Zoom 4412A/TF User Manual
Zoom 4412A/TF User Manual

Zoom 4412A/TF User Manual

Wireless-g pc card

Advertisement

Quick Links

Wireless-G
PC Card
U
S
E
R ' S
G
U
I
D
E

Advertisement

Table of Contents
loading

Summary of Contents for Zoom 4412A/TF

  • Page 1 Wireless-G PC Card R ’ S...
  • Page 2: Table Of Contents

    Changing your Security Setting ...26 Advanced Options...27 Creating Profiles...27 Monitoring Link Status...30 Using Site Survey and Rescan...31 Advanced Configuration ...33 Appendix A. TCP/IP Settings ...34 Appendix B. Troubleshooting...39 Appendix C. Zoom Technical Support Services...41 Appendix D Regulatory Information...45 Wireless-G PC Card Adapter...
  • Page 3: Overview

    The chapters in this User’s Guide describe how to: Install the Zoom Wireless-G PC Card adapter on a Windows Connect to a wireless network Enable security on the Wireless-G PC Card adapter Use the advanced features of the Wireless-G PC Card configuration software Chapters 1 and 2 cover the basics –...
  • Page 4: Installation Instructions

    Installation Instructions This chapter provides simple instructions for installing the Wireless-G PC Card software on a Windows PC. If you have already installed the adapter on a computer (using the separate Quick Start booklet), you can skip this chapter and begin with Chapter 2: Setting Security.
  • Page 5: Installing The Wireless-G Pc Card Adapter

    Installing the Wireless-G PC Card Adapter Important! Install the software BEFORE you insert the Wireless-G PC Card into your laptop. 1 1 1 1 Insert the Wireless-G PC Card CD into the CD drive. The CD should start automatically and the Language Selection screen should appear.
  • Page 6 3 3 3 3 The setup program opens: 4 4 4 4 Follow the prompts to complete the installation. 5 5 5 5 At the final setup screen, click Finish and then turn off your computer. Wireless-G PC Card Adapter...
  • Page 7 6 6 6 6 While your laptop is off, insert the Wireless-G PC Card into the PCMCIA slot on your laptop, making sure that the LEDs are facing up. You will hear the card click softly into place. 7 7 7 7 Turn the computer on.
  • Page 8 All operating systems: In the list of devices, double-click Network Adapters and make sure there is no alert icon next to the Zoom Wireless-G PC Card adapter. This alert icon appears next to devices that are not responding or that are not installed properly.) Your Wireless-G PC Card adapter is successfully installed! Continue with Getting Connected on the next page.
  • Page 9: Getting Connected

    Getting Connected The installation places a Zoom Wireless-G PC Card icon on your desktop: 1 1 1 1 Double-click this icon to open the Wireless-G PC Card configuration software: In the Profile text box, the term “ANY” indicates that the adapter has identified the strongest wireless network signal in your vicinity –...
  • Page 10 2 2 2 2 Select the Site Survey tab to see a list of wireless networks within range: There are two types of wireless networks: Infrastructure and Ad Hoc. In an Infrastructure network, wireless devices communicate with each other via a wireless access point, a router, or an ADSL modem with built-in wireless technology.
  • Page 11 If the network you select has security configured, you must enable and configure security on your computer before you can connect. See Chapter 2, Setting Security on page 4 4 4 4 Your laptop should now be connected to the network, as long as your security settings match those of the access point and other network users.
  • Page 12: The Adapter Leds

    The Adapter LEDs The states of the LEDs on the Wireless-G PC Card adapter are explained below. Status Meaning Flashing Adapter is attempting to connect to a LINK wireless network. Steady Adapter is connected to a network. Flashing Adapter is transmitting or receiving data.
  • Page 13: Setting Security

    We strongly recommend security, although you do not need to use it to get your wireless connection working. Important! You must first enable security on the the wireless access point. You then enable security on the adapter using the same configuration that you used for the access point. For example, if the wireless access point is configured for WPA2- PSK, you must select WPA2-PSK security in the Wireless-G PC Card configuration software and enter the same encryption key.
  • Page 14: Accessing The Security Screen

    TKIP ( T emporal K ey I ntegrity P rotocol), which dynamically changes keys as the system is used. Accessing the Security Screen 1 1 1 1 On your desktop, double-click the Zoom Wireless-G PC Card icon: Wireless-G PC Card Adapter...
  • Page 15 2 2 2 2 The Zoom Wireless-G PC Card configuration software opens to display the configuration parameters: 3 3 3 3 Make sure that the desired wireless network is displayed in the Profile and SSID text boxes (the term <Infra>...
  • Page 16: Wpa2-Psk (Pre-Shared Key)

    WPA2-PSK (Pre-Shared Key) 5 5 5 5 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WPA2-PSK . 6 6 6 6 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a key with a minimum of 20 random characters.
  • Page 17: Wpa-Psk (Pre-Shared Key)

    WPA-PSK (Pre-Shared Key) If not all of the wireless devices in your network support the recommended WPA2-PSK, select WPA-PSK. 5 5 5 5 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WPA-PSK . 6 6 6 6 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point.
  • Page 18: Wep (Wired Equivalent Privacy)

    That’s it! You have configured WPA-PSK security for your wireless connection, and you’re ready to use the Internet. WEP (Wired Equivalent Privacy) 5 5 5 5 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WEP : Wireless-G PC Card Adapter...
  • Page 19 6 6 6 6 In the Preconfigured key [WEP] area , do the following: In the Format for entering key drop-down list, select ASCII characters if your network uses all Zoom wireless products Hexadecimal digits if an access point, router, or...
  • Page 20: Wpa2-Enterprise

    8 8 8 8 Click OK to save your settings and return to the Configuration tab. 9 9 9 9 On the Configuration tab, click Apply . Click the Close box to exit the configuration software. That’s it! You have configured WEP security for your wireless connection, and you’re ready to use the Internet.
  • Page 21 5 5 5 5 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WPA2-Enterprise . 6 6 6 6 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected.
  • Page 22 TTLS ( T unneled T ransport L ayer S ecurity). With TTLS, you can select from four authentication extensions: PAP ( P assword A uthentication P rotocol) CHAP ( C hallenge H andshake A uthentication P rotocol) MS-CHAP (Microsoft’s version of CHAP). MS-CHAPV2 (the default).
  • Page 23: Wpa

    Select WPA if you are linking to a corporate network that uses a RADIUS ( R emote A uthentication D ial- I n U ser S ervice) server that does not support WPA2. 5 5 5 5 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WPA .
  • Page 24 7 7 7 7 Click the EAP ( E xtensible A uthentication P rotocol) Type drop-down list and select an authentication protocol: PEAP ( P rotected E xtensible A uthentication P rotocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default).
  • Page 25: Certificate (Wpa2-Enterprise And Wpa)

    9 9 9 9 Click OK to save your settings and return to the Configuration tab. On the Configuration tab, click Apply . Click the Close box to exit the configuration software. That’s it! You have configured WPA security for your wireless connection, and you’re ready to use the Internet.
  • Page 26: Changing Your Security Setting

    Changing your Security Setting If the type of security on your wireless network changes, you need to modify your security settings. On the Configuration tab, click the Configure Security button to select a different security option and enter the required information.
  • Page 27: Advanced Options

    Advanced Options The Zoom Wireless-G PC Card utility provides options so you can create profiles, monitor the signal strength of your network connection, scan available networks, and specify advanced settings. This chapter tells you when and how to use each of these options.
  • Page 28 2 2 2 2 On the Configuration tab, in the Profile text box, enter a name for the profile you want to create. For example, let’s say you have a small home network to which you want to be able to switch quickly when you arrive home.
  • Page 29 Enable Security – Select this check box to open the Security Configuration window. Note: If you are setting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, click OK to return to the Configuration tab.
  • Page 30: Monitoring Link Status

    Monitoring Link Status The Status area on the Configuration tab displays information about your wireless connection: State : (Infrastructure only) The name and the MAC address of the wireless access point to which your computer is connected. Current Tx (Transmission) Rate : Highest transmission speed in M ega b ytes p er s econd of the last received...
  • Page 31: Using Site Survey And Rescan

    Using Site Survey and Rescan Use the Site Survey window and the Rescan button when you need to do any of the following: Find a list of network names (ESSIDs) so you can connect to a network Identify the MAC address (BSSID) of your wireless access point or wireless router Check the channel difference between your network and other networks within range...
  • Page 32 The information displayed on the Site Survey tab is as follows: ESSID ( E xtended S ervice S et Id entifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network.
  • Page 33: Advanced Configuration

    Advanced Configuration To access this window, click the Advanced button on the Configuration tab. Power Save Enabled : When you select this option, the Wireless-G PC Card adapter immediately signals the access point that it is in Power Save mode. The access point buffers all packets until it is polled by the adapter.
  • Page 34: Appendix A. Tcp/Ip Settings

    Appendix A TCP/IP Settings By default, Windows is set for dynamic addressing (DHCP). Generally, this is the correct setting for an Infrastructure network, but needs to be changed if you are using an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the section that corresponds to your Windows operating system.
  • Page 35 b b b b If this is the first computer to be set up in the ad hoc network, enter 10.0.0.5 for an IP address . If you are adding it to an existing ad hoc network, increment the last digit by one, for example, 10.0.0.6 , 10.0.0.7 c c c c Enter 255.255.255.0 for Subnet mask .
  • Page 36: Windows 2000

    Properties . c c c c In the Properties dialog box, in the Connect Using box, make sure the Zoom Wireless-G PC Card adapter is displayed. From the Components list, select Internet Protocol ( TCP/IP) and click the Properties button.
  • Page 37 In the Control Panel window, double-click the Network icon. c c c c In the Network dialog box, select the Zoom Wireless-G PC Card TCP/IP from the list, click the Properties button and then click OK . d d d d If you have an ad hoc network, continue with step 2a.
  • Page 38 b b b b If this is the first computer to be set up in the ad hoc network, enter 10.0.0.5 for IP address . If you are adding a computer to an existing ad hoc network, increment the last digit by one, for example, 10.0.0.6 , 10.0.0.7 c c c c Enter 255.255.255.0 for Subnet mask .
  • Page 39: Appendix B. Troubleshooting

    Appendix B Troubleshooting If your Zoom Wireless-G PC Card adapter is not working properly, try each of the following steps until you get it to work. 1 1 1 1 Make sure the adapter is firmly inserted into the laptop’s PC card slot.
  • Page 40 First, turn off your computer and unplug the adapter from the PC Card port. Then select Start – All Programs – Zoom Wireless-G PC Card – Uninstall Zoom Wireless-G PC Card . Follow the prompts to uninstall, then re-install the software (see page 5).
  • Page 41: Appendix C. Zoom Technical Support Services

    Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenient, professional support responsive to our customers’ needs and capabilities. If you find yourself unable to get your Zoom product to operate, and you have thoroughly reviewed your owner’s manual and all relevant...
  • Page 42: World Wide Web

    Zoom’s Web page lets you send email for assistance, register on-line, access product reviews and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Product. To access Zoom’s Web page, please log onto your local Internet Service...
  • Page 43 Contact Zoom by Email You can email Zoom with any tech support questions you might have and one of our Technical Support Engineers will respond by email within 2 business days. You may request personal assistance via email at www.zoom.com/techmail. When emailing...
  • Page 44 Please note that the customer is responsible for any charges (including brokerage or customs and duties) associated with shipping the defective unit to Zoom for repair. During the first year Zoom will pay return shipping to the customer by common carrier.
  • Page 45: Appendix D Regulatory Information

    Appendix D Regulatory Information U.S. FCC Part 15 Emissions Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 46 Countries of Operation & Conditions of Use in the European Community This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must ensure that the channels of operation are in conformance with the spectrum usage rules for European Community countries as described below.
  • Page 47 Le constructeur déclare sous son entière responsabilité que ce matériel est conforme à la Directive 1999/5/EC via les documents ci-dessous. Ce produit a reçu le marquage CE. Hiermit erklärt Zoom die Übereinstimmung des Gerätes modem mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EC. Dieses Produkt ist das gekennzeichnete CE.
  • Page 48 NOTICE NOTICE NOTICE NOTICE This document contains proprietary information protected by copyright, and this User’s Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form. The manufacturer does not warrant that the hardware will work properly in all environments and applications, and makes no warranty or representation, either expressed or implied, with respect...

This manual is also suitable for:

4412a

Table of Contents