ZyXEL Communications ZyXEL ZyAIR G-470 User Manual

802.11g wireless ethernet adapter
Hide thumbs Also See for ZyXEL ZyAIR G-470:
Table of Contents

Advertisement

Quick Links

G-470
802.11g Wireless Ethernet Adapter
User's Guide
Version 1.00
Edition 1
6/2006

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ZyXEL ZyAIR G-470

  • Page 1 G-470 802.11g Wireless Ethernet Adapter User’s Guide Version 1.00 Edition 1 6/2006...
  • Page 3: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 4: Certifications

    G-470 User’s Guide Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5 This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. 注意 ! 依據 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用 者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
  • Page 6: Zyxel Limited Warranty

    G-470 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to...
  • Page 7: Safety Warnings

    For your safety, be sure to read and follow all warning notices and instructions. • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device.
  • Page 8: Customer Support

    +7-3272-590-689 1-800-255-4101 www.us.zyxel.com +1-714-632-0882 +1-714-632-0858 ftp.us.zyxel.com +47-22-80-61-80 www.zyxel.no +47-22-80-61-81 REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika ZyXEL Communications A/S...
  • Page 9 Poland ZyXEL Russia Ostrovityanova 37a Str. Moscow, 117279 Russia ZyXEL Communications Arte, 21 5ª planta 28033 Madrid Spain ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg Sweden ZyXEL Ukraine 13, Pimonenko Str. Kiev, 04050 Ukraine ZyXEL Communications UK Ltd.,11 The Courtyard,...
  • Page 10 G-470 User’s Guide Customer Support...
  • Page 11: Table Of Contents

    Copyright ... 3 Certifications ... 4 ZyXEL Limited Warranty... 6 Safety Warnings ... 7 Customer Support... 8 Table of Contents ... 11 List of Figures ... 15 List of Tables ... 17 Preface ... 19 Chapter 1 Getting Started ... 21 1.1 About Your ZyXEL Device ...21 1.1.1 ZyXEL Device Hardware Installation ...22 1.1.2 Application Overview ...23...
  • Page 12 G-470 User’s Guide 3.2.1.5 WPA2 ...34 Chapter 4 Introducing the Web Configurator... 35 4.1 Web Configurator Overview ...35 4.1.1 Setting Up Your Computer's IP Address ...35 4.1.1.1 Windows 2000/NT/XP ...36 4.2 Accessing the Web Configurator ...39 4.2.1 The Status Screen ...39 4.3 Navigating the Web Configurator ...41 4.3.1 Change Your Password ...41 4.3.2 Statistics ...42...
  • Page 13 6.3.1 The AP Survey Window ...60 6.4 Wireless Security Overview ...61 6.5 Configuring Wireless Security ...61 6.5.1 Wireless Security: Disable ...62 6.5.2 Wireless Security: WEP ...62 6.5.3 Wireless Security: WPA(2)-PSK ...64 6.5.4 Wireless Security: WPA(2) ...64 6.5.5 Wireless Security: IEEE 802.1x ...66 Chapter 7 Management Screens ...
  • Page 14 G-470 User’s Guide Table of Contents...
  • Page 15: List Of Figures

    G-470 User’s Guide List of Figures Figure 1 Device application: Basic ... 21 Figure 2 Device Application: Home Network ... 21 Figure 3 The ZyXEL Device: Front Panel ... 22 Figure 4 The ZyXEL Device: Rear Panel ... 23 Figure 5 Application: Infrastructure ... 24 Figure 6 Roaming Example ...
  • Page 16 G-470 User’s Guide Figure 39 Management: Reset Warning Message ... 71 Figure 40 Management: F/W Upload ... 72 Figure 41 Management: Firmware Upgrading Screen ... 73 Figure 42 Network Temporarily Disconnected ... 73 Figure 43 Management: Firmware Upload Error ... 73 Figure 44 Pop-up Blocker ...
  • Page 17: List Of Tables

    G-470 User’s Guide List of Tables Table 1 The ZyXEL Device: Front Panel Lights..23 Table 2 The ZyXEL Device: Rear Panel Connections ... 23 Table 3 Web Configurator: the Status screen ... 40 Table 4 Status: View Statistics ... 42 Table 5 Private IP Address Ranges ...
  • Page 18 G-470 User’s Guide List of Tables...
  • Page 19: Preface

    Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 20: Graphics Icons Key

    G-470 User’s Guide Graphics Icons Key Wireless Access Point Server Internet Cloud Computer Notebook Computer Modem Wireless Signal Printer Preface...
  • Page 21: Chapter 1 Getting Started

    This chapter introduces the ZyXEL Device and prepares you to use the Web Configurator. 1.1 About Your ZyXEL Device The G-470 is an IEEE 802.11g compliant wireless LAN Ethernet adapter. It acts as a bridge between your computer and a wireless network access point (AP) as in the following diagram, where A is your computer, B is the ZyXEL Device and C is the access point.
  • Page 22: Zyxel Device Hardware Installation

    G-470 User’s Guide The following lists the main features of your ZyXEL Device. See the product specifications in the appendix for detailed features. • Hardware An external antenna. Lights to indicate power, device status, LAN status, WLAN status and link quality. Easy, driver-free installation.
  • Page 23: Application Overview

    The following table describes the front panel of the ZyXEL Device. Table 1 The ZyXEL Device: Front Panel Lights. LIGHT STATUS POWER The light is on. The light is off. STATUS The light is off. The light is blinking orange. The light is on.
  • Page 24: Infrastructure

    G-470 User’s Guide 1.1.2.1 Infrastructure Infrastructure mode allows your ZyXEL Device to connect to a network via an access point (AP). Through the AP, you can access the Internet or the wired network behind the AP. Figure 5 Application: Infrastructure 1.1.2.2 Roaming In an infrastructure network, wireless stations are able to switch from one BSS to another as they move between the coverage areas.
  • Page 25: Figure 6 Roaming Example

    G-470 User’s Guide Figure 6 Roaming Example Chapter 1 Getting Started...
  • Page 26 G-470 User’s Guide Chapter 1 Getting Started...
  • Page 27: Chapter 2 Tutorial

    2.1 Connecting to an Access Point This example shows you how to connect your ZyXEL Device to an access point (AP) configured for WPA-PSK security, in order to access the Internet. In the following diagram, your computer is labeled A, the ZyXEL Device is labeled B and the access point is labeled C.
  • Page 28 G-470 User’s Guide 2 The Login screen appears. Enter admin as the username and 1234 as the password, then click Login. 3 In the Status screen, click on Wireless. Chapter 2 Tutorial...
  • Page 29 4 The Wireless Settings screen appears. Click AP Survey to search for available wireless access points. The Access Point List screen displays. The Security Mode entry shows that AP6 is using WPA-PSK security with TKIP data encryption. 5 Click on the AP6 entry. The AP Survey window closes, and the entry AP6 now appears in the Wireless Settings screen’s SSID field.
  • Page 30 G-470 User’s Guide The following message appears in the Status bar. 8 Next, click the Security tab. In the Security screen, select WPA-PSK from the Encryption Method menu. Select TKIP from the Data Encryption menu. Enter your PSK "ThisismyWPA-pre-sharedkey" in the Pre-Shared Key box and click Apply. The following message appears in the Status bar.
  • Page 31: Wireless Lan Network

    This chapter provides background information on wireless LAN networks. 3.1 Wireless LAN Overview The following figure provides an example of a wireless network with an AP. Figure 7 Example of a Wireless Network The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.
  • Page 32: Wireless Lan Security

    G-470 User’s Guide • Every device in the same wireless network must use security compatible with the AP or peer computer. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 3.2 Wireless LAN Security Wireless LAN security is vital to your network to protect wireless communications.
  • Page 33: Wep

    5 Additionally, Jenny uses her own private key to encrypt a message and Tim uses Jenny’s public key to decrypt the message. The certification authority uses its private key to sign certificates. Anyone can then use the certification authority’s public key to verify the certificates. 3.2.1.2 WEP 3.2.1.2.1 Data Encryption WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between...
  • Page 34: Ieee 802.1X

    G-470 User’s Guide 3.2.1.3 IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Authentication can be done using an external RADIUS server. 3.2.1.3.1 EAP Authentication EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE 802.1x transport mechanism in order to support multiple types of user authentication.
  • Page 35: Introducing The Web Configurator

    This chapter shows you how to configure the ZyXEL Device using the embedded web configurator. 4.1 Web Configurator Overview The embedded web configurator allows you to manage the ZyXEL Device from anywhere through a browser such as Microsoft Internet Explorer or Netscape Navigator. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions with JavaScript enabled.
  • Page 36: Windows 2000/Nt/Xp

    G-470 User’s Guide Figure 8 Wired Connection 192.168.1.15 Note: Skip this section if your computer's IP address is already between 192.168.1.12 and 192.168.1.254 with subnet mask 255.255.255.0. Your computer must have a network card and TCP/IP installed. TCP/IP should already be installed on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems.
  • Page 37: Figure 10 Network Connection

    Figure 10 Network Connection 4 Select Internet Protocol (TCP/IP) and then click Properties. Figure 11 Local Area Connection Properties 5 Select Use the following IP Address and fill in an IP address (between 192.168.1.12 and 192.168.1.254). • Type 255.255.255.0 as the Subnet mask. •...
  • Page 38: Figure 12 Internet Protocol Properties

    G-470 User’s Guide Figure 12 Internet Protocol Properties 6 Remove any previously installed gateways in the IP Settings tab and click OK to go back to the Internet Protocol TCP/IP Properties screen. Figure 13 Advanced TCP/IP Settings 7 Click OK to close the Internet Protocol (TCP/IP) Properties window. 8 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window.
  • Page 39: Accessing The Web Configurator

    4.2 Accessing the Web Configurator Follow the steps below to access the web configurator using a web browser. 1 Make sure your ZyXEL Device is properly connected and prepare your computer/ network to connect to the G-470. 2 Launch your web browser. 3 Type http://192.168.1.11 4 A login screen displays as shown.
  • Page 40: Figure 16 Web Configurator: The Status Screen

    G-470 User’s Guide Figure 16 Web Configurator: the Status screen submenus to configure the ZyXEL Device The following table describes the labels in this screen. Table 3 Web Configurator: the Status screen LINK/ICON Wizard About Logout Status System Wireless Wireless Settings Use this screen to check for available access points and Security Management Password...
  • Page 41: Navigating The Web Configurator

    LINK/ICON MAC Address Firmware Version This is the ZyNOS Firmware version and the date created. Wireless Settings SSID Channel Encryption Method IP Settings IP Address Subnet Mask Gateway IP Address Summary View Statistics Status Link Status Refresh Interval Refresh Now 4.3 Navigating the Web Configurator The following section summarizes how to navigate the web configurator from the Status screen.
  • Page 42: Statistics

    G-470 User’s Guide Figure 17 Web Configurator: Change Administrator Login Password Enter a new password between 1 and 19 characters, retype it to confirm and click Apply. Click on Reset to clear all fields. 4.3.2 Statistics Click View Statistics in the Status screen. This screen displays read-only information including port status and packet specific statistics.
  • Page 43: Configuring The Zyxel Device Using The Wizard

    Table 4 Status: View Statistics LABEL Bytes Wireless Unicast Packets Broadcast Packets Multicast Packets Total Packets Total Bytes System Up Time Poll Interval(s) Set Interval Stop 4.4 Configuring the ZyXEL Device Using the Wizard The wizard consists of a series of screens to help you configure your ZyXEL Device to access the wireless network.
  • Page 44: Wizard: Wireless Settings

    G-470 User’s Guide 3 Select Use fixed IP Address to give the device a static IP address. The IP address you configure here is used for management of the device (accessing the web configurator). 4 Enter a Subnet Mask appropriate to your network and the Gateway IP Address of the neighboring device, if you know it.
  • Page 45: Wizard: Security Settings

    Figure 20 Setup Wizard 2: Wireless Settings. Click Next to continue, or Back to return to the Basic Settings screen. 4.4.3 Wizard: Security Settings Use this screen to configure security for your wireless LAN connection. The screen varies depending on what you select in the Encryption Method field. Select Disable to have no wireless security configured, select WEP, or select WPA-PSK if your wireless AP supports WPA-PSK.
  • Page 46: Wep

    G-470 User’s Guide Figure 21 Setup Wizard 3: Disable 4.4.3.2 WEP 1 WEP (Wired Equivalent Privacy) encrypts data frames before transmitting them over the wireless network. Select 64-bit or 128-bit from the WEP Encryption drop-down list box and then follow the on-screen instructions to set up the WEP keys. 2 Choose an encryption level from the drop-down list.
  • Page 47: Wpa-Psk

    Figure 22 Wizard 3: WEP 4.4.3.3 WPA-PSK Select WPA-PSK only if your wireless AP supports it. Type a pre-shared key from 8 to 63 ASCII characters (including spaces and symbols). This field is case-sensitive. Chapter 4 Introducing the Web Configurator G-470 User’s Guide Use Passphrase to automatically generate...
  • Page 48: Wizard: Confirm Your Settings

    G-470 User’s Guide Figure 23 Wizard 3: WPA(2)-PSK 4.4.4 Wizard: Confirm Your Settings This read-only screen shows the status of the current settings. Use the summary table to check whether what you have configured is correct. Click Finish to complete the wizard configuration and save your settings.
  • Page 49: Using The Ap Survey Tool

    Figure 24 Wizard: Confirm Your Settings 4.5 Using the AP Survey tool To scan for available wireless access points in your network, click AP Survey in the Wireless screen. Wait for the scan process to complete. A screen displays showing the scan results. Click on an entry in the SSID column to select that device for the Basic Settings SSID field in your Wireless page.
  • Page 50: Using The Reset Button

    G-470 User’s Guide 4.6.1.1 Using the RESET Button Make sure the POWER light is steady on. 1 Press the RESET button for about 10 seconds, then release it and press the button in once. 2 If the POWER light begins to blink, the defaults have been restored and the ZyXEL Device restarts.
  • Page 51: Chapter 5 System Screen

    This chapter provides information on the System screen. 5.1 TCP/IP Parameters 5.1.1 IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet (for instance, only between your two branch offices) you can assign any IP addresses to the hosts without problems.
  • Page 52: System Settings

    G-470 User’s Guide If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use;...
  • Page 53 Table 6 System Settings LABEL DESCRIPTION Obtain IP Address Select this option to have your device use a dynamically assigned IP address from Automatically a router each time. Warning: If you select Obtain IP Address Automatically you will not be able to access the ZyXEL Device through the Web Configurator unless you have a router that assigns an IP address.
  • Page 54 G-470 User’s Guide Chapter 5 System Screen...
  • Page 55: Chapter 6 Wireless Screens

    This chapter discusses how to configure wireless settings and wireless security on your ZyXEL Device. 6.1 Wireless LAN Overview This section introduces the wireless LAN (WLAN) and some basic scenarios. 6.1.1 BSS (Infrastructure) A Basic Service Set (BSS), also called an Infrastructure network, exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point (AP).
  • Page 56: Ess

    G-470 User’s Guide 6.1.2 ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). An ESSID (ESS IDentification) uniquely identifies each ESS.
  • Page 57: Ssid

    6.2.2 SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. 6.2.3 RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other.
  • Page 58: Fragmentation Threshold

    G-470 User’s Guide If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Note: Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy.
  • Page 59: Table 7 Wireless: Wireless Settings

    The following table describes the labels in this screen. Table 7 Wireless: Wireless Settings LABEL DESCRIPTION SSID Your ZyXEL Device must have the same SSID as the AP you want to connect to. Enter a descriptive name (up to 32 printable characters) for the wireless LAN. Spaces are allowed.
  • Page 60: The Ap Survey Window

    G-470 User’s Guide Table 7 Wireless: Wireless Settings (continued) LABEL DESCRIPTION Preamble Type Preamble is used to signal that data is coming to the receiver. Select the preamble type that the AP uses. synchronization field in a packet. Short Preamble increases performance as less time sending preamble means more time for sending data.
  • Page 61: Wireless Security Overview

    Table 8 Wireless: the AP Survey Screen LABEL SSID Channel Signal Strength Security Mode Rescan 6.4 Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless stations, access points and the wired network. The figure below shows the possible wireless security levels on your ZyXEL Device. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange.
  • Page 62: Wireless Security: Disable

    G-470 User’s Guide 6.5.1 Wireless Security: Disable If you do not enable any wireless security on your device, your network is accessible to any wireless networking device that is within range. Figure 31 Wireless Security: Disable The following table describes the labels in this screen. Table 10 Wireless Security: Disable LABEL Encryption Method...
  • Page 63: Figure 32 Wireless Security: Wep

    Figure 32 Wireless Security: WEP The following table describes the labels in this screen. Table 11 Wireless Security: WEP LABEL Encryption Method Authentication Type Data Encryption Passphrase Generate Key 1 to Key 4 Apply Reset Chapter 6 Wireless Screens DESCRIPTION Select WEP if you want to configure WEP encryption parameters.
  • Page 64: Wireless Security: Wpa(2)-Psk

    G-470 User’s Guide 6.5.3 Wireless Security: WPA(2)-PSK Select WPA-PSK, WPA2-PSK or WPA-PSK & WPA2-PSK in the Encryption Method drop down list-box to display the next screen. Figure 33 Wireless Security: WPA(2)-PSK The following table describes the labels in this screen. Table 12 Wireless Security: WPA-PSK LABEL Encryption Method...
  • Page 65: Figure 34 Wireless Security: Wpa(2)

    Figure 34 Wireless Security: WPA(2) The following table describes the labels in this screen. Table 13 Wireless Security: WPA(2) LABEL Encryption Method EAP Type Data Encryption Trusted Root CA File (EAP-TLS, EAP-TTLS and EAP-PEAP only) Select File Login Name Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) User Certificate File...
  • Page 66: Wireless Security: Ieee 802.1X

    G-470 User’s Guide Table 13 Wireless Security: WPA(2) (continued) LABEL Select File Private Key Password (EAP-TLS only) Validate Server Certificate (EAP-TLS, EAP-TTLS and EAP-PEAP only) Apply Reset 6.5.5 Wireless Security: IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management.
  • Page 67: Figure 35 Wireless Security: 802.1X

    Figure 35 Wireless Security: 802.1x The following table describes the labels in this screen. Table 14 Wireless Security: 802.1x LABEL Encryption Method EAP Type Data Encryption (EAP-MD5 only) Trusted Root CA File (EAP-TLS, EAP-TTLS and EAP-PEAP only) Select File (EAP-TLS, EAP-TTLS and EAP-PEAP only) Chapter 6 Wireless Screens DESCRIPTION...
  • Page 68 G-470 User’s Guide Table 14 Wireless Security: 802.1x LABEL Login Name Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) User Certificate File (EAP-TLS only) Select File (EAP-TLS only) Private Key Password (EAP-TLS only) Validate Server Certificate (EAP-TLS, EAP-TTLS and EAP-PEAP only) Passphrase (EAP-MD5 only) Generate (EAP-MD5 only)
  • Page 69: Chapter 7 Management Screens

    This chapter describes the Management screens. 7.1 Management Overview Use these management screens to change the password, back up or restore the configuration files and upgrade your ZyXEL Device’s firmware. 7.2 Password To change your device's password (recommended), click Management. The screen appears as shown.
  • Page 70: Configuration File

    G-470 User’s Guide Table 15 Management: Password (continued) LABEL DESCRIPTION New Password Type your new system password (up to 19 printable characters). Spaces are not allowed. As you type a password, the screen displays an asterisk (*) for each character you type.
  • Page 71: Backup Configuration

    7.3.1 Backup Configuration Backup configuration allows you to back up (save) the device's current configuration to a file on your computer. Once your device is configured and functioning properly, it is strongly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
  • Page 72: F/W Upload Screen

    G-470 User’s Guide You can also press the RESET button on the rear panel to reset the factory defaults of your device. Refer to Section 4.6.1 on page 49 7.4 F/W Upload Screen Find firmware at www.zyxel.com .rmt extension, for example, "zyxel.rmt". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes.
  • Page 73: Figure 41 Management: Firmware Upgrading Screen

    G-470 User’s Guide Figure 41 Management: Firmware Upgrading Screen The device automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 42 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen.
  • Page 74 G-470 User’s Guide Chapter 7 Management Screens...
  • Page 75: Chapter 8 Troubleshooting

    This chapter covers potential problems and possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. 8.1 Problems Starting Up the ZyXEL Device Table 18 Troubleshooting the Start-Up of Your ZyXEL Device PROBLEM CORRECTIVE ACTION None of the LEDs...
  • Page 76: Problem With The Wireless Link Quality

    G-470 User’s Guide 8.3 Problem with the Wireless Link Quality Table 20 Troubleshooting Link Quality PROBLEM CORRECTIVE ACTION The link quality Search and connect to another AP with a better link quality using the Site Survey and/or signal screen. strength is poor all Move your computer closer to the AP or the peer computer(s) within the the time.
  • Page 77: Problems With The Ethernet Interface

    8.5 Problems with the Ethernet Interface Table 22 Troubleshooting the Ethernet Interface PROBLEM I cannot access the ZyXEL Device from the LAN. I cannot ping any computer on the LAN. I cannot access the web configurator. Chapter 8 Troubleshooting CORRECTIVE ACTION If the ETHN LED on the front panel is off, check the Ethernet cable connection between your ZyXEL Device and the Ethernet device connected to the ETHERNET port.
  • Page 78: Pop-Up Windows, Javascripts And Java Permissions

    G-470 User’s Guide 8.5.1 Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 79: Figure 45 Internet Options

    Figure 45 Internet Options 3 Click Apply to save this setting. 8.5.1.1.2 Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen.
  • Page 80: Figure 46 Internet Options: Settings

    G-470 User’s Guide Figure 46 Internet Options: Settings 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.11. 4 Click Add to move the IP address to the list of Allowed sites. Chapter 8 Troubleshooting...
  • Page 81: Javascripts

    Figure 47 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. 8.5.1.2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab.
  • Page 82: Figure 48 Internet Options: Custom Level

    G-470 User’s Guide Figure 48 Internet Options: Custom Level 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window.
  • Page 83: Java Permissions

    Figure 49 Security Settings - Java Scripting 8.5.1.3 Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
  • Page 84: Figure 50 Security Settings - Java

    G-470 User’s Guide Figure 50 Security Settings - Java 8.5.1.3.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Chapter 8 Troubleshooting...
  • Page 85: Testing The Connection To The Zyxel Device

    Figure 51 Java (Sun) 8.6 Testing the Connection to the ZyXEL Device 1 Click Start, (All) Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type “ping” followed by a space and the IP address of the ZyXEL Device (192.168.1.11 is the default). 3 Press ENTER.
  • Page 86 G-470 User’s Guide Chapter 8 Troubleshooting...
  • Page 87: Product Specifications

    Table 23 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name Standards Network Architectures Security Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Dimensions RADIO SPECIFICATIONS Media Access Protocol Frequency Data Rate Modulation Peak Output Power Rx Sensitivity SOFTWARE SPECIFICATIONS Device Drivers Roaming Appendix A...
  • Page 88 G-470 User’s Guide Appendix A...
  • Page 89: Appendix B Wireless Security

    Types of EAP Authentication This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. Your wireless LAN device may not support all authentication types.
  • Page 90: Table 24 Comparison Of Eap Authentication Types

    G-470 User’s Guide EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection. Client authentication is then done by sending username and password through the secure connection, thus client identity is protected.
  • Page 91 Table 24 Comparison of EAP Authentication Types Deployment Difficulty Client Identity Protection WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication.
  • Page 92: User Authentication

    G-470 User’s Guide The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped.
  • Page 93: Figure 53 Wpa-Psk Authentication

    Figure 53 WPA-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server.
  • Page 94: Table 25 Wireless Security Relational Matrix

    G-470 User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 25 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY...
  • Page 95: Setting Up Your Computer's Ip Address

    Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
  • Page 96: Figure 55 Windows 95/98/Me: Network: Configuration

    G-470 User’s Guide Figure 55 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 97: Figure 56 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
  • Page 98: Figure 57 Windows 95/98/Me: Tcp/Ip Properties: Dns Configuration

    G-470 User’s Guide Figure 57 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • • 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Restart your computer when prompted.
  • Page 99: Figure 58 Windows Xp: Start Menu

    Figure 58 Windows XP: Start Menu 2 For Windows XP, click Network Connections. For Windows 2000/NT, click Network and Dial-up Connections. Figure 59 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Appendix C G-470 User’s Guide...
  • Page 100: Figure 60 Windows Xp: Control Panel: Network Connections: Properties

    G-470 User’s Guide Figure 60 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. Figure 61 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 101: Figure 62 Windows Xp: Advanced Tcp/Ip Settings

    • Figure 62 Windows XP: Advanced TCP/IP Settings 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 102: Figure 63 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    G-470 User’s Guide • • Figure 63 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window. 10Restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
  • Page 103: Figure 64 Macintosh Os 8/9: Apple Menu

    Figure 64 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 65 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: Appendix C G-470 User’s Guide...
  • Page 104: Figure 66 Macintosh Os X: Apple Menu

    G-470 User’s Guide • • • • 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration. 7 Restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the TCP/IP Control Panel window. Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window.
  • Page 105: Figure 67 Macintosh Os X: Network

    Figure 67 Macintosh OS X: Network 4 For statically assigned settings, do the following: • • • • 5 Click Apply Now and close the window. 6 Restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window. Appendix C From the Configure box, select Manually.
  • Page 106 G-470 User’s Guide Appendix C...
  • Page 107: Index

    Access point 21, 24, 31 Access point. See also AP. Address assignment Advanced Encryption Standard (AES) Antenna connector power output AP survey AP. See also access point. Applications Authentication Authentication method auto open system shared key Auto authentication Backup Basic Service Set Bridge Browser Cache...
  • Page 108 G-470 User’s Guide Firmware 22, 72 upgrade Fragmentation Threshold 58, 60 Frequency 31, 56, 87 Front panel Getting started Graphics icons key Hardware installation 19, 22 Hardware connection Home network Humidity IEEE 802.11b IEEE 802.11b/g IEEE 802.11g IEEE 802.11i IEEE 802.1x 32, 34 Infrastructure 24, 55...
  • Page 109 Pop-up windows 35, 78 Power Power light Power over Ethernet (PoE) Power socket Preamble Preface Pre-shared key Private IP Address Private key Public key Public-private key pairs Pure B mode Pure G mode Quick Start Guide 19, 22 Radio Radio enable Radio interference Radio specifications RADIUS...
  • Page 110 G-470 User’s Guide Warranty Web Configurator 21, 35 accessing Web configurator default key manual setup passphrase WEP (Wired Equivalent Privacy) WEP key automatic manual Wi-Fi Protected Access 34, 91 Wired Equivalent Privacy Wired network Wireless client Wireless LAN basics introduction security Wireless LAN (WLAN) Wireless mode...

Table of Contents