ZyXEL Communications ZyXEL ZyAIR G-360 User Manual
ZyXEL Communications ZyXEL ZyAIR G-360 User Manual

ZyXEL Communications ZyXEL ZyAIR G-360 User Manual

802.11g wireless pci adapter
Hide thumbs Also See for ZyXEL ZyAIR G-360:
Table of Contents

Advertisement

Quick Links

ZyXEL G-360
802.11g Wireless PCI Adapter
User's Guide
Version 3.0
8/2005

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ZyXEL ZyAIR G-360

  • Page 1 ZyXEL G-360 802.11g Wireless PCI Adapter User's Guide Version 3.0 8/2005...
  • Page 2 ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 3: Zyxel Limited Warranty

    ZyXEL G-360 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product...
  • Page 4: Federal Communications Commission

    ZyXEL G-360 User’s Guide Federal Communications Commission The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5: Table Of Contents

    Copyright ...ii ZyXEL Limited Warranty ...iii Federal Communications Commission (FCC) Interference Statement...iv List of Figures...vii List of Tables ...viii Chapter 1 Getting Started ...1-1 About Your G-360 ...1-1 Syntax Conventions ...1-1 Graphics Icons Key ...1-2 Application Overview...1-2 1.4.1 Infrastructure ...1-2 1.4.2 Ad-Hoc...1-3 G-360 Hardware and Utility Installation...1-3...
  • Page 6 ZyXEL G-360 User’s Guide 6.1.1 Enabling OTIST...6-1 6.1.2 Starting OTIST ...6-2 6.1.3 Notes on OTIST...6-3 Configuring the Adapter Screen ...6-4 Chapter 7 Maintenance ...7-1 The About Screen ...7-1 Uninstalling the ZyXEL Utility ...7-2 Upgrading the ZyXEL Utility...7-2 Chapter 8 Troubleshooting ...8-1 Problems Starting the ZyXEL Utility Program...8-1 Problem with the Link Status ...8-2 Problems Communicating With Other Computers...8-2...
  • Page 7: List Of Figures

    ZyXEL G-360 User’s Guide List of Figures Figure 1-1 Infrastructure Example ...1-2 Figure 1-2 Ad-Hoc Example ...1-3 Figure 1-3 ZyXEL Utility: System Tray Icon ...1-4 Figure 1-4 Screen Overview ...1-5 Figure 1-5 Site Survey ...1-6 Figure 1-6 Site Survey: Security Settings ...1-7 Figure 1-7 Link Info...1-7 Figure 1-8 Profile ...1-8 Figure 1-9 Profile: Add ...1-9...
  • Page 8 ZyXEL G-360 User’s Guide List of Tables Table 1-1ZyXEL Utility: System Tray Icon...1-4 Table 1-2 Screen Summary...1-5 Table 2-1 Link Info ...2-2 Table 2-2 Link Info: Trend Chart...2-4 Table 3-1 Site Survey...3-2 Table 4-1 Wireless LAN Security Levels ...4-1 Table 4-2 Security Settings: WEP...4-3 Table 4-3 Security Settings: WPA-PSK/WPA2-PSK...4-5 Table 4-4 Security Settings: WPA/WPA2 or 802.1x...4-6 Table 5-1 Profile ...5-2...
  • Page 9: Chapter 1 Getting Started

    This chapter introduces the G-360 and prepares you to use the ZyXEL Utility. About Your G-360 The G-360 is an IEEE 802.11g compliant wireless LAN adapter. The following lists the main features of your G-360. See the product specifications in the appendix for detailed features.
  • Page 10: Graphics Icons Key

    ZyXEL G-360 User’s Guide Graphics Icons Key Wireless Access Point Server Application Overview 1.4.1 Infrastructure To connect to a network via an Access Point (AP), set the G-360 network type to Infrastructure. Through the AP, you can access the Internet or the wired network behind the AP. Computer Modem or Router Figure 1-1 Infrastructure Example...
  • Page 11: Ad-Hoc

    1.4.2 Ad-Hoc In case you prefer to set up a small independent wireless workgroup without an AP, use the Ad-Hoc mode. Ad-hoc mode does not require an AP or a wired network. Two or more wireless clients communicate directly to each other. To set up an Ad-Hoc network, configure all wireless clients in Ad-Hoc network type and use the same SSID, channel and security.
  • Page 12: Accessing The Zyxel Utility

    ZyXEL G-360 User’s Guide DO NOT use WZC or the Odyssey Client Manager and the ZyXEL Utility at the Accessing the ZyXEL Utility After you install and start the ZyXEL Utility, an icon for the ZyXEL Utility appears in the system tray. When the ZyXEL Utility system tray icon displays, the G-360 is installed properly.
  • Page 13: Network Connection Methods

    The following table describes the labels in this screen. SCREEN Link Info Use this screen to see your current connection status, configuration and data rate statistics. Site Survey Use this screen to Profile Use this screen to add, delete, edit or activate a profile with a set of wireless and security settings.
  • Page 14: Site Survey

    ZyXEL G-360 User’s Guide 1.8.1 Site Survey After you insert the G-360 and install the ZyXEL Utility, follow the steps below to connect to a network using the Site Survey screen. 1. Make sure a wireless network is available and within range. 2.
  • Page 15: Figure 1-6 Site Survey: Security Settings

    ZyXEL G-360 User’s Guide If the selected network is unavailable or security settings are not correct, the G- 360 will be disconnected. Figure 1-6 Site Survey: Security Settings 6. Verify that you have successfully connected to the selected network and check the network information in the Link Info screen.
  • Page 16: Profiles

    ZyXEL G-360 User’s Guide 1.8.2 Profiles A profile is a set of wireless parameters that you need to connect to a wireless network. With a profile activated, each time you start the G-360, it automatically scans for the specific SSID and joins that network with the pre-defined wireless security settings.
  • Page 17: Figure 1-9 Profile: Add

    ZyXEL G-360 User’s Guide 4. Give the profile a descriptive name (of up to 32 printable ASCII characters). If you want to connect to an AP, select Infrastructure and enter the AP’s SSID. If you want to connect to another peer wireless device directly (without an AP), select Ad-Hoc and enter the same SSID as that device.
  • Page 18: Figure 1-10 Profile: Channel

    ZyXEL G-360 User’s Guide 5. If you selected Infrastructure, skip to the next step. If you selected Ad-Hoc, use the same channel as the peer wireless device. Figure 1-10 Profile: Channel 1-10 Getting Started...
  • Page 19: Figure 1-11 Profile: Encryption

    ZyXEL G-360 User’s Guide 6. If you selected Infrastructure, choose the same encryption method (Disable, WEP, WPA, WPA2, WPA-PSK, WPA2-PSK or 802.1x) as the AP to which you want to connect. If you selected Ad- Hoc, you can only use WEP. Figure 1-11 Profile: Encryption Getting Started 1-11...
  • Page 20: Figure 1-12 Profile: Security

    ZyXEL G-360 User’s Guide 7. This screen varies depending on the encryption method you selected in the previous screen. Enter the same settings as the associated network. Figure 1-12 Profile: Security 1-12 Getting Started...
  • Page 21: Figure 1-13 Profile: Confirm

    8. Verify the profile settings in the ready-only screen. Click Save to save and go to the next screen. Click Back to return to the previous screen. 9. Click Activate Now to use the new profile immediately. Otherwise, click Activate Later and go back to the Profile screen.
  • Page 22: Figure 1-15 Profile

    ZyXEL G-360 User’s Guide Activating a Profile If you have more than one profile, you can use one of the pre-configured profiles to connect to a wireless network by activating it. Follow the steps below to activate a profile. Only one profile can be activated and used at any given time. 1.
  • Page 23: Chapter 2 Link Info

    This chapter shows you detailed information about the Link Info screen. Transmission Rate (Transfer Rate) The G-360 provides various transmission (data) rate options for you to select. Options include Fully Auto, 1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 22 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, 54 Mbps and 125 Mbps.
  • Page 24: Figure 2-1 Link Info

    ZyXEL G-360 User’s Guide The following table describes the labels in this screen. LABEL Wireless Network Status The following fields show the information of the network to which the G-360 is connected. If there is no associated wireless network, they are blank. Profile Name This is the name of the profile you are currently using.
  • Page 25 LABEL AP MAC Address This field displays the MAC address of the wireless device to which the G-360 is associated. Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
  • Page 26: Trend Chart

    ZyXEL G-360 User’s Guide 2.2.1 Trend Chart Click Trend Chart in the Link Info screen to open the read-only screen as shown next. The following table describes the labels in this screen. LABEL Transmit This field displays the current data transmission rate in kilobits per second (Kbps). Receive This field displays the current data receiving rate in kilobits per second (Kbps).
  • Page 27: Chapter 3 Site Survey

    ZyXEL G-360 User’s Guide Chapter 3 Site Survey This chapter provides a detailed description about the Site Survey screen. See the Getting Stated chapter for how to connect to a network using the Site Survey screen. Configuring the Site Survey screen Click the Site Survey tab and use this screen to scan for a wireless network and connect to it.
  • Page 28: Table 3-1 Site Survey

    ZyXEL G-360 User’s Guide LABEL Available Network List The wireless network to which the G-360 is associated is bolded. Click a column heading to sort the entries. A triangle indicates ascending or descending sort order. denotes that the wireless device is in infrastructure mode. denotes that the wireless device is in Ad-Hoc mode.
  • Page 29: Chapter 4 Security Settings

    This chapter discusses how to configure wireless security on the G-360. Wireless LAN Security Wireless LAN security is vital to protect wireless communications. The figure below shows the possible wireless security levels on your G-360. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. It requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server either on the WAN or your LAN to provide authentication service for wireless clients.
  • Page 30: Authentication Type

    ZyXEL G-360 User’s Guide For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the ZyXEL Utility and entering them manually as the WEP keys in the other WLAN adapter(s). •...
  • Page 31: Wep Encryption

    4.3.1 WEP Encryption The following table describes the labels in this screen. LABEL Select 64 Bits, 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields. Authentication Select Share to authenticate the G-360 to an AP or peer WLAN device using the key(s) configured below.
  • Page 32 ZyXEL G-360 User’s Guide LABEL Key x If you want to manually set the WEP keys, enter the WEP key (same as the AP or peer (where x is a device) in the field provided. number If you select 64 Bits in the WEP field. between 1 and Enter either 10 hexadecimal digits in the range of “A-F”, “a-f”...
  • Page 33: Wpa-Psk/Wpa2-Psk

    4.3.2 WPA-PSK/WPA2-PSK Figure 4-2 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 4-3 Security Settings: WPA-PSK/WPA2-PSK FIELD Encryption Type WPA uses TKIP and WPA2 uses AES to improve data encryption. Pass Phrase The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials.
  • Page 34: Wpa/Wpa2 Or 802.1X

    ZyXEL G-360 User’s Guide 4.3.3 WPA/WPA2 or 802.1x Figure 4-3 Security Settings: WPA/WPA2 or 802.1x The following table describes the labels in this screen. Table 4-4 Security Settings: WPA/WPA2 or 802.1x FIELD Authentication Type Select the authentication method that the RADIUS server uses from the drop down list.
  • Page 35 Table 4-4 Security Settings: WPA/WPA2 or 802.1x FIELD Certificate This field is only available when you select EAP-TLS in the Authentication Type field. Specify the location and name of a certificate in the Certificate field or click Browse to locate it. Browse This field is only available when you select EAP-TLS in the Authentication Type field.
  • Page 37: Chapter 5 Profile

    Configuring the Profile Screen Click the Profile tab in the ZyXEL Utility program to display the Profile screen as shown next. The profile function allows you to save a wireless network’s settings, so you can use them again later. The following table describes the labels in this screen. Profile This chapter describes how to configure and use a profile.
  • Page 38: Adding A New Profile

    ZyXEL G-360 User’s Guide LABEL Profile List Click a column heading to sort the entries. A triangle indicates ascending or descending sort order. denotes that the wireless device is in infrastructure mode. denotes that the wireless device is in Ad-Hoc mode. displays with the previous two icons if the wireless devices are using security.
  • Page 39: Figure 5-2 Profile: Add New Profile

    The following table describes the labels in this screen. LABEL Profile Name Enter a descriptive name (of up to 32 printable ASCII characters) in this field. SSID Select an available wireless device in the Scan Info table and click Select, or enter the SSID (Service Set IDentifier) of the AP or the peer ad-hoc device to which you want to associate in this field.
  • Page 40 ZyXEL G-360 User’s Guide LABEL Exit Click Exit to go back to the previous screen without saving. Scan Info This table displays the information of the available wireless networks within the transmission range. denotes that the wireless device is in infrastructure mode. denotes that the wireless device is in Ad-Hoc mode.
  • Page 41: Figure 5-3 Profile: Select A Channel

    Step 2. If you select the Infrastructure network type in the previous screen, skip to Step 3. If you select the Ad-Hoc network type in the previous screen, a screen displays as follows. Select the same channel number as the peer device and click Next to continue. Profile Figure 5-3 Profile: Select a Channel ZyXEL G-360 User’s Guide...
  • Page 42: Figure 5-4 Profile: Wireless Settings

    ZyXEL G-360 User’s Guide Step 3. If you select Infrastructure network type in the first screen, select the same encryption method as the AP (WEP, WPA-PSK, WPA2-PSK, WPA, WPA2 or 802.1x) from the drop-down list box to enable data encryption. If you select Ad-Hoc network type in the first screen, you can only use WEP encryption method.
  • Page 43: Figure 5-5 Profile: Security Settings

    Step 4. The screen varies depending on the encryption method you select in the previous screen. The settings must be exactly the same on the APs or other peer wireless devices as they are on the G-360. Refer to Section 1.1 for detailed information on wireless security configuration. Profile Figure 5-5 Profile: Security Settings ZyXEL G-360 User’s Guide...
  • Page 44: Figure 5-6 Profile: Confirm New Settings

    ZyXEL G-360 User’s Guide Step 5. This read-only screen shows a summary of the new profile settings. Verify that the settings are correct. Click Save to save and go to the next screen. Click Back to return to the previous screen.
  • Page 45: Figure 5-7 Profile: Activate The Profile

    Step 6. To use this network profile, click the Activate Now button. Otherwise, click the Activate Later button. Once you activate a profile, the ZyXEL Utility will use that profile the next time it Profile is started. Figure 5-7 Profile: Activate the Profile ZyXEL G-360 User’s Guide...
  • Page 47: Chapter 6 Adapter

    ZyXEL G-360 User’s Guide Chapter 6 Adapter This chapter discusses OTIST and how to configure the Adapter screen. Introduction to OTIST In a wireless network, the wireless clients must have the same SSID and security settings as the access point (AP) or wireless router (we will refer to both as “AP” here) in order to associate with it. Traditionally this meant that you have to configure the settings on the AP and then manually configure the exact same settings on each wireless client.
  • Page 48: Starting Otist

    ZyXEL G-360 User’s Guide You can enable OTIST using the reset button or the web configurator. If you use the reset button, the default (01234567) or previous saved (through the web configurator) Setup Key is used to encrypt the settings that you want to transfer. Hold in the Reset button for one or two seconds.
  • Page 49: Notes On Otist

    In the wireless client, you see this screen if it can't find an OTIST-enabled AP (with the same Setup Key). Click OK to go back to the ZyXEL Utility main screen. If there is more than one OTIST-enabled AP within range, you see a screen asking you to select one AP to get settings from.
  • Page 50: Configuring The Adapter Screen

    ZyXEL G-360 User’s Guide 4. If you change the SSID or the keys on the AP after using OTIST, you need to run OTIST again or enter them manually in the wireless client(s). 5. If you configure OTIST to generate a WPA(2)-PSK key, this key changes each time you run OTIST.
  • Page 51 LABEL Transfer Rate Select a transmission speed from the drop-down list box. Options are Fully Auto (default), 1 Mbps, 2 Mbps, 5.5 Mbps, 11 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 22 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, 54 Mbps and 125 Mbps. Select Fully Auto to allow your G-360 to operate at the maximum available transmission rate.
  • Page 53: Chapter 7 Maintenance

    The About Screen The About screen displays related version numbers of the G-360. To display the screen as shown next, click the about ( ) button. The following table describes the read-only fields in this screen. LABEL Driver Version This field displays the version number of the ZyXEL driver. Utility Version This field displays the version number of the ZyXEL Utility.
  • Page 54: Uninstalling The Zyxel Utility

    ZyXEL G-360 User’s Guide Uninstalling the ZyXEL Utility Follow the steps below to remove (or uninstall) the ZyXEL Utility from your computer. 1. Click Start, Programs, ZyXEL G-360 802.11g Wireless PCI Card, Uninstall. 2. When prompted, click OK to remove the driver and the utility software. 3.
  • Page 55: Chapter 8 Troubleshooting

    This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. Problems Starting the ZyXEL Utility Program Table 8-1 Troubleshooting Starting ZyXEL Utility Program PROBLEM Cannot start the ZyXEL Make sure the G-360 is properly inserted and the LED(s) is on.
  • Page 56: Problem With The Link Status

    ZyXEL G-360 User’s Guide Problem with the Link Status PROBLEM The link quality and/or signal strength is poor all the time. Problems Communicating With Other Computers Table 8-3 Troubleshooting Communication Problems PROBLEM The G-360 computer cannot communicate with another computer. Infrastructure Ad-Hoc (IBSS) Table 8-2 Troubleshooting Link Quality...
  • Page 57: Related Documentation

    Help us help you. E-mail all User’s Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 58: Troubleshooting

    Nils Hansens vei 13 0667 Oslo Norway ZyXEL Communications Alejandro Villegas 33 1º, 28043 Madrid Spain ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg Sweden ZyXEL Communications UK Ltd., 11, The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK) Troubleshooting...
  • Page 59: Appendix A Product Specifications

    Product Name ZyXEL G-360 802.11g Wireless PCI Adapter Type 3.3V 32-bit PCI V2.2 IEEE 802.11b Standards IEEE 802.11g Infrastructure Network Architectures Ad-Hoc Operating Frequencies 2.412-2.483GHz (Industrial Scientific Medical Band) IEEE 802.11b: 11 Channels (North America) IEEE 802.11g: 11 Channels (North America) Operating Channels IEEE 802.11b: 13 Channels (Europe) IEEE 802.11g: 13 Channels (Europe)
  • Page 60 ZyXEL G-360 User’s Guide 17 dBm (typical) at 11Mbps DBPSK, DQPSK, CCK Output Power 14 dBm (typical) at 54Mbps OFDM 802.11g (OFDM): 54 Mbps: < -68 dBm (typ.) < -69 dBM (max.) RX Sensitivity 802.11b (PBCC): 22 Mbps: < -83 dBm (typ.) < -88 dBM (max.) Operating: 0°...
  • Page 61: Appendix B Disable Windows Xp Wireless Lan Configuration Tool

    ZyXEL G-360 User’s Guide Appendix B Disable Windows XP Wireless LAN Configuration Tool Windows XP includes a configuration tool (also known as Wireless Zero Configuration (WZC)) for wireless devices. Follow the steps below to disable the configuration tool in Windows XP after you install the ZyXEL Utility.
  • Page 62 ZyXEL G-360 User’s Guide 2. Windows XP SP1: When a Wireless Network Connection window displays, click Advanced…. Diagram 2 Windows XP SP1: Wireless Network Connection Windows XP SP2: When a Wireless Network Connection window displays, click Change advanced settings under Related Tasks and then the Wireless Networks tab. Diagram 3 Windows XP SP2: Wireless Network Connection Disable Windows XP Wireless LAN Configuration Tool...
  • Page 63 ZyXEL G-360 User’s Guide 3. In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Diagram 4 Windows XP SP1: Wireless Network Connection Properties Disable Windows XP Wireless LAN Configuration Tool...
  • Page 64 ZyXEL G-360 User’s Guide Diagram 5 Windows XP SP2: Wireless Network Connection Properties Via the Control Panel 1. If the icon for the wireless network connection is not in the system tray, click Start, Control Panel and double-click Network Connections. Disable Windows XP Wireless LAN Configuration Tool...
  • Page 65 ZyXEL G-360 User’s Guide 2. Double-click on the icon for wireless network connection to display a status window as shown below. Diagram 6 Windows XP SP1: Wireless Network Connection Status Diagram 7 Windows XP SP2: Wireless Network Connection Status Disable Windows XP Wireless LAN Configuration Tool...
  • Page 66 ZyXEL G-360 User’s Guide 3. Click Properties and click the Wireless Networks tab. 4. In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Diagram 8 Windows XP SP1: Wireless Network Connection Properties Disable Windows XP Wireless LAN Configuration Tool...
  • Page 67 ZyXEL G-360 User’s Guide Diagram 9 Windows XP SP2: Wireless Network Connection Properties Disable Windows XP Wireless LAN Configuration Tool...
  • Page 69: Appendix C Management With Wireless Zero Configuration

    ZyXEL G-360 User’s Guide Appendix C Management with Wireless Zero Configuration This appendix shows you how to manage your G-360 using the Windows XP wireless zero configuration tool. Be sure you have the Windows XP service pack 2 installed on your computer. Otherwise, you should at least have the Windows XP service pack 1 already on your computer and download the support patch for WPA from the Microsoft web site.
  • Page 70: Connecting To A Wireless Network

    ZyXEL G-360 User’s Guide Connecting to a Wireless Network 1. Double-click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Diagram 11 Windows XP SP2: System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the G-360. Refer to the following table for details.
  • Page 71 ZyXEL G-360 User’s Guide 2. Windows XP SP2: In the Wireless Network Connection Status screen, click View Wireless Networks to open the Wireless Network Connection screen. Diagram 12 Windows XP SP2: Wireless Network Connection Status Management with Wireless Zero Configuration...
  • Page 72 ZyXEL G-360 User’s Guide Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the Wireless Network Connection Properties screen. Diagram 13 Windows XP SP1: Wireless Network Connection Status Management with Wireless Zero Configuration...
  • Page 73 3. Windows XP SP2: Click Refresh network list to reload and search for available wireless devices within transmission range. Select a wireless network in the list and click Connect to join the selected wireless network. Diagram 14 Windows XP SP2: Wireless Network Connection The following table describes the icons in the wireless network list.
  • Page 74 ZyXEL G-360 User’s Guide Chart 2 Windows XP SP2: Wireless Network Connection ICON This denotes that this wireless network is your preferred network. Ordering your preferred networks is important because the G-360 tries to associate to the preferred network first in the order that you specify.
  • Page 75 4. Windows XP SP2: If the wireless security is activated for the selected wireless network, the Wireless Network Connection screen displays. You must set the related fields in the Wireless Network Connection screen to the same security settings as the associated AP. Refer to Section 0 for more information.
  • Page 76: Security Settings

    ZyXEL G-360 User’s Guide Security Settings When you configure the G-360 to connect to a secure network but the security settings are not yet enabled on the G-360, you will see different screens according to the authentication and encryption methods used by the selected network.
  • Page 77 Chart 4 Windows XP: Wireless (network) properties: Association LABEL Network This field automatically shows the authentication method (Share, Open, WPA or WPA- Authentication PSK) used by the selected network. Refer to Section 4.2 for more information. Data Encryption This field automatically shows the encryption type (TKIP, WEP or Disable) used by the selected network.
  • Page 78 ZyXEL G-360 User’s Guide Diagram 19 Windows XP: Wireless (network) properties: Authentication The following table describes the labels in this screen. Chart 5 Windows XP: Wireless (network) properties: Authentication LABEL Enable IEEE This field displays whether the IEEE 802.1x authentication is active. 802.1x If the network authentication is set to Open in the previous screen, you can choose to authentication...
  • Page 79 Chart 5 Windows XP: Wireless (network) properties: Authentication LABEL Authenticate as Select this check box to have the computer access to the network as a guest when a guest when user user is not logged on or computer information is not available. or computer information is unavailable...
  • Page 80 ZyXEL G-360 User’s Guide The following table describes the labels in this screen. Chart 6 Windows XP: Protected EAP Properties LABEL Validate server Select the check box to verify the certificate of the authentication server. certificate Connect to Select the check box and specify a domain in the field below to have your computer these servers connect to a server which resides only within this domain.
  • Page 81 Smart Card or other Certificate Properties Diagram 21 Windows XP: Smart Card or other Certificate Properties The following table describes the labels in this screen. Chart 7 Windows XP: Smart Card or other Certificate Properties LABEL Use my smart Select this check box to use the smart card for authentication. card Use a certificate Select this check box to use a certificate on your computer for authentication.
  • Page 82: Ordering The Preferred Networks

    ZyXEL G-360 User’s Guide Chart 7 Windows XP: Smart Card or other Certificate Properties LABEL Trusted Root Select a trusted certification authority from the list below. Certification You must first have a wired connection to a network and obtain Authorities: the certificate(s) from a certificate authority (CA).
  • Page 83 ZyXEL G-360 User’s Guide Diagram 22 Windows XP SP2: Wireless Networks: Preferred Networks Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the screen as shown. Management with Wireless Zero Configuration...
  • Page 84 ZyXEL G-360 User’s Guide Diagram 23 Windows XP SP1: Wireless Networks: Preferred Networks 2. Whenever the G-360 tries to connect to a new network, the new network is added in the Preferred networks table automatically. Select a network and click Move up or Move down to change it’s order, click Remove to delete it or click Properties to view the security, authentication or connection information of the selected network.
  • Page 85: Appendix D Wireless Lans

    ZyXEL G-360 User’s Guide Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-Hoc (IBSS) The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless clients. Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 86 ZyXEL G-360 User’s Guide Diagram 25 BSS Example A series of overlapping BSS and a network medium, such as an Ethernet forms an Extended Service Set (ESS) or infrastructure network. All communication is done through the AP, which relays data packets to other wireless clients or devices connected to the wired network.
  • Page 87 ZyXEL G-360 User’s Guide EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless client and a RADIUS server perform authentication.
  • Page 88 ZyXEL G-360 User’s Guide The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. The common- password approach makes WPA-PSK susceptible to brute-force password-guessing attacks but it’s still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password.
  • Page 89 WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. “A” is the RADIUS server.
  • Page 90 ZyXEL G-360 User’s Guide Diagram 28 WPA(2) with RADIUS Application Example Wireless LANs...
  • Page 91: Appendix E Types Of Eap Authentication

    This appendix discusses the five popular EAP authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client.
  • Page 92 ZyXEL G-360 User’s Guide LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE802.1x. For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical.
  • Page 93 About ...7-1 About the ZyXEL Utility ...7-1 Accessing the ZyXEL Utility...1-4 Activating a Profile ...1-14 Add a New Profile...5-2 Application Overview ...1-2 Authentication Mode...4-2 Open...4-2 Shared ...4-2 Automatic WEP key generation...4-2 CA... GG Certificate Authority ... See CA Communication Problem Ad-hoc(IBSS) ...8-3 Infrastructure...8-2 Configuration Methods ...1-3...
  • Page 94 ZyXEL G-360 User’s Guide Online Registration... iii Open authentication mode ... 4-2 OTIST... 6-1 passphrase... 4-2 PEAP ...GG problem description ... 8-1 Profile ... 5-1 Protected EAP... See PEAP Related Documentation... 8-3 Security Settings WEP Encryption ... 4-3 WPA/WPA2 ... 4-6 WPA-PSK/WPA2-PSK ...
  • Page 95 ZyXEL Utility WPA/WPA2...4-6 ZyXEL Utility Removing...7-2 Index ZyXEL G-360 User’s Guide ZyXEL Utility Before you upgrade ...7-2 ZyXEL Utility Maintenance...7-1 ZyXEL Utility Upgrading ...7-2...

Table of Contents