ZyXEL G-260 802.11g Wireless USB 2.0 Adapter User’s Guide Version 1.
ZyXEL G-260 User’s Guide Copyright Copyright © 2005 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
ZyXEL G-260 User’s Guide Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules.
ZyXEL G-260 User’s Guide Certifications 1 Go to www.zyxel.com 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
ZyXEL G-260 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase.
ZyXEL G-260 User’s Guide Customer Support Please have the following information ready when you contact customer support. • • • • Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it. METHOD SUPPORT E-MAIL TELEPHONEA WEB SITE FAX FTP SITE REGULAR MAIL LOCATION SALES E-MAIL support@zyxel.com.tw +886-3-578-3942 CORPORATE HEADQUARTERS (WORLDWIDE) CZECH REPUBLIC DENMARK FINLAND sales@zyxel.com.
ZyXEL G-260 User’s Guide TELEPHONEA WEB SITE SALES E-MAIL FAX FTP SITE support@zyxel.co.uk +44 (0) 1344 303044 08707 555779 (UK only) www.zyxel.co.uk sales@zyxel.co.uk +44 (0) 1344 303034 ftp.zyxel.co.uk METHOD SUPPORT E-MAIL REGULAR MAIL LOCATION UNITED KINGDOM ZyXEL Communications UK Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK) a. “+” is the (prefix) number you enter to make an international telephone call.
ZyXEL G-260 User’s Guide Table of Contents Copyright .................................................................................................................. 2 Federal Communications Commission (FCC) Interference Statement ............... 3 ZyXEL Limited Warranty.......................................................................................... 5 Customer Support.................................................................................................... 6 Table of Contents ........
ZyXEL G-260 User’s Guide 2.2.3.1 User Authentication .........................................................................26 2.2.3.2 Encryption .......................................................................................26 2.2.4 WPA(2)-PSK Application Example ...........................................................27 2.2.5 WPA with RADIUS Application Example ..................................................27 2.3 Encryption Type ...........................................................
ZyXEL G-260 User’s Guide Appendix B Disable Windows XP Wireless LAN Configuration Tool..................................... 58 Appendix C Management with Wireless Zero Configuration .................................................. 64 Appendix D Types of EAP Authentication ................................................................................ 76 Index........................................................................................................................
ZyXEL G-260 User’s Guide 11 Table of Contents
ZyXEL G-260 User’s Guide List of Figures Figure 1 Application: Infrastructure ....................................................................... 18 Figure 2 Application: Ad-Hoc ................................................................................ 19 Figure 3 ZyXEL Utility: System Tray Icon .............................................................. 20 Figure 4 ZyXEL Utility: Site Survey .......................................................................
ZyXEL G-260 User’s Guide Figure 39 Windows XP SP2: System Tray Icon ..................................................... 65 Figure 40 Windows XP SP2: Wireless Network Connection Status ....................... 65 Figure 41 Windows XP SP1: Wireless Network Connection Status ....................... 66 Figure 42 Windows XP SP2: Wireless Network Connection .................................. 66 Figure 43 Windows XP SP1: Wireless Network Connection Properties ................
ZyXEL G-260 User’s Guide List of Tables Table 1 ZyXEL Utility: System Tray Icon ............................................................... 20 Table 2 ZyXEL Utility: Menu Screen Summary ..................................................... 22 Table 3 Link Info .................................................................................................... 34 Table 4 Link Info: Trend Chart ............................................................................... 35 Table 5 Site Survey ........
ZyXEL G-260 User’s Guide 15 List of Tables
ZyXEL G-260 User’s Guide Preface Congratulations on your purchase of the ZyXEL G-220F 802.11g Wireless USB Adapter. Note: Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products. Your ZyXEL G-260 is easy to install and configure. About This User's Guide This manual is designed to guide you through the configuration of your ZyXEL G-260 for its various applications.
ZyXEL G-260 User’s Guide • For brevity’s sake, we will use “e.g.,” as a shorthand for “for instance”, and “i.e.,” for “that is” or “in other words” throughout this manual. • The ZyXEL G-220F 802.11g Wireless USB Adapter may be referred to as the ZyXEL G260 in this user’s guide.
ZyXEL G-260 User’s Guide CHAPTER 1 Getting Started This chapter introduces the ZyXEL G-260 and prepares you to use the ZyXEL Utility. 1.1 About Your ZyXEL G-260 The ZyXEL G-260 is an IEEE 802.11g compliant wireless LAN USB adapter. The following lists the main features of your ZyXEL G-260. See the product specifications in the appendix for detailed features. • Automatic rate selection. • Security: WEP (Wired Equivalent Privacy), IEEE 802.
ZyXEL G-260 User’s Guide 1.1.1.2 Ad-Hoc In case you prefer to set up a small independent wireless workgroup without an AP, use the Ad-Hoc mode. Ad-hoc mode does not require an AP or a wired network. Two or more wireless clients communicate directly to each other. Figure 2 Application: Ad-Hoc 1.2 ZyXEL G-260 Hardware and Utility Installation Follow the instructions in the Quick Start Guide to install the ZyXEL Utility and make hardware connections. 1.
ZyXEL G-260 User’s Guide 1.5 Accessing the ZyXEL Utility After you install and start the ZyXEL Utility, an icon for the ZyXEL Utility appears in the system tray. Note: When the ZyXEL Utility system tray icon displays, the ZyXEL G-260 is installed properly. When you use the ZyXEL Utility, it automatically disables the Windows XP wireless configuration tool. Figure 3 ZyXEL Utility: System Tray Icon The color of the ZyXEL Utility system tray icon indicates the status of the ZyXEL G-260.
ZyXEL G-260 User’s Guide 1 Make sure a wireless network is available and within range. 2 Open the ZyXEL Utility and click the Site Survey tab to open the screen as shown next. 3 Click Scan to search for available wireless networks. Figure 4 ZyXEL Utility: Site Survey 4 To join a network, either click an SSID in the table and then click Connect or doubleclick an SSID. 5 If the wireless security is activated for the selected wireless network, the Security Settings screen displays.
ZyXEL G-260 User’s Guide Figure 6 ZyXEL Utility: Link Info 1.7 ZyXEL Utility Screen Summary This sections describes the ZyXEL Utility screens. Figure 7 Menu Summary The following table describes the menus. Table 2 ZyXEL Utility: Menu Screen Summary TAB DESCRIPTION Link Info Use this screen to see your current connection status, configuration and data rate statistics. Site Survey Use this screen to • scan for a wireless network • configure wireless security (if activated on the selected network).
ZyXEL G-260 User’s Guide 23 Chapter 1 Getting Started
ZyXEL G-260 User’s Guide CHAPTER 2 Wireless LAN Network This chapter provides background information on wireless LAN network. 2.1 Wireless LAN Overview This section describes the wireless LAN network terms and applications. 2.1.1 SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. 2.1.2 Channel A radio frequency used by a wireless device is called a channel. 2.1.
ZyXEL G-260 User’s Guide Configure the wireless LAN security using the Configuration or the Profile Security Settings screen. If you do not enable any wireless security on your ZyXEL G-260, the ZyXEL G-260’s wireless communications are accessible to any wireless networking device that is in the coverage area. 2.2.
ZyXEL G-260 User’s Guide 2.2.3 WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences between WPA(2) and WEP are user authentication and improved data encryption. 2.2.3.1 User Authentication WPA(2) applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database.
ZyXEL G-260 User’s Guide The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password. 2.2.
ZyXEL G-260 User’s Guide Figure 9 WPA with RADIUS Application Example 2.3 Encryption Type The IEEE 802.11b/g standard describes a simple encryption method between the wireless stations and AP. Two encryption types are defined: an Open system mode and a Shared key mode. • Open System mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP do not share a secret key.
ZyXEL G-260 User’s Guide Note: The ZyXEL G-260 and the access point/wireless stations MUST use the same preamble mode in order to communicate. 2.5 Introduction to OTIST In a wireless network, the wireless clients must have the same SSID and security settings as the access point (AP) or wireless router (we will refer to both as “AP” here) in order to associate with it.
ZyXEL G-260 User’s Guide 2.5.1.2 Wireless Client Start the ZyXEL Utility and click the Adapter tab. Select the Auto Security check box, enter the same Setup Key as your AP’s and click Save.
ZyXEL G-260 User’s Guide 2.5.2 Starting OTIST Note: You must click Start in the AP OTIST web configurator screen and Save in the wireless client(s) Adapter screen all within three minutes (at the time or writing). You can start OTIST in the wireless clients and AP in any order but they must all be within range and have OTIST enabled. 1 In the AP, a web configurator screen pops up showing you the security settings to transfer. After reviewing the settings, click OK.
ZyXEL G-260 User’s Guide 3 When the wireless client finds an OTIST-enabled AP, you must still click Start in the AP OTIST web configurator screen or hold in the Reset button (for one or two seconds) for the AP to transfer settings. 4 If you change the SSID or the keys on the AP after using OTIST, you need to run OTIST again or enter them manually in the wireless client(s). 5 If you configure OTIST to generate a WPA-PSK key, this key changes each time you run OTIST.
ZyXEL G-260 User’s Guide 33 Chapter 2 Wireless LAN Network
ZyXEL G-260 User’s Guide CHAPTER 3 ZyXEL Utility Configuration This chapter shows you how to configure your ZyXEL G-260 in wireless station mode. 3.1 The Link Info Screen When the ZyXEL Utility starts, the Link Info screen displays, showing the current configuration and connection status of your ZyXEL G-260. Figure 10 Link Info The following table describes the labels in this screen.
ZyXEL G-260 User’s Guide Table 3 Link Info (continued) LABEL DESCRIPTION Security This field displays whether data encryption is activated (WEP (WEP or 802.1x), TKIP (WPA/WPA-PSK), AES (WPA2/WPA2-PSK)) or inactive (Disabled). Channel This field displays the radio channel the ZyXEL G-260 is currently using. Statistics Transmit Rate This field displays the current data transmission rate in kilobits per second (Kbps).
ZyXEL G-260 User’s Guide 3.2 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically. Figure 12 Site Survey The following table describes the labels in this screen. Table 5 Site Survey LABEL DESCRIPTION Available Network List Click a column heading to sort the entries. , denotes that the wireless device is in infrastructure mode and the wireless security is activated.
ZyXEL G-260 User’s Guide Table 5 Site Survey (continued) LABEL DESCRIPTION MAC address This field displays the MAC address of the wireless device. Surveyed at This field displays the time when the wireless device is scanned. 3.2.1 Connecting to a WLAN Network Follow the steps below to connect to a WLAN network using the Site Survey screen. 1 Click Scan to search for all available wireless networks within range.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 6 Security Settings: WEP LABEL DESCRIPTION Security Setting WEP Select 64 Bits, 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields. Select Disable to deactivate WEP encryption. Encryption Type Select an encryption type. Choices are Open and Shared. Refer to Section 2.3 on page 28 for more information.
ZyXEL G-260 User’s Guide 3.2.2.2 WPA/WPA2 Figure 14 Security Settings: WPA/WPA2 The following table describes the labels in this screen. Table 7 Security Settings: WPA/WPA2 LABEL DESCRIPTION Authentication Type Select an authentication method from the drop down list. Options are TLS and PEAP. Login Name Enter a user name. This is the user name that you or an administrator set up on a WPA/WPA2 server. Certificate This field is only available when you select TLS in the Authentication Type field.
ZyXEL G-260 User’s Guide 3.2.2.3 WPA-PSK/WPA2-PSK Figure 15 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 8 Security Settings: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Security Setting Encryption Type The encryption mechanisms used for WPA and WPA-PSK/WPA2-PSK are the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses a simple common password, instead of user-specific credentials.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 9 Security Settings: 802.1x LABEL DESCRIPTION Authentication Type Select an authentication method from the drop down list. Options are TLS and PEAP. Login Name Enter a user name. This is the user name that you or an administrator set up on a RADIUS server. Password This field is not available when you select TLS in the Authentication Type field. Enter the password associated with the user name above.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 10 Confirm Save Screen LABEL DESCRIPTION Security Setting Network Name This field displays the SSID previously entered. Network Type This field displays the network type (Infrastructure or Ad Hoc) of the wireless device. Channel This field displays the channel number used by the profile. Security This field shows whether data encryption is activated (WEP, WPA, WPA2, WPAPSK, WPA2-PSK or 802.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 11 Profile Screen LABEL DESCRIPTION Profile List Click a column heading to sort the entries. , , or denotes that the wireless device is in infrastructure mode and the wireless security is activated. denotes that the wireless device is in infrastructure mode but the wireless security is deactivated. denotes that the wireless device is in Ad-Hoc mode and the wireless security is activated.
ZyXEL G-260 User’s Guide Figure 19 Profile: Add New Profile The following table describes the labels in this screen. Table 12 Profile: Add New Profile LABEL DESCRIPTION Add New Profile Profile Name Enter a descriptive name in this field. SSID Select an available wireless device in the Scan Info table and click Select, or enter the SSID of the wireless device to which you want to associate in this field manually.
ZyXEL G-260 User’s Guide 2 If you select the Infrastructure network type in the previous screen, skip to step 3. If you select the Ad-Hoc network type in the previous screen, a screen displays as follows. Select a channel number and wireless LAN mode and click Next to continue. Figure 20 Profile: Wireless Setting: Select a Channel The following table describes the labels in this screen.
ZyXEL G-260 User’s Guide Figure 21 Profile: Security Setting: Encryption Type 4 The screen varies depending on the encryption method you select in the previous screen. The settings must be exactly the same on the APs or other peer wireless computers as they are on the ZyXEL G-260. Refer to Section 3.2.2 on page 37 for detailed information on wireless security configuration. Figure 22 Profile: Security Setting 5 This read-only screen shows a summary of the new profile settings.
ZyXEL G-260 User’s Guide Figure 23 Profile: Confirm New Settings 6 To use this network profile, click the Activate Now button. Otherwise, click the Activate Later button. Note: Once you activate a profile, the ZyXEL Utility will use that profile the next time it is started. Figure 24 Profile: Activate the Profile 3.4 The Adapter Screen To set the advanced features on the ZyXEL G-260, click the Adapter tab.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 14 Adapter LABEL DESCRIPTION Adapter Transfer Rate Select a transfer speed from the drop-down list box. Choose from Fully Auto (default), 1 Mbps, 2 Mbps, 5.5 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, and 54 Mbps. Preamble Type Select a preamble type. Choices are Long, Short and Auto.The default setting is Long. Refer to Section 2.4 on page 28 for more information.
ZyXEL G-260 User’s Guide 49 Chapter 3 ZyXEL Utility Configuration
ZyXEL G-260 User’s Guide CHAPTER 4 Maintenance This chapter describes how to uninstall or upgrade the ZyXEL Utility. 4.1 The About Screen The About screen displays related version numbers of the ZyXEL G-260. To display the screen as shown below, click the about ( ) button. Figure 26 About The following table describes the read-only fields in this screen. Table 15 About LABEL DESCRIPTION Driver Version This field displays the version number of the ZyXEL G-260 driver.
ZyXEL G-260 User’s Guide Figure 27 Uninstall: Confirm 3 Click Finish to complete uninstalling the software and restart the computer when prompted. Figure 28 Uninstall: Finish 4.3 Upgrading the ZyXEL Utility Note: Before you uninstall the ZyXEL Utility, take note of the current network configuration. To perform the upgrade, follow the steps below. 1 Download the latest version of the utility from the ZyXEL web site and save the file on your computer. 2 Follow the steps in Section 4.
ZyXEL G-260 User’s Guide 6 Insert the ZyXEL G-260 and check the version numbers in the About screen to make sure the new utility is installed properly.
ZyXEL G-260 User’s Guide 53 Chapter 4 Maintenance
ZyXEL G-260 User’s Guide CHAPTER 5 Troubleshooting This chapter covers potential problems and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. 5.1 Problems Starting the ZyXEL Utility Program Table 16 Troubleshooting Starting ZyXEL Utility Program PROBLEM CORRECTIVE ACTION Cannot start the ZyXEL Wireless LAN Utility Make sure the ZyXEL G-260 is properly inserted and the LED is on.
ZyXEL G-260 User’s Guide 5.3 Problems Communicating With Other Computers Table 18 Troubleshooting Communication Problem 55 PROBLEM CORRECTIVE ACTION In wireless station mode, the computer with the ZyXEL G-260 installed cannot communicate with the other computer(s). In Infrastructure Mode • Make sure that the AP and the associated computers are turned on and working properly. • Make sure the ZyXEL G-260 computer and the associated AP use the same SSID.
ZyXEL G-260 User’s Guide Appendix A Product Specifications Table 19 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name ZyXEL G-260 802.11g Wireless USB Adapter Interface USB 2.0 bus-powered Standards IEEE 802.11b IEEE 802.
ZyXEL G-260 User’s Guide Table 19 Product Specifications (continued) 57 Roaming IEEE 802.
ZyXEL G-260 User’s Guide APPENDIX B Disable Windows XP Wireless LAN Configuration Tool Windows XP includes a configuration tool (also known as Wireless Zero Configuration (WZC)) for wireless devices. Follow the steps below to disable the configuration tool in Windows XP after you install the ZyXEL Utility. The screen varies depending on the version of Windows XP service pack.
ZyXEL G-260 User’s Guide Figure 30 Windows XP SP1: Wireless Network Connection Windows XP SP2: When a Wireless Network Connection window displays, click Change advanced settings under Related Tasks and then the Wireless Networks tab. Figure 31 Windows XP SP2: Wireless Network Connection 3 In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK.
ZyXEL G-260 User’s Guide Figure 32 Windows XP SP1: Wireless Network Connection Properties Figure 33 Windows XP SP2: Wireless Network Connection Properties Appendix B 60
ZyXEL G-260 User’s Guide Via the Control Panel 1 If the icon for the wireless network connection is not in the system tray, click Start, Control Panel and double-click Network Connections. 2 Double-click on the icon for wireless network connection to display a status window as shown below. 3 Click Properties and click the Wireless Networks tab.
ZyXEL G-260 User’s Guide 4 In the Wireless Network Connection Properties window, make sure the Use Windows to configure my wireless network settings check box is not selected. Click OK.
ZyXEL G-260 User’s Guide 63 Appendix B
ZyXEL G-260 User’s Guide APPENDIX C Management with Wireless Zero Configuration This appendix shows you how to manage your ZyXEL wireless LAN adapter using the Windows XP wireless zero configuration tool. Be sure you have the Windows XP service pack 2 installed on your computer. Otherwise, you should at least have the Windows XP service pack 1 already on your computer and download the support patch for WPA from the Microsoft web site. Windows XP SP2 screen shots are shown unless otherwise specified.
ZyXEL G-260 User’s Guide Connecting to a Wireless Network 1 Double-click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Figure 39 Windows XP SP2: System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the ZyXEL wireless LAN adapter. Refer to the following table for details.
ZyXEL G-260 User’s Guide Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the Wireless Network Connection Properties screen. Figure 41 Windows XP SP1: Wireless Network Connection Status 3 Windows XP SP2: Click Refresh network list to reload and search for available wireless devices within transmission range. Select a wireless network in the list and click Connect to join the selected wireless network.
ZyXEL G-260 User’s Guide The following table describes the icons in the wireless network list. Table 21 Windows XP SP2: Wireless Network Connection ICON DESCRIPTION This denotes that wireless security is activated for the wireless network. This denotes that this wireless network is your preferred network. Ordering your preferred networks is important because the ZyXEL wireless LAN adapter tries to associate to the preferred network first in the order that you specify.
ZyXEL G-260 User’s Guide If there is no security activated for the selected wireless network, a warning screen appears. Click Connect Anyway if wireless security is not your concern.
ZyXEL G-260 User’s Guide Association Select a network in the Preferred networks list and click Properties to view or configure security. Figure 46 Windows XP: Wireless (network) properties: Association The following table describes the labels in this screen. Table 23 Windows XP: Wireless (network) properties: Association 69 LABEL DESCRIPTION Network name (SSID) This field displays the SSID (Service Set IDentifier) of each wireless network.
ZyXEL G-260 User’s Guide Table 23 Windows XP: Wireless (network) properties: Association (continued) LABEL DESCRIPTION If this check box is selected, you are connecting to another computer directly. This is a computer-tocomputer (ad hoc) network; wireless access points are not used OK Click OK to save your changes. Cancel Click Cancel to leave this screen without saving any changes you may have made.
ZyXEL G-260 User’s Guide Table 24 Windows XP: Wireless (network) properties: Authentication (continued) LABEL DESCRIPTION Authenticate as computer when computer information is available Select this check box to have the computer send its information to the network for authentication when a user is not logged on.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 25 Windows XP: Protected EAP Properties LABEL DESCRIPTION Validate server certificate Select the check box to verify the certificate of the authentication server. Connect to these servers Select the check box and specify a domain in the field below to have your computer connect to a server which resides only within this domain.
ZyXEL G-260 User’s Guide The following table describes the labels in this screen. Table 26 Windows XP: Smart Card or other Certificate Properties LABEL DESCRIPTION Use my smart card Select this check box to use the smart card for authentication. Use a certificate on this computer Select this check box to use a certificate on your computer for authentication. Validate server certificate Select the check box to check the certificate of the authentication server.
ZyXEL G-260 User’s Guide Figure 50 Windows XP SP2: Wireless Networks: Preferred Networks Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the screen as shown. Figure 51 Windows XP SP1: Wireless Networks: Preferred Networks 2 Whenever the ZyXEL wireless LAN adapter tries to connect to a new network, the new network is added in the Preferred networks table automatically.
ZyXEL G-260 User’s Guide 75 Appendix C
ZyXEL G-260 User’s Guide Appendix D Types of EAP Authentication This appendix discusses some popular authentication types: EAP-MD5, EAP-TLS, EAPTTLS, PEAP and LEAP. The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. Your wireless LAN device may not support all authentication types. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method.
ZyXEL G-260 User’s Guide PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secured connection to authenticate the clients, thus hiding client identity. However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco.
ZyXEL G-260 User’s Guide WPA User Authentication WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database. Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Standard (AES), Message Integrity Check (MIC) and IEEE 802.1x. TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
ZyXEL G-260 User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 28 Wireless Security Relational Matrix AUTHENTICATION ENCRYPTION ENTER METHOD/ KEY METHOD MANUAL KEY MANAGEMENT PROTOCOL ENABLE IEEE 802.
ZyXEL G-260 User’s Guide Index Numerics 802.
ZyXEL G-260 User’s Guide L R link information 34 radio interference 54 real-time data traffic statistics 35 Regular Mail 6 Related Documentation 16 M Message Integrity Check (MIC) 78 N network type 34 North America Contact Information 6 Norway, Contact Information 6 O Odyssey Client Manager 19 One-Touch Intelligent Security Technology 29 open system authentication 28 OTIST 31 OTIST (One-Touch Intelligent Security) 48 OTIST Introduction 29 P Pairwise Master Key (PMK) 78 passphrase 25, 38 password phr
ZyXEL G-260 User’s Guide U uninstalling ZyXEL Utility 50 upgrading ZyXEL Utility 51 important step 51 User Authentication 78 opening 20 system tray icon 20 upgrade 51 version 50 V voltage 56 W Web Site 6 WEP 25, 37, 38 manual setup 25, 38 passphrase 25, 38 WEP (Wired Equivalent Privacy) 25 Windows XP 19 wireless LAN authentication 28 channel 24 introduction 24 security 24 SSID 24 transmission rate 24 Wireless LAN (WLAN) 24 wireless standard 56 wireless station mode configuration 34 WLAN Security paramet