background image

ZyXEL G-120 User’s Guide

Appendix D Setting up Your Computer’s IP Address

91

Figure 64   

Macintosh OS X: Network

4

For statically assigned settings, do the following:

From  the 

Configure 

box, select 

Manually

.

Type your IP address in the 

IP Address

 box.

Type your subnet mask in the 

Subnet mask

 box.

Type the IP address of your gateway in the 

Router

 

address 

box if 

you have one.

5

Click 

Apply Now 

and close the window.

6

Restart your computer (if prompted).

Verifying Settings

Check your TCP/IP properties in the 

Network 

window.

Summary of Contents for G-120

Page 1: ...ZyXEL G 120 802 11g Wireless CardBus Card User s Guide Version 1 00 Edition 1 6 2006...

Page 2: ......

Page 3: ...XEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it con...

Page 4: ...which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving ant...

Page 5: ...ertifications 5 Viewing Certifications 1 Go to http www zyxel com 2 Select your product from the drop down list box on the ZyXEL home page to go to that product s page 3 Select the certification you w...

Page 6: ...t as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitn...

Page 7: ...rk sales zyxel dk 45 39 55 07 07 FINLAND support zyxel fi 358 9 4780 8411 www zyxel fi ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland sales zyxel fi 358 9 4780 8448 FRANCE info zyxel fr...

Page 8: ...el se 46 31 744 7700 www zyxel se ZyXEL Communications A S Sj porten 4 41764 G teborg Sweden sales zyxel se 46 31 744 7701 UKRAINE support ua zyxel com 380 44 247 69 78 www ua zyxel com ZyXEL Ukraine...

Page 9: ...Infrastructure 19 1 2 0 2 Ad Hoc 20 1 3 G 120 Hardware and Utility Installation 21 1 3 1 ZyXEL Utility Icon 21 1 4 Configuration Methods 21 1 4 1 Enabling WZC 21 1 4 2 Accessing the ZyXEL Utility 22...

Page 10: ...WPA2 RADIUS 43 4 2 1 4 RADIUS 44 4 2 2 Confirm New Settings 45 4 3 The Profile Screen 46 4 3 1 Adding a New Profile 48 4 4 The Adapter Screen 52 Chapter 5 Maintenance 55 5 1 The About Screen 55 5 2 U...

Page 11: ...ZyXEL G 120 User s Guide Table of Contents 11 Index 93...

Page 12: ...ZyXEL G 120 User s Guide 12 Table of Contents...

Page 13: ...28 Figure 16 Example of a Wireless Network 29 Figure 17 Link Info 37 Figure 18 Station Mode Link Info Trend Chart 39 Figure 19 Site Survey 40 Figure 20 Security Setting WEP 41 Figure 21 Security Setti...

Page 14: ...P SP2 Wireless Networks Preferred Networks 73 Figure 49 Windows XP SP1 Wireless Networks Preferred Networks 73 Figure 50 WPA PSK Authentication 79 Figure 51 WPA 2 with RADIUS Application Example 80 Fi...

Page 15: ...Adapter 53 Table 14 About 55 Table 15 Troubleshooting Starting ZyXEL Utility 59 Table 16 Troubleshooting Link Quality 59 Table 17 Troubleshooting Communication Problem 60 Table 18 Product Specificati...

Page 16: ...ZyXEL G 120 User s Guide 16 List of Tables...

Page 17: ...support documentation User Guide Feedback Help us help you E mail all User Guide related comments questions or suggestions for improvement to techwriters zyxel com tw or send regular mail to The Tech...

Page 18: ...ZyXEL G 120 User s Guide 18 Preface Graphics Icons Key Wireless Access Point Computer Notebook Computer Server Modem or Router Wireless Signal Internet Cloud...

Page 19: ...20 See the appendix for detailed product specifications 1 2 Application Overview This section describes some network applications for the G 120 You can either set the network type to Infrastructure an...

Page 20: ...1 Application Infrastructure 1 2 0 2 Ad Hoc To set up a small independent wireless workgroup without an AP use Ad Hoc Ad Hoc does not require an AP or a wired network Two or more wireless clients com...

Page 21: ...tray icon indicates the status of the G 120 Refer to the following table for details 1 4 Configuration Methods To configure your G 120 use one of the following applications Wireless Zero Configuration...

Page 22: ...top or click Start All Programs ZyXEL G 120 Utility ZyXEL G 120 Utility GUI 1 4 2 Accessing the ZyXEL Utility Double click on the ZyXEL wireless LAN utility icon in the system tray to open the ZyXEL u...

Page 23: ...ofile to have the wireless client automatically connect to a specific network or peer computer see Section 2 2 on page 25 2 1 Connecting to a Wireless LAN This example illustrates how to manually conn...

Page 24: ...To connect to an AP or peer computer either click an entry in the list and then click Connect or double click an entry with a SSID of SSID_Examples3 in this example 4 When you try to connect to an AP...

Page 25: ...s in this screen remain blank See Table 2 on page 37 for detailed field descriptions Figure 9 ZyXEL Utility Link Info 7 Open your Internet browser and enter http www zyxel com or the URL of any other...

Page 26: ...o configure a new profile Figure 10 ZyXEL Utility Profile 2 The Add New Profile screen appears The wireless client automatically searches for available wireless networks which are displayed in the Sca...

Page 27: ...setting Figure 13 ZyXEL Utility Profile Encryption 6 Verify the profile settings in the ready only screen Click Save to save and go to the next screen Figure 14 ZyXEL Utility Profile Confirm New Setti...

Page 28: ...reen displays details of the active connection 9 Make sure the selected AP in the active profile is connected to the Internet Open your Internet browser enter http www zyxel com or the URL of any othe...

Page 29: ...circle In this wireless network devices A and B are called wireless clients The wireless clients use the access point AP to interact with other devices such as the printer or with the Internet Every w...

Page 30: ...ess devices to get the MAC address of an authorized device Then they can use that MAC address to use the wireless network 3 2 1 User Authentication and Encryption You can make every user log in to the...

Page 31: ...d use same settings on both the wireless station and the AP or peer computer Auto authentication mode allows the G 120 to switch between the open system and shared key modes automatically Use the auto...

Page 32: ...ss client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS server or not Select WEP only...

Page 33: ...transfer Hold in the Reset button for one or two seconds Note If you hold in the Reset button too long the device may reset to the factory defaults In the web configurator go to the Wireless LAN main...

Page 34: ...T web configurator screen and in the wireless client s Adapter screen all within three minutes at the time of writing You can start OTIST in the wireless clients and AP in any order but they must all...

Page 35: ...ou must still click Start in the AP OTIST web configurator screen or hold in the Reset button for one or two seconds for the AP to transfer settings 4 If you change the SSID or the keys on the AP afte...

Page 36: ...ZyXEL G 120 User s Guide 36 Chapter 3 Wireless LAN Network...

Page 37: ...s showing the current configuration and connection status of your G 120 Figure 17 Link Info The following table describes the labels in this screen Table 2 Link Info LABEL DESCRIPTION Wireless Network...

Page 38: ...ays the current data receiving rate in kilobits per second Kbps Authentication This field displays the authentication method of the G 120 Network Mode This field displays the wireless standard 802 11b...

Page 39: ...creen 4 2 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically Table 3 Station Mode Link Info Trend Chart LABEL DESCRIPTION Transmit This field...

Page 40: ...eactivated SSID This field displays the SSID Service Set IDentifier of each wireless device Channel This field displays the channel number used by each wireless device Signal This field displays the s...

Page 41: ...continued LABEL DESCRIPTION Table 5 Security Setting WEP LABEL DESCRIPTION Security Setting WEP Select 64 Bits 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields Encry...

Page 42: ...ey type or Enter 13 ASCII characters case sensitive ranging from a z A Z and 0 9 for example MyKey12345678 for ASCII key type If you select 256 Bits in the WEP field Enter either 58 hexadecimal digits...

Page 43: ...e only difference between the two is that WPA PSK WPA2 PSK uses a simple common password instead of user specific credentials Select the encryption type TKIP or AES for data encryption Refer to Sectio...

Page 44: ...on a RADIUS server Password This field is not available when you select TLS in the Authentication Type field Enter the password associated with the user name above Certificate This field is only avail...

Page 45: ...rtificate This field is only available when you select TLS in the Authentication Type field Select a certificate used by the authentication server to authenticate the G 120 Note You must first have a...

Page 46: ...disabled The default profile is a profile that allows you to connect to any SSID without security Click the Profile tab in the ZyXEL utility program to display the Profile screen as shown next The pr...

Page 47: ...ed Profile Name This is the name of the pre configured profile SSID This is the SSID of the wireless network to which the selected profile associate Connect To use and activate a previously saved netw...

Page 48: ...on is activated WEP WPA PSK WPA RADIUS RADIUS WPA2 RADIUS WPA2 PSK or inactive Disable Transfer Rate This field displays the transmission speed of the selected profile in megabits per second Mbps Tabl...

Page 49: ...wireless networks within the transmission range or denotes that the wireless device is in infrastructure mode and the wireless security is activated denotes that the wireless device is in infrastruct...

Page 50: ...type in the first screen you can only use WEP encryption method Otherwise select Disabled to allow the G 120 to communicate with the access points or other peer wireless computers without any data en...

Page 51: ...her peer wireless computers as they are on the G 120 Refer to Section 4 2 1 on page 41 for detailed information on wireless security configuration Figure 29 Profile Security Settings 5 This read only...

Page 52: ...k the Activate Now button Otherwise click the Activate Later button You can activate only one profile at a time Note Once you activate a profile the ZyXEL utility will use that profile the next time i...

Page 53: ...t the AP uses Short Preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b g compliant wireless adapters support Long Preamble but not all suppo...

Page 54: ...must also make the same change here Start Click Start to encrypt the wireless security data using the setup key and have the ZyXEL AP or wireless router set your G 120 to use the same wireless setting...

Page 55: ...ollowing table describes the read only fields in this screen 5 2 Uninstalling the ZyXEL Utility Follow the steps below to remove or uninstall the ZyXEL utility from your computer 1 Click Start All Pro...

Page 56: ...ake note of your current wireless configurations To perform the upgrade follow the steps below 1 Download the latest version of the utility from the ZyXEL web site and save the file on your computer 2...

Page 57: ...ZyXEL G 120 User s Guide Chapter 5 Maintenance 57 6 Insert the G 120 and check the version numbers in the About screen to make sure the new utility is installed properly...

Page 58: ...ZyXEL G 120 User s Guide 58 Chapter 5 Maintenance...

Page 59: ...nding on the version of Windows Install the G 120 in another computer If the error persists you may have a hardware problem In this case you should contact your local vendor The ZyXEL utility icon doe...

Page 60: ...the associated wireless clients to use another radio channel if interference is high Make sure that the computer and the AP share the same security option and key Verify the settings in the Profile S...

Page 61: ...2 1Mbps IEEE 802 11g 54 48 36 24 18 12 9 6 Mbps Modulation IEEE 802 11g Orthogonal Frequency Division Multiplexing 64QAM 16QAM QPSK and BPSK IEEE 802311b PBCC Direct Sequence Spread Spectrum CCK DQPS...

Page 62: ...put Power 18 dBm typical at 11Mbps CCK QPSK BPSK 15 dBm typical at 54Mbps OFDM RX Sensitivity IEEE 802 11g OFDM 54 Mbps 70 dBm IEEE 802 11b CCK 11 Mbps 85 dBm SOFTWARE SPECIFICATIONS Device Drivers Mi...

Page 63: ...the support patch for WPA from the Microsoft web site Windows XP SP2 screen shots are shown unless otherwise specified Click the help icon in most screens move the cursor to the item that you want th...

Page 64: ...Refer to the following table for details 2 Windows XP SP2 In the Wireless Network Connection Status screen click View Wireless Networks to open the Wireless Network Connection screen Figure 38 Window...

Page 65: ...tab to open the Wireless Network Connection Properties screen Figure 39 Windows XP SP1 Wireless Network Connection Status 3 Windows XP SP2 Click Refresh network list to reload and search for available...

Page 66: ...selected wireless network the Wireless Network Connection screen displays You must set the related fields in the Wireless Network Connection screen to the same security settings as the associated AP a...

Page 67: ...nnection status in the wireless network list or the connection icon in the Preferred networks or Available networks list The following table describes the connection icons Security Settings When you c...

Page 68: ...the authentication method Share Open WPA or WPA PSK used by the selected network Data Encryption This field automatically shows the encryption type TKIP WEP or Disable used by the selected network Ne...

Page 69: ...Click OK to save your changes Cancel Click Cancel to leave this screen without saving any changes you may have made Table 22 Windows XP Wireless network properties Association continued LABEL DESCRIP...

Page 70: ...formation is available Select this check box to have the computer send its information to the network for authentication when a user is not logged on Authenticate as guest when user or computer inform...

Page 71: ...ion authority from the list below Note You must first have a wired connection to a network and obtain the certificate s from a certificate authority CA Consult your network administrator for more info...

Page 72: ...check the certificate of the authentication server Connect to these servers Select the check box and specify a domain in the field below to have your computer connect to a server which resides only w...

Page 73: ...e screen as shown Figure 49 Windows XP SP1 Wireless Networks Preferred Networks 2 Whenever the G 120 tries to connect to a new network the new network is added in the Preferred networks table automati...

Page 74: ...ZyXEL G 120 User s Guide 74 Appendix B Management with Wireless Zero Configuration...

Page 75: ...s from a certificate authority CA A certificate also called digital IDs can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner EAP MD5 Mes...

Page 76: ...n thus client identity is protected For client authentication EAP TTLS supports EAP methods and legacy authentication methods such as PAP CHAP MS CHAP and MS CHAP v2 PEAP Protected EAP Like EAP TTLS s...

Page 77: ...ord entered into each access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not suppo...

Page 78: ...nd AES it is more difficult to decrypt data on a Wi Fi network than WEP and difficult for an intruder to break into the network The encryption mechanisms used for WPA 2 and WPA 2 PSK are the same The...

Page 79: ...m Figure 50 WPA PSK Authentication WPA 2 with RADIUS Application Example You need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA 2 application e...

Page 80: ...how you configure these security features Table 27 Wireless Security Relational Matrix AUTHENTICATION METHOD KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY IEEE 802 1X Open None No Disable...

Page 81: ...ude the software components you need to install and use TCP IP on your computer Windows 3 1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on comp...

Page 82: ...icrosoft Networks If you need the adapter 1 In the Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you nee...

Page 83: ...apter s TCP IP entry and click Properties 2 Click the IP Address tab If your IP address is dynamic select Obtain an IP address automatically If you have a static IP address select Specify an IP addres...

Page 84: ...d 5 Click OK to save and close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Restart your computer when prompted Verifying Settings 1 Click St...

Page 85: ...omputer s IP Address 85 Figure 55 Windows XP Start Menu 2 For Windows XP click Network Connections For Windows 2000 NT click Network and Dial up Connections Figure 56 Windows XP Control Panel 3 Right...

Page 86: ...onnections Properties 4 Select Internet Protocol TCP IP under the General tab in Win XP and click Properties Figure 58 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Proper...

Page 87: ...ab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Confi...

Page 88: ...b to order them Figure 60 Windows XP Internet Protocol TCP IP Properties 8 Click OK to close the Internet Protocol TCP IP Properties window 9 Click OK to close the Local Area Connection Properties win...

Page 89: ...up Your Computer s IP Address 89 Figure 61 Macintosh OS 8 9 Apple Menu 2 Select Ethernet built in from the Connect via list Figure 62 Macintosh OS 8 9 TCP IP 3 For dynamically assigned settings selec...

Page 90: ...Control Panel 6 Click Save if prompted to save changes to your configuration 7 Restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Mac...

Page 91: ...owing From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your gateway in the Router address box if yo...

Page 92: ...ZyXEL G 120 User s Guide 92 Appendix D Setting up Your Computer s IP Address...

Page 93: ...Authority 76 Certifications viewing 5 channel 38 40 49 61 configuration method 21 Wireless Zero Configuration WZC 21 Copyright 3 creating a new profile 48 current configuration 37 current connection s...

Page 94: ...tatistics 38 Related Documentation 17 S save power 53 Scan Info 49 security 30 62 data encryption 30 Security Parameters 80 Setup Key 33 shared key authentication 31 signal strength 40 site survey 39...

Page 95: ...lient 29 wireless LAN introduction 29 security 30 Wireless LAN WLAN 29 wireless network 29 wireless standard 38 61 WLAN Security parameters 80 WPA 32 43 77 WPA2 32 43 77 WPA2 Pre Shared Key 32 77 WPA2...

Reviews: