ZyXEL Communications ZyAIR G-160 User Manual

802.11g wireless cardbus card
Hide thumbs Also See for ZyAIR G-160:
Table of Contents

Advertisement

Quick Links

ZyAIR G-160
802.11g Wireless Cardbus Card
User's Guide
Version 2.0
June 2004

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ZyAIR G-160

  • Page 1 ZyAIR G-160 802.11g Wireless Cardbus Card User's Guide Version 2.0 June 2004...
  • Page 2 ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 3: Zyxel Limited Warranty

    ZyAIR G-160 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to one (1) year from the date of purchase. During the warranty period and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall deem necessary to restore the product...
  • Page 4: Information For Canadian Users

    ZyAIR G-160 User’s Guide Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective operation and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company.
  • Page 5: Federal Communications Commission

    ZyAIR G-160 User’s Guide Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 7: Customer Support

    Brief description of the problem and the steps you took to solve it. METHOD SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION WORLDWIDE support@zyxel.com.tw +886-3-578-3942 www.zyxel.com ZyXEL Communications Corp. 6 Innovation Road II www.europe.zyxel.com Science Park ftp.zyxel.com Hsinchu 300 Taiwan sales@zyxel.com.tw +886-3-578-2439 ftp.europe.zyxel.com NORTH support@zyxel.com +1-800-255-4101 www.us.zyxel.com...
  • Page 8 SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION SWEDEN support@zyxel.se +46 31 744 7700 www.zyxel.se ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg sales@zyxel.se +46 31 744 7701 Sweden FINLAND support@zyxel.fi +358-9-4780-8411 www.zyxel.fi ZyXEL Communications Oy Malminkaari 10...
  • Page 9: Table Of Contents

    ZyAIR G-160 User’s Guide Table of Contents Copyright ...............................ii ZyXEL Limited Warranty ..........................iii Information for Canadian Users.........................iv Federal Communications Commission (FCC) Interference Statement............v Customer Support............................vii List of Figures...............................xi List of Tables ...............................xii Preface.................................xiii Chapter 1 Getting Started .........................1-1 About Your ZyAIR ........................1-1 ZyAIR Hardware and Utility Installation..................1-1 Disable Windows XP Wireless LAN Configuration Tool .............1-1 1.3.1...
  • Page 10 ZyAIR G-160 User’s Guide 2.4.2 802.1x Configuration ......................2-23 2.4.3 WPA-PSK Configuration....................2-24 The Statistics Screen ........................2-25 The About Screen ........................2-27 Chapter 3 Maintenance ..........................3-1 Removing the ZyAIR Utility ......................3-1 Upgrading the ZyAIR Utility......................3-1 Chapter 4 Troubleshooting ........................4-1 Problems Starting the ZyAIR Utility Program................4-1 Problems Communicating With Other Computers...............4-1 Problem with the Link Status .......................4-2 Appendix A Product Specifications......................
  • Page 11: List Of Figures

    ZyAIR G-160 User’s Guide List of Figures Figure 1-1 Windows XP: System Tray Icon....................1-2 Figure 1-2 Windows XP: Wireless Network Connection Status ..............1-2 Figure 1-3 Windows XP: Connect to Wireless Network................1-3 Figure 1-4 Windows XP: Wireless Network Connection Properties............1-4 Figure 1-5 ZyAIR Utility: System Tray Icon ....................1-4 Figure 2-1 Ad-hoc Network Example ......................2-2 Figure 2-2 BSS Example..........................2-2 Figure 2-3 Infrastructure Network Example ....................2-3...
  • Page 12 ZyAIR G-160 User’s Guide List of Tables Table 1-1 ZyAIR Utility: System Tray Icon ....................1-5 Table 1-2 Common Screen Command Buttons....................1-5 Table 2-1 Main............................2-11 Table 2-2 Main: New Connection......................2-13 Table 2-3 Main: Advanced.........................2-16 Table 2-4 Advanced ...........................2-18 Table 2-5 Privacy ............................2-20 Table 2-6 WEP Configuration........................2-22 Table 2-7 802.1X Configuration ........................2-24 Table 2-8 PSK Configuration........................2-25...
  • Page 13: Preface

    Help us help you! E-mail all User’s Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you!
  • Page 15: Chapter 1 Getting Started

    ZyAIR G-160 User’s Guide Chapter 1 Getting Started This chapter prepares you to using the ZyAIR Utility. About Your ZyAIR The ZyAIR is an IEEE 802.11g compliant wireless LAN adapter. With the ZyAIR, you can enjoy the wireless mobility within the coverage area. The following lists the main features of your ZyAIR.
  • Page 16: The Connect To Wireless Network Screen

    ZyAIR G-160 User’s Guide 1.3.1 The Connect to Wireless Network Screen Follow the steps below to disable the configuration tool in Windows XP in the Connect to Wireless Network screen. Step 1. Double-click on the network icon for the wireless connection in the system tray. If the icon is not present, proceed to Step 2.
  • Page 17: Figure 1-3 Windows Xp: Connect To Wireless Network

    ZyAIR G-160 User’s Guide Step 5. When a Connect to Wireless Network window displays, click Advanced…. Figure 1-3 Windows XP: Connect to Wireless Network Getting Started...
  • Page 18: Accessing The Zyair Utility

    ZyAIR G-160 User’s Guide Step 6. In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Figure 1-4 Windows XP: Wireless Network Connection Properties Accessing the ZyAIR Utility After you installed the ZyAIR Utility and reboot your computer, the ZyAIR Utility automatically starts and an icon for the ZyAIR Utility appears in the system tray.
  • Page 19: Common Screen Command Buttons

    ZyAIR G-160 User’s Guide Table 1-1 ZyAIR Utility: System Tray Icon COLOR DESCRIPTION The radio is disabled if your computer provides the radio disable feature and you turn it on. Green The ZyAIR is connected to a wireless network. Yellow The ZyAIR is in the process of connecting to a wireless network.
  • Page 21: Chapter 2 Using The Zyair Utility

    ZyAIR G-160 User’s Guide Chapter 2 Using the ZyAIR Utility This chapter shows you how to configure the ZyAIR using the ZyAIR Utility. About Wireless LAN Network This section describes each wireless LAN parameter. 2.1.1 Channel The range of radio frequencies used by IEEE 802.11 wireless devices is called a “channel”. The number of available channels depends on your geographical area.
  • Page 22: Figure 2-1 Ad-Hoc Network Example

    ZyAIR G-160 User’s Guide Ad-Hoc (IBSS) Ad-hoc mode does not require an AP or a wired network. Two or more wireless stations communicate directly to each other. An ad-hoc network may sometimes be referred to as an Independent Basic Service Set (IBSS).
  • Page 23: Roaming

    ZyAIR G-160 User’s Guide Figure 2-3 Infrastructure Network Example 2.1.5 Roaming In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas. During this period, the wireless stations maintain uninterrupted connection to the network.
  • Page 24: Profile

    ZyAIR G-160 User’s Guide Figure 2-4 Roaming Example 2.1.6 Profile The Profile function allows you to save or delete the wireless network settings and use one of the pre- configured network profiles. 2.1.7 Threshold Controls Fragmentation Threshold A fragmentation threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the ZyAIR will fragment the packet into smaller data frames.
  • Page 25: Wireless Lan Security

    ZyAIR G-160 User’s Guide Figure 2-5 RTS Threshold When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 26: Data Encryption With Wep

    ZyAIR G-160 User’s Guide Figure 2-6 Wireless LAN Security Levels Configure the wireless LAN security using the Privacy screen. If you do not enable any wireless security on your ZyAIR, communication between the ZyAIR and the wired network is accessible to any wireless networking device that is in the coverage area.
  • Page 27: Preamble Type

    ZyAIR G-160 User’s Guide 2.1.11 Preamble Type A preamble is used to synchronize the transmission timing in your wireless network. There are two preamble modes: Long Preamble and Short Preamble. Short preamble takes less time to process and minimizes overhead, so it should be used in a good wireless network environment when all wireless stations support it.
  • Page 28: Wpa-Psk Application Example

    ZyAIR G-160 User’s Guide Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. It includes a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism.
  • Page 29: Wpa With Radius Application Example

    ZyAIR G-160 User’s Guide Figure 2-7 WPA - PSK Authentication 2.1.15 WPA with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA application example with an external RADIUS server looks as follows. “A” is the RADIUS server.
  • Page 30: The Main Screen

    ZyAIR G-160 User’s Guide Figure 2-8 WPA with RADIUS Application Example The Main Screen Click the Main tab to display the screen as shown next. 2-10 Using the ZyAIR Utility...
  • Page 31: Figure 2-9 Main

    ZyAIR G-160 User’s Guide Figure 2-9 Main The following table describes the labels in this screen. Table 2-1 Main LABEL DESCRIPTION Status This field displays the connection status. Select this option and click Apply if you activate and use another configuration tool (such External Configuration as the Windows XP Zero Configuration tool) to configure the ZyAIR.
  • Page 32: Connecting To A Network

    ZyAIR G-160 User’s Guide Table 2-1 Main LABEL DESCRIPTION SSID This field displays the SSID (or name) of each wireless device. Indicates that the wireless network does not require security setting to access it. indicates that the wireless security is activated on this network. indicates a hidden network.
  • Page 33: The New Connection Screen

    ZyAIR G-160 User’s Guide Step 1. Click Rescan to scan for all available wireless networks within range. Step 2. To join a wireless network, either click an entry in the table to select a wireless network and then click Connect or double-click an entry. Step 3.
  • Page 34 ZyAIR G-160 User’s Guide Table 2-2 Main: New Connection LABEL DESCRIPTION BSS Type Select Infrastructure or 802.11 Ad-Hoc from the drop-down list box. Select Infrastructure to associate to an AP. Select 802.11 Ad-Hoc to associate to a peer ad-hoc computer. Refer to Section 2.1.4 for more information.
  • Page 35 ZyAIR G-160 User’s Guide Table 2-2 Main: New Connection LABEL DESCRIPTION Mode From the drop-sown list, select the wireless standard (802.11b or 802.11g) of the wireless device. Select B-Only Mode to allow the ZyAIR to associate with only IEEE 802.11b compliant WLAN devices.
  • Page 36: Figure 2-11 Main: Advanced

    ZyAIR G-160 User’s Guide Figure 2-11 Main: Advanced The following table describes the labels in this screen. Table 2-3 Main: Advanced LABEL DESCRIPTION Thresholds Fragment The threshold (number of bytes) for the fragmentation boundary for directed messages. Threshold It is the maximum data fragment size that can be sent. Enter an even number from 256 to 4096.
  • Page 37: The Advanced Screen

    ZyAIR G-160 User’s Guide Table 2-3 Main: Advanced LABEL DESCRIPTION Preamble Use the radio button to select the preamble type. Refer to Section 2.1.11 for more information. The Advanced Screen Click the Advanced tab to display the read-only screen as shown next. Figure 2-12 Advanced The following table describes the labels in this screen.
  • Page 38: Table 2-4 Advanced

    ZyAIR G-160 User’s Guide Table 2-4 Advanced LABEL DESCRIPTION Domain & Power Information AP Country This field displays the AP’s country code of up to three characters. Code AP Tx Power This field displays the current transmission power in db (decibel). Level STA Reg.
  • Page 39: The Privacy Screen

    ZyAIR G-160 User’s Guide The Privacy Screen Click the Privacy tab to display the screen as shown next. The screen varies depending on what you select in the Privacy Mode and the Authentication Mode field. Privacy Mode field. You see the next screen when you select None in the Figure 2-13 Privacy The following table describes the labels in this screen.
  • Page 40: Wep Configuration

    ZyAIR G-160 User’s Guide Table 2-5 Privacy LABEL DESCRIPTION Privacy Mode Select None to have no wireless LAN security configured. Select WEP to enable WEP data encryption. Select CCX (Cisco Compatible Extensions) to allow for instant communication with Cisco networks. Select WPA to configure Wi-Fi Protected Access settings.
  • Page 41: Figure 2-14 Wep Configuration

    ZyAIR G-160 User’s Guide Figure 2-14 WEP Configuration The following table describes the labels in this screen. Using the ZyAIR Utility 2-21...
  • Page 42: Table 2-6 Wep Configuration

    ZyAIR G-160 User’s Guide Table 2-6 WEP Configuration LABEL DESCRIPTION 1 - 4 Select a WEP key to use for data encryption. Enter the WEP keys in the fields provided. If you select 64 bit in the Key Size field. •...
  • Page 43: 802.1X Configuration

    ZyAIR G-160 User’s Guide Table 2-6 WEP Configuration LABEL DESCRIPTION Key Format Select Hex to enter the WEP keys as hexadecimal characters. Select ASCII to enter WEP keys as ASCII characters. Click OK to save the changes and close the screen. Cancel Click Cancel to leave this screen without saving.
  • Page 44: Wpa-Psk Configuration

    ZyAIR G-160 User’s Guide Table 2-7 802.1X Configuration LABEL DESCRIPTION Protocol Select an authentication protocol (EAP-TLS, MSCHAP V2 over PEAP or LEAP) in the text box. The options vary based on what you select in the Privacy Mode field in the Privacy screen.
  • Page 45: The Statistics Screen

    ZyAIR G-160 User’s Guide Figure 2-16 PSK Configuration The following table describes the labels in this screen. Table 2-8 PSK Configuration LABEL DESCRIPTION Pre-shared key Passphrase The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials.
  • Page 46: Figure 2-17 Statistics

    ZyAIR G-160 User’s Guide Figure 2-17 Statistics The following table describes the labels in the table. Table 2-9 Statistics LABEL DESCRIPTION Receive Good Packets This is the total number of packets that the ZyAIR receives without errors. Partial This is the total number of partial packets that the ZyAIR receives. Packets Duplicate This is the total number of the same duplicate packets that the ZyAIR receives.
  • Page 47: The About Screen

    ZyAIR G-160 User’s Guide Table 2-9 Statistics LABEL DESCRIPTION Error Packets This is the total number of packets that the ZyAIR receives with errors. Beacons This is the total number of beacons that the ZyAIR receives from other WLAN devices for probing.
  • Page 48: Figure 2-18 About

    ZyAIR G-160 User’s Guide Figure 2-18 About The following table describes the read-only fields in this screen. Table 2-10 About FIELD DESCRIPTION Utility Version This field displays the version number and release date of the ZyAIR Utility. Network This field displays the version number and release date of the Windows driver for the Driver Version ZyAIR.
  • Page 49: Chapter 3 Maintenance

    ZyAIR G-160 User’s Guide Chapter 3 Maintenance This chapter describes how to uninstall or upgrade the ZyAIR Utility. Removing the ZyAIR Utility Follow the steps below to remove (or uninstall) the ZyAIR Utility from your computer. Step 1. Close and exit the ZyAIR Utility. Step 2.
  • Page 51: Chapter 4 Troubleshooting

    ZyAIR G-160 User’s Guide Chapter 4 Troubleshooting This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. Problems Starting the ZyAIR Utility Program Table 4-1 Troubleshooting Starting ZyAIR Utility Program Cannot start the ZyAIR Make sure the ZyAIR is properly inserted and the LED is on.
  • Page 52: Problem With The Link Status

    ZyAIR G-160 User’s Guide Table 4-2 Troubleshooting Communication Problems PROBLEM CORRECTIVE ACTION Ad-Hoc Verify that the peer computer(s) is turned on. Make sure the ZyAIR and the peer computer(s) are using the same SSID and channel. Use another radio channel if interference is high. Make sure that the computer and the AP share the same wireless security settings.
  • Page 53: Appendix A Product Specifications

    ZyAIR G-160 User’s Guide Appendix A Product Specifications Product Specifications Product Name ZyAIR G-160 802.11g Wireless Cardbus Card Interface 32-bit Cardbus, Type II PCMCIA Card IEEE 802.11b Standards IEEE 802.11g Infrastructure Network Architectures Ad-Hoc Operating Frequencies 2.412-2.483GHz IEEE 802.11b: 11 Channels (North America) IEEE 802.11g: 11 Channels (North America) Operating Channels IEEE 802.11b: 13 Channels (Europe)
  • Page 54 ZyAIR G-160 User’s Guide Product Specifications Dimension 117.6mm(L)*54.1mm(W)*7mm(H) Product Specifications...
  • Page 55: Appendix B Types Of Eap Authentication

    ZyAIR G-160 User’s Guide Appendix B Types of EAP Authentication This appendix discusses the five popular EAP authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method.
  • Page 56 ZyAIR G-160 User’s Guide LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE802.1x. For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical.
  • Page 57: Index

    ZyAIR G-160 User’s Guide Index 4x ..............2-14 EAP Authentication MD5 ..............iii PEAP.............iii TLS ...............iii About ............2-27 TTLS .............iii Accessing the ZyAIR Utility......1-4 Encryption............2-8 Authentication Mode........2-7 ESS..............2-3 Auto ............2-7 Extended Service Set.......See ESS Shared ............2-7 External Configuration........2-11 Auto authentication mode .......2-7 Federal Communications Commission (FCC) Basic Service Set........
  • Page 58 ZyAIR G-160 User’s Guide Network driver version ......... 2-28 Temporal Key Integrity Protocol ....2-8 Network Type ..........2-2 Threshold ............2-16 Ad-Hoc(IBSS) ..........2-2 TKIP ..See Temporal Key Integrity Protocol Infrastructure..........2-2 TLS ..............iii NIC firmware version ........2-29 Transmission rate ..........2-1 Transmission rates ........2-14 Transmission speeds ........2-14 Transport Layer Security .......
  • Page 59 ZyAIR G-160 User’s Guide Data Encryption with WEP......2-6 About............2-28 WPA..............2-8 Before you upgrade ........3-1 WPA with RADIUS Application ....2-9 Removing ............3-1 WPA-PSK ............2-8 Site Survey ..........2-26 WPA-PSK Application ........2-9 Upgrading............3-1 ZyAIR Utility system tray icon.......1-5 ZyAIR Utility..........3-1 Index...

Table of Contents