background image

ZyXEL G-120

802.11g Wireless CardBus Card

User’s Guide

Version 1.00

Edition 1

6/2006

Содержание G-120

Страница 1: ...ZyXEL G 120 802 11g Wireless CardBus Card User s Guide Version 1 00 Edition 1 6 2006...

Страница 2: ......

Страница 3: ...XEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it con...

Страница 4: ...which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving ant...

Страница 5: ...ertifications 5 Viewing Certifications 1 Go to http www zyxel com 2 Select your product from the drop down list box on the ZyXEL home page to go to that product s page 3 Select the certification you w...

Страница 6: ...t as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitn...

Страница 7: ...rk sales zyxel dk 45 39 55 07 07 FINLAND support zyxel fi 358 9 4780 8411 www zyxel fi ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland sales zyxel fi 358 9 4780 8448 FRANCE info zyxel fr...

Страница 8: ...el se 46 31 744 7700 www zyxel se ZyXEL Communications A S Sj porten 4 41764 G teborg Sweden sales zyxel se 46 31 744 7701 UKRAINE support ua zyxel com 380 44 247 69 78 www ua zyxel com ZyXEL Ukraine...

Страница 9: ...Infrastructure 19 1 2 0 2 Ad Hoc 20 1 3 G 120 Hardware and Utility Installation 21 1 3 1 ZyXEL Utility Icon 21 1 4 Configuration Methods 21 1 4 1 Enabling WZC 21 1 4 2 Accessing the ZyXEL Utility 22...

Страница 10: ...WPA2 RADIUS 43 4 2 1 4 RADIUS 44 4 2 2 Confirm New Settings 45 4 3 The Profile Screen 46 4 3 1 Adding a New Profile 48 4 4 The Adapter Screen 52 Chapter 5 Maintenance 55 5 1 The About Screen 55 5 2 U...

Страница 11: ...ZyXEL G 120 User s Guide Table of Contents 11 Index 93...

Страница 12: ...ZyXEL G 120 User s Guide 12 Table of Contents...

Страница 13: ...28 Figure 16 Example of a Wireless Network 29 Figure 17 Link Info 37 Figure 18 Station Mode Link Info Trend Chart 39 Figure 19 Site Survey 40 Figure 20 Security Setting WEP 41 Figure 21 Security Setti...

Страница 14: ...P SP2 Wireless Networks Preferred Networks 73 Figure 49 Windows XP SP1 Wireless Networks Preferred Networks 73 Figure 50 WPA PSK Authentication 79 Figure 51 WPA 2 with RADIUS Application Example 80 Fi...

Страница 15: ...Adapter 53 Table 14 About 55 Table 15 Troubleshooting Starting ZyXEL Utility 59 Table 16 Troubleshooting Link Quality 59 Table 17 Troubleshooting Communication Problem 60 Table 18 Product Specificati...

Страница 16: ...ZyXEL G 120 User s Guide 16 List of Tables...

Страница 17: ...support documentation User Guide Feedback Help us help you E mail all User Guide related comments questions or suggestions for improvement to techwriters zyxel com tw or send regular mail to The Tech...

Страница 18: ...ZyXEL G 120 User s Guide 18 Preface Graphics Icons Key Wireless Access Point Computer Notebook Computer Server Modem or Router Wireless Signal Internet Cloud...

Страница 19: ...20 See the appendix for detailed product specifications 1 2 Application Overview This section describes some network applications for the G 120 You can either set the network type to Infrastructure an...

Страница 20: ...1 Application Infrastructure 1 2 0 2 Ad Hoc To set up a small independent wireless workgroup without an AP use Ad Hoc Ad Hoc does not require an AP or a wired network Two or more wireless clients com...

Страница 21: ...tray icon indicates the status of the G 120 Refer to the following table for details 1 4 Configuration Methods To configure your G 120 use one of the following applications Wireless Zero Configuration...

Страница 22: ...top or click Start All Programs ZyXEL G 120 Utility ZyXEL G 120 Utility GUI 1 4 2 Accessing the ZyXEL Utility Double click on the ZyXEL wireless LAN utility icon in the system tray to open the ZyXEL u...

Страница 23: ...ofile to have the wireless client automatically connect to a specific network or peer computer see Section 2 2 on page 25 2 1 Connecting to a Wireless LAN This example illustrates how to manually conn...

Страница 24: ...To connect to an AP or peer computer either click an entry in the list and then click Connect or double click an entry with a SSID of SSID_Examples3 in this example 4 When you try to connect to an AP...

Страница 25: ...s in this screen remain blank See Table 2 on page 37 for detailed field descriptions Figure 9 ZyXEL Utility Link Info 7 Open your Internet browser and enter http www zyxel com or the URL of any other...

Страница 26: ...o configure a new profile Figure 10 ZyXEL Utility Profile 2 The Add New Profile screen appears The wireless client automatically searches for available wireless networks which are displayed in the Sca...

Страница 27: ...setting Figure 13 ZyXEL Utility Profile Encryption 6 Verify the profile settings in the ready only screen Click Save to save and go to the next screen Figure 14 ZyXEL Utility Profile Confirm New Setti...

Страница 28: ...reen displays details of the active connection 9 Make sure the selected AP in the active profile is connected to the Internet Open your Internet browser enter http www zyxel com or the URL of any othe...

Страница 29: ...circle In this wireless network devices A and B are called wireless clients The wireless clients use the access point AP to interact with other devices such as the printer or with the Internet Every w...

Страница 30: ...ess devices to get the MAC address of an authorized device Then they can use that MAC address to use the wireless network 3 2 1 User Authentication and Encryption You can make every user log in to the...

Страница 31: ...d use same settings on both the wireless station and the AP or peer computer Auto authentication mode allows the G 120 to switch between the open system and shared key modes automatically Use the auto...

Страница 32: ...ss client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS server or not Select WEP only...

Страница 33: ...transfer Hold in the Reset button for one or two seconds Note If you hold in the Reset button too long the device may reset to the factory defaults In the web configurator go to the Wireless LAN main...

Страница 34: ...T web configurator screen and in the wireless client s Adapter screen all within three minutes at the time of writing You can start OTIST in the wireless clients and AP in any order but they must all...

Страница 35: ...ou must still click Start in the AP OTIST web configurator screen or hold in the Reset button for one or two seconds for the AP to transfer settings 4 If you change the SSID or the keys on the AP afte...

Страница 36: ...ZyXEL G 120 User s Guide 36 Chapter 3 Wireless LAN Network...

Страница 37: ...s showing the current configuration and connection status of your G 120 Figure 17 Link Info The following table describes the labels in this screen Table 2 Link Info LABEL DESCRIPTION Wireless Network...

Страница 38: ...ays the current data receiving rate in kilobits per second Kbps Authentication This field displays the authentication method of the G 120 Network Mode This field displays the wireless standard 802 11b...

Страница 39: ...creen 4 2 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically Table 3 Station Mode Link Info Trend Chart LABEL DESCRIPTION Transmit This field...

Страница 40: ...eactivated SSID This field displays the SSID Service Set IDentifier of each wireless device Channel This field displays the channel number used by each wireless device Signal This field displays the s...

Страница 41: ...continued LABEL DESCRIPTION Table 5 Security Setting WEP LABEL DESCRIPTION Security Setting WEP Select 64 Bits 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields Encry...

Страница 42: ...ey type or Enter 13 ASCII characters case sensitive ranging from a z A Z and 0 9 for example MyKey12345678 for ASCII key type If you select 256 Bits in the WEP field Enter either 58 hexadecimal digits...

Страница 43: ...e only difference between the two is that WPA PSK WPA2 PSK uses a simple common password instead of user specific credentials Select the encryption type TKIP or AES for data encryption Refer to Sectio...

Страница 44: ...on a RADIUS server Password This field is not available when you select TLS in the Authentication Type field Enter the password associated with the user name above Certificate This field is only avail...

Страница 45: ...rtificate This field is only available when you select TLS in the Authentication Type field Select a certificate used by the authentication server to authenticate the G 120 Note You must first have a...

Страница 46: ...disabled The default profile is a profile that allows you to connect to any SSID without security Click the Profile tab in the ZyXEL utility program to display the Profile screen as shown next The pr...

Страница 47: ...ed Profile Name This is the name of the pre configured profile SSID This is the SSID of the wireless network to which the selected profile associate Connect To use and activate a previously saved netw...

Страница 48: ...on is activated WEP WPA PSK WPA RADIUS RADIUS WPA2 RADIUS WPA2 PSK or inactive Disable Transfer Rate This field displays the transmission speed of the selected profile in megabits per second Mbps Tabl...

Страница 49: ...wireless networks within the transmission range or denotes that the wireless device is in infrastructure mode and the wireless security is activated denotes that the wireless device is in infrastruct...

Страница 50: ...type in the first screen you can only use WEP encryption method Otherwise select Disabled to allow the G 120 to communicate with the access points or other peer wireless computers without any data en...

Страница 51: ...her peer wireless computers as they are on the G 120 Refer to Section 4 2 1 on page 41 for detailed information on wireless security configuration Figure 29 Profile Security Settings 5 This read only...

Страница 52: ...k the Activate Now button Otherwise click the Activate Later button You can activate only one profile at a time Note Once you activate a profile the ZyXEL utility will use that profile the next time i...

Страница 53: ...t the AP uses Short Preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b g compliant wireless adapters support Long Preamble but not all suppo...

Страница 54: ...must also make the same change here Start Click Start to encrypt the wireless security data using the setup key and have the ZyXEL AP or wireless router set your G 120 to use the same wireless setting...

Страница 55: ...ollowing table describes the read only fields in this screen 5 2 Uninstalling the ZyXEL Utility Follow the steps below to remove or uninstall the ZyXEL utility from your computer 1 Click Start All Pro...

Страница 56: ...ake note of your current wireless configurations To perform the upgrade follow the steps below 1 Download the latest version of the utility from the ZyXEL web site and save the file on your computer 2...

Страница 57: ...ZyXEL G 120 User s Guide Chapter 5 Maintenance 57 6 Insert the G 120 and check the version numbers in the About screen to make sure the new utility is installed properly...

Страница 58: ...ZyXEL G 120 User s Guide 58 Chapter 5 Maintenance...

Страница 59: ...nding on the version of Windows Install the G 120 in another computer If the error persists you may have a hardware problem In this case you should contact your local vendor The ZyXEL utility icon doe...

Страница 60: ...the associated wireless clients to use another radio channel if interference is high Make sure that the computer and the AP share the same security option and key Verify the settings in the Profile S...

Страница 61: ...2 1Mbps IEEE 802 11g 54 48 36 24 18 12 9 6 Mbps Modulation IEEE 802 11g Orthogonal Frequency Division Multiplexing 64QAM 16QAM QPSK and BPSK IEEE 802311b PBCC Direct Sequence Spread Spectrum CCK DQPS...

Страница 62: ...put Power 18 dBm typical at 11Mbps CCK QPSK BPSK 15 dBm typical at 54Mbps OFDM RX Sensitivity IEEE 802 11g OFDM 54 Mbps 70 dBm IEEE 802 11b CCK 11 Mbps 85 dBm SOFTWARE SPECIFICATIONS Device Drivers Mi...

Страница 63: ...the support patch for WPA from the Microsoft web site Windows XP SP2 screen shots are shown unless otherwise specified Click the help icon in most screens move the cursor to the item that you want th...

Страница 64: ...Refer to the following table for details 2 Windows XP SP2 In the Wireless Network Connection Status screen click View Wireless Networks to open the Wireless Network Connection screen Figure 38 Window...

Страница 65: ...tab to open the Wireless Network Connection Properties screen Figure 39 Windows XP SP1 Wireless Network Connection Status 3 Windows XP SP2 Click Refresh network list to reload and search for available...

Страница 66: ...selected wireless network the Wireless Network Connection screen displays You must set the related fields in the Wireless Network Connection screen to the same security settings as the associated AP a...

Страница 67: ...nnection status in the wireless network list or the connection icon in the Preferred networks or Available networks list The following table describes the connection icons Security Settings When you c...

Страница 68: ...the authentication method Share Open WPA or WPA PSK used by the selected network Data Encryption This field automatically shows the encryption type TKIP WEP or Disable used by the selected network Ne...

Страница 69: ...Click OK to save your changes Cancel Click Cancel to leave this screen without saving any changes you may have made Table 22 Windows XP Wireless network properties Association continued LABEL DESCRIP...

Страница 70: ...formation is available Select this check box to have the computer send its information to the network for authentication when a user is not logged on Authenticate as guest when user or computer inform...

Страница 71: ...ion authority from the list below Note You must first have a wired connection to a network and obtain the certificate s from a certificate authority CA Consult your network administrator for more info...

Страница 72: ...check the certificate of the authentication server Connect to these servers Select the check box and specify a domain in the field below to have your computer connect to a server which resides only w...

Страница 73: ...e screen as shown Figure 49 Windows XP SP1 Wireless Networks Preferred Networks 2 Whenever the G 120 tries to connect to a new network the new network is added in the Preferred networks table automati...

Страница 74: ...ZyXEL G 120 User s Guide 74 Appendix B Management with Wireless Zero Configuration...

Страница 75: ...s from a certificate authority CA A certificate also called digital IDs can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner EAP MD5 Mes...

Страница 76: ...n thus client identity is protected For client authentication EAP TTLS supports EAP methods and legacy authentication methods such as PAP CHAP MS CHAP and MS CHAP v2 PEAP Protected EAP Like EAP TTLS s...

Страница 77: ...ord entered into each access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not suppo...

Страница 78: ...nd AES it is more difficult to decrypt data on a Wi Fi network than WEP and difficult for an intruder to break into the network The encryption mechanisms used for WPA 2 and WPA 2 PSK are the same The...

Страница 79: ...m Figure 50 WPA PSK Authentication WPA 2 with RADIUS Application Example You need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA 2 application e...

Страница 80: ...how you configure these security features Table 27 Wireless Security Relational Matrix AUTHENTICATION METHOD KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY IEEE 802 1X Open None No Disable...

Страница 81: ...ude the software components you need to install and use TCP IP on your computer Windows 3 1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on comp...

Страница 82: ...icrosoft Networks If you need the adapter 1 In the Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you nee...

Страница 83: ...apter s TCP IP entry and click Properties 2 Click the IP Address tab If your IP address is dynamic select Obtain an IP address automatically If you have a static IP address select Specify an IP addres...

Страница 84: ...d 5 Click OK to save and close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Restart your computer when prompted Verifying Settings 1 Click St...

Страница 85: ...omputer s IP Address 85 Figure 55 Windows XP Start Menu 2 For Windows XP click Network Connections For Windows 2000 NT click Network and Dial up Connections Figure 56 Windows XP Control Panel 3 Right...

Страница 86: ...onnections Properties 4 Select Internet Protocol TCP IP under the General tab in Win XP and click Properties Figure 58 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Proper...

Страница 87: ...ab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Confi...

Страница 88: ...b to order them Figure 60 Windows XP Internet Protocol TCP IP Properties 8 Click OK to close the Internet Protocol TCP IP Properties window 9 Click OK to close the Local Area Connection Properties win...

Страница 89: ...up Your Computer s IP Address 89 Figure 61 Macintosh OS 8 9 Apple Menu 2 Select Ethernet built in from the Connect via list Figure 62 Macintosh OS 8 9 TCP IP 3 For dynamically assigned settings selec...

Страница 90: ...Control Panel 6 Click Save if prompted to save changes to your configuration 7 Restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Mac...

Страница 91: ...owing From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your gateway in the Router address box if yo...

Страница 92: ...ZyXEL G 120 User s Guide 92 Appendix D Setting up Your Computer s IP Address...

Страница 93: ...Authority 76 Certifications viewing 5 channel 38 40 49 61 configuration method 21 Wireless Zero Configuration WZC 21 Copyright 3 creating a new profile 48 current configuration 37 current connection s...

Страница 94: ...tatistics 38 Related Documentation 17 S save power 53 Scan Info 49 security 30 62 data encryption 30 Security Parameters 80 Setup Key 33 shared key authentication 31 signal strength 40 site survey 39...

Страница 95: ...lient 29 wireless LAN introduction 29 security 30 Wireless LAN WLAN 29 wireless network 29 wireless standard 38 61 WLAN Security parameters 80 WPA 32 43 77 WPA2 32 43 77 WPA2 Pre Shared Key 32 77 WPA2...

Отзывы: