ZyXEL Communications ZyXEL ZyAIR G-100 User Manual

ZyXEL Communications ZyXEL ZyAIR G-100 User Manual

802.11g wireless cardbus card
Hide thumbs Also See for ZyXEL ZyAIR G-100:
Table of Contents

Advertisement

Quick Links

ZyAIR G-100
802.11g Wireless CardBus Card
User's Guide
Version 1.1
April 2004

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZyXEL ZyAIR G-100 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ZyXEL Communications ZyXEL ZyAIR G-100

  • Page 1 ZyAIR G-100 802.11g Wireless CardBus Card User's Guide Version 1.1 April 2004...
  • Page 2 ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 3: Zyxel Limited Warranty

    ZyAIR G-100 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to one (1) year from the date of purchase. During the warranty period and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor and to whatever extent it shall...
  • Page 4: Information For Canadian Users

    ZyAIR G-100 User’s Guide Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective operation and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction.
  • Page 5: Federal Communications Commission (Fcc) Interference Statement

    Federal Communications Commission The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 7: Warranty Information

    +47 22 80 61 81 +46 31 744 7700 www.zyxel.se +46 31 744 7701 +358-9-4780-8411 www.zyxel.fi ZyAIR G-100 User’s Guide REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Inc. 1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
  • Page 9: Table Of Contents

    Chapter 1 Getting Started ... 1-1 ZyAIR Hardware and Utility Installation... 1-1 Disable Windows XP Wireless LAN Configuration Tool ... 1-1 Accessing the ZyAIR Utility... 1-3 Chapter 2 Using the ZyAIR Utility ... 2-1 About Your ZyAIR ... 2-1 Benefits of a Wireless LAN ... 2-1 Notes on Wireless LAN Setup ...
  • Page 10 ZyAIR G-100 User’s Guide List of Figures Figure 1-1 Windows XP: System Tray Icon ... 1-1 Figure 1-2 Windows XP: System Tray Icon ... 1-1 Figure 1-3 Windows XP: Wireless Network Connection Status... 1-2 Figure 1-4 Windows XP: Connect to Wireless Network ... 1-2 Figure 1-5 Windows XP: Wireless Network Connection Properties ...
  • Page 11 ZyAIR G-100 User’s Guide List of Tables Table 1-1 ZyAIR Utility: System Tray Icon ... 1-3 Table 2-1 ZyAIR Utility: Link Info ... 2-5 Table 2-2 Site Survey ... 2-6 Table 2-3 Configuration ... 2-7 Table 2-4 WEP Authentication ... 2-11 Table 2-5 WPA Authentication ...
  • Page 12: Related Documentation

    Window and command choices are in Bold Times New Roman font. Predefined field choices are in Bold Arial font. • The ZyXEL ZyAIR G-100 802.11g Wireless CardBus Card is referred to as the ZyAIR in this guide. • The ZyAIR G-100 802.11g Wireless CardBus Utility may be referred to as the ZyAIR Utility in this guide.
  • Page 13: Chapter 1 Getting Started

    ZyAIR Hardware and Utility Installation Follow the instructions in the Quick Installation Guide to install the ZyAIR Utility and driver and make hardware connections. Disable Windows XP Wireless LAN Configuration Tool Windows XP includes a configuration tool for wireless LAN devices. DO NOT use the Windows XP configuration tool and the ZyAIR Utility at the same time.
  • Page 14: Figure 1-3 Windows Xp: Wireless Network Connection Status

    ZyAIR G-100 User’s Guide 3. Double-click on the icon for wireless network connection to display a status window as shown next. Figure 1-3 Windows XP: Wireless Network Connection Status 4. Click Properties and click the Wireless Networks tab. Then skip to Step 6. 5.
  • Page 15: Accessing The Zyair Utility

    6. In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK. Figure 1-5 Windows XP: Wireless Network Connection Properties Accessing the ZyAIR Utility After you installed the ZyAIR Utility, an icon for the ZyAIR Utility appears in the system tray. When the ZyAIR Utility system tray icon displays, the ZyAIR is installed properly.
  • Page 17: Chapter 2 Using The Zyair Utility

    This chapter shows you how to configure the ZyAIR using the ZyAIR Utility. About Your ZyAIR The ZyAIR is an IEEE 802.11g compliant wireless LAN PC card that fits into any 32-bit CardBus slot. With the ZyAIR, you can enjoy wireless mobility within the coverage area. The IEEE 802.11g technology provides greater range and offers transmission rate at up to 54 Mbps.
  • Page 18: About Wireless Lan Network

    ZyAIR G-100 User’s Guide Floors usually have metal girders and metal reinforcing struts that interfere with WLAN transmission. About Wireless LAN Network This section describes the wireless LAN network terms and applications. 2.4.1 SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other.
  • Page 19: Roaming

    ZyAIR G-100 User’s Guide To set up an ad-hoc network, configure all wireless clients in ad-hoc network type and use the same SSID and channel. Infrastructure When a number of wireless clients are connected using a single AP, you have a Basic Service Set (BSS).
  • Page 20: Zyair Driver And Wireless Utility Installation

    ZyAIR G-100 User’s Guide ZyAIR Driver and Wireless Utility Installation Refer to the Quick Installation Guide to install the ZyAIR driver and wireless utility program. The Link Info Screen When the ZyAIR Utility starts, the Link Info screen displays, showing the current configuration of your ZyAIR.
  • Page 21: The Site Survey Screen

    Table 2-1 ZyAIR Utility: Link Info LABEL Current SSID This field displays the name of the wireless LAN network to which the ZyAIR is associated. Status This field displays the connection status of the ZyAIR. This field is blank if there is no device associated with the ZyAIR.
  • Page 22: Connecting To A Wireless Network

    ZyAIR G-100 User’s Guide The following table describes the fields in the table. FIELD SSID This field displays the SSID (or name) of each wireless device. Signal This field displays the signal strength of each wireless device. Channel This field displays the channel number used by each wireless device. Security This field shows whether the wireless security is activated (WEP, WPA-PSK, WPA or 802.1x) or inactive (None).
  • Page 23: The Configuration Screen

    1. Click Search to scan for all available wireless networks within range. 2. To join a network, either click an entry in the table to select a wireless network and then click Connect or double-click an entry. 3. If the WEP field is Yes for the selected wireless network, you must also set up WEP keys in the Security Configuration screen.
  • Page 24: Wireless Lan Security

    ZyAIR G-100 User’s Guide FIELD Configuration Service Set Enter the SSID (Service Set Identifier) of the AP or the peer ad-hoc computer to which Identifier you want to associate in this field. To associate to an ad-hoc network or a particular AP in an infrastructure network, you must enter the same SSID as the peer ad-hoc computer.
  • Page 25: The Security Configuration Screen

    If you do not enable any wireless security on your ZyAIR, communication between the ZyAIR and the wired network is accessible to any wireless networking device that is in the coverage area. 2.10 The Security Configuration Screen Configure the wireless LAN security by clicking the Set Security button in the Configuration screen.
  • Page 26: Figure 2-9 Wep Authentication Steps

    ZyAIR G-100 User’s Guide Figure 2-9 WEP Authentication Steps Open System authentication involves an unencrypted two-message procedure. A wireless station sends an open system authentication request to the AP, which will then automatically accept and connect the wireless station to the network. In effect, open system is not authentication at all as any station can gain access to the network.
  • Page 27: Figure 2-10 Wep Authentication

    Figure 2-10 WEP Authentication Follow the instructions in the table to configure the WEP encryptions. FIELD Authentication Select WEP from the drop-down list box to activate WEP Authentication. Encryption Select either 64 Bits or 128 Bits from the drop-down list box to activate WEP encryption and then fill in the related fields.
  • Page 28: Data Encryption With Wpa

    ZyAIR G-100 User’s Guide FIELD Transmit Key Enter the key number (1 to 4) in this field. Only one key can be enabled at any one time. This key must be the same on the ZyAIR and the wireless stations to communicate.
  • Page 29: Figure 2-11 Wpa Authentication

    ZyAIR G-100 User’s Guide Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and distributed by the authentication server. It includes a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism.
  • Page 30: Data Encryption With Wpa-Psk

    ZyAIR G-100 User’s Guide FIELD Authentication Select WPA from the drop-down list box. Encryption Status All unicast traffic is automatically encrypted by TKIP when WPA or WPA-PSK Authentication is selected. See the section on Encryption for details about Temporal Key Integrity Protocol (TKIP). EAP Type Select an EAP Type from the drop-down list box.
  • Page 31: Wpa-Psk Application Example

    WPA-PSK Application Example A WPA-PSK application looks as follows. First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) or Passphrase must consist of between 8 and 63 ASCII characters (including spaces and symbols). The AP checks each client’s password and (only) allows it to join the network if it matches its password.
  • Page 32: Figure 2-13 Wpa With Radius Application Example

    ZyAIR G-100 User’s Guide Figure 2-13 WPA with RADIUS Application Example Figure 2-14 WPA-PSK Authentication Follow the instructions in the table to configure the WEP encryptions. Table 2-6 WPA-PSK Authentication FIELD DESCRIPTION Authentication Select WPA-PSK from the drop-down list box. 2-16 Using the ZyAIR Utility...
  • Page 33: Data Encryption With 802.1X

    Table 2-6 WPA-PSK Authentication FIELD Encryption Status All unicast traffic is automatically encrypted by TKIP when WPA or WPA-PSK Authentication is selected. See the section on Encryption for details about Temporal Key Integrity Protocol (TKIP). Passphrase Type a Passphrase from 8 to 63 ASCII characters long. The Passphrase is case- sensitive.
  • Page 34: Figure 2-15 802.1X Authentication

    ZyAIR G-100 User’s Guide Figure 2-15 802.1x Authentication Follow the instructions in the table to configure 802.1x authentication. Table 2-7 802.1x Authentication FIELD Authentication Select 802.1x from the drop-down list box. EAP Type Select an EAP Type from the drop-down list box. See Types of EAP Authentication in the Appendix of this User’s Guide for information on the fields listed below: EAP-TLS EAP-TTLS...
  • Page 35: The About Screen

    Table 2-7 802.1x Authentication FIELD Validate Server This field is not available when you select EAP-MD5 or LEAP from the EAP Type Certificate list. The server presents a certificate to the client. After validating the identity of the server, the client sends a different certificate to the server. Select the check box to have your server validate this certificate.
  • Page 36: Table 2-8 About

    ZyAIR G-100 User’s Guide FIELD Utility Version This field displays the version number of the ZyAIR Utility. Driver Version This field displays the version number of the ZyAIR wireless card driver. Firmware This field displays the version of the firmware of the ZyAIR card. Click OK to apply the changes and close the screen.
  • Page 37: Chapter 3 Maintenance

    This chapter describes how to uninstall or upgrade the ZyAIR Utility. Removing the ZyAIR Utility Follow the steps below to remove (or uninstall) the ZyAIR Utility from your computer. Click Start, Programs, ZyAIR G-200 Wireless LAN USB Adapter, Uninstall. A Confirm Uninstallation window displays. Click OK to remove the driver and the utility software.
  • Page 38: Figure 3-2 Zyair Utility: Exit

    ZyAIR G-100 User’s Guide Double-click the removable device icon in the system tray. Figure 3-3 Removable Device System Tray Icon: Windows XP When a Safely Remove Hardware window displays, select the ZyAIR device in the Hardware devices list and click Stop. Figure 3-4 Safely Remove Hardware: Windows XP If you do not close and exit the ZyAIR Utility, a warning window displays.
  • Page 39: Figure 3-5 Stop A Hardware Device: Windows Xp

    ZyAIR G-100 User’s Guide Figure 3-5 Stop a Hardware device: Windows XP After the following notice window displays in the system tray, you can safely disconnect the ZyAIR from your computer. Figure 3-6 Safe To Remove Hardware Message: Windows XP Maintenance...
  • Page 41: Chapter 4 Troubleshooting

    ZyAIR G-100 User’s Guide This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the Problems Starting the ZyAIR Utility Program Table 4-1 Troubleshooting Starting ZyAIR Utility Program PROBLEM Cannot start the ZyAIR Make sure the ZyAIR is properly inserted and the PWR LED is on.
  • Page 42: Problem With The Link Status

    Table 4-2 Troubleshooting Communication Problems PROBLEM Ad-Hoc (IBSS) Verify that the peer computer(s) is turned on. Make sure the ZyAIR and the peer computer(s) are using the same SS ID and channel. Make sure that the ZyAIR and the peer computer(s) share the same security option and key.
  • Page 43: Appendix A Wireless Lan And Ieee 802

    Wireless LAN and IEEE 802.11 A wireless LAN (WLAN) provides a flexible data communications system that you can use to access various services (navigating the Internet, email, printer services, etc.) without the use of a cabled connection. In effect a wireless LAN environment provides you the freedom to stay connected to the network while roaming around in the coverage area.
  • Page 44: Infrastructure Wireless Lan Configuration

    ZyAIR G-100 User’s Guide Diagram 4-1 Peer-to-Peer Communication in an Ad-hoc Network Infrastructure Wireless LAN Configuration For infrastructure WLANs, multiple access points (APs) link the WLAN to the wired network and allow users to efficiently share network resources. The access points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood.
  • Page 45: Appendix B Wireless Lan With Ieee 802.1X

    Wireless LAN With IEEE 802.1x As wireless networks become popular for both portable computing and corporate networks, security is now a priority. Security Flaws with IEEE 802.11 Wireless networks based on the original IEEE 802.11 have a poor reputation for safety. The IEEE 802.11b wireless access standard, first published in 1999, was based on the MAC address.
  • Page 46 ZyAIR G-100 User’s Guide Diagram 4-3 Sequences for EAP MD5–Challenge Authentication Client computer access authorized. Client computer access not authorized. Wireless LAN With IEEE 802.1x...
  • Page 47: Appendix C Types Of Eap Authentication

    ZyAIR G-100 User’s Guide Appendix C Types of EAP Authentication This appendix discusses the five popular EAP authentication types: EAP-MD5, EAP-TLS, EAP- TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method.
  • Page 48 ZyAIR G-100 User’s Guide Comparison of EAP Authentication Types EAP-MD5 Mutual Authentication Certificate – Client Certificate – Server Dynamic Key Exchange Credential Security None Deployment Easy Difficulty Wireless Security Poor Client Identity Protection EAP-TLS EAP-TTLS Optional Optional Strong Strong Hard Moderate Moderate Best...
  • Page 49: Appendix D Product Specifications

    Product Name ZyAIR G-100 802.11g Wireless CardBus Card Type 3.3V 32-bit CardBus IEEE 802.11b Standards IEEE 802.11g Antenna Internal PCB antenna Media Access Protocol IEEE802.11 Frequency 2.412-2.497GHz 11 Channels (USA, Canada) Channels 13 Channels (Europe) 14 Channels (Japan) 802.11b: 11, 5.5, 2, 1Mbps Data Rate 802.11g: 54, 48, 36, 24, 18, 12, 9, 6 Mbps 802.11g: OFDM with BPSK, QPSK and 16/64-QAM sub-carrier modulations...
  • Page 50 ZyAIR G-100 User’s Guide Operating: 0° ~ 50° C Temperature Storage: -20° ~ 75° C Relative Humidity 5% to 95% (non-condensing) ENVIRONMENTAL SPECIFICATIONS Types of EAP Authentication...
  • Page 51: Index

    About ... 2-19 Accessing the ZyAIR Utility ... 1-3 Ad-hoc Configuration...A Automatic WEP key generation ... 2-9 Basic Service Set ... See BSS Benefits of a Wireless LAN ... 2-1 BSS... 2-3, A CA ... E Certificate Authority...See CA Communication Problem... 4-1 Ad-hoc(IBSS)...
  • Page 52 ZyAIR G-100 User’s Guide User Authentication... 2-12 Using the ZyAIR Utility... 2-1 Warranty... iii Note ... iii WEP ... 2-9 WEP Data Encryption Configuring ... 2-9 WEP Data Encryption with ..2-9, 2-12, 2-14, 2-17 WEP Key... 2-9 Wired Equivalent Privacy...See WEP Wireless LAN benefits ...

Table of Contents