Page 3
Settings and then click Control Panel. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. • The ZyXEL G-302 v3 802.11g Wireless PCI Adapter may be referred to as the G-302 v3 in this user’s guide.
Page 4
ZyXEL G-302 v3 User’s Guide Graphics Icons Key Access Point Computer Notebook Computer Server Internet Cloud Wireless Signal Preface...
Page 5
ZyXEL G-302 v3 User’s Guide Safety Warnings WARNING: For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
ZyXEL G-302 v3 User’s Guide Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
Page 9
ZyXEL G-302 v3 User’s Guide 注意 ! 依據 低功率電波輻射性電機管理辦法 第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用 者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。 第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現 有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。 前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France.
ZyXEL G-302 v3 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to five years from the date of purchase. During...
1.1 About Your G-302 v3 The G-302 v3 is an IEEE 802.11b/g compliant wireless LAN adapter. The following lists the main features of your G-302 v3. See the product specifications in the appendix for detailed features. • Automatic rate selection.
ZyXEL G-302 v3 User’s Guide 1.1.2.1 Infrastructure To connect to a network via an Access Point (AP), set the G-302 v3 network type to Infrastructure. Through the AP, you can access the Internet or the wired network behind the Figure 1 Application: Infrastructure 1.1.2.2 Ad-Hoc...
To configure your G-302 v3, use one of the following applications: • Wireless Zero Configuration (WZC) (recommended for Windows XP) • ZyXEL Utility (This guide shows you how to configure the G-302 v3 using the ZyXEL utility) • Odyssey Client Manager (not supplied) Refer to the Odyssey Client Manager documentation for more information.
Figure 5 ZyXEL Utility: System Tray Icon The color of the ZyXEL utility system tray icon indicates the status of the G-302 v3. Refer to the following table for details. Table 1 ZyXEL Utility: System Tray Icon...
The following sections show you how to associate with a network using the ZyXEL utility. You can either manually connect to a network or configure a profile to have the G-302 v3 automatically connect to a specific network. Otherwise, configure nothing and leave the G- 302 v3 to automatically scan for and connect to any other available network without security.
Figure 8 ZyXEL Utility: Security Settings 6 Verify that you have successfully connected to the selected network and check the network information in the Link Info screen. If the G-302 v3 is not connected to a network, the fields in this screen are blank.
Configure the wireless LAN security using the Profile Security Settings screen. If you do not enable any wireless security on your G-302 v3, the G-302 v3’s wireless communications are accessible to any wireless networking device that is in the coverage area.
WLAN adapter(s). • Enter the WEP keys manually. Your G-302 v3 allows you to configure up to four 64-bit or 128-bit WEP keys and only one key is used as the default key at any one time. 2.2.2 IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of...
ZyXEL G-302 v3 User’s Guide 2.2.3 WPA and WPA2 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication.
ZyXEL G-302 v3 User’s Guide 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols). 2 The AP checks each client's password and (only) allows it to join the network if it matches its password.
All IEEE 802.11b/g compliant wireless adapters support long preamble, but not all support short preamble. Select Auto to have the G-302 v3 automatically use short preamble when access point/ wireless stations support it, otherwise the G-302 v3 uses long preamble.
(SSID) field displays the name of the wireless device to which the G-302 v3 is associated. AP MAC Address This field displays the MAC address of the wireless device to which the G-302 v3 is associated. Network Type This field displays the network type (Infrastructure or Ad Hoc) of the wireless network.
ZyXEL G-302 v3 User’s Guide Table 3 Link Info (continued) LABEL DESCRIPTION Transmission Rate This field displays the current transmission rate of the G-302 v3 in megabits per second (Mbps). Security This field displays whether data encryption is activated (WEP, WPA, WPA2, WPA- PSK or WPA2-PSK) or inactive (DISABLE).
ZyXEL G-302 v3 User’s Guide The following table describes the labels in this screen. Table 4 Link Info: Trend Chart LABEL DESCRIPTION Transmit This field displays the current data transmission rate in kilobits per second (Kbps). Receive This field displays the current data receiving rate in kilobits per second (Kbps).
Link Info screen. 3.2.2 Security Settings When you configure the G-302 v3 to connect to a network with wireless security activated and the security settings are disabled on the G-302 v3, the screen varies according to the encryption method used by the selected network.
Pass Phrase Enter a passphrase of up to 63 case-sensitive printable characters. As you enter the passphrase, the G-302 v3 automatically generates four different WEP keys and displays it in the key field below. Refer to Section 2.2.1 on page 30 for more information.
Click Exit to return to the Site Survey screen without saving. 3.2.2.2 WPA/WPA2 Note: You can use WPA and WPA2 with the G-302 v3 only on Microsoft Windows XP or Windows 2000. At the time of writing this function is not yet available on Windows Vista.
Exit Click Exit to return to the Site Survey screen without saving. 3.2.2.3 WPA-PSK/WPA2-PSK Note: You can use WPA and WPA2 with the G-302 v3 only in Microsoft Windows XP, Windows Vista and Windows 2000. Figure 17 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen.
G-302 v3 will be disconnected. If you do not configure and activate a profile, each time you start the G-302 v3, the G-302 v3 uses the default profile to connect to any available network with security disabled.
ZyXEL G-302 v3 User’s Guide Click the Profile tab in the ZyXEL utility to display the Profile screen as shown next. The profile function allows you to save the wireless network settings in this screen, or use one of the pre-configured network profiles.
Select an available wireless device in the Scan Info table and click Select, or enter the SSID of the wireless device to which you want to associate in this field manually. Otherwise, enter Any to have the G-302 v3 associate to or roam between any infrastructure wireless networks.
Select an available wireless device in the table and click Select to add it to this profile. Whenever you activate this profile, the G-302 v3 associates to the selected wireless network only. 2 If you select the Infrastructure network type in the previous screen, skip to step 3. If you select the Ad-Hoc network type in the previous screen, a screen displays as follows.
Ad-Hoc network type in the first screen, you can only use WEP encryption method. Otherwise, select DISABLE to allow the G-302 v3 to communicate with the access points or other peer wireless computers without any data encryption and skip to step 6.
ZyXEL G-302 v3 User’s Guide Figure 23 Profile: Security Setting 5 This read-only screen shows a summary of the new profile settings. Verify that the settings are correct. Click Save to save and go to the next screen. Click Back to return to the previous screen.
LABEL DESCRIPTION Adapter Setting Wireless Mode Select 802.11b Only to have the G-302 v3 connect to an IEEE 802.11b wireless device. Select 802.11b/g Mixed to have the G-302 v3 connect to either an IEEE 802.11g or IEEE 802.11b wireless device Preamble Mode Select a preamble type.
Maintenance This chapter describes how to uninstall or upgrade the ZyXEL utility. 4.1 The About Screen The About screen displays related version numbers of the G-302 v3. To display the screen as shown below, click the about ( ) button.
5 Double-click on the setup program for the new utility to start the ZyXEL utility installation. 6 Insert the G-302 v3 and check the version numbers in the About screen to make sure the new utility is installed properly. Chapter 4 Maintenance...
Use the Device Manager to check for possible hardware conflicts. Click Start, LAN utility Settings, Control Panel, System, Hardware and Device Manager. Verify the status of the G-302 v3 under Network Adapter. (Steps may vary depending on the version of Windows). Install the G-302 v3 in another computer.
Make sure that the AP and the associated computers are turned on and computer with the working properly. G-302 v3 installed • Make sure the G-302 v3 computer and the associated AP use the same SSID. cannot • Change the AP and the associated wireless clients to use another radio communicate with channel if interference is high.
ZyXEL G-302 v3 User’s Guide Figure 30 WLAN AutoConfig: Services and Applications 2 On the Computer Management screen, click Services and Applications on the left side to expand the menu. 3 Click on Services. This will display the Windows Vista services in the middle part of the screen.
ZyXEL G-302 v3 User’s Guide Figure 32 WLAN AutoConfig: More Actions 5 You may also wish to start WLAN AutoConfig automatically when you start your computer. You can do this by setting the Startup Type as Automatic. On the right side of the screen click More Actions under WLAN AutoConfig and click Properties.
ZyXEL G-302 v3 User’s Guide P P E N D I X Product Specifications Table 18 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name ZyXEL G-302 v3 802.11g Wireless PCI Adapter Interface 3.3V 32-bit PCI V2.2 Standards IEEE 802.11b IEEE 802.11g...
ZyXEL G-302 v3 User’s Guide P P E N D I X Management with Wireless Zero Configuration This appendix shows you how to manage your ZyXEL wireless LAN adapter using the Windows XP wireless zero configuration tool. Be sure you have the Windows XP service pack 2 installed on your computer. Otherwise, you should at least have the Windows XP service pack 1 already on your computer and download the support patch for WPA from the Microsoft web site.
ZyXEL G-302 v3 User’s Guide Connecting to a Wireless Network 1 Double-click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Figure 35 Windows XP SP2: System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the ZyXEL wireless LAN adapter.
ZyXEL G-302 v3 User’s Guide Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the Wireless Network Connection Properties screen. Figure 37 Windows XP SP1: Wireless Network Connection Status 3 Windows XP SP2: Click Refresh network list to reload and search for available wireless devices within transmission range.
ZyXEL G-302 v3 User’s Guide The following table describes the icons in the wireless network list. Table 20 Windows XP SP2: Wireless Network Connection ICON DESCRIPTION This denotes that wireless security is activated for the wireless network. This denotes that this wireless network is your preferred network. Ordering your preferred networks is important because the ZyXEL wireless LAN adapter tries to associate to the preferred network first in the order that you specify.
ZyXEL G-302 v3 User’s Guide If there is no security activated for the selected wireless network, a warning screen appears. Click Connect Anyway if wireless security is not your concern. Figure 40 Windows XP SP2: Wireless Network Connection: WEP or WPA-PSK...
ZyXEL G-302 v3 User’s Guide Association Select a network in the Preferred networks list and click Properties to view or configure security. Figure 42 Windows XP: Wireless (network) properties: Association The following table describes the labels in this screen. Table 22 Windows XP: Wireless (network) properties: Association...
ZyXEL G-302 v3 User’s Guide Table 22 Windows XP: Wireless (network) properties: Association (continued) LABEL DESCRIPTION This is a If this check box is selected, you are connecting to another computer directly. computer-to- computer (ad hoc) network; wireless access points are not used Click OK to save your changes.
ZyXEL G-302 v3 User’s Guide Table 23 Windows XP: Wireless (network) properties: Authentication (continued) LABEL DESCRIPTION Authenticate as Select this check box to have the computer send its information to the network for computer when authentication when a user is not logged on.
ZyXEL G-302 v3 User’s Guide The following table describes the labels in this screen. Table 24 Windows XP: Protected EAP Properties LABEL DESCRIPTION Validate server Select the check box to verify the certificate of the authentication server. certificate Connect to these...
ZyXEL G-302 v3 User’s Guide The following table describes the labels in this screen. Table 25 Windows XP: Smart Card or other Certificate Properties LABEL DESCRIPTION Use my smart card Select this check box to use the smart card for authentication.
ZyXEL G-302 v3 User’s Guide Figure 46 Windows XP SP2: Wireless Networks: Preferred Networks Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the screen as shown. Figure 47 Windows XP SP1: Wireless Networks: Preferred Networks 2 Whenever the ZyXEL wireless LAN adapter tries to connect to a new network, the new network is added in the Preferred networks table automatically.
Page 72
ZyXEL G-302 v3 User’s Guide Appendix B Management with Wireless Zero Configuration...
ZyXEL G-302 v3 User’s Guide P P E N D I X Wireless Security Types of EAP Authentication This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information.
ZyXEL G-302 v3 User’s Guide EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection. Client authentication is then done by sending username and password through the secure connection, thus client identity is protected.
Page 75
ZyXEL G-302 v3 User’s Guide Table 26 Comparison of EAP Authentication Types EAP-MD5 EAP-TLS EAP-TTLS PEAP LEAP Deployment Difficulty Easy Hard Moderate Moderate Moderate Client Identity Protection WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and...
Page 76
ZyXEL G-302 v3 User’s Guide The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped.
ZyXEL G-302 v3 User’s Guide Figure 48 WPA-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows.
ZyXEL G-302 v3 User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.
Page 79
ZyXEL G-302 v3 User’s Guide Index About Encryption 31, 71 activating a profile Adapter Ad-Hoc Advanced Encryption Standard 31, 71 advanced settings antenna antenna power output authentication authentication method open system shared key Authentication Type getting started graphics icons key...
Page 80
ZyXEL G-302 v3 User’s Guide shared key authentication signal strength site survey network type connecting to a WLAN network scan security settings SSID 35, 37 SSID (Service Set Identity) statistics Odyssey Client Manager support CD open system authentication syntax conventions...
Page 81
ZyXEL G-302 v3 User’s Guide Windows Vista 21, 40, 52 Windows XP wireless LAN channel introduction security SSID Wireless LAN (WLAN) wireless standard wireless station mode configuration WLAN Security parameters 31, 40, 71 WPA2 31, 40, 71 WPA2-Pre-Shared Key 31, 71...
Need help?
Do you have a question about the G-302 v3 and is the answer not in the manual?
Questions and answers