ZyXEL Communications ZyAIR G-5100 Support Notes
Hide thumbs Also See for ZyAIR G-5100:

Advertisement

Quick Links

ZyAIR G-5100
V3.50(HV.0) | 2005.6.30
FAQ
-
ZyNOS FAQ
-
Product FAQ
-
Wireless FAQ
Application Notes
-Infrastructure Mode
-Wireless MAC Address Filtering
-WEP Configurations
-Roaming
-Site Survey
-Repeater mode
-AP + Bridge mode
-802.1x/WPA
CI Command List
Trouble Shooting
Support Notes

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ZyAIR G-5100

  • Page 1 Support Notes ZyAIR G-5100 V3.50(HV.0) | 2005.6.30 ZyNOS FAQ Product FAQ Wireless FAQ Application Notes -Infrastructure Mode -Wireless MAC Address Filtering -WEP Configurations -Roaming -Site Survey -Repeater mode -AP + Bridge mode -802.1x/WPA CI Command List Trouble Shooting...
  • Page 2: Zynos Faq

    ZyNOS FAQ What is ZyNOS? How do I access the embeded web configurator? What is the default username and password? Moreover, how do I change it? How do I upload the ZyNOS firmware code via embedded web configurator? How do I upgrade/backup the ZyNOS firmware by using TFTP client program via LAN? How do I upgrade/backup the ZyNOS firmware by using FTP client program via LAN?
  • Page 3: How Do I Upload The Zynos Firmware Code Via Embeded Web Configurator

    IP address of the ZyAIR G-5100 in users web browser. To access the ZyAIR G-5100's web configurator via web browser, the configuration PC must be in the same IP segment of ZyAIR G-5100 and ZyAIR G-5100 must be reachable to the configuration station.
  • Page 4: How Do I Upload Or Backup Romfile Via Web Configurator

    To upgrade firmware, use TFTP client program to put firmware in file 'ras' in the ZyAIR G-5100. After data transfer is finished, the Prestige will program the upgraded firmware into FLASH ROM and reboot itself. d. To backup your firmware, use the TFTP client program to get file 'ras' from the ZyAIR G-5100.
  • Page 5 To backup the configurations, use TFTP client program to get file 'rom- 0' from the Prestige. d. To restore the configurations, use the TFTP client program to put your configuration in file ROM-0 in the ZyAIR G-5100. 9. How do I backup/restore configurations by using FTP client program via LAN? a.
  • Page 6: Product Faq

    What is the coverage range of ZyAIR G-5100? What is the range coverage of B-100/B-200/B-300/B-400? What can I do if I lost the password for my ZyAIR G-5100 and can't access it's configuration any more? How do I used the reset button, more over what field of parameter will...
  • Page 7 2 device it can carry all the upper layer protocol in other words it is transparent to all applications. You can use ZyAIR G-5100 to add wireless capability to your existing wired network. Due to ZyAIR G-5100 is an outdoor access point, it is suitable to be...
  • Page 8: How Do I Used The Reset Button? More Over What Field Of Parameter Will Be Reset By Reset Button

    RF interference, etc in the environment. 5. What can I do if I lost the password for my ZyAIR G-5100 and can't access it's configuration any more? If you have lost the password there is no way to gain access to the device except to reset the device by pressing the reset button located by the power jack.
  • Page 9 Windows task bar and restart it again. Now you can use the supplied utility to configure your B-100. 8. What is the default user name and password to login the ZyAIR G-5100 via the browser? To restrict only the adminstrator can configure the router, there is a login procedure prompted for asking User Name and Password.
  • Page 10 3. What are the connector type required on the replacement antenna? ZyAIR G-5100 are equip with Reverse Polarity SMA jack, so it will work with any 2.4Ghz wireless antenna with Reverse Polarity SMA Plug. 4. What is the RF power output of ZyAIR G-5100?
  • Page 11 WEP. 7. What authentication type does ZyAIR G-5100 support? ZyAIR G-5100 support null authentication when WEP is disabled as specified by IEEE 802.11b/802.11g standard, and when WEP is enabled it is using shared key authentication and data are encrypted at the same time.
  • Page 12 9. I have problem associated with ZyAIR G-5100 with Symbol wireless PCMCIA card when WEP is enabled, why? This is because when WEP is enabled in ZyAIR G-5100 it is authenticating using Shared key authentication. Symbol PcMCIA client do not support Shared key Authentication.
  • Page 13: Meetinghouse Aegis Client

    1. Funk Software Odyssey client. Note: 1. XP only support MD5/CHAP and TLS before SP1 patch, after upgrade SP1, XP support only PEAT authentication. 2. When using external server ZyAIR G-5100 only act as a pass-through thus no extra setting are required.
  • Page 14: Wireless Faq

    Wireless FAQ General FAQ What is a Wireless LAN ? What are the main advantages of Wireless LANs ? What are the disadvantages of Wireless LANs ? Where can you find wireless 802.11 networks ? What is an Access Point ? What is IEEE 802.11 ? What is IEEE 802.11b ? How fast is 802.11b ?
  • Page 15: Security Faq

    What is Frequency-hopping Spread Spectrum Technology – (FHSS) ? Do I need the same kind of antenna on both sides of a link ? Why the 2.4 Ghz Frequency range ? What is Server Set ID (SSID) ? What is an ESSID ? Security FAQ How do I secure the data across an Access Point's radio link? What is WEP ?
  • Page 16: Installation Flexibility

    54Mbps, although in practice data throughput is half of this. Wireless LANs can be formed simply by equipping PC's with wireless NICs. If connectivity to a wired LAN is required an Access Point (AP) is used as a bridging device. AP's are typically located close to the centre of the wireless client population.
  • Page 17 Wireless LAN card is higher than hubs and CAT 5 cables. 4. Where can you find wireless 802.11 networks ? Airports, hotels, and even coffee shops like Starbucks are deploying 802.11 networks so people can wirelessly browse the Internet with their laptops. As these types of networks increase, this will create additional security risk for the remote user if not properly protected.
  • Page 18 band and allows transmission rates of up to 54Mbps. 802.11a uses OFDM (orthogonal frequency division multiplexing) as opposed to FHSS or DSSS. Higher data rates are possible by combining channels. Due to higher frequency, range is less than lower frequency systems (i.e., 802.11b and 802.11g) and can increase the cost of the overall solution because a greater number of access points may be required.
  • Page 19: What Are Potential Factors That May Causes Interference Among Wlan Products

    14. Does the 802.11 interfere with Bluetooth devices ? Any time devices are operated in the same frequency band, there is the potential for interference. Both the 802.11b and Bluetooth devices occupy the same2.4-to-2.483-GHz unlicensed frequency range-the same band. But a Bluetooth device would not interfere with other 802.11 devices much more than another 802.11 device would interefere.
  • Page 20: What Is Direct-Sequence Spread Spectrum Technology - (Dsss)

    coverage in metropolitan areas and along traffic corridors. WWANs are owned by a service provider or carrier. Data rates are low and charges are based on usage. Specialized applications are characteristically designed around short, burst messaging. Advanced FAQ 1. What is Ad Hoc mode ? A wireless network consists of a number of stations without access points.
  • Page 21 narrowband noise and simple jamming. Both transmitter and receiver must have their hopping sequences synchronized to create the effect of a single "logical channel". To an unsynchronised receivers an FHSS transmission appears to be short-duration impulse noise. 802.11 may use FHSS or DSSS. 6.
  • Page 22: What Is The Difference Between 40-Bit And 64-Bit Wep

    sent across a radio link. 2. What is WEP ? Wired Equivalent Privacy. WEP is a security mechanism defined within the 802.11 standard and designed to make the security of the wireless medium equal to that of a cable (wire). WEP data encryption was designed to prevent access to the network by "intruders"...
  • Page 23: What Are Insertion Attacks

    will find the SSID in the broadcast beacon packets. Turning off the broadcast of SSID in the beacon message (a common practice) does not prevent getting the SSID; since the SSID is sent in the clear in the probe message when a client associates to an AP, a sniffer just has to wait for a valid user to associate to the network to see the SSID.
  • Page 24 and auto ? force-authorized—disables 802.1X and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1X-based authentication of the client. force-unauthorized—causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
  • Page 25 802.11b/Wi-Fi Access Point and communicate with other clients in infrastructure mode through that access point. Configuration Wireless Access Point to Infrastructure mode using SMT. To configure Infrastructure mode of your ZyAIR G-5100 wireless AP please follow the steps below. 1. From the SMT main menu, enter 3 to display Menu 3 – LAN Setup.
  • Page 26 3. Configure ESSID, Channel ID, WEP, Default Key and Keys as you desire. Configuration Wireless Access Point to Infrastructure mode using Web configurator. To configure Infrastructure mode of your ZyAIR G-5100 wireless AP please follow the steps below. 1. From the web configurator main menu, click advanced->wireless to display –Wireless LAN.
  • Page 27 3. Select Infrastructure from the operation mode pull down menu, fill in an SSID or leave it as any if you wish to connect to any AP than press Apply Change to take effect. 4. Click on Site Survey tab, and press search all the available AP will be listed. 5.
  • Page 28 6. After the client have associated with the selected AP. The linked AP's channel, current linkup rate, SSID, link quality, and signal strength will show on the Link Info page. You now successfully associate with the selected AP with Infrastructure Mode.
  • Page 29 MAC Filter MAC Filter Overview ● ZyXEL MAC Filter Implementation ● Configure the WLAN MAC Filter ● 1. MAC Filter Overview Users can use MAC Filter as a method to restrict unauthorized stations from accessing the APs. ZyXEL's APs provide the capability for checking MAC address of the station before allowing it to connect to the network.
  • Page 30 Key Settings: Option Descriptions Allow or block association from MAC addresses contained in this list. If Allow Association is selected in this field, Filter Action hosts with MAC addresses configured in this list will be allowed to associate with AP. If Deny Association is selected in this field, hosts with MAC addresses configured in this list will be blocked.
  • Page 31 Setup WEP Wired Equivalent Privacy) Introduction Setting up the Access Point Setting up the Station Introduction The 802.11 standard describes the communication that occurs in wireless LANs. The Wired Equivalent Privacy (WEP) algorithm is used to protect wireless communication from eavesdropping, because wireless transmissions are easier to intercept than transmissions over wired networks, and wireless is a shared medium, everything that is transmitted or received over a wireless network can be intercepted.
  • Page 32 Most access points and clients have the ability to hold up to 4 WEP keys simultaneously. You need to specify one of the 4 keys as default Key for data encryption. To set up the Access Point, you will need to set the one of the following parameters: 64-bit WEP key (secret key) with 5 characters 64-bit WEP key (secret key) with 10 hexadecimal digits 128-bit WEP key (secret key) with 13 characters...
  • Page 33 Key1= 2e3f4w345ytre Key2= 5y7jse8r4i038 128-bit WEP with 13 characters Key3= 24fg70okx3fr7 Key4= 98jui2wss35u4 Key1= 0x112233445566778899AABBCDEF 128-bit WEP with 26 hexadecimal digits Key2= 0x2233445566778899AABBCCDDEE ('0-9', 'A-F') Key3= 0x3344556677889900AABBCCDDFF Key4= 0x44556677889900AABBCCDDEEFF Select one of the WEP key as default Key to encrypt wireless data transmission. The receiver will use the corresponding key to decrypt the data.
  • Page 34 Key settings Select one WEP key as default key to encrypt wireless data transmission. Setting up the Station 1. Double click on the utility icon in your windows task bar or right click the utility icon then select 'Show Config Utility'. The utility will pop up on your windows screen.
  • Page 35 Key settings The WEP Encryption type of station has to equal to the access point. Check 'ASCII' field for characters WEP key or uncheck 'ASCII' field for Hexadecimal digits WEP key. Hexadecimal digits don't need to preceded by '0x'. For example, 64-bits with characters WEP key : Key1= loads Key2= oueww...
  • Page 36 Configure Access Point for Roaming Introduction ● Configure Access Point 1 for roaming using SMT ● Configure Access Point 2 for roaming using SMT ● Configure Access Point 1 for roaming using Web configurator ● Configure Access Point 2 for roaming using Web configurator ●...
  • Page 37 Menu 3.5.2 - Roaming Configuration Active= Yes Port #= 3517 Press ENTER to Confirm or ESC to Cancel:     Configuration AP2 for Roaming using SMT ● To Enable the roaming feature if you have two or more ZyAIRs on the same subnet. Follow the steps below to allow roaming on your ZyAIR. 1.
  • Page 38 4. All access points must use the same port number to relay roaming information. Configuration AP1 for Roaming using Web configurator ● To Enable the roaming feature if you have two or more ZyAIRs on the same subnet. Follow the steps below to allow roaming on your ZyAIR. 1.
  • Page 39 Port # Enter the port number to communicate roaming information between access points. The port number must be the same on all access points. The default is 3517. Make sure this port is not used by other services. When you have completed this menu, press [Apply] on the bottom of the page for the configuration to take effect. 4.
  • Page 40: Site Survey

    Site Survey Site survey introduction Preparation Survey on site Introduction What is Site Survey? An RF site survey is a MAP to RF contour of RF coverage in a particular facility. With wireless system it is very difficult to predict the propagation of radio waves and detect the presence of interfering signals. Walls, doors, elevator shafts, and other obstacles offer different degree of attenuation.
  • Page 41 4. It's always a good idea to start with putting the access point at the corner of the room and walk away from the access point in a systematic manner. Record down the changes at point where transfer rate drop and the link quality and signal strength information on the diagram as you go alone.
  • Page 42 5. When you reach the farthest point of connection mark the spot. Now you move the access point to this new spot as have already determine the farthest point of the access point installation spot if wireless service is required from corner of the room.
  • Page 43 Note: If there are more than one access point is needed be sure to make the adjacent access point service area over lap one another. So the wireless station are able to roam. For more information please refer to roaming at...
  • Page 44 The ZyAIR G-5100 can function as wireless network bridge/repeater. You need to know the MAC address of the peer device, which also must be in bridge/repeater mode. The repeater mode is the bridge mode without the Ethernet connection. When the ZyAIR G-5100 is in the bridge/repeater mode, you need to enable STP to prevent bridge loops.
  • Page 45 Configuration for Wireless Station 2 1. Click Advanced and Wireless. 2. Select Bridge/Repeater in the Operation Mode drop-down list box to display the screen as down. 3. Type the MAC address of peer device in the Remote Bridge MAC Address field, that is, six hexadecimal character pairs. 4.
  • Page 46 Configuration for Wireless Station 3 1. Click Advanced and Wireless. 2. Select Bridge/Repeater in the Operation Mode drop-down list box to display the screen as down. 3. Type the MAC address of peer device in the Remote Bridge MAC Address field, that is, six hexadecimal character pairs. 4.
  • Page 48 Note: When the ZyAIR G-5100 is in AP+Bridge mode, the traffic between ZyAIRs(WDS) is not encrypted. The security settings on the ZyAIR refer to the traffic between the wireless station and the ZyAIR.
  • Page 49 Configuration for Wireless Station B 1. Click Advanced and Wireless. 2. Select AP+Bridge in the Operation Mode drop-down list box to display the screen as down. 3. Type a name to identify the ZyAIR in the wireless LAN(up to 32 characters) as the ESSID. 4.
  • Page 50 5. Type the MAC address of peer device in the Remote Bridge MAC Address field, that is, six hexadecimal character pairs. 6. Click Apply to finish.
  • Page 51 Configure 802.1x and WPA What is the WPA Functionality? Configuration for Access Point Configuration for your PC Introduction What is WPA Functionality? Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft. Key differences between WAP and WEP are user authentication and improved data encryption WAP applies IEEE 802.1x Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database.
  • Page 52 Configuration for your PC 1. Double click on your wireless utility icon(here is the Centrion on Windows XP) in your windows task bar the utility will pop up on your windows screen. 2. Select the wireless card that you want to configure. 3.
  • Page 53 6. Type the Profile Name and Network Name (SSID) in the field. 7. Click Next button. 8. Select WPA-PSK from the Network Authentication field. 9. Select TKIP from the Data Encryption field. 10. Type the Pre Share Key (8-63 character) in the Pass phrase field. 11.
  • Page 54 12. After you finished the profile settings, choose the profile you configured. Then, click Connect button to associate with the Access Point. 13. Click the General option, we will see the following information, that means the PC associated and authenticated with AP successfully.
  • Page 56 CI Command List Command Class List Table System Related Command Exit Command Ethernet Related Command Wireless LAN Related Command IP Related Command Bridge Related Command 802.1x Related Command System Related Command Home Command Description adjtime retrive date and time from Internet callhist display display call history...
  • Page 57 disp display log error online [on|off] turn on/off error log online display load <entry no.> load remote node information disp <entry no.>(0:working buffer) display remote node information <none|sua|full_feature> config remote node nat nailup <no|yes> config remote node nailup save [entry no.] save remote node information stdio [second]...
  • Page 58 display display CPU utilization Exit Command Home Command Description exit exit smt menu Ethernet Related Command Home Command Description ether config display LAN configuration information driver disp <name> display ether driver counters ioctl <ch_name> Useless in this stage. status <ch_name> see LAN status version see ethernet device type...
  • Page 59 essid [ess id] set ESS ID scan scan wireless channels version display WLAN version information wlan1 [on|off] set on/off wlan active association display association list chid [channel id] set channel diagnose self-diagnostics essid set ESS ID [ess id] scan scan wireless channels version display WLAN version information IP Related Command...
  • Page 60 discovery <iface> [on|off] set icmp router discovery flag ifconfig [iface] [ipaddr] [broadcast <addr> |mtu configure network interface <value>|dynamic] ping <hostid> ping remote host route status [if] display routing table <dest_addr|default>[/<bits>] <gateway> add route [<metric>] addiface <dest_addr|default>[/<bits>] <gateway> add an entry to the routing table to iface [<metric>] addprivate <dest_addr|default>[/<bits>] <gateway>...
  • Page 61 clear clear bridge route counter stat related to bridge packet statistic table disp display bridge route packet counter clear clear bridge route packet counter 802.1x Related Command Home Command Description 8021x authentication Show show current radius authentication server configuration radius accounting Show show current radius accounting server configuration...
  • Page 62: Wireless Troubleshooting

    Wireless Troubleshooting Is it a hardware problem ● How can I check to be sure if I am interfered or not ● If I've confirmed it is an interference problem. What should I do ● What should I do if I have low signal or high noise ●...
  • Page 63 interference decreases and the link quality improves. What should I do if I have low signal or high noise ? To improve the signal, check or get the antennas with reverse SMA type connectors. For noise problems, please shield or remove the interference. If the situation doesn't improve, please change radio channels.
  • Page 64 If you use WEP shared key to authenticate the wireless clients, you should check whether following configuration parameters on both AP and wireless clients match: WEP key values, WEP key sizes, WEP activation, and WEP transmit key parameters ●   Authentication with 802.1X: If 802.1X security is used in your network, you can troubleshoot the authentication through SMT Menu 24.3.1 - System Maintenance - Log and Trace.
  • Page 65 [test] [0:60:b3:69:3:37] [login fail] [rejected by RADIUS server] [test] [0:60:b3:69:3:37] [auth enticating ...] [no response from RADIUS server] [test] [0:60:b3:69:3:37] [logout] [user requested] Note: Some wireless clients (for example, Symbol PCMCIA client) support open authentication and WEP encryption for data traffic. To support these clients in your network, you need to select either 'Open System' or 'Auto' for authentication method when WEP is enable.
  • Page 66 2. Make sure the client is configured with exact IP setting or get a valid IP address from DHCP server. You can go to a DOS prompt and type: ipconfig and press Enter to verify this. 3. Ping the gateway in your network. A response other than Request timed out indicates a successful ping.

Table of Contents