ZyXEL Communications ZyXEL ZyAIR G-260 User Manual

802.11g wireless usb 2.0 adapter
Hide thumbs Also See for ZyXEL ZyAIR G-260:
Table of Contents

Advertisement

Quick Links

ZyXEL G-260
802.11g Wireless USB 2.0 Adapter
User's Guide
Version 1.00
8/2005

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ZyXEL ZyAIR G-260

  • Page 1 ZyXEL G-260 802.11g Wireless USB 2.0 Adapter User’s Guide Version 1.00 8/2005...
  • Page 2: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 3: Federal Communications Commission (Fcc) Interference Statement

    ZyXEL G-260 User’s Guide Federal Communications Commission (FCC) Interference The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 4 Certifications 1 Go to www.zyxel.com 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page 注意 ! 依據 低功率電波輻射性電機管理辦法 第十二條...
  • Page 5: Zyxel Limited Warranty

    ZyXEL G-260 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to...
  • Page 6: Customer Support

    +34 902 195 420 www.zyxel.es +34 913 005 345 +46 31 744 7700 www.zyxel.se +46 31 744 7701 ZyXEL G-260 User’s Guide REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská...
  • Page 7 “+” is the (prefix) number you enter to make an international telephone call. TELEPHONE WEB SITE FTP SITE +44 (0) 1344 303044 www.zyxel.co.uk 08707 555779 (UK only) +44 (0) 1344 303034 ftp.zyxel.co.uk REGULAR MAIL ZyXEL Communications UK Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK) Customer Support...
  • Page 8: Table Of Contents

    Copyright ... 2 Federal Communications Commission (FCC) Interference Statement ... 3 ZyXEL Limited Warranty... 5 Customer Support... 6 Table of Contents ... 8 List of Figures ... 12 List of Tables ... 14 Preface ... 16 Chapter 1 Getting Started ... 18 1.1 About Your ZyXEL G-260 ...18 1.1.1 Application Overview ...18 1.1.1.1 Infrastructure ...18...
  • Page 9 ZyXEL G-260 User’s Guide 2.2.3.1 User Authentication ...26 2.2.3.2 Encryption ...26 2.2.4 WPA(2)-PSK Application Example ...27 2.2.5 WPA with RADIUS Application Example ...27 2.3 Encryption Type ...28 2.4 Preamble Type ...28 2.5 Introduction to OTIST 2.5.1 Enabling OTIST ...29 2.5.1.1 AP ...29 2.5.1.2 Wireless Client ...30 2.5.2 Starting OTIST ...31 2.5.3 Notes on OTIST ...31...
  • Page 10 ZyXEL G-260 User’s Guide Appendix B Disable Windows XP Wireless LAN Configuration Tool... 58 Appendix C Management with Wireless Zero Configuration ... 64 Appendix D Types of EAP Authentication ... 76 Index... 80 Table of Contents...
  • Page 11 ZyXEL G-260 User’s Guide Table of Contents...
  • Page 12: List Of Figures

    ZyXEL G-260 User’s Guide List of Figures Figure 1 Application: Infrastructure ... 18 Figure 2 Application: Ad-Hoc ... 19 Figure 3 ZyXEL Utility: System Tray Icon ... 20 Figure 4 ZyXEL Utility: Site Survey ... 21 Figure 5 ZyXEL Utility: Security Settings ... 21 Figure 6 ZyXEL Utility: Link Info ...
  • Page 13 ZyXEL G-260 User’s Guide Figure 39 Windows XP SP2: System Tray Icon ... 65 Figure 40 Windows XP SP2: Wireless Network Connection Status ... 65 Figure 41 Windows XP SP1: Wireless Network Connection Status ... 66 Figure 42 Windows XP SP2: Wireless Network Connection ... 66 Figure 43 Windows XP SP1: Wireless Network Connection Properties ...
  • Page 14: List Of Tables

    ZyXEL G-260 User’s Guide List of Tables Table 1 ZyXEL Utility: System Tray Icon ... 20 Table 2 ZyXEL Utility: Menu Screen Summary ... 22 Table 3 Link Info ... 34 Table 4 Link Info: Trend Chart ... 35 Table 5 Site Survey ... 36 Table 6 Security Settings: WEP ...
  • Page 15 ZyXEL G-260 User’s Guide List of Tables...
  • Page 16: Preface

    Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 17: Graphics Icons Key

    ZyXEL G-260 User’s Guide • For brevity’s sake, we will use “e.g.,” as a shorthand for “for instance”, and “i.e.,” for “that is” or “in other words” throughout this manual. • The ZyXEL G-220F 802.11g Wireless USB Adapter may be referred to as the ZyXEL G- 260 in this user’s guide.
  • Page 18: Chapter 1 Getting Started

    This chapter introduces the ZyXEL G-260 and prepares you to use the ZyXEL Utility. 1.1 About Your ZyXEL G-260 The ZyXEL G-260 is an IEEE 802.11g compliant wireless LAN USB adapter. The following lists the main features of your ZyXEL G-260. See the product specifications in the appendix for detailed features.
  • Page 19: Ad-Hoc

    ZyXEL G-260 User’s Guide 1.1.1.2 Ad-Hoc In case you prefer to set up a small independent wireless workgroup without an AP, use the Ad-Hoc mode. Ad-hoc mode does not require an AP or a wired network. Two or more wireless clients communicate directly to each other.
  • Page 20: Accessing The Zyxel Utility

    1.5 Accessing the ZyXEL Utility After you install and start the ZyXEL Utility, an icon for the ZyXEL Utility appears in the system tray. Note: When the ZyXEL Utility system tray icon displays, the ZyXEL G-260 is installed properly. When you use the ZyXEL Utility, it automatically disables the Windows XP wireless configuration tool.
  • Page 21: Figure 4 Zyxel Utility: Site Survey

    ZyXEL G-260 User’s Guide 1 Make sure a wireless network is available and within range. 2 Open the ZyXEL Utility and click the Site Survey tab to open the screen as shown next. 3 Click Scan to search for available wireless networks. Figure 4 ZyXEL Utility: Site Survey 4 To join a network, either click an SSID in the table and then click Connect or double- click an SSID.
  • Page 22: Zyxel Utility Screen Summary

    Figure 6 ZyXEL Utility: Link Info 1.7 ZyXEL Utility Screen Summary This sections describes the ZyXEL Utility screens. Figure 7 Menu Summary The following table describes the menus. Table 2 ZyXEL Utility: Menu Screen Summary DESCRIPTION Link Info Use this screen to see your current connection status, configuration and data rate statistics.
  • Page 23 ZyXEL G-260 User’s Guide Chapter 1 Getting Started...
  • Page 24: Wireless Lan Network

    This chapter provides background information on wireless LAN network. 2.1 Wireless LAN Overview This section describes the wireless LAN network terms and applications. 2.1.1 SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network.
  • Page 25: Data Encryption With Wep

    ZyXEL G-260 User’s Guide Configure the wireless LAN security using the Configuration or the Profile Security Settings screen. If you do not enable any wireless security on your ZyXEL G-260, the ZyXEL G-260’s wireless communications are accessible to any wireless networking device that is in the coverage area.
  • Page 26: Wpa(2)

    2.2.3 WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences between WPA(2) and WEP are user authentication and improved data encryption. 2.2.3.1 User Authentication WPA(2) applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database.
  • Page 27: Wpa(2)-Psk Application Example

    ZyXEL G-260 User’s Guide The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password.
  • Page 28: Encryption Type

    Figure 9 WPA with RADIUS Application Example 2.3 Encryption Type The IEEE 802.11b/g standard describes a simple encryption method between the wireless stations and AP. Two encryption types are defined: an Open system mode and a Shared key mode. • Open System mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP do not share a secret key.
  • Page 29: Introduction To Otist

    ZyXEL G-260 User’s Guide Note: The ZyXEL G-260 and the access point/wireless stations MUST use the same preamble mode in order to communicate. 2.5 Introduction to OTIST In a wireless network, the wireless clients must have the same SSID and security settings as the access point (AP) or wireless router (we will refer to both as “AP”...
  • Page 30: Wireless Client

    2.5.1.2 Wireless Client Start the ZyXEL Utility and click the Adapter tab. Select the Auto Security check box, enter the same Setup Key as your AP’s and click Save. Chapter 2 Wireless LAN Network ZyXEL G-260 User’s Guide...
  • Page 31: Starting Otist

    ZyXEL G-260 User’s Guide 2.5.2 Starting OTIST Note: You must click Start in the AP OTIST web configurator screen and Save in the wireless client(s) Adapter screen all within three minutes (at the time or writing). You can start OTIST in the wireless clients and AP in any order but they must all be within range and have OTIST enabled.
  • Page 32 3 When the wireless client finds an OTIST-enabled AP, you must still click Start in the AP OTIST web configurator screen or hold in the Reset button (for one or two seconds) for the AP to transfer settings. 4 If you change the SSID or the keys on the AP after using OTIST, you need to run OTIST again or enter them manually in the wireless client(s).
  • Page 33 ZyXEL G-260 User’s Guide Chapter 2 Wireless LAN Network...
  • Page 34: Zyxel Utility Configuration

    ZyXEL Utility Configuration This chapter shows you how to configure your ZyXEL G-260 in wireless station mode. 3.1 The Link Info Screen When the ZyXEL Utility starts, the Link Info screen displays, showing the current configuration and connection status of your ZyXEL G-260. Figure 10 Link Info The following table describes the labels in this screen.
  • Page 35: Trend Chart

    ZyXEL G-260 User’s Guide Table 3 Link Info (continued) LABEL DESCRIPTION Security This field displays whether data encryption is activated (WEP (WEP or 802.1x), TKIP (WPA/WPA-PSK), AES (WPA2/WPA2-PSK)) or inactive (Disabled). Channel This field displays the radio channel the ZyXEL G-260 is currently using. Statistics Transmit Rate This field displays the current data transmission rate in kilobits per second (Kbps).
  • Page 36: The Site Survey Screen

    3.2 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically. Figure 12 Site Survey The following table describes the labels in this screen. Table 5 Site Survey LABEL DESCRIPTION Available Network Click a column heading to sort the entries.
  • Page 37: Connecting To A Wlan Network

    ZyXEL G-260 User’s Guide Table 5 Site Survey (continued) LABEL DESCRIPTION MAC address This field displays the MAC address of the wireless device. Surveyed at This field displays the time when the wireless device is scanned. 3.2.1 Connecting to a WLAN Network Follow the steps below to connect to a WLAN network using the Site Survey screen.
  • Page 38: Table 6 Security Settings: Wep

    The following table describes the labels in this screen. Table 6 Security Settings: WEP LABEL DESCRIPTION Security Setting Select 64 Bits, 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields. Select Disable to deactivate WEP encryption. Encryption Type Select an encryption type.
  • Page 39: Wpa/Wpa2

    ZyXEL G-260 User’s Guide 3.2.2.2 WPA/WPA2 Figure 14 Security Settings: WPA/WPA2 The following table describes the labels in this screen. Table 7 Security Settings: WPA/WPA2 LABEL DESCRIPTION Authentication Select an authentication method from the drop down list. Options are TLS and Type PEAP.
  • Page 40: Wpa-Psk/Wpa2-Psk

    3.2.2.3 WPA-PSK/WPA2-PSK Figure 15 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 8 Security Settings: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Security Setting Encryption Type The encryption mechanisms used for WPA and WPA-PSK/WPA2-PSK are the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses a simple common password, instead of user-specific credentials.
  • Page 41: Confirm Save Screen

    ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 9 Security Settings: 802.1x LABEL DESCRIPTION Authentication Select an authentication method from the drop down list. Options are TLS and Type PEAP. Login Name Enter a user name. This is the user name that you or an administrator set up on a RADIUS server.
  • Page 42: The Profile Screen

    The following table describes the labels in this screen. Table 10 Confirm Save Screen LABEL DESCRIPTION Security Setting Network Name This field displays the SSID previously entered. Network Type This field displays the network type (Infrastructure or Ad Hoc) of the wireless device.
  • Page 43: Adding A New Profile

    ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 11 Profile Screen LABEL DESCRIPTION Profile List Click a column heading to sort the entries. Profile Name This is the name of the pre-configured profile. SSID This is the SSID of the wireless network to which the selected profile associate.
  • Page 44: Figure 19 Profile: Add New Profile

    Figure 19 Profile: Add New Profile The following table describes the labels in this screen. Table 12 Profile: Add New Profile LABEL DESCRIPTION Add New Profile Profile Name Enter a descriptive name in this field. SSID Select an available wireless device in the Scan Info table and click Select, or enter the SSID of the wireless device to which you want to associate in this field manually.
  • Page 45: Figure 20 Profile: Wireless Setting: Select A Channel

    ZyXEL G-260 User’s Guide 2 If you select the Infrastructure network type in the previous screen, skip to step 3. If you select the Ad-Hoc network type in the previous screen, a screen displays as follows. Select a channel number and wireless LAN mode and click Next to continue. Figure 20 Profile: Wireless Setting: Select a Channel The following table describes the labels in this screen.
  • Page 46: Figure 21 Profile: Security Setting: Encryption Type

    Figure 21 Profile: Security Setting: Encryption Type 4 The screen varies depending on the encryption method you select in the previous screen. The settings must be exactly the same on the APs or other peer wireless computers as they are on the ZyXEL G-260. Refer to on wireless security configuration.
  • Page 47: The Adapter Screen

    ZyXEL G-260 User’s Guide Figure 23 Profile: Confirm New Settings 6 To use this network profile, click the Activate Now button. Otherwise, click the Activate Later button. Note: Once you activate a profile, the ZyXEL Utility will use that profile the next time it is started.
  • Page 48: Table 14 Adapter

    The following table describes the labels in this screen. Table 14 Adapter LABEL DESCRIPTION Adapter Transfer Rate Select a transfer speed from the drop-down list box. Choose from Fully Auto (default), 1 Mbps, 2 Mbps, 5.5 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, and 54 Mbps.
  • Page 49 ZyXEL G-260 User’s Guide Chapter 3 ZyXEL Utility Configuration...
  • Page 50: Chapter 4 Maintenance

    This chapter describes how to uninstall or upgrade the ZyXEL Utility. 4.1 The About Screen The About screen displays related version numbers of the ZyXEL G-260. To display the screen as shown below, click the about ( Figure 26 About The following table describes the read-only fields in this screen.
  • Page 51: Upgrading The Zyxel Utility

    ZyXEL G-260 User’s Guide Figure 27 Uninstall: Confirm 3 Click Finish to complete uninstalling the software and restart the computer when prompted. Figure 28 Uninstall: Finish 4.3 Upgrading the ZyXEL Utility Note: Before you uninstall the ZyXEL Utility, take note of the current network configuration.
  • Page 52 ZyXEL G-260 User’s Guide 6 Insert the ZyXEL G-260 and check the version numbers in the About screen to make sure the new utility is installed properly. Chapter 4 Maintenance...
  • Page 53 ZyXEL G-260 User’s Guide Chapter 4 Maintenance...
  • Page 54: Chapter 5 Troubleshooting

    This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. 5.1 Problems Starting the ZyXEL Utility Program Table 16 Troubleshooting Starting ZyXEL Utility Program PROBLEM CORRECTIVE ACTION Cannot start the...
  • Page 55: Problems Communicating With Other Computers

    ZyXEL G-260 User’s Guide 5.3 Problems Communicating With Other Computers Table 18 Troubleshooting Communication Problem PROBLEM CORRECTIVE ACTION In wireless station In Infrastructure Mode mode, the • computer with the ZyXEL G-260 • installed cannot communicate with • the other computer(s).
  • Page 56: Product Specifications

    Table 19 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name Interface Standards Network Architectures Security Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Weight Dimension RADIO SPECIFICATIONS Media Access Protocol Frequency Data Rate Modulation Output Power RX Sensitivity SOFTWARE SPECIFICATIONS Device Drivers Roaming...
  • Page 57 ZyXEL G-260 User’s Guide Appendix A...
  • Page 58: Disable Windows Xp Wireless Lan Configuration Tool

    Disable Windows XP Wireless LAN Windows XP includes a configuration tool (also known as Wireless Zero Configuration (WZC)) for wireless devices. Follow the steps below to disable the configuration tool in Windows XP after you install the ZyXEL Utility. The screen varies depending on the version of Windows XP service pack. Via the Wireless Network System Tray Icon If the network icon for wireless connections is not present in the system tray, see the next section.
  • Page 59: Figure 30 Windows Xp Sp1: Wireless Network Connection

    ZyXEL G-260 User’s Guide Figure 30 Windows XP SP1: Wireless Network Connection Windows XP SP2: When a Wireless Network Connection window displays, click Change advanced settings under Related Tasks and then the Wireless Networks tab. Figure 31 Windows XP SP2: Wireless Network Connection 3 In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected.
  • Page 60: Figure 32 Windows Xp Sp1: Wireless Network Connection Properties

    ZyXEL G-260 User’s Guide Figure 32 Windows XP SP1: Wireless Network Connection Properties Figure 33 Windows XP SP2: Wireless Network Connection Properties Appendix B...
  • Page 61: Figure 34 Windows Xp Sp1: Wireless Network Connection Status

    ZyXEL G-260 User’s Guide Via the Control Panel 1 If the icon for the wireless network connection is not in the system tray, click Start, Control Panel and double-click Network Connections. 2 Double-click on the icon for wireless network connection to display a status window as shown below.
  • Page 62: Figure 36 Windows Xp Sp1: Wireless Network Connection Properties

    ZyXEL G-260 User’s Guide 4 In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Figure 36 Windows XP SP1: Wireless Network Connection Properties Figure 37 Windows XP SP2: Wireless Network Connection Properties Appendix B...
  • Page 63 ZyXEL G-260 User’s Guide Appendix B...
  • Page 64: Management With Wireless Zero Configuration

    Management with Wireless Zero This appendix shows you how to manage your ZyXEL wireless LAN adapter using the Windows XP wireless zero configuration tool. Be sure you have the Windows XP service pack 2 installed on your computer. Otherwise, you should at least have the Windows XP service pack 1 already on your computer and download the support patch for WPA from the Microsoft web site.
  • Page 65: Figure 39 Windows Xp Sp2: System Tray Icon

    ZyXEL G-260 User’s Guide Connecting to a Wireless Network 1 Double-click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Figure 39 Windows XP SP2: System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the ZyXEL wireless LAN adapter.
  • Page 66: Figure 41 Windows Xp Sp1: Wireless Network Connection Status

    Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the Wireless Network Connection Properties screen. Figure 41 Windows XP SP1: Wireless Network Connection Status 3 Windows XP SP2: Click Refresh network list to reload and search for available wireless devices within transmission range.
  • Page 67: Figure 43 Windows Xp Sp1: Wireless Network Connection Properties

    ZyXEL G-260 User’s Guide The following table describes the icons in the wireless network list. Table 21 Windows XP SP2: Wireless Network Connection ICON DESCRIPTION This denotes that wireless security is activated for the wireless network. This denotes that this wireless network is your preferred network. Ordering your preferred networks is important because the ZyXEL wireless LAN adapter tries to associate to the preferred network first in the order that you specify.
  • Page 68: Figure 44 Windows Xp Sp2: Wireless Network Connection: Wep Or Wpa-Psk

    If there is no security activated for the selected wireless network, a warning screen appears. Click Connect Anyway if wireless security is not your concern. Figure 44 Windows XP SP2: Wireless Network Connection: WEP or WPA-PSK Figure 45 Windows XP SP2: Wireless Network Connection: No Security 5 Verify that you have successfully connected to the selected network and check the connection status in the wireless network list or the connection icon in the Preferred networks or Available networks list.
  • Page 69: Figure 46 Windows Xp: Wireless (Network) Properties: Association

    ZyXEL G-260 User’s Guide Association Select a network in the Preferred networks list and click Properties to view or configure security. Figure 46 Windows XP: Wireless (network) properties: Association The following table describes the labels in this screen. Table 23 Windows XP: Wireless (network) properties: Association LABEL DESCRIPTION Network name...
  • Page 70: Figure 47 Windows Xp: Wireless (Network) Properties: Authentication

    Table 23 Windows XP: Wireless (network) properties: Association (continued) LABEL DESCRIPTION This is a If this check box is selected, you are connecting to another computer directly. computer-to- computer (ad hoc) network; wireless access points are not used Click OK to save your changes. Cancel Click Cancel to leave this screen without saving any changes you may have made.
  • Page 71: Figure 48 Windows Xp: Protected Eap Properties

    ZyXEL G-260 User’s Guide Table 24 Windows XP: Wireless (network) properties: Authentication (continued) LABEL DESCRIPTION Authenticate as Select this check box to have the computer send its information to the network for computer when authentication when a user is not logged on. computer information is available...
  • Page 72: Figure 49 Windows Xp: Smart Card Or Other Certificate Properties

    The following table describes the labels in this screen. Table 25 Windows XP: Protected EAP Properties LABEL DESCRIPTION Validate server Select the check box to verify the certificate of the authentication server. certificate Connect to these Select the check box and specify a domain in the field below to have your servers computer connect to a server which resides only within this domain.
  • Page 73: Table 26 Windows Xp: Smart Card Or Other Certificate Properties

    ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 26 Windows XP: Smart Card or other Certificate Properties LABEL DESCRIPTION Use my smart card Select this check box to use the smart card for authentication. Use a certificate Select this check box to use a certificate on your computer for authentication.
  • Page 74: Figure 50 Windows Xp Sp2: Wireless Networks: Preferred Networks

    Figure 50 Windows XP SP2: Wireless Networks: Preferred Networks Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the screen as shown. Figure 51 Windows XP SP1: Wireless Networks: Preferred Networks 2 Whenever the ZyXEL wireless LAN adapter tries to connect to a new network, the new network is added in the Preferred networks table automatically.
  • Page 75 ZyXEL G-260 User’s Guide Appendix C...
  • Page 76: Types Of Eap Authentication

    ZyXEL G-260 User’s Guide Appendix D Types of EAP Authentication This appendix discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP- TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information.
  • Page 77: Table 27 Comparison Of Eap Authentication Types

    ZyXEL G-260 User’s Guide PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secured connection to authenticate the clients, thus hiding client identity. However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication.
  • Page 78 User Authentication WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database. Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Standard (AES), Message Integrity Check (MIC) and IEEE 802.1x. TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
  • Page 79: Table 28 Wireless Security Relational Matrix

    ZyXEL G-260 User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 28 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY...
  • Page 80: Index

    Numerics 802.1x About about your ZyXEL G-260 activating a profile Adapter Ad-Hoc advanced settings antenna antenna power output authentication authentication method open system shared key Certificate Authority channel 24, 35, 36, 45 configuration method important note Odyssey Client Manager Wireless Zero Configuration (WZC) ZyXEL Utility connecting to a WLAN Copyright...
  • Page 81 ZyXEL G-260 User’s Guide link information Message Integrity Check (MIC) network type North America Contact Information Norway, Contact Information Odyssey Client Manager One-Touch Intelligent Security Technology open system authentication OTIST OTIST (One-Touch Intelligent Security) OTIST Introduction Pairwise Master Key (PMK) passphrase 25, 38 password phrase...
  • Page 82 uninstalling ZyXEL Utility upgrading ZyXEL Utility important step User Authentication voltage Web Site 25, 37, 38 manual setup 25, 38 passphrase 25, 38 WEP (Wired Equivalent Privacy) Windows XP wireless LAN authentication channel introduction security SSID transmission rate Wireless LAN (WLAN) wireless standard wireless station mode configuration...

Table of Contents