The chapters in this User Guide describe how to: • Install the Zoom Wireless-G USB adapter on a Windows • Connect to a wireless network • Enable security on the Wireless-G USB adapter • Use the advanced features of the Wireless-G USB configuration software Chapters 1 and 2 cover the basics –...
Installation Instructions This chapter provides simple instructions for installing the Wireless-G USB adapter on a Windows PC. If you have already installed the adapter on a computer (using the separate Quick Start guide), you can skip this chapter and begin with Chapter 2: Setting Security.
On the next screen, select Installation Wizard, and then on the following screen select USB. On the Zoom Wireless-G USB Welcome screen, click Next to install the adapter. A Zoom Wireless-G USB Setup screen is displayed for a few seconds while the installation proceeds. Wireless-G USB Adapter...
Page 7
To connect to a network Double-click the Zoom Wireless-G USB icon desktop to open the Zoom Wireless-G Configuration window. Note that you also have a Zoom Wireless-G USB icon in your Windows taskbar: The color of this icon indicates the status of your network connection: Blue indicates an excellent or good link.
Page 8
In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless networks. Highlight the network you want and click Join. If the network you select has security configured, you must enable and configure security on your computer before you can connect.
The Adapter LED The states of the LED on the Wireless-G USB adapter are explained below. LED Status Meaning Flashing The Wireless-G USB adapter is attempting to connect to a wireless network. Steady The Wireless-G USB adapter is connected to a wireless network and is transmitting or receiving data.
We strongly recommend security, although you do not need to use it to get your wireless connection working. Important! You must first enable security on the the wireless access point. You then enable security on the adapter using the same configuration that you used for the access point. For example, if the wireless access point is configured for WPA2- PSK, you must select WPA2-PSK security in the Wireless-G USB configuration software and enter the same encryption key.
WPA2. WPA provides security with TKIP (Temporal Key Integrity Protocol), which dynamically changes keys as the system is used. Accessing the Security Screen On your desktop, double-click the Zoom Wireless-G USB icon: Chapter 2: Setting Security...
Page 12
The Zoom Wireless-G USB configuration software opens to display the configuration parameters: Make sure that the desired wireless network is displayed in the Profile and SSID text boxes (the term <Infra> designates an Infrastructure network) and that the Network Type is correct.
Page 13
• In the unlikely event that you use an Ad Hoc network, you must set up Static IP addressing. See Appendix A: TCP/IP Settings. Select the Enable Security check box to open the Security Configuration window. For configuration instructions, consult this table: To configure Go to page WPA2-PSK...
WPA2-PSK (Pre-Shared Key) In the Privacy Configuration window, click the Authentication Mode drop-down arrow and select WPA2- PSK. At Encryption Mode, accept the default: AES (Advanced Encryption Standard). In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a key with a minimum of 20 random characters.
WPA-PSK (Pre-Shared Key) If all of the wireless devices in your network DO NOT support the recommended WPA2-PSK, select WPA-PSK. In the Privacy Configuration window, click the Authentication Mode drop-down arrow and select WPA- PSK. At Encryption Mode, accept the default: TKIP (Temporal Key Integrity Protocol).
The USB Adapter automatically selects WEP as the Encryption Mode. In the Preconfigured key [WEP] area, do the following: In the Format for entering key drop-down list, select • ASCII characters if your network uses all Zoom wireless products Wireless-G USB Adapter...
Page 17
• Hexadecimal digits if an access point, router, or some adapters are not Zoom products In the Key Length drop-down list, select 128 bits, 64 bits, or 256 bits. Note: 128-bit and 256-bit WEP provide more security than 64-bit, but the longer keys could diminish network performance.
Click the Close box to exit the configuration software. That’s it! You have configured WEP security for your wireless connection, and you’re ready to use the Internet. WPA2 Select WPA2 if: • you are linking to a corporate network that uses a RADIUS (Remote Authentication Dial-In User Service) authentication server •...
Page 19
In the Privacy Configuration window, click the Authentication Mode drop-down arrow and select WPA2. At Encryption Mode, accept the default AES (Advanced Encryption Standard) In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected.
• TTLS (Tunneled Transport Layer Security). With TTLS, you can select from four authentication extensions: PAP (Password Authentication Protocol) CHAP (Challenge Handshake Authentication Protocol) MS-CHAP (Microsoft’s version of CHAP). MS-CHAPV2 (the default). • SIM (Subscriber Identity Module). A SIM card stores the key used to identify a subscriber to a wireless service.
Page 21
Accept the default Authentication Mode: TKIP (Temporal Key Integrity Protocol). In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentication, each wireless device (client) sends a signal to the wireless access point, which in turn sends the signal to the RADIUS server.
Page 22
• PEAP (Protected Extensible Authentication Protocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handshake Authentication Protocol. • TLS (Transport Layer Security). There are no authentication extension options with TLS. •...
Certificate (WPA2 and WPA) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security of the network. If you are linking to a corporate network that uses an authentication server and you have configured WPA2 or WPA security, your MIS staff will assist you in completing the Certification information.
WiFi™ Protected Setup (WPS) If your access point supports WiFi Protected Setup (WPS), this protocol can greatly simplify the process of configuring WPA2- PSK or WPA-PSK security. To access WPS, on the Configuration tab, click the WPS button to open the WPS Config screen: If you are like most users, you will want to join a wireless network (WLAN), so select Join a WLAN (Enrollee) and click Next.
Page 25
You can select the Push Button option if your access point has a hardware Secure Setup or similarly named button, or a virtual pushbutton on a software display. Before you initiate WPS by clicking Next, go to the access point and activate its pushbutton. The access point will begin accepting WPS connections.
Changing your Security Setting If the type of security on your wireless network changes, you need to modify your security settings. On the Configuration tab, click the Configure Security button to select a different security option and enter the required information.
Advanced Options The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the signal strength of your network connection, scan available networks, and specify advanced settings. This chapter tells you when and how to use each of these options.
Page 28
In the Configuration area, enter the following settings: • SSID – Enter the network name. In the example above, the SSID is Home. • Network Type – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop-down list, select the channel used by the other device(s) in the network.
Page 29
• Enable Security – Select this check box to open the Security Configuration window. Note: If you are setting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, click OK to return to the Configuration tab.
Monitoring Link Status The Status area on the Configuration tab displays information about your wireless connection: • State: In an Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected. In an ad hoc network, the virtual MAC address used by computers in the network.
Using Site Survey and Rescan Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network names (ESSIDs) so you can connect to a network • Identify the MAC address (BSSID) of your wireless access point or wireless router •...
Page 32
The information displayed on the Site Survey tab is as follows: • ESSID (Extended Service Set Identifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network.
Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Wireless Mode: • Power Save Enabled: When you select this option, the Wireless-G USB adapter immediately signals the access point that it is in Power Save mode.
Appendix A TCP/IP Settings By default, Windows is set for dynamic addressing (DHCP). Generally, this is the correct setting for an Infrastructure network, but needs to be changed if you are using an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the section that corresponds to your Windows operating system.
Page 35
In the Network Connections window, double-click the Wireless Network Connection option: In the Wireless Network Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Settings...
Page 36
In the Wireless Network Connection Properties dialog box, highlight the version of TCP/IP (Transmission Control Protocol/Internet Protocol) that you are using and click the Properties button: If you have an ad hoc network, continue with Step 2 below. If you have an infrastructure network, continue with Step 3 below.
Page 37
Enter 255.255.255.0 for Subnet mask. The Subnet mask should be the same for each computer in your ad hoc network. Enter 10.0.0.5 for Default gateway and Preferred DNS server. (This is the IP address of the first computer that was set up in your ad hoc network.) The Default Gateway and Preferred DNS server should be the same for each computer in your ad hoc network.
Page 38
Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure network. Windows XP Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box. From the desktop, click the Start button, select Control Panel, and then click Network Connections.
Right-click the Local Area Connection icon, and select Properties. In the Properties dialog box, in the Connect Using box, make sure the Zoom Wireless-G USB adapter is displayed. From the Components list, select Internet Protocol (TCP/IP) and click the Properties button.
Page 40
Complete the following steps to set static IP addressing: In the Internet Protocol (TCP/IP) Properties dialog box, ensure that Obtain an IP address automatically is not selected. Then make sure the buttons labeled Use the following IP address and Use the following DNS server addresses are selected.
If possible, try installing the adapter on another computer. If the problem does not seem to be hardware-related, click the Zoom icon on your desktop to run the Wireless-G USB software. Check the Configuration tab to make sure that the SSID...
Page 42
User Guide. If the adapter still does not work, uninstall the software and then re-install it. Unplug the adapter from the USB port, then select Start, All Programs, Zoom Wireless-G USB, Uninstall Zoom Wireless-G USB. Then re-install the Wireless-G USB software.
Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenient, professional support responsive to our customers’ needs and capabilities. If you find yourself unable to get your Zoom product to operate, and you have thoroughly reviewed your owner’s manual and all relevant...
Zoom’s Web page lets you send email for assistance, register on-line, access product reviews and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Product. To access Zoom’s Web page, please log onto your local Internet Service...
Page 45
Contact Zoom by Email You can email Zoom with any tech support questions you might have and one of our Technical Support Engineers will respond by email within 2 business days. You may request personal assistance via email at www.zoom.com/techmail. When emailing Zoom, be sure to include the following: •...
Page 46
Please note that the customer is responsible for any charges (including brokerage or customs and duties) associated with shipping the defective unit to Zoom for repair. During the first year Zoom will pay return shipping to the customer by common carrier.
Appendix D Regulatory Information U.S. FCC Part 15 Emissions Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Page 48
Countries of Operation & Conditions of Use in the European Community This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must ensure that the channels of operation are in conformance with the spectrum usage rules for European Community countries as described below.
Page 49
Le constructeur déclare sous son entière responsabilité que ce matériel est conforme à la Directive 1999/5/EC via les documents ci-dessous. Ce produit a reçu le marquage CE. Hiermit erklärt Zoom die Übereinstimmung des Gerätes modem mit den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie 1999/5/EC. Dieses Produkt ist das gekennzeichnete CE.
Page 50
NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form. The manufacturer does not warrant that the hardware will work properly in all environments and applications, and makes no warranty or representation, either expressed or implied, with respect...
Need help?
Do you have a question about the 4410B and is the answer not in the manual?
Questions and answers