Summary of Contents for ZyXEL Communications ZyAIR G-160
Page 1
ZyAIR G-160 802.11g Wireless Cardbus Card User's Guide Version 2.0 June 2004...
Page 2
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
ZyAIR G-160 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to one (1) year from the date of purchase. During the warranty period and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product...
ZyAIR G-160 User’s Guide Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective operation and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company.
ZyAIR G-160 User’s Guide Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
Brief description of the problem and the steps you took to solve it. METHOD SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION WORLDWIDE support@zyxel.com.tw +886-3-578-3942 www.zyxel.com ZyXEL Communications Corp. 6 Innovation Road II www.europe.zyxel.com Science Park ftp.zyxel.com Hsinchu 300 Taiwan sales@zyxel.com.tw +886-3-578-2439 ftp.europe.zyxel.com NORTH support@zyxel.com +1-800-255-4101 www.us.zyxel.com...
Page 8
SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION SWEDEN support@zyxel.se +46 31 744 7700 www.zyxel.se ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg sales@zyxel.se +46 31 744 7701 Sweden FINLAND support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy Malminkaari 10...
ZyAIR G-160 User’s Guide Table of Contents Copyright ...............................ii ZyXEL Limited Warranty ..........................iii Information for Canadian Users.........................iv Federal Communications Commission (FCC) Interference Statement............v Customer Support............................vii List of Figures...............................xi List of Tables ...............................xii Preface.................................xiii Chapter 1 Getting Started .........................1-1 About Your ZyAIR ........................1-1 ZyAIR Hardware and Utility Installation..................1-1 Disable Windows XP Wireless LAN Configuration Tool .............1-1 1.3.1...
Page 10
ZyAIR G-160 User’s Guide 2.4.2 802.1x Configuration ......................2-23 2.4.3 WPA-PSK Configuration....................2-24 The Statistics Screen ........................2-25 The About Screen ........................2-27 Chapter 3 Maintenance ..........................3-1 Removing the ZyAIR Utility ......................3-1 Upgrading the ZyAIR Utility......................3-1 Chapter 4 Troubleshooting ........................4-1 Problems Starting the ZyAIR Utility Program................4-1 Problems Communicating With Other Computers...............4-1 Problem with the Link Status .......................4-2 Appendix A Product Specifications......................
Help us help you! E-mail all User’s Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you!
ZyAIR G-160 User’s Guide Chapter 1 Getting Started This chapter prepares you to using the ZyAIR Utility. About Your ZyAIR The ZyAIR is an IEEE 802.11g compliant wireless LAN adapter. With the ZyAIR, you can enjoy the wireless mobility within the coverage area. The following lists the main features of your ZyAIR.
ZyAIR G-160 User’s Guide 1.3.1 The Connect to Wireless Network Screen Follow the steps below to disable the configuration tool in Windows XP in the Connect to Wireless Network screen. Step 1. Double-click on the network icon for the wireless connection in the system tray. If the icon is not present, proceed to Step 2.
ZyAIR G-160 User’s Guide Step 6. In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Figure 1-4 Windows XP: Wireless Network Connection Properties Accessing the ZyAIR Utility After you installed the ZyAIR Utility and reboot your computer, the ZyAIR Utility automatically starts and an icon for the ZyAIR Utility appears in the system tray.
ZyAIR G-160 User’s Guide Table 1-1 ZyAIR Utility: System Tray Icon COLOR DESCRIPTION The radio is disabled if your computer provides the radio disable feature and you turn it on. Green The ZyAIR is connected to a wireless network. Yellow The ZyAIR is in the process of connecting to a wireless network.
ZyAIR G-160 User’s Guide Chapter 2 Using the ZyAIR Utility This chapter shows you how to configure the ZyAIR using the ZyAIR Utility. About Wireless LAN Network This section describes each wireless LAN parameter. 2.1.1 Channel The range of radio frequencies used by IEEE 802.11 wireless devices is called a “channel”. The number of available channels depends on your geographical area.
ZyAIR G-160 User’s Guide Ad-Hoc (IBSS) Ad-hoc mode does not require an AP or a wired network. Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS).
ZyAIR G-160 User’s Guide Figure 2-3 Infrastructure Network Example 2.1.5 Roaming In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connection to the network.
ZyAIR G-160 User’s Guide Figure 2-4 Roaming Example 2.1.6 Profile The Profile function allows you to save or delete the wireless network settings and use one of the pre- configured network profiles. 2.1.7 Threshold Controls Fragmentation Threshold A fragmentation threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the ZyAIR will fragment the packet into smaller data frames.
ZyAIR G-160 User’s Guide Figure 2-5 RTS Threshold When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
ZyAIR G-160 User’s Guide Figure 2-6 Wireless LAN Security Levels Configure the wireless LAN security using the Privacy screen. If you do not enable any wireless security on your ZyAIR, communication between the ZyAIR and the wired network is accessible to any wireless networking device that is in the coverage area.
ZyAIR G-160 User’s Guide 2.1.11 Preamble Type A preamble is used to synchronize the transmission timing in your wireless network. There are two preamble modes: Long Preamble and Short Preamble. Short preamble takes less time to process and minimizes overhead, so it should be used in a good wireless network environment when all wireless stations support it.
ZyAIR G-160 User’s Guide Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. It includes a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism.
ZyAIR G-160 User’s Guide Figure 2-7 WPA - PSK Authentication 2.1.15 WPA with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA application example with an external RADIUS server looks as follows. “A” is the RADIUS server.
ZyAIR G-160 User’s Guide Figure 2-8 WPA with RADIUS Application Example The Main Screen Click the Main tab to display the screen as shown next. 2-10 Using the ZyAIR Utility...
ZyAIR G-160 User’s Guide Figure 2-9 Main The following table describes the labels in this screen. Table 2-1 Main LABEL DESCRIPTION Status This field displays the connection status. Select this option and click Apply if you activate and use another configuration tool (such External Configuration as the Windows XP Zero Configuration tool) to configure the ZyAIR.
ZyAIR G-160 User’s Guide Table 2-1 Main LABEL DESCRIPTION SSID This field displays the SSID (or name) of each wireless device. Indicates that the wireless network does not require security setting to access it. indicates that the wireless security is activated on this network. indicates a hidden network.
ZyAIR G-160 User’s Guide Step 1. Click Rescan to scan for all available wireless networks within range. Step 2. To join a wireless network, either click an entry in the table to select a wireless network and then click Connect or double-click an entry. Step 3.
Page 34
ZyAIR G-160 User’s Guide Table 2-2 Main: New Connection LABEL DESCRIPTION BSS Type Select Infrastructure or 802.11 Ad-Hoc from the drop-down list box. Select Infrastructure to associate to an AP. Select 802.11 Ad-Hoc to associate to a peer ad-hoc computer. Refer to Section 2.1.4 for more information.
Page 35
ZyAIR G-160 User’s Guide Table 2-2 Main: New Connection LABEL DESCRIPTION Mode From the drop-sown list, select the wireless standard (802.11b or 802.11g) of the wireless device. Select B-Only Mode to allow the ZyAIR to associate with only IEEE 802.11b compliant WLAN devices.
ZyAIR G-160 User’s Guide Figure 2-11 Main: Advanced The following table describes the labels in this screen. Table 2-3 Main: Advanced LABEL DESCRIPTION Thresholds Fragment The threshold (number of bytes) for the fragmentation boundary for directed messages. Threshold It is the maximum data fragment size that can be sent. Enter an even number from 256 to 4096.
ZyAIR G-160 User’s Guide Table 2-3 Main: Advanced LABEL DESCRIPTION Preamble Use the radio button to select the preamble type. Refer to Section 2.1.11 for more information. The Advanced Screen Click the Advanced tab to display the read-only screen as shown next. Figure 2-12 Advanced The following table describes the labels in this screen.
ZyAIR G-160 User’s Guide Table 2-4 Advanced LABEL DESCRIPTION Domain & Power Information AP Country This field displays the AP’s country code of up to three characters. Code AP Tx Power This field displays the current transmission power in db (decibel). Level STA Reg.
ZyAIR G-160 User’s Guide The Privacy Screen Click the Privacy tab to display the screen as shown next. The screen varies depending on what you select in the Privacy Mode and the Authentication Mode field. Privacy Mode field. You see the next screen when you select None in the Figure 2-13 Privacy The following table describes the labels in this screen.
ZyAIR G-160 User’s Guide Table 2-5 Privacy LABEL DESCRIPTION Privacy Mode Select None to have no wireless LAN security configured. Select WEP to enable WEP data encryption. Select CCX (Cisco Compatible Extensions) to allow for instant communication with Cisco networks. Select WPA to configure Wi-Fi Protected Access settings.
ZyAIR G-160 User’s Guide Table 2-6 WEP Configuration LABEL DESCRIPTION 1 - 4 Select a WEP key to use for data encryption. Enter the WEP keys in the fields provided. If you select 64 bit in the Key Size field. •...
ZyAIR G-160 User’s Guide Table 2-6 WEP Configuration LABEL DESCRIPTION Key Format Select Hex to enter the WEP keys as hexadecimal characters. Select ASCII to enter WEP keys as ASCII characters. Click OK to save the changes and close the screen. Cancel Click Cancel to leave this screen without saving.
ZyAIR G-160 User’s Guide Table 2-7 802.1X Configuration LABEL DESCRIPTION Protocol Select an authentication protocol (EAP-TLS, MSCHAP V2 over PEAP or LEAP) in the text box. The options vary based on what you select in the Privacy Mode field in the Privacy screen.
ZyAIR G-160 User’s Guide Figure 2-16 PSK Configuration The following table describes the labels in this screen. Table 2-8 PSK Configuration LABEL DESCRIPTION Pre-shared key Passphrase The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials.
ZyAIR G-160 User’s Guide Figure 2-17 Statistics The following table describes the labels in the table. Table 2-9 Statistics LABEL DESCRIPTION Receive Good Packets This is the total number of packets that the ZyAIR receives without errors. Partial This is the total number of partial packets that the ZyAIR receives. Packets Duplicate This is the total number of the same duplicate packets that the ZyAIR receives.
ZyAIR G-160 User’s Guide Table 2-9 Statistics LABEL DESCRIPTION Error Packets This is the total number of packets that the ZyAIR receives with errors. Beacons This is the total number of beacons that the ZyAIR receives from other WLAN devices for probing.
ZyAIR G-160 User’s Guide Figure 2-18 About The following table describes the read-only fields in this screen. Table 2-10 About FIELD DESCRIPTION Utility Version This field displays the version number and release date of the ZyAIR Utility. Network This field displays the version number and release date of the Windows driver for the Driver Version ZyAIR.
ZyAIR G-160 User’s Guide Chapter 3 Maintenance This chapter describes how to uninstall or upgrade the ZyAIR Utility. Removing the ZyAIR Utility Follow the steps below to remove (or uninstall) the ZyAIR Utility from your computer. Step 1. Close and exit the ZyAIR Utility. Step 2.
ZyAIR G-160 User’s Guide Chapter 4 Troubleshooting This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. Problems Starting the ZyAIR Utility Program Table 4-1 Troubleshooting Starting ZyAIR Utility Program Cannot start the ZyAIR Make sure the ZyAIR is properly inserted and the LED is on.
ZyAIR G-160 User’s Guide Table 4-2 Troubleshooting Communication Problems PROBLEM CORRECTIVE ACTION Ad-Hoc Verify that the peer computer(s) is turned on. Make sure the ZyAIR and the peer computer(s) are using the same SSID and channel. Use another radio channel if interference is high. Make sure that the computer and the AP share the same wireless security settings.
ZyAIR G-160 User’s Guide Appendix B Types of EAP Authentication This appendix discusses the five popular EAP authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method.
Page 56
ZyAIR G-160 User’s Guide LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE802.1x. For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical.