server allowing access Access Challenge Sent by a RADIUS server requesting mo...

Page 75: ...oint Figure 44 EAP Authentication The details below provide a general description of how IEEE 802 1x EAP authentication works For an example list of EAP MD5 authentication steps see the IEEE 802 1x ap...

Page 76: ...ntered into each access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not support WP...

Page 77: ...the wireless clients 4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data exchanged between them Figure 45 WPA 2 PSK Authentication 6 12 WPA 2 with RADIUS Application...

Page 78: ...nual keys by first selecting 64 bit WEP or 128 bit WEP from the WEP Encryption field and then typing the keys in ASCII or hexadecimal format in the key text boxes MAC address filters are not dependent...

Page 79: ...creen 6 14 2 Wireless Security WEP WEP provides a mechanism for encrypting data using encryption keys Both the AP and the wireless stations must use the same WEP key to encrypt and decrypt data You ca...

Page 80: ...ter a passphrase password phrase of up to 16 case sensitive printable characters and click Generate Generate After you enter the passphrase click Generate to have the device generate four different WE...

Page 81: ...a encryption Table 19 Wireless Security WPA PSK LABEL DESCRIPTION Encryption Method Select WPA PSK WPA2 PSK or WPA PSK WPA2 PSK if you want to configure a pre shared key Choose this option only if you...

Page 82: ...ion Port Number Enter the port number of the external authentication server The default port number is 1812 You need not change this value unless your network administrator instructs you to do so with...

Page 83: ...uthentication Figure 51 Wireless Security 802 1x Global Key Update This is how often the AP sends a new group key out to all clients The re keying process is the WPA equivalent of automatically changi...

Page 84: ...characters or 10 hexadecimal characters 0 9 A F If you chose 128 bit WEP then enter 13 ASCII characters or 26 hexadecimal characters 0 9 A F Authentication Server IP Address Enter the IP address of th...

Page 85: ...nt to connect to an AP that uses a MAC filter After the device turns on in client mode it clones the MAC address of the first packets that it receives from devices connected to the Ethernet port It us...

Page 86: ...associate to permit access to the device MAC addresses not listed will be denied access to the device Select Deny the following MAC address to associate to block access to the device MAC addresses not...

Page 87: ...idn t configure one manually Note OTIST replaces the pre configured wireless settings on the wireless clients 6 16 1 Enabling OTIST G 570U in AP Mode You must enable OTIST on both the AP and wireless...

Page 88: ...setup key of up to eight printable characters The default OTIST setup key is 01234567 Note If you change the OTIST setup key here you must also make the same change on the wireless client s Yes To hav...

Page 89: ...Mode field Click on the OTIST tab The screen displays as shown Enter the same Setup Key as your AP s Click Start when you are ready to begin OTIST Figure 55 G 570U in Wireless Client Mode OTIST Screen...

Page 90: ...an OTIST enabled AP with the same Setup key Click OK to go back to the ZyXEL utility main screen Figure 59 No AP with OTIST Found If there is more than one OTIST enabled AP within range you see a scr...

Page 91: ...the search 3 When the wireless client finds an OTIST enabled AP you must still click Start in the AP OTIST web configurator screen or hold in the OTIST button for one or two seconds for the AP to tra...

Page 92: ...ZyXEL G 570U User s Guide 92 Chapter 6 Wireless Screens...

Page 93: ...ange the device s password If you forget your password or the device IP address you will need to reset the device See the section on resetting the device for details Figure 61 Management Password The...

Page 94: ...ave your changes back to the device Reset Click Reset to clear all fields in this screen Table 24 Management Password continued LABEL DESCRIPTION Table 25 Management Logs LABEL DESCRIPTION Display Sel...

Page 95: ...guration appears as shown next Figure 63 Management Configuration File 7 4 1 Backup Configuration Backup configuration allows you to back up save the device s current configuration to a file on your c...

Page 96: ...some operating systems you may see the following icon on your desktop Figure 65 Network Temporarily Disconnected If you uploaded the default configuration file you may need to change the IP address of...

Page 97: ...panel to reset the factory defaults of your device Refer to the section on resetting the device for more information on the RESET button 7 5 F W Upload Screen Find firmware at www zyxel com in a file...

Page 98: ...ktop Figure 70 Network Temporarily Disconnected After two minutes log in again and check your new firmware version in the System Status screen If the upload was not successful the following status mes...

Page 99: ...wer source is turned on If the problem persists you may have a hardware problem In this case you should contact your local vendor The G 570U reboots automatically sometimes The supplied power to the G...

Page 100: ...g radio signal interference and are within range Move the devices closer together and away from any sources of interference such as microwave ovens Bluetooth devices and other radio transmitters Resta...

Page 101: ...ss is on the bottom of the device If you just changed the G 570U s IP address your computer s cache of machine names may contain an entry that maps the name of the G 570U to its previous IP address In...

Page 102: ...gure 72 Pop up Blocker You can also check if pop up blocking is disabled in the Pop up Blocker section in the Privacy tab 1 In Internet Explorer select Tools Internet Options Privacy 2 Clear the Block...

Page 103: ...following steps 1 In Internet Explorer select Tools Internet Options and then the Privacy tab 2 Select Settings to open the Pop up Blocker Settings screen Figure 74 Internet Options 3 Type the IP add...

Page 104: ...Click Close to return to the Privacy screen 6 Click Apply to save this setting 8 4 1 2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer check that JavaScripts...

Page 105: ...76 Internet Options 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enable is selected the default 5 Under Scripting of Java applets make sure that...

Page 106: ...s Java Scripting 8 4 1 3 Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 Under Java per...

Page 107: ...eshooting 107 Figure 78 Security Settings Java 8 4 1 3 1 JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 make sure that Use Java 2 for applet under Java Sun...

Page 108: ...reen displays Figure 80 Pinging the G 570U Your computer can now communicate with the G 570U via the ETHERNET port C ping 192 168 1 2 Pinging 192 168 1 2 with 32 bytes of data Reply from 192 168 1 2 b...

Page 109: ...ctor Power Requirements 12VDC 1 Amp maximum Operation Temperature 0 C 50 C Storage Temperature 30 60 C Operation Humidity 20 95 RH Storage Humidity 20 95 RH Table 33 Feature Specifications Protocol Su...

Page 110: ...disable Security WPA and IEEE 802 1x security EAP TLS EAP TTLS LEAP EAP PEAP and Win XP PEAP included 64 128 bits WEP WPA WPA2 support based on 802 11i standard Dynamic WEP key exchange MAC address f...

Page 111: ...k Output Power 11a 19 61 dBm 11b 18 81dBm 11g 22 64dBm Sensitivity 11a 54M 68dBm 11b g 54M 70dBm 11M 85dBm Coverage 11a Indoor Up to 80 meters Outdoor Up to 250 meters 11g Indoor up to 100 meters Outd...

Page 112: ...50204 LAN COMPATIBILITY SmartBit FOR WIRELESS PC CARD FCC Part15C Sec15 247 ETS300 328 ETS300 826 CE mark Table 35 Approvals continued Table 36 Power Adapter Specifications AUSTRALIAN PLUG STANDARDS A...

Page 113: ...s AC 60Hz Output Power 12 Volts DC 5 1 Amp Power Consumption 12 Watts Safety Standards UL UK PLUG STANDARDS AC Power Adapter Model AD 121AD Input Power 240 Volts AC 50Hz Output Power 12 Volts DC 5 1 A...

Page 114: ...ZyXEL G 570U User s Guide 114 Appendix A Product Specifications...

Page 115: ...1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the approp...

Page 116: ...Microsoft Networks If you need the adapter 1 In the Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you ne...

Page 117: ...dapter s TCP IP entry and click Properties 2 Click the IP Address tab If your IP address is dynamic select Obtain an IP address automatically If you have a static IP address select Specify an IP addre...

Page 118: ...ose the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Turn on your G 570U and restart your computer when prompted Verifying Settings 1 Click Start...

Page 119: ...uter s IP Address 119 Figure 84 Windows XP Start Menu 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 85 Windows XP Control Panel 3 Ri...

Page 120: ...nections Properties 4 Select Internet Protocol TCP IP under the General tab in Win XP and then click Properties Figure 87 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Pro...

Page 121: ...ure additional IP addresses In the IP Settings tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two...

Page 122: ...he General tab in Windows XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know your DNS server IP address es click Use the following DNS server...

Page 123: ...work Connections window Network and Dial up Connections in Windows 2000 NT 11Turn on your G 570U and restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and the...

Page 124: ...Address Figure 91 Macintosh OS 8 9 Apple Menu 2 Select Ethernet built in from the Connect via list Figure 92 Macintosh OS 8 9 TCP IP 3 For dynamically assigned settings select Using DHCP Server from...

Page 125: ...e changes to your configuration 7 Turn on your G 570U and restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Macintosh OS X 1 Click th...

Page 126: ...t mask in the Subnet mask box Type the IP address of your G 570U in the Router address box 5 Click Apply Now and close the window 6 Turn on your G 570U and restart your computer if prompted Verifying...

Page 127: ...ick the Red Hat button located on the bottom left corner select System Setting and click Network Figure 95 Red Hat 9 0 KDE Network Configuration Devices 2 Double click on the profile of the network ca...

Page 128: ...work Configuration DNS 5 Click the Devices tab 6 Click the Activate button to apply the changes The following screen displays Click Yes to save the changes in all screens Figure 98 Red Hat 9 0 KDE Net...

Page 129: ...55 0 Figure 100 Red Hat 9 0 Static IP Address Setting in ifconfig eth0 2 If you know your DNS server IP address es enter the DNS server information in the resolv conf file in the etc directory The fol...

Page 130: ...g down loopback interface OK Setting network parameters OK Bringing up loopback interface OK Bringing up interface eth0 OK root localhost ifconfig eth0 Link encap Ethernet HWaddr 00 50 BA 72 5B 44 ine...

Page 131: ...rk or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an Ad hoc wireless LAN Figure 104 Peer to Peer Communication in an...

Page 132: ...red connection between APs is called a Distribution System DS This type of wireless LAN topology is called an Infrastructure WLAN The Access Points not only provide communication with the wired networ...

Page 133: ...overlap however To avoid interference due to overlap your AP should be on a channel at least five channels away from a channel that an adjacent AP is using For example if your region has 11 channels...

Page 134: ...nsmission It also reserves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without...

Page 135: ...d was designed to extend the features of IEEE 802 11 to support extended authentication as well as providing additional accounting and control features It is supported by Windows XP and a number of ne...

Page 136: ...US server rejecting access Access Accept Sent by a RADIUS server allowing access Access Challenge Sent by a RADIUS server requesting more information in order to allow access The access point sends a...

Page 137: ...pendix 1 The wireless station sends a start message to the device 2 The device sends a request identity message to the wireless station for identity information 3 The wireless station replies with ide...

Page 138: ...ificate Authority CA to handle certificates which imposes a management overhead EAP TTLS Tunneled Transport Layer Service EAP TTLS is an extension of the EAP TLS authentication that uses certificates...

Page 139: ...ared key authentication involves a four message procedure A wireless station sends a shared key authentication request to the AP which will then reply with a challenge text message The wireless statio...

Page 140: ...ir is more practical The following table is a comparison of the features of authentication types WPA 2 User Authentication WPA or WPA2 applies IEEE 802 1x and Extensible Authentication Protocol EAP to...

Page 141: ...crypt data on a Wi Fi network than WEP making it difficult for an intruder to break into the network The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two...

Page 142: ...sence of wireless station Y and relays this information to access point P1 through the wired LAN 4 Access point P1 updates the new position of wireless station 5 Wireless station Y sends a request to...

Page 143: ...ZyXEL G 570U User s Guide Appendix C Wireless LANs 143 5 The access points must be connected to the Ethernet and be able to get IP addresses from a DHCP server if using dynamic IP address assignment...

Page 144: ...ZyXEL G 570U User s Guide 144 Appendix C Wireless LANs...

Page 145: ...erefore each octet has a possible range of 00000000 to 11111111 in binary or 0 to 255 in decimal There are several classes of IP addresses The first network number 192 in the above example defines the...

Page 146: ...lass B addresses have a 1 in the leftmost bit and a 0 in the next leftmost bit Class C addresses start with 1 1 0 in the first three leftmost bits Class D addresses begin with 1 1 1 0 Class D addresse...

Page 147: ...number bits By convention subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask followed by a continuous sequence of zeros for a total number of 32...

Page 148: ...ctet bit values indicate host ID bits borrowed to make network ID bits The number of borrowed host ID bits determines the number of subnets you can have The remaining number of host ID bits after borr...

Page 149: ...o borrow two host ID bits to give four possible combinations 00 01 10 and 11 The subnet mask is 26 bits 11111111 11111111 11111111 11000000 or 255 255 255 192 Each subnet contains 6 host ID bits givin...

Page 150: ...1 127 Highest Host ID 192 168 1 126 Table 48 Subnet 3 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask Bin...

Page 151: ...available for subnetting and a class A address has three host ID octets see Table 39 on page 146 available for subnetting Table 50 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADC...

Page 152: ...5 255 128 0 17 2 32766 2 255 255 192 0 18 4 16382 3 255 255 224 0 19 8 8190 4 255 255 240 0 20 16 4094 5 255 255 248 0 21 32 2046 6 255 255 252 0 22 64 1022 7 255 255 254 0 23 128 510 8 255 255 255 0...

Page 153: ...e in accordance with section 3 of the GNU General Public License This exception does not invalidate any other reasons why a work based on this file might be covered by the GNU General Public License T...

Page 154: ...of eCos At the same time eCos is fully open source with all the benefits that implies in terms of quality and innovation We believe that this is a winning combination This product include glibc busybo...

Page 155: ...r work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a wor...

Page 156: ...ve works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium...

Page 157: ...itions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribu...

Page 158: ...NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF A...

Page 159: ...CA Certifications 4 Notices 5 Viewing 5 Channel 59 133 Interference 133 Channel ID 62 67 69 Clear to Send see CTS Client Connections 26 Connection Clients 26 Testing 108 Contact information 9 Copyrigh...

Page 160: ...Half Duplex 24 Hardware 110 Height 109 Hidden node 133 Humidity 109 I IBSS 57 131 IEEE 802 11g 24 135 IEEE 802 11i 25 IEEE 802 1x 23 25 Incoming Transmission Speed 24 Independent Basic Service Set se...

Page 161: ...Read Me First 21 registration product 8 Related Documentation 21 Remote Authentication Dial In User Service see RADIUS Repeater 23 27 Request To Send see RTS Reset 24 30 35 Restart 30 35 Restore Defau...

Page 162: ...e 8 WDS 23 65 Web Configurator 31 Access 37 overview 37 Weight 109 WEP 23 25 72 75 140 WEP encryption 138 Width 109 Wi Fi Protected Access see WPA Wired Equivalent Privacy see WEP Wireless Access 34 W...

Reviews: