background image

 

 
 

ZyAIR G-100 

802.11g Wireless CardBus Card 

 

 
 
 

User's Guide 

 

Version 1.1 

April 2004 

 
 
 

 

 

 
 
 
 
 
 
 
 
 

Summary of Contents for ZyAir G-100

Page 1: ...ZyAIR G 100 802 11g Wireless CardBus Card User s Guide Version 1 1 April 2004...

Page 2: ...ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products...

Page 3: ...under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a part...

Page 4: ...mpliance with the above conditions may not prevent degradation of service in some situations Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by...

Page 5: ...ns If this equipment does cause harmful interference to radio television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference...

Page 6: ......

Page 7: ...zyxel de 49 2405 6909 0 www zyxel de GERMANY sales zyxel de 49 2405 6909 99 ZyXEL Deutschland GmbH Adenauerstr 20 A2 D 52146 Wuerselen Germany 33 0 4 72 52 97 97 FRANCE info zyxel fr 33 0 4 72 52 19 2...

Page 8: ......

Page 9: ...5 2 7 1 Connecting to a Wireless Network 2 6 2 8 The Configuration Screen 2 7 2 9 Wireless LAN Security 2 8 2 10 The Security Configuration Screen 2 9 2 10 1 Data Encryption with WEP 2 9 2 10 2 Data E...

Page 10: ...ZyAIR Utility Link Info 2 4 Figure 2 6 Site Survey 2 6 Figure 2 7 Configuration 2 7 Figure 2 8 ZyAIR Wireless Security Levels 2 8 Figure 2 9 WEP Authentication Steps 2 10 Figure 2 10 WEP Authenticatio...

Page 11: ...Configuration 2 7 Table 2 4 WEP Authentication 2 11 Table 2 5 WPAAuthentication 2 14 Table 2 6 WPA PSK Authentication 2 16 Table 2 7 802 1x Authentication 2 18 Table 2 8 About 2 20 Table 4 1 Troublesh...

Page 12: ...yXEL ZyAIR G 100 802 11g Wireless CardBus Card is referred to as the ZyAIR in this guide The ZyAIR G 100 802 11g Wireless CardBus Utility may be referred to as the ZyAIR Utility in this guide Related...

Page 13: ...is recommended you use the ZyAIR Utility to configure the ZyAIR There are two methods to disable the configuration tool in Windows XP after you install the ZyAIR Utility From ZyAIR Utility Right clic...

Page 14: ...ection to display a status window as shown next Figure 1 3 Windows XP Wireless Network Connection Status 4 Click Properties and click the Wireless Networks tab Then skip to Step 6 5 When a Connect to...

Page 15: ...ility appears in the system tray When the ZyAIR Utility system tray icon displays the ZyAIR is installed properly Figure 1 6 ZyAIR Utility System Tray Icon The color of the ZyAIR Utility system tray i...

Page 16: ......

Page 17: ...red LAN systems Access to network services in areas otherwise hard or expensive to wire such as historical buildings buildings with asbestos materials and classrooms Doctors and nurses can access a co...

Page 18: ...data rate Transmission at lower data speeds is usually more reliable However when the communication quality improves again the ZyAIR gradually increases the transmission data rate again until it reach...

Page 19: ...twork Wireless clients can then access resource such as the printer on the wired network Figure 2 3 Infrastructure Network Example 2 4 5 Roaming Roaming is where in an infrastructure network wireless...

Page 20: ...ation Refer to the Quick Installation Guide to install the ZyAIR driver and wireless utility program 2 6 The Link Info Screen When the ZyAIR Utility starts the Link Info screen displays showing the cu...

Page 21: ...ther None WEP WPA PSK WPA or 802 1x for the wireless device Current IP This field displays your computers IP address Operating Mode This field displays the operating mode of the ZyAIR Infrastructure t...

Page 22: ...ireless network type as Infrastructure or Ad Hoc of each wireless device Infrastructure the ZyAIR associates to an AP Ad Hoc the ZyAIR associates to a peer ad hoc computer Mode This field displays the...

Page 23: ...re automatically taken to the Link Info screen 2 8 The Configuration Screen Click Configuration in the ZyAIR Utility program to display the Configuration screen as shown next Figure 2 7 Configuration...

Page 24: ...eer ad hoc computer you must use the same channel as the peer ad hoc computer Set Security Click Set Security to display the Security Configuration screen Configure your ZyAIR with wireless LAN securi...

Page 25: ...ption with WEP Select WEP from the Authentication drop down list box to view the security configuration options WEP Wired Equivalent Privacy encryption scrambles all communication transmitted between...

Page 26: ...uthentication request to the AP which will then reply with a challenge text message The wireless station must then use the AP s default WEP key to encrypt the challenge text and return it to the AP wh...

Page 27: ...computers as they are on the ZyAIR Authentication Type Select Open System or Shared Key from the drop down list box See the section on Authentication Type for further descriptions of these Select Ope...

Page 28: ...Enter either 26 hexadecimal digits in the range of A F a f and 0 9 for example 00112233445566778899AABBCC for hexadecimal key type or Enter 13 ASCII characters case sensitive ranging from a z A Z and...

Page 29: ...he background automatically The Message Integrity Check MIC is designed to prevent an attacker from capturing data packets altering them and resending them The MIC provides a strong mathematical funct...

Page 30: ...allowed type a Password Certificate This field is only available when you select EAP TLS in the EAP Type field You must first have a wired connection to a network and obtain the certificate s from a c...

Page 31: ...uthentication WPA with RADIUS Application Example You need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA application example with an external R...

Page 32: ...re 2 13 WPA with RADIUS Application Example Figure 2 14 WPA PSK Authentication Follow the instructions in the table to configure the WEP encryptions Table 2 6 WPA PSK Authentication FIELD DESCRIPTION...

Page 33: ...or an unlimited number of users EAP Authentication Overview EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE802 1x transport mechanism in order to supp...

Page 34: ...Guide for information on the fields listed below EAP TLS EAP TTLS EAP MD5 EAP PEAP LEAP Login Name Enter a user name This is the user name that you or an administrator set up on the RADIUS server Pas...

Page 35: ...icate to the server Select the check box to have your server validate this certificate TTLS Protocol PEAP Protocol Select a protocol from the drop down list box The choices are EAP TTLS PAP CHAP MS CH...

Page 36: ...the ZyAIR Utility Driver Version This field displays the version number of the ZyAIR wireless card driver Firmware This field displays the version of the firmware of the ZyAIR card OK Click OK to appl...

Page 37: ...ving the ZyAIR Utility section to remove the current ZyAIR Utility from your computer 3 Restart the computer when prompted 4 After restarting refer to the procedure in the Quick Installation Guide to...

Page 38: ...Icon Windows XP 3 When a Safely Remove Hardware window displays select the ZyAIR device in the Hardware devices list and click Stop Figure 3 4 Safely Remove Hardware Windows XP 4 If you do not close...

Page 39: ...tenance 3 3 Figure 3 5 Stop a Hardware device Windows XP 6 After the following notice window displays in the system tray you can safely disconnect the ZyAIR from your computer Figure 3 6 Safe To Remov...

Page 40: ......

Page 41: ...act your local vendor The ZyAIR Utility displays only three tabs When the ZyAIR Utility displays only three tabs you are using the Windows XP wireless configuration tool at the same time Refer to Sect...

Page 42: ...e 4 3 Troubleshooting Link Quality PROBLEM CORRECTIVE ACTION The link quality and or signal strength is poor all the time Search and connect to another AP with a better link quality using the Site Sur...

Page 43: ...set up easy to use wireless networks that cover the entire campus transparently IEEE 802 11 The 1997 completion of the IEEE 802 11 standard for wireless LANs WLANs was a first important step in the ev...

Page 44: ...mediate neighborhood Multiple access points can provide wireless coverage for an entire building or campus All communications between stations or between a station and a wired network client go throug...

Page 45: ...e through manual modification of the MAC address table on the access point Although WEP data encryption offers a form of data security you have to reset the WEP key on the clients each time you change...

Page 46: ...ZyAIR G 100 User s Guide B Wireless LAN With IEEE 802 1x Diagram 4 3 Sequences for EAP MD5 Challenge Authentication Client computer access authorized Client computer access not authorized...

Page 47: ...the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable to passive attacks A digital certificate is an electronic ID card th...

Page 48: ...ion No Yes Yes Yes Yes Certificate Client No Yes Optional Optional No Certificate Server No Yes Yes Yes No Dynamic Key Exchange No Yes Yes Yes Yes Credential Security None Strong Strong Strong Moderat...

Page 49: ...te 802 11b 11 5 5 2 1Mbps 802 11g 54 48 36 24 18 12 9 6 Mbps Modulation 802 11g OFDM with BPSK QPSK and 16 64 QAM sub carrier modulations 802 11b DBPSK DQPSK CCK Output Power 17 dBm typical at 11Mbps...

Page 50: ...ZyAIR G 100 User s Guide F Types of EAP Authentication ENVIRONMENTAL SPECIFICATIONS Temperature Operating 0 50 C Storage 20 75 C Relative Humidity 5 to 95 non condensing...

Page 51: ...ty Flaws C IEEE 802 11g 2 1 IEEE 802 1x C Advantages C Independent Basic Service Set A See IBSS Information for Canadian Users iv Caution iv Note iv Infrastructure 2 3 Infrastructure Configuration B L...

Page 52: ...ess LAN benefits 2 1 Wireless LAN Benefits 2 1 A Wireless LAN Parameters Channel 2 2 Configuring 2 7 Network Type 2 2 SSID 2 2 Transmission Rate 2 2 Wireless LAN Security Data Encryption with WEP 2 9...

Reviews: