Zoom 4410B Скачать руководство пользователя страница 40

40 

 

Wireless-G USB Adapter 

2

 

Complete the following steps to set static IP addressing: 

a

 

In the 

Internet Protocol (TCP/IP) Properties

 dialog 

box, ensure that 

Obtain an IP address automatically

 is 

not selected. Then make sure the buttons labeled 

Use 

the following IP address 

and

 Use the following DNS 

server addresses

 are selected. 

b

 

If this is the first computer to be set up in the ad hoc 
network, enter 

10.0.0.5

 for 

IP address

. If you are adding 

it to an existing ad hoc network, increment the last digit 
by one, for example, 

10.0.0.6

10.0.0.7

 

c

 

Enter 

255.255.255.0

 for 

Subnet mask

. The 

Subnet 

mask

 remains the same for each computer in your ad 

hoc network. 

d

 

Enter 

10.0.0.5 

for 

Default gateway

 and 

Preferred DNS 

server

. (This is the IP address of the first computer that 

was set up in your ad hoc network.) The 

Default 

Gateway 

and

 Preferred DNS server 

should be the 

same for each computer in your ad hoc network. 

e

 

Click 

OK

 twice. 

That’s it! You have set static IP addressing for a Windows 2000 
computer in an ad hoc network. 

3

 

For Infrastructure Networks: To verify your DHCP settings, 
complete the following: 

a

 

Ensure that Obtain an IP address automatically is 
selected. 

b

 

Ensure that either 

Obtain a DNS server address 

automatically

 or 

Enable DNS

 is selected. All text boxes 

for static IP addressing should be blank. 

c

 

Click 

OK

 twice to exit. 

That’s it! You have verified the DHCP settings for your Windows  

 

Содержание 4410B

Страница 1: ...Wireless G USB Adapter U S E R G U I D E...

Страница 2: ...Wireless G USB Adapter 2...

Страница 3: ...re Shared Key 15 WEP Wired Equivalent Privacy 16 WPA2 18 WPA 20 Certificate WPA2 and WPA 23 WiFi Protected Setup WPS 24 Changing your Security Setting 26 3 Advanced Options 27 Creating Profiles 27 Mon...

Страница 4: ...tures of the Wireless G USB configuration software Chapters 1 and 2 cover the basics what you need to get connected and to enable security If you are interested in the more advanced features of the Wi...

Страница 5: ...art guide you can skip this chapter and begin with Chapter 2 Setting Security What s in the Package The adapter package includes the following Wireless G USB adapter CD containing the Installation Wiz...

Страница 6: ...ars click Run Setup exe If a message appears saying An unidentified program wants access to your computer click Allow 2 On the Language Selection screen select your language 3 On the next screen selec...

Страница 7: ...he USB Adapter and turn your computer back on To connect to a network 1 Double click the Zoom Wireless G USB icon on your desktop to open the Zoom Wireless G Configuration window Note that you also ha...

Страница 8: ...s not have security you should now be connected To check your connection open your Web browser and go to your favorite site We highly recommend security Chapter 2 Setting Security on page 10 has descr...

Страница 9: ...the LED on the Wireless G USB adapter are explained below LED Status Meaning Flashing The Wireless G USB adapter is attempting to connect to a wireless network Steady The Wireless G USB adapter is co...

Страница 10: ...of six ways to configure and implement security for your wireless network WPA2 PSK WiFi Protected Access 2 Pre Shared Key This is the option we recommend if it is supported by the access point and the...

Страница 11: ...DIUS Remote Authentication Dial In User Service authentication server and if the devices in the network support WPA2 select WPA2 This option provides security with AES Advanced Encryption Standard AES...

Страница 12: ...pe is correct There are two types of wireless networks Infrastructure and Ad Hoc In an Infrastructure network wireless devices communicate with each other via a wireless access point router or ADSL mo...

Страница 13: ...network you must set up Static IP addressing See Appendix A TCP IP Settings 4 Select the Enable Security check box to open the Security Configuration window For configuration instructions consult this...

Страница 14: ...r the same network key that is used on the wireless access point We advise you to enter a key with a minimum of 20 random characters 4 Click OK to save your settings and return to the Configuration ta...

Страница 15: ...2 At Encryption Mode accept the default TKIP Temporal Key Integrity Protocol 3 In the Pre shared key WPA area enter the same network key that is used on the wireless access point We advise a key with...

Страница 16: ...guration window click the Authentication Mode drop down arrow and select Open recommended or Shared The USB Adapter automatically selects WEP as the Encryption Mode 2 In the Preconfigured key WEP area...

Страница 17: ...xt box enter a key using the table below as a guide The key must be the same for all the devices on your network If you selected key type Enter exactly Hexadecimal digits 256 bits 58 Hexadecimal chara...

Страница 18: ...ess connection and you re ready to use the Internet WPA2 Select WPA2 if you are linking to a corporate network that uses a RADIUS Remote Authentication Dial In User Service authentication server all o...

Страница 19: ...ess access point which in turn sends the signal to the RADIUS server The server determines whether or not the client is allowed to join the network 4 Click the EAP Extensible Authentication Protocol T...

Страница 20: ...r the required information see page 23 6 Click OK to save your settings and return to the Configuration tab 7 On the Configuration tab click Apply 8 Click the Close box to exit the configuration softw...

Страница 21: ...network is selected With IEEE 802 1X authentication each wireless device client sends a signal to the wireless access point which in turn sends the signal to the RADIUS server The server determines wh...

Страница 22: ...ication Protocol the most basic form of authentication CHAP Challenge Handshake Authentication Protocol MS CHAP Microsoft s version of CHAP MS CHAPV2 SIM Subscriber Identity Module A SIM card stores t...

Страница 23: ...work administrator to confirm the user s identity and thereby maintain the security of the network If you are linking to a corporate network that uses an authentication server and you have configured...

Страница 24: ...2 PSK or WPA PSK security To access WPS on the Configuration tab click the WPS button to open the WPS Config screen 1 If you are like most users you will want to join a wireless network WLAN so select...

Страница 25: ...set up on the access point If security has not been set on the access point a random SSID and WPA key will be used b You can select PIN configuration if the access point does not have a hard or soft...

Страница 26: ...ity Setting If the type of security on your wireless network changes you need to modify your security settings On the Configuration tab click the Configure Security button to select a different securi...

Страница 27: ...want to connect to that particular network For example you may want to set up profiles for a work network and a home network each of which has different configuration settings By creating two profile...

Страница 28: ...o to avoid interference it is desirable to have a 5 channel difference between your channel and the channel being used by another network within range Click Site Survey then Rescan to check the channe...

Страница 29: ...p an ad hoc network as in this example only WEP security is available to you After you enter your security settings click OK to return to the Configuration tab 4 In the Configuration area click the Ap...

Страница 30: ...oughput Packets sec TX number of packets transmitted per second without errors RX number of packets received per second without errors Link Quality Infrastructure only The transmission quality of the...

Страница 31: ...y the MAC address BSSID of your wireless access point or wireless router Check the channel difference between your network and other networks within range Check the network type infrastructure or ad h...

Страница 32: ...Basic Service Set Identifier A Basic Service Set consists of a wireless access point connected to wired network and a set of wireless devices In an infrastructure network the BSSID is the MAC address...

Страница 33: ...point that it is in Power Save mode The access point buffers all packets until it is polled by the adapter Note The access point you use must also support Power Save Frag Data fragmentation Threshold...

Страница 34: ...dvanced users will know other ways to set up their networks Please go to the section that corresponds to your Windows operating system Windows Vista 1 Follow these steps to open the TCP IPv4 or TCP IP...

Страница 35: ...c In the Network Connections window double click the Wireless Network Connection option d In the Wireless Network Connection Status dialog box click the Properties button Appendix A TCP IP Settings 35...

Страница 36: ...fer to page 12 2 For Ad Hoc Networks In the TCP IPv4 or TCP IPv6 Properties dialog box on the General tab complete the following to set static IP addressing a Ensure that Obtain an IP address automati...

Страница 37: ...c network e Click OK twice That s it You have set static IP addressing for a Windows Vista computer in an ad hoc network 3 For Infrastructure Networks To verify your DHCP settings complete the followi...

Страница 38: ...ructure network continue with step 3a If you re not sure what kind of network you have refer to page 12 2 For Ad Hoc Networks Complete the following to set static IP addressing a Ensure that Obtain an...

Страница 39: ...be blank c Click OK twice to exit That s it You have verified your DHCP settings for a Windows XP computer in an infrastructure network Windows 2000 1 Follow these steps to open the Internet Protocol...

Страница 40: ...ains the same for each computer in your ad hoc network d Enter 10 0 0 5 for Default gateway and Preferred DNS server This is the IP address of the first computer that was set up in your ad hoc network...

Страница 41: ...gain to connect your wireless adapter to a network If you are using the short USB cable try changing the orientation of the USB adapter Turn the computer off then on and then check to see if the adapt...

Страница 42: ...s the same remember that the keys are case sensitive 3 Check your TCP IP settings as discussed in Appendix A of the User Guide 4 If the adapter still does not work uninstall the software and then re i...

Страница 43: ...t Name __________________________________ Product Model Number __________________________________ Product Serial Number __________________________________ Date Installed _______________________ The se...

Страница 44: ...Smart Facts is an automated intelligent database of Frequently Asked Questions FAQ s about Zoom products It allows you to search for solutions to your Technical Support questions by product or via a p...

Страница 45: ...www zoom com techmail When emailing Zoom be sure to include the following Serial number of your adapter Your full name and address A detailed description of your problem Contact Zoom by Phone You can...

Страница 46: ...t the customer is responsible for any charges including brokerage or customs and duties associated with shipping the defective unit to Zoom for repair During the first year Zoom will pay return shippi...

Страница 47: ...quipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help This device complies with Part 15 of the F...

Страница 48: ...n operation not in accordance with local regulations and may cause harmful interference to other systems The user is obligated to ensure that the device is operating according to the channel limitatio...

Страница 49: ...die bereinstimmung des Ger tes modem mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999 5 EC Dieses Produkt ist das gekennzeichnete CE 1999 5 C CE Il forn...

Страница 50: ...s and makes no warranty or representation either expressed or implied with respect to the quality performance merchantability or fitness for a particular purpose of the software or documentation The m...

Отзывы: