ZyXEL G-302 v3 User’s Guide Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
Page 5
1 Go to www.zyxel.com. 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page. Certifications ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase.
+36-1-3259100 +7-3272-590-698 www.zyxel.kz +7-3272-590-689 1-800-255-4101 www.us.zyxel.com +1-714-632-0882 +1-714-632-0858 ftp.us.zyxel.com ZyXEL G-302 v3 User’s Guide REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Costa Rica Plaza Roble Escazú Etapa El Patio, Tercer Piso San José, Costa Rica...
Page 8
ZyXEL G-302 v3 User’s Guide METHOD SUPPORT E-MAIL SALES E-MAIL LOCATION support@zyxel.no NORWAY sales@zyxel.no info@pl.zyxel.com POLAND http://zyxel.ru/support RUSSIA sales@zyxel.ru support@zyxel.es SPAIN sales@zyxel.es support@zyxel.se SWEDEN sales@zyxel.se support@ua.zyxel.com +380-44-247-69-78 UKRAINE sales@ua.zyxel.com support@zyxel.co.uk UNITED KINGDOM sales@zyxel.co.uk +” is the (prefix) number you enter to make an international telephone call.
Settings and then click Control Panel. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. • The ZyXEL G-302 v3 802.11g Wireless PCI Adapter may be referred to as the G-302 v3 in this user’s guide.
This section describes some network applications for the G-302 v3. 1.1.1.1 Infrastructure To connect to a network via an Access Point (AP), set the G-302 v3 network type to Infrastructure. Through the AP, you can access the Internet or the wired network behind the Chapter 1 Getting Started ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide Figure 1 Application: Infrastructure 1.1.1.2 Ad-Hoc In case you prefer to set up a small independent wireless workgroup without an AP, use the Ad-Hoc mode. Ad-hoc mode does not require an AP or a wired network. Two or more wireless clients communicate directly to each other.
To configure your G-302 v3, use one of the following applications: • Wireless Zero Configuration (WZC) (recommended for Windows XP) • ZyXEL Utility (This guide shows you how to configure the G-302 v3 using the ZyXEL utility) • Odyssey Client Manager (not supplied) Refer to the Odyssey Client Manager documentation for more information.
Figure 5 ZyXEL Utility: System Tray Icon The color of the ZyXEL utility system tray icon indicates the status of the G-302 v3. Refer to the following table for details. Table 1 ZyXEL Utility: System Tray Icon...
The following sections show you how to associate with a network using the ZyXEL utility. You can either manually connect to a network or configure a profile to have the G-302 v3 automatically connect to a specific network. Otherwise, configure nothing and leave the G- 302 v3 to automatically scan for and connect to any other available network without security.
Figure 8 ZyXEL Utility: Security Settings 6 Verify that you have successfully connected to the selected network and check the network information in the Link Info screen. If the G-302 v3 is not connected to a network, the fields in this screen are blank.
Configure the wireless LAN security using the Profile Security Settings screen. If you do not enable any wireless security on your G-302 v3, the G-302 v3’s wireless communications are accessible to any wireless networking device that is in the coverage area.
WLAN adapter(s). • Enter the WEP keys manually. Your G-302 v3 allows you to configure up to four 64-bit or 128-bit WEP keys and only one key is used as the default key at any one time. 2.2.2 IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of...
WPA include key caching and pre-authentication. These two features are optional and may not be supported in all wireless devices. 2.2.4 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. Chapter 2 Wireless LAN Network ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each client's password and (only) allows it to join the network if it matches its password.
All IEEE 802.11b/g compliant wireless adapters support long preamble, but not all support short preamble. Select Auto to have the G-302 v3 automatically use short preamble when access point/ wireless stations support it, otherwise the G-302 v3 uses long preamble.
(SSID) field displays the name of the wireless device to which the G-302 v3 is associated. AP MAC Address This field displays the MAC address of the wireless device to which the G-302 v3 is associated. Network Type This field displays the network type (Infrastructure or Ad Hoc) of the wireless network.
ZyXEL G-302 v3 User’s Guide Table 3 Link Info (continued) LABEL DESCRIPTION Transmission Rate This field displays the current transmission rate of the G-302 v3 in megabits per second (Mbps). Security This field displays whether data encryption is activated (WEP, WPA, WPA2, WPA- PSK or WPA2-PSK) or inactive (DISABLE).
Ad-Hoc mode and the wireless security is activated. denotes that the wireless device is in Ad-Hoc mode but the wireless security is deactivated. ZyXEL G-302 v3 User’s Guide...
Link Info screen. 3.2.2 Security Settings When you configure the G-302 v3 to connect to a network with wireless security activated and the security settings are disabled on the G-302 v3, the screen varies according to the encryption method used by the selected network.
29 Pass Phrase Enter a passphrase of up to 63 case-sensitive printable characters. As you enter the passphrase, the G-302 v3 automatically generates four different WEP keys and displays it in the key field below. Refer to information.
Exit Click Exit to return to the Site Survey screen without saving. 3.2.2.2 WPA/WPA2 Note: You can use WPA and WPA2 with the G-302 v3 only in Microsoft Windows XP or Windows 2000. Figure 16 Security Settings: WPA/WPA2 The following table describes the labels in this screen.
Exit Click Exit to return to the Site Survey screen without saving. 3.2.2.3 WPA-PSK/WPA2-PSK Note: You can use WPA and WPA2 with the G-302 v3 only in Microsoft Windows XP or Windows 2000. Figure 17 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen.
G-302 v3 will be disconnected. If you do not configure and activate a profile, each time you start the G-302 v3, the G-302 v3 uses the default profile to connect to any available network with security disabled.
Ad-Hoc mode and the wireless security is activated. denotes that the wireless device is in Ad-Hoc mode but the wireless security is deactivated. ZyXEL G-302 v3 User’s Guide...
Select an available wireless device in the Scan Info table and click Select, or enter the SSID of the wireless device to which you want to associate in this field manually. Otherwise, enter Any to have the G-302 v3 associate to or roam between any infrastructure wireless networks.
Select an available wireless device in the table and click Select to add it to this profile. Whenever you activate this profile, the G-302 v3 associates to the selected wireless network only. 2 If you select the Infrastructure network type in the previous screen, skip to step 3. If you select the Ad-Hoc network type in the previous screen, a screen displays as follows.
Ad-Hoc network type in the first screen, you can only use WEP encryption method. Otherwise, select DISABLE to allow the G-302 v3 to communicate with the access points or other peer wireless computers without any data encryption and skip to step 6.
6 To use this network profile, click the Activate Now button. Otherwise, click the Activate Later button. Note: Once you activate a profile, the ZyXEL utility will use that profile the next time it is started. Figure 25 Profile: Activate the Profile Chapter 3 ZyXEL Utility Configuration ZyXEL G-302 v3 User’s Guide...
LABEL DESCRIPTION Adapter Setting Wireless Mode Select 802.11b Only to have the G-302 v3 connect to an IEEE 802.11b wireless device. Select 802.11b/g Mixed to have the G-302 v3 connect to either an IEEE 802.11g or IEEE 802.11b wireless device Preamble Mode Select a preamble type.
This chapter describes how to uninstall or upgrade the ZyXEL utility. 4.1 The About Screen The About screen displays related version numbers of the G-302 v3. To display the screen as shown below, click the about ( Figure 27 About The following table describes the read-only fields in this screen.
5 Double-click on the setup program for the new utility to start the ZyXEL utility installation. 6 Insert the G-302 v3 and check the version numbers in the About screen to make sure the new utility is installed properly. Section 4.2 on page 45...
Table 15 Troubleshooting Starting ZyXEL Utility PROBLEM CORRECTIVE ACTION Cannot start the Make sure the G-302 v3 is properly inserted and the LED is on. ZyXEL wireless Use the Device Manager to check for possible hardware conflicts. Click Start, LAN utility Settings, Control Panel, System, Hardware and Device Manager.
Make sure that the AP and the associated computers are turned on and working properly. Make sure the G-302 v3 computer and the associated AP use the same SSID. Change the AP and the associated wireless clients to use another radio channel if interference is high.
SOFTWARE SPECIFICATIONS Device Drivers Appendix A Product Specifications ZyXEL G-302 v3 User’s Guide P P E N D I X Product Specifications ZyXEL G-302 v3 802.11g Wireless PCI Adapter 3.3V 32-bit PCI V2.2 IEEE 802.11b IEEE 802.11g Infrastructure Ad-Hoc One 2 dBi Dipole Antenna...
If you see the following screen, refer to article 871122 on the Microsoft web site for information on starting WZC. Figure 30 Windows XP SP2: WZC Not Available Appendix B Management with Wireless Zero Configuration ZyXEL G-302 v3 User’s Guide P P E N D I X Configuration Appendix B on...
ZyXEL G-302 v3 User’s Guide Connecting to a Wireless Network 1 Double-click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Figure 31 Windows XP SP2: System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the ZyXEL wireless LAN adapter.
Select a wireless network in the list and click Connect to join the selected wireless network. Figure 34 Windows XP SP2: Wireless Network Connection Appendix B Management with Wireless Zero Configuration ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide The following table describes the icons in the wireless network list. Table 20 Windows XP SP2: Wireless Network Connection ICON DESCRIPTION This denotes that wireless security is activated for the wireless network. This denotes that this wireless network is your preferred network. Ordering your preferred networks is important because the ZyXEL wireless LAN adapter tries to associate to the preferred network first in the order that you specify.
ZyXEL wireless LAN adapter, you will see different screens according to the authentication and encryption methods used by the selected network. Appendix B Management with Wireless Zero Configuration ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide Association Select a network in the Preferred networks list and click Properties to view or configure security. Figure 38 Windows XP: Wireless (network) properties: Association The following table describes the labels in this screen. Table 22 Windows XP: Wireless (network) properties: Association...
Smart Card or other Certificate. Properties Click this button to open the properties screen and configure certificates. The screen varies depending on what you select in the EAP type field. Appendix B Management with Wireless Zero Configuration ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide Table 23 Windows XP: Wireless (network) properties: Authentication (continued) LABEL DESCRIPTION Authenticate as Select this check box to have the computer send its information to the network for computer when authentication when a user is not logged on.
Smart Card or other Certificate Properties Figure 41 Windows XP: Smart Card or other Certificate Properties Appendix B Management with Wireless Zero Configuration obtain the certificate(s) from a certificate authority (CA). Consult your network administrator for more information. ZyXEL G-302 v3 User’s Guide...
ZyXEL G-302 v3 User’s Guide The following table describes the labels in this screen. Table 25 Windows XP: Smart Card or other Certificate Properties LABEL DESCRIPTION Use my smart card Select this check box to use the smart card for authentication.
Move up or Move down to change it's order, click Remove to delete it or click Properties to view the security, authentication or connection information of the selected network. Click Add to add a preferred network into the list manually. Appendix B Management with Wireless Zero Configuration ZyXEL G-302 v3 User’s Guide...
Page 62
ZyXEL G-302 v3 User’s Guide Appendix B Management with Wireless Zero Configuration...
A digital certificate is an electronic ID card that authenticates the sender’s identity. However, to implement EAP-TLS, you need a Certificate Authority (CA) to handle certificates, which imposes a management overhead. Appendix C Wireless Security ZyXEL G-302 v3 User’s Guide P P E N D I X Wireless Security...
ZyXEL G-302 v3 User’s Guide EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection. Client authentication is then done by sending username and password through the secure connection, thus client identity is protected.
Page 65
AP and the wireless stations. This all happens in the background automatically. Appendix C Wireless Security EAP-MD5 EAP-TLS EAP-TTLS Easy Hard Moderate ZyXEL G-302 v3 User’s Guide PEAP LEAP Moderate Moderate...
ZyXEL G-302 v3 User’s Guide The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped.
ZyXEL G-302 v3 User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.
Need help?
Do you have a question about the G-302 and is the answer not in the manual?
Questions and answers