ZyXEL Communications NWD-271N User Manual
ZyXEL Communications NWD-271N User Manual

ZyXEL Communications NWD-271N User Manual

Wireless n usb adapter
Hide thumbs Also See for NWD-271N:

Advertisement

Quick Links

NWD-271N
Wireless N USB Adapter
Firmware Version 4.0.0.11 for OS X
Edition 2, 03/2009
www.zyxel.com
www.zyxel.com
Copyright © 2009
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NWD-271N

  • Page 1 NWD-271N Wireless N USB Adapter Firmware Version 4.0.0.11 for OS X Edition 2, 03/2009 www.zyxel.com www.zyxel.com Copyright © 2009 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    Help us help you. Send all User’s Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead. Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan.
  • Page 4: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your NWD- 271N. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 5 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. Table 1 Common Icons NWD-271N Wireless AP Computer Notebook Printer Telephone Switch Router Internet Cloud Firewall Modem Wireless Signal Server NWD-271N User’s Guide...
  • Page 6: Safety Warnings

    Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
  • Page 7: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................4 Safety Warnings........................6 Table of Contents........................7 Chapter 1 Getting Started .......................... 9 1.1 Overview ..........................9 1.1.1 What You Need to Know ....................9 1.1.2 Before You Begin ......................
  • Page 8 Table of Contents 4.2 Main Screen ........................24 4.3 Settings Screen ........................26 4.3.1 WEP Key Settings ...................... 28 4.3.2 WPA Key Settings ...................... 29 Chapter 5 Troubleshooting........................31 5.1 Overview ..........................31 5.2 Power, Hardware Connections, and LEDs ................31 5.3 Accessing the ZyXEL Utility ....................
  • Page 9: Chapter 1 Getting Started

    H A P T E R Getting Started 1.1 Overview The ZyXEL NWD-271N brings you a better Internet experience over existing IEEE 802.11 b/g/n networks. With data rates of up to 150 Mbps, you can enjoy a breathtaking high-speed connection at home or in the office. It is an excellent solution for daily activities such as file transfers, music downloading, video streaming and online gaming.
  • Page 10: Features

    Chapter 1 Getting Started 1.2 Features Your NWD-271N is an IEEE 802.11n draft 2.0 compliant wireless LAN adapter. It can also connect to IEEE 802.11b/g wireless networks. It connects to an empty USB port on your computer. Figure 1 The NWD-271N The following table describes the NWD-271N.
  • Page 11: Hardware Installation

    Chapter 1 Getting Started 1.3 Hardware Installation This sections shows you how to install your NWD-271N. Locate an available USB port on the computer. Remove the protective cap to expose the USB connector. Insert the NWD-271N into an available USB port on the computer. The NWD-271N’s LED (light) turns on if it is properly inserted.
  • Page 12: Installing The Zyxel Utility

    Chapter 1 Getting Started 1.4.2 Installing the ZyXEL Utility To install the ZyXEL Utility: Make sure the NWD-271N is disconnected from your computer before you begin the installation process. Open the installation DMG file on the included disc. Inside the DMG, locate the installer package and double-click it to run the installation program.
  • Page 13 Chapter 1 Getting Started Once your computer restarts, you can find the ZyXEL Utility in your Applications > Utilities. NWD-271N User’s Guide...
  • Page 14 Chapter 1 Getting Started 1.4.2.1 Uninstalling the ZyXEL Utility While you can drag the ZyXEL Utility from your Applications folder directly to the Trash and remove it that way, the best and safest course of action is to run the uninstallation program bundled on the included disc.
  • Page 15: Device Applications

    Chapter 1 Getting Started 1.5 Device Applications This section describes some network applications for the NWD-271N. You can either set the network type to Infrastructure and connect to an AP or use Ad- Hoc mode and connect to a peer computer (another wireless device in Ad-Hoc mode).
  • Page 16 Chapter 1 Getting Started Ad-Hoc To set up a small independent wireless workgroup without an AP, use Ad-Hoc. Ad-Hoc does not require an AP or a wired network. Two or more wireless clients communicate directly with each other. Figure 3 Application: Ad-Hoc NWD-271N User’s Guide...
  • Page 17: Chapter 2 Wireless Lans

    H A P T E R Wireless LANs 2.1 Overview This section provides background information on wireless Local Area Networks. 2.1.1 What You Can Do in This Section Connect securely to an AP using many of the strongest and most common encryption protocols.
  • Page 18: Before You Begin

    Chapter 2 Wireless LANs Encryption The process of taking data and encoding it, usually using a mathematical formula, so that it becomes unreadable unless decrypted with the proper code or password. 2.1.3 Before You Begin You should have valid login information for an existing network Access Point, otherwise you may not be able to make a network connection right away.
  • Page 19: Wireless Lan Security

    Chapter 2 Wireless LANs • If two wireless networks overlap, they should use a different channel. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. • Every device in the same wireless network must use security compatible with the AP or peer computer.
  • Page 20 Chapter 2 Wireless LANs 2.3.1.2 WPA and WPA2 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication.
  • Page 21: Chapter 3 Tutorial

    H A P T E R Tutorial 3.1 Connecting to a Wireless LAN This tutorial shows you how to connect to a wireless LAN using the NWD-271N. Open the ZyXEL Utility then select the network to which you want to connect from the Available Network list.
  • Page 22 Chapter 3 Tutorial The ZyXEL Utility then asks whether you want to use the security settings in your current profile or not. If you click Yes, then it attempts to connect using those settings. If the settings are correct and the ZyXEL Utility makes the connection, skip to step 5. Note: If you do not yet have a profile, then the ZyXEL Utility uses the factory default profile.
  • Page 23: Chapter 4 Zyxel Utility

    H A P T E R ZyXEL Utility 4.1 Overview This chapter shows you how to use the ZyXEL utility to configure your NWD-271N using the Macintosh operating system, Mac OS X. 4.1.1 What You Need to Know The following terms and concepts may help as you read through this chapter. Wired Equivalent Privacy (WEP) Although one of the original wireless encryption protocols, WEP is also the weakest.
  • Page 24: Main Screen

    Chapter 4 ZyXEL Utility 4.2 Main Screen This section describes the ZyXEL Utility’s main screen. Figure 5 ZyXEL Utility The following table describes this screen. Table 4 Main Screen DESCRIPTION Network This displays the name of the currently connected wireless network Adapter device.
  • Page 25 Chapter 4 ZyXEL Utility Table 4 Main Screen DESCRIPTION Extension This indicates the extension band (if any) on which the network Channel broadcasts data. Tx Rate This indicates the transmission rate of the current network connection. Note: Due to many relatively unpredictable factors, such as network congestion and distance from the transmitter, the actual connection speed may vary.
  • Page 26: Settings Screen

    Chapter 4 ZyXEL Utility Table 4 Main Screen DESCRIPTION Signal Strength This indicates the strength of the current network’s broadcast signal. It ranges from 0% (no signal) to 100% (full signal). Note: This value can be highly variable depending on a number of factors, such as distance from the AP and interference from other nearby devices.
  • Page 27 Chapter 4 ZyXEL Utility The following table describes this screen. Table 5 Settings Screen DESCRIPTION Basic Settings These describe the basic profile settings currently in use. SSID This is the SSID of the current profile. This name can be up to 32 alphanumeric characters in length (a-z, A-Z, 0-9).
  • Page 28: Wep Key Settings

    Chapter 4 ZyXEL Utility 4.3.1 WEP Key Settings This screen allows you to configure WEP encryption for a profile. Click the Settings > WEP Encryption button to open it. Note: For more information on wireless LAN security, see Section 2.3 on page Figure 7 The Settings Screen The following table describes this screen.
  • Page 29: Wpa Key Settings

    Chapter 4 ZyXEL Utility Table 6 WEP Key Settinhs DESCRIPTION Change/Apply Click this button when it reads Change to unlock the settings for editing. Click it when it reads Apply in order to store these encryption settings with the profile. Click this button to close this screen.
  • Page 30 Chapter 4 ZyXEL Utility NWD-271N User’s Guide...
  • Page 31: Chapter 5 Troubleshooting

    H A P T E R Troubleshooting 5.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Accessing the ZyXEL Utility •...
  • Page 32: Accessing The Zyxel Utility

    Chapter 5 Troubleshooting If the problem continues, contact the vendor. 5.3 Accessing the ZyXEL Utility I cannot access the ZyXEL Utility Make sure the NWD-271N is properly inserted and the LEDs are on. Install the NWD-271N on another computer. If the error persists, you may have a hardware problem. In this case, you should contact your vendor.
  • Page 33: Problems Communicating With Other Computers

    Chapter 5 Troubleshooting 5.5 Problems Communicating with Other Computers The computer with the NWD-271N installed cannot communicate with the other computer(s). In Infrastructure Mode • Make sure that the AP and the associated computers are turned on and working properly. •...
  • Page 34 Chapter 5 Troubleshooting NWD-271N User’s Guide...
  • Page 35: Product Specifications

    H A P T E R Product Specifications Table 8 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name NWD-271N Wireless N USB Adapter Interface USB 2.0 Standards IEEE 802.11b IEEE 802.11g IEEE 802.11n (Draft 2.0) Antenna 2.4GHz (PCB 1.02 dBi) Operating Temperature 0 - 50 degrees Celsius Storage Temperature -30 - 70 degrees Celsius...
  • Page 36 Chapter 6 Product Specifications Table 8 Product Specifications (continued) Transmit Power 802.11b: 18dBm 802.11g: 18dBm 802.11n (Draft 2.0): At HT20 :17.5dBm At HT40 :16.5dBm Tolerance (±) 2 dB Receiver Sensitivity 802.11b: At 11Mbps: -88dBm 802.11g: At 54Mbps: -79dBm 802.11n (Draft 2.0): At HT20 MSC7: -73dBM At HT40: -70dBM WIRELESS STANDARDS...
  • Page 37 Chapter 6 Table 8 Product Specifications (continued) Networking Mode Infrastructure, Ad-Hoc Approvals Safety European Union: EN60950 (CE-LVD) United States: FCC Part 15B Class B Canada: ICES-003 European Union: CE EN 55022 Class B Australia: C-Tick European Union: CE EN55024 United States: FCC Part 15C Canada: RSS-210 European Union: CE EN 300 328 Taiwan: NCC LP0002...
  • Page 38 Chapter 6 NWD-271N User’s Guide...
  • Page 39: Appendix A Setting Up Your Ip Address

    P P E N D I X Setting Up Your IP Address This appendix shows you how to configure the TCP/IP settings on your computer in order for it to be able to communicate with the other devices on your network. Mac OS X includes the software components you need to use TCP/IP on your computer.
  • Page 40 Appendix A Setting Up Your IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. NWD-271N User’s Guide...
  • Page 41 Appendix A Setting Up Your IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. •...
  • Page 42 Appendix A Setting Up Your IP Address • In the Router address field, type the IP address of your NWD-271N. Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab.
  • Page 43 Appendix A Setting Up Your IP Address Mac OS X: 10.5 The screens in this section are from Mac OS 10.5. Click Apple > System Preferences. In System Preferences, click the Network icon. NWD-271N User’s Guide...
  • Page 44 Appendix A Setting Up Your IP Address When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: •...
  • Page 45 Appendix A Setting Up Your IP Address • In the Router field, enter the IP address of your NWD-271N. Click Apply and close the window. NWD-271N User’s Guide...
  • Page 46 Appendix A Setting Up Your IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. NWD-271N User’s Guide...
  • Page 47: Appendix B Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 48 Appendix B IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 9 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 49 Appendix B IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1”...
  • Page 50 Appendix B IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet.
  • Page 51 Appendix B IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 10 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
  • Page 52 Appendix B IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 11 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
  • Page 53 Appendix B IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 2 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 13 Subnet 1 LAST OCTET BIT IP/SUBNET MASK...
  • Page 54 Appendix B IP Addresses and Subnetting Table 16 Subnet 4 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.193 192.168.1.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).
  • Page 55 Appendix B IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 19 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK HOST BITS SUBNETS SUBNET 255.255.128.0 (/17) 32766...
  • Page 56 Appendix B IP Addresses and Subnetting that you entered. You don't need to change the subnet mask computed by the NWD-271N unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
  • Page 57 Appendix B IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 12 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers.
  • Page 58 Appendix B IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 14 Conflicting Computer and Router IP Addresses Example NWD-271N User’s Guide...
  • Page 59: Appendix C Wireless Lans

    P P E N D I X Wireless LANs This appendix discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 60 Appendix C Wireless LANs A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other.
  • Page 61 Appendix C Wireless LANs An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
  • Page 62 Appendix C Wireless LANs adjacent AP is using. For example, if your region has 11 channels and an adjacent AP is using channel 1, then you need to select a channel between 6 or 11. RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other.
  • Page 63 Appendix C Wireless LANs If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Note: Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy.
  • Page 64 Appendix C Wireless LANs IEEE 802.11g Wireless LAN IEEE 802.11g is fully compatible with the IEEE 802.11b standard. This means an IEEE 802.11b adapter can interface directly with an IEEE 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. IEEE 802.11g has several intermediate rate steps between the maximum and minimum data rates.
  • Page 65 Appendix C Wireless LANs Note: You must enable the same wireless security settings on the NWD-271N and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
  • Page 66 Appendix C Wireless LANs • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message.
  • Page 67 Appendix C Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information.
  • Page 68 Appendix C Wireless LANs LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out.
  • Page 69 Appendix C Wireless LANs If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client.
  • Page 70 Appendix C Wireless LANs The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it’s still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys.
  • Page 71 Appendix C Wireless LANs The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly. A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the RADIUS server and the client. The RADIUS server distributes the PMK to the AP.
  • Page 72 Appendix C Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 20 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
  • Page 73 Appendix C Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN.
  • Page 74 Appendix C Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points.
  • Page 75: Appendix D Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 76 Appendix D Legal Information This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 77 Appendix D Legal Information 注意 ! 依據 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用 者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France.
  • Page 78 Appendix D Legal Information ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser.
  • Page 79: Appendix E Customer Support

    • Sales E-mail: sales@zyxel.com.tw • Telephone: +886-3-578-3942 • Fax: +886-3-578-2439 • Web: www.zyxel.com, www.europe.zyxel.com • FTP: ftp.zyxel.com, ftp.europe.zyxel.com • Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park, Hsinchu 300, Taiwan Costa Rica • Support E-mail: soporte@zyxel.co.cr • Sales E-mail: sales@zyxel.co.cr •...
  • Page 80 Czech Republic • E-mail: info@cz.zyxel.com • Telephone: +420-241-091-350 • Fax: +420-241-091-359 • Web: www.zyxel.cz • Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 - Modrany, Ceská Republika Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk •...
  • Page 81 Appendix E Customer Support • Web: www.zyxel.de • Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen, Germany Hungary • Support E-mail: support@zyxel.hu • Sales E-mail: info@zyxel.hu • Telephone: +36-1-3361649 • Fax: +36-1-3259100 • Web: www.zyxel.hu • Regular Mail: ZyXEL Hungary, 48, Zoldlomb Str., H-1025, Budapest, Hungary India •...
  • Page 82 • Support Telephone: +1-800-978-7222 • Sales E-mail: sales@zyxel.com • Sales Telephone: +1-714-632-0882 • Fax: +1-714-632-0858 • Web: www.zyxel.com • Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806-2001, U.S.A. Norway • Support E-mail: support@zyxel.no • Sales E-mail: sales@zyxel.no •...
  • Page 83 • Support E-mail: support@zyxel.es • Sales E-mail: sales@zyxel.es • Telephone: +34-902-195-420 • Fax: +34-913-005-345 • Web: www.zyxel.es • Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • Telephone: +46-31-744-7700 •...
  • Page 84 • Sales E-mail: sales@zyxel.co.uk • Telephone: +44-1344-303044, 08707-555779 (UK only) • Fax: +44-1344-303034 • Web: www.zyxel.co.uk • FTP: ftp.zyxel.co.uk • Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road, Bracknell, Berkshire RG12 2XB, United Kingdom (UK) NWD-271N User’s Guide...
  • Page 85: Index

    Index Index CTS (Clear to Send) customer support about your ZyXEL Device Access Point (AP) Access point (AP) Access Point. See also AP. ACT LED dimensions Ad-Hoc disclaimer Advanced Encryption Standard dynamic WEP key exchange See AES. alternative subnet mask notation antenna directional EAP Authentication...
  • Page 86 Index IANA radio interference IBSS radio specifications 35, 36 IEEE 802.11g RADIUS 20, 65 message types Independent Basic Service Set messages See IBSS shared secret key infrastructure registration Initialization Vector (IV) product interface related documentation Internet access RTS (Request To Send) Internet Assigned Numbers Authority threshold 62, 63...
  • Page 87 Index warranty note weight WEP (Wired Equivalent Privacy) Wi-Fi Protected Access 20, 68 wireless client wireless client WPA supplicants wireless LAN introduction security wireless LAN (WLAN) wireless network wireless security wireless standard WLAN interference security parameters 20, 68 key caching pre-authentication user authentication vs WPA-PSK...
  • Page 88 Index NWD-271N User’s Guide...

Table of Contents