background image

ZyAIR G-100 User’s Guide 

2-10                                                           

Using the ZyAIR Utility 

 

Figure 2-9 WEP Authentication Steps 

Open System

 authentication involves an unencrypted two-message procedure. A wireless station 

sends an open system authentication request to the AP, which will then automatically accept and 
connect the wireless station to the network. In effect, open system is not authentication at all as 
any station can gain access to the network. 

Shared Key

 authentication involves a four-message procedure. A wireless station sends a shared 

key authentication request to the AP, which will then reply with a challenge text message. The 
wireless station must then use the AP’s default WEP key to encrypt the challenge text and return 
it to the AP, which attempts to decrypt the message using the AP’s default WEP key. If the 
decrypted message matches the challenge text, the wireless station is authenticated.  
When your ZyAIR's authentication method is set to open system, it will only accept open system 
authentication requests. The same is true for shared key authentication. However, when it is set to 
auto authentication, the ZyAIR will accept either type of authentication request and the ZyAIR 
will fall back to use open authentication if the shared key does not match.  
 
 

Содержание ZyAir G-100

Страница 1: ...ZyAIR G 100 802 11g Wireless CardBus Card User s Guide Version 1 1 April 2004...

Страница 2: ...ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products...

Страница 3: ...under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a part...

Страница 4: ...mpliance with the above conditions may not prevent degradation of service in some situations Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by...

Страница 5: ...ns If this equipment does cause harmful interference to radio television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference...

Страница 6: ......

Страница 7: ...zyxel de 49 2405 6909 0 www zyxel de GERMANY sales zyxel de 49 2405 6909 99 ZyXEL Deutschland GmbH Adenauerstr 20 A2 D 52146 Wuerselen Germany 33 0 4 72 52 97 97 FRANCE info zyxel fr 33 0 4 72 52 19 2...

Страница 8: ......

Страница 9: ...5 2 7 1 Connecting to a Wireless Network 2 6 2 8 The Configuration Screen 2 7 2 9 Wireless LAN Security 2 8 2 10 The Security Configuration Screen 2 9 2 10 1 Data Encryption with WEP 2 9 2 10 2 Data E...

Страница 10: ...ZyAIR Utility Link Info 2 4 Figure 2 6 Site Survey 2 6 Figure 2 7 Configuration 2 7 Figure 2 8 ZyAIR Wireless Security Levels 2 8 Figure 2 9 WEP Authentication Steps 2 10 Figure 2 10 WEP Authenticatio...

Страница 11: ...Configuration 2 7 Table 2 4 WEP Authentication 2 11 Table 2 5 WPAAuthentication 2 14 Table 2 6 WPA PSK Authentication 2 16 Table 2 7 802 1x Authentication 2 18 Table 2 8 About 2 20 Table 4 1 Troublesh...

Страница 12: ...yXEL ZyAIR G 100 802 11g Wireless CardBus Card is referred to as the ZyAIR in this guide The ZyAIR G 100 802 11g Wireless CardBus Utility may be referred to as the ZyAIR Utility in this guide Related...

Страница 13: ...is recommended you use the ZyAIR Utility to configure the ZyAIR There are two methods to disable the configuration tool in Windows XP after you install the ZyAIR Utility From ZyAIR Utility Right clic...

Страница 14: ...ection to display a status window as shown next Figure 1 3 Windows XP Wireless Network Connection Status 4 Click Properties and click the Wireless Networks tab Then skip to Step 6 5 When a Connect to...

Страница 15: ...ility appears in the system tray When the ZyAIR Utility system tray icon displays the ZyAIR is installed properly Figure 1 6 ZyAIR Utility System Tray Icon The color of the ZyAIR Utility system tray i...

Страница 16: ......

Страница 17: ...red LAN systems Access to network services in areas otherwise hard or expensive to wire such as historical buildings buildings with asbestos materials and classrooms Doctors and nurses can access a co...

Страница 18: ...data rate Transmission at lower data speeds is usually more reliable However when the communication quality improves again the ZyAIR gradually increases the transmission data rate again until it reach...

Страница 19: ...twork Wireless clients can then access resource such as the printer on the wired network Figure 2 3 Infrastructure Network Example 2 4 5 Roaming Roaming is where in an infrastructure network wireless...

Страница 20: ...ation Refer to the Quick Installation Guide to install the ZyAIR driver and wireless utility program 2 6 The Link Info Screen When the ZyAIR Utility starts the Link Info screen displays showing the cu...

Страница 21: ...ther None WEP WPA PSK WPA or 802 1x for the wireless device Current IP This field displays your computers IP address Operating Mode This field displays the operating mode of the ZyAIR Infrastructure t...

Страница 22: ...ireless network type as Infrastructure or Ad Hoc of each wireless device Infrastructure the ZyAIR associates to an AP Ad Hoc the ZyAIR associates to a peer ad hoc computer Mode This field displays the...

Страница 23: ...re automatically taken to the Link Info screen 2 8 The Configuration Screen Click Configuration in the ZyAIR Utility program to display the Configuration screen as shown next Figure 2 7 Configuration...

Страница 24: ...eer ad hoc computer you must use the same channel as the peer ad hoc computer Set Security Click Set Security to display the Security Configuration screen Configure your ZyAIR with wireless LAN securi...

Страница 25: ...ption with WEP Select WEP from the Authentication drop down list box to view the security configuration options WEP Wired Equivalent Privacy encryption scrambles all communication transmitted between...

Страница 26: ...uthentication request to the AP which will then reply with a challenge text message The wireless station must then use the AP s default WEP key to encrypt the challenge text and return it to the AP wh...

Страница 27: ...computers as they are on the ZyAIR Authentication Type Select Open System or Shared Key from the drop down list box See the section on Authentication Type for further descriptions of these Select Ope...

Страница 28: ...Enter either 26 hexadecimal digits in the range of A F a f and 0 9 for example 00112233445566778899AABBCC for hexadecimal key type or Enter 13 ASCII characters case sensitive ranging from a z A Z and...

Страница 29: ...he background automatically The Message Integrity Check MIC is designed to prevent an attacker from capturing data packets altering them and resending them The MIC provides a strong mathematical funct...

Страница 30: ...allowed type a Password Certificate This field is only available when you select EAP TLS in the EAP Type field You must first have a wired connection to a network and obtain the certificate s from a c...

Страница 31: ...uthentication WPA with RADIUS Application Example You need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA application example with an external R...

Страница 32: ...re 2 13 WPA with RADIUS Application Example Figure 2 14 WPA PSK Authentication Follow the instructions in the table to configure the WEP encryptions Table 2 6 WPA PSK Authentication FIELD DESCRIPTION...

Страница 33: ...or an unlimited number of users EAP Authentication Overview EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE802 1x transport mechanism in order to supp...

Страница 34: ...Guide for information on the fields listed below EAP TLS EAP TTLS EAP MD5 EAP PEAP LEAP Login Name Enter a user name This is the user name that you or an administrator set up on the RADIUS server Pas...

Страница 35: ...icate to the server Select the check box to have your server validate this certificate TTLS Protocol PEAP Protocol Select a protocol from the drop down list box The choices are EAP TTLS PAP CHAP MS CH...

Страница 36: ...the ZyAIR Utility Driver Version This field displays the version number of the ZyAIR wireless card driver Firmware This field displays the version of the firmware of the ZyAIR card OK Click OK to appl...

Страница 37: ...ving the ZyAIR Utility section to remove the current ZyAIR Utility from your computer 3 Restart the computer when prompted 4 After restarting refer to the procedure in the Quick Installation Guide to...

Страница 38: ...Icon Windows XP 3 When a Safely Remove Hardware window displays select the ZyAIR device in the Hardware devices list and click Stop Figure 3 4 Safely Remove Hardware Windows XP 4 If you do not close...

Страница 39: ...tenance 3 3 Figure 3 5 Stop a Hardware device Windows XP 6 After the following notice window displays in the system tray you can safely disconnect the ZyAIR from your computer Figure 3 6 Safe To Remov...

Страница 40: ......

Страница 41: ...act your local vendor The ZyAIR Utility displays only three tabs When the ZyAIR Utility displays only three tabs you are using the Windows XP wireless configuration tool at the same time Refer to Sect...

Страница 42: ...e 4 3 Troubleshooting Link Quality PROBLEM CORRECTIVE ACTION The link quality and or signal strength is poor all the time Search and connect to another AP with a better link quality using the Site Sur...

Страница 43: ...set up easy to use wireless networks that cover the entire campus transparently IEEE 802 11 The 1997 completion of the IEEE 802 11 standard for wireless LANs WLANs was a first important step in the ev...

Страница 44: ...mediate neighborhood Multiple access points can provide wireless coverage for an entire building or campus All communications between stations or between a station and a wired network client go throug...

Страница 45: ...e through manual modification of the MAC address table on the access point Although WEP data encryption offers a form of data security you have to reset the WEP key on the clients each time you change...

Страница 46: ...ZyAIR G 100 User s Guide B Wireless LAN With IEEE 802 1x Diagram 4 3 Sequences for EAP MD5 Challenge Authentication Client computer access authorized Client computer access not authorized...

Страница 47: ...the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable to passive attacks A digital certificate is an electronic ID card th...

Страница 48: ...ion No Yes Yes Yes Yes Certificate Client No Yes Optional Optional No Certificate Server No Yes Yes Yes No Dynamic Key Exchange No Yes Yes Yes Yes Credential Security None Strong Strong Strong Moderat...

Страница 49: ...te 802 11b 11 5 5 2 1Mbps 802 11g 54 48 36 24 18 12 9 6 Mbps Modulation 802 11g OFDM with BPSK QPSK and 16 64 QAM sub carrier modulations 802 11b DBPSK DQPSK CCK Output Power 17 dBm typical at 11Mbps...

Страница 50: ...ZyAIR G 100 User s Guide F Types of EAP Authentication ENVIRONMENTAL SPECIFICATIONS Temperature Operating 0 50 C Storage 20 75 C Relative Humidity 5 to 95 non condensing...

Страница 51: ...ty Flaws C IEEE 802 11g 2 1 IEEE 802 1x C Advantages C Independent Basic Service Set A See IBSS Information for Canadian Users iv Caution iv Note iv Infrastructure 2 3 Infrastructure Configuration B L...

Страница 52: ...ess LAN benefits 2 1 Wireless LAN Benefits 2 1 A Wireless LAN Parameters Channel 2 2 Configuring 2 7 Network Type 2 2 SSID 2 2 Transmission Rate 2 2 Wireless LAN Security Data Encryption with WEP 2 9...

Отзывы: