ZyXEL Communications G-162 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 72 Seiten
- 1.36 mb
Zur Seite of
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung ZyXEL Communications G-162 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von ZyXEL Communications G-162, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung ZyXEL Communications G-162 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung ZyXEL Communications G-162. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung ZyXEL Communications G-162 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts ZyXEL Communications G-162
- Den Namen des Produzenten und das Produktionsjahr des Geräts ZyXEL Communications G-162
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts ZyXEL Communications G-162
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von ZyXEL Communications G-162 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von ZyXEL Communications G-162 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service ZyXEL Communications finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von ZyXEL Communications G-162 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts ZyXEL Communications G-162, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von ZyXEL Communications G-162 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
ZyXEL G-162/G-360 User’s G uide ZyXEL G-162/G-360 (Hardware Revisi on v2) 802.11b/g Wireless LAN Adapter User's Guide Version 1.0 May 2005[...]
-
Seite 2
ZyXEL G-162/G-360 User’ s Guide ii Copyright Copyright Copyright ©2005 by ZyXEL Communications Corp oration The contents of this publ ication ma y not be reproduced in any part or as a whole, transcribed, stored in a retrieva l system , translated into an y langua ge, or tra nsmitt ed in any form or by any means, electroni c, mechanical, magneti[...]
-
Seite 3
ZyXEL G-162/G-360 User’ s Guide ZyXEL Limited Warranty iii ZyXEL Limited W arranty ZyXEL war rants to the or iginal en d user (purchaser) that this product is free from any defects in materials or workmanshi p for a period of u p to two (2) years fr om the date of purcha se. During the warranty perio d and upon proof of purchase, should the produ[...]
-
Seite 4
ZyXEL G-162/G-360 User’ s Guide iv FCC Statement Federal Communications Commission (FCC) Interference S tatement FCC Certification The United States Federal Communicatio n (FCC) and the Canadian Department of Com municat ions have establ ished certa in rules gove rning the use of electronic eq uipm ent. Part 15, Class B The devic e complies with [...]
-
Seite 5
ZyXEL G-162/G-360 User’ s Guide Customer Support v Customer Support When contacting your Cust omer Support R epresentati ve, please have the followi ng informatio n ready: Product model and serial nu mber. Warranty Information. The Date you purchased your prod uct. Brief description of the problem and the steps you to ok to solve [...]
-
Seite 6
ZyXEL G-162/G-360 User’ s Guide vi Table of Conte nts T able of Content s Copy right ... ......... ........... ......... ........... ......... ......... ........... ......... ........... ......... ......... ........ .......... ......... ......... ........ i i ZyXEL Li mi ted Wa rran ty.......... ......... ............ ........... ......... ......[...]
-
Seite 7
ZyXEL G-162/G-360 User’ s Guide Table Of Contents vii 2.5 OTIST (One T ou ch Int ellig ent Sec urit y Techn olog y) ... ........... ........... ........... ............ ........... ....... 2-23 Chap ter 3 Ma inte nanc e ... ........... ......... ......... ........... ......... ........... ......... ......... ........... ......... ..... .... .....[...]
-
Seite 8
ZyXEL G-162/G-360 User’ s Guide viii Preface Preface Congratulat ions on the purchase of yo ur new ZyXEL G-162/G-360! About This U ser's Guide This manual provides inform ation ab out the ZyXEL Wireless LAN Utility. Synt ax Conventions • “Type” or “Enter” means for you to type one or more characters. "Select" or "Cho[...]
-
Seite 9
ZyXEL G-162/G-360 User’ s Guide Preface ix Graphics Ico ns Key Wireless Access Point Computer Notebook computer Server Modem Wireless Signal Telephone Switch Router[...]
-
Seite 10
[...]
-
Seite 11
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-1 Chapter 1 Getting Started This chapter introduces the ZyXEL G-162/G-360 and prepares you to use the ZyXEL Utility. 1.1 About Y our ZyXEL G-162/G-360 The ZyXEL G-162/ G-360 is an IEEE 802.11b and 802.11g complia n t wireless LAN adapt ers. With the ZyXEL G-162/G-360, you can enjoy wireless mobil[...]
-
Seite 12
ZyXEL G-162/G-360 User’ s Guide 1-2 WLAN Net wor king Double-c lick ing on the Z icon will dis pla y th e following ZyXEL utility window. Each of the pages (Site Survey, Profile, Link Info, About) presen ted in the ZyXEL Utility are explained in the follo wing section s.[...]
-
Seite 13
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-3 1.3.1 Site Survey Site Survey screen shows how the network is presently co nfi gured: ne twork m ode, inform ation, channel, signal strength, etc. The Select ed Network window show s you a list of SSI Ds in your v icinity. Inf ormation regarding each SSID is also show n as Security Status, SSID[...]
-
Seite 14
ZyXEL G-162/G-360 User’ s Guide 1-4 WLAN Net wor king Use Windows Zero Configuration Checking this box will allow you to use Windows to co nfigure your wire less network se ttings. When you check this box to configure, you will no longer use ZyXEL’s utility. Connect Clicking on this bottom will gu ide you to the fol lowing Profile Config uratio[...]
-
Seite 15
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-5 should use the sam e SSID (whatever your choice is). TX Rate This field displays t he current data transm ission rate in Megabit per second (Mbps). RX Rate This field disp lays the current data receiving rate in Megabit per second (Mbps). Signal Strength This shows the strength of the signal (t[...]
-
Seite 16
ZyXEL G-162/G-360 User’ s Guide 1-6 WLAN Net wor king a. [Profile ] Defa ult pr ofile nam e is ZyXEL. You m ay also ent er in a descr iptive nam e for this pr ofile. b. [SSID Name] is depends on the A P/Router you connect to from Site Surv ey page. c. [Network Mod e] if connec ting to an AP/R outer, cho o se “Infras tructure”. If you a re goi[...]
-
Seite 17
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-7 2.2) [Enable CCX Mode] refers the Cisco Com patib le Extension, whi ch is the certi ficate-ba sed authentications (EAP-TLS , PEAP and LEAP) using dy nam ic keys for data encryption. Check this box will en able PEAP-MS-CHAP-V2, PEAP-G TC, T LS and LEAP. Pl ease see your MIS administrat or for th[...]
-
Seite 18
ZyXEL G-162/G-360 User’ s Guide 1-8 WLAN Net wor king Advanced Mode : This screen (Botto m Red Rectangle) allows yo u to make changes to the default ways the card operates in cluding adv anced 80 2.1 1 settings. Unless y o u are an ad vanced user and have deep knowledge ab out each property on this page, it is recommended tha t you leave them at [...]
-
Seite 19
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-9 [Turbo Mode] allows y ou either “Active” or “ Inactive” th e 22Mbps and 125Mbp s. The information wil l be also shown unde r Link Info screen . Please refer to 1.1.3 Lin k Info for the detail exp lanation. [Packet Bu rst] allows you e ither “Activ e” or “Inactive” the packet bur[...]
-
Seite 20
ZyXEL G-162/G-360 User’ s Guide 1-10 WLAN Networking Profil e Pool A li st of inactiv e profi les, wh ich are not cu rrently c onnected to AP/ Router. Defau lt prof ile name i s set “ZyXEL”. You can add new profile by clicking [N ew], modif y profile by clic king [ Edit] and delete it by clicking [Delet e]. Active Profiles 1) A list of active[...]
-
Seite 21
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-11 1.3.3 Link Info Link Info screen shows th e current configurat ion an d connect ion stat us of yo ur G-162/ G-360. The Link Info shows you the information inc luding Rec eive, Transmit, Co nnection Informat ion, Network informatio n and OTIST.[...]
-
Seite 22
ZyXEL G-162/G-360 User’ s Guide 1-12 WLAN Networking OTIST Function (Above Red Rectang le) OTIST (O ne T ouch In tell igent Sec urity T echno logy ) is the ZyXEL propriet ary one bottom security technology . Y ou must have th e ZyXEL P-334WT ro uter or othe r ZyXEL AP/Router suppor ting O TIST to set the wire less adapter to use the sam e wireles[...]
-
Seite 23
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-13 Transmit Good Packets This field dis plays the total num ber of good packets tra nsmit ted Total Bytes This field displays the total num ber of bytes t ransmitted Connection Information Associa tio n Reje cts This field disp lays t he tota l number of rejecti ons when connectin g between Acces[...]
-
Seite 24
ZyXEL G-162/G-360 User’ s Guide 1-14 WLAN Networking 1.3.4 About About screen shows you the product nam e and software informati on of the current client device (G-1 62 or G-360) you are usi ng. ZyX EL W e bs it e Clicking , You can go to ZyXEL US website for up grading driver, utility and updating user’s gu ide as well as registering products.[...]
-
Seite 25
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-15 Chapter 2 Wireless LAN Networking This chapter provid es background inf ormation on general wirele ss LAN netw orkin g technol ogy and term inolog y. 2.1 Overview This section describes the wireless LA N network term s and applica tions. 2.1.1 SSID The SSID (Service Set Iden tity) is a unique [...]
-
Seite 26
ZyXEL G-162/G-360 User’ s Guide 2-16 WLAN Networking Ad-Hoc (IBSS) Ad-hoc mode does not require an AP or a wired ne twork. Two or more wireless stations comm unicate directly to each ot her. A n ad-hoc netw ork may som e tim es be referred to as an Independe nt Basic Service Set (IBSS). Figure 2-1 IB SS Example T o set up an ad-hoc netw ork, conf[...]
-
Seite 27
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-17 Figure 2-3 Infras tructure N etwork Exam ple 2.1.5 Roaming In an infrastructure network, wireless stations are ab le to switch from one BSS to another as they move between the co verage areas. During this period, the wi re less sta tions m aintai n uninter rupte d connec tion to the netw ork. [...]
-
Seite 28
ZyXEL G-162/G-360 User’ s Guide 2-18 WLAN Networking Figure 2-4 R o aming Exa mple 2.2 Wireless LAN Securi ty Wireless LAN security is vital to your network to protect wireless comm unication between wireless stations and the wired ne twork. The figure below shows the possib le wireless security levels o n your ZyXEL G-162/G-360. EAP (Extensible [...]
-
Seite 29
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-19 Configure the wireless LAN se curity us ing the Profil e Security Settings scre en. If you do not enabl e any wireless secur ity on your Z yXEL G-162 /G-360, t h e ZyXEL G-162 /G-360’s wire less communi cations ar e accessible to any wireless netw orking device that is i n the co verage are [...]
-
Seite 30
ZyXEL G-162/G-360 User’ s Guide 2-20 WLAN Networking Figure 2-6 WP A-PSK/WPA2-PSK Authentication 2.2.3 WP A and WP A2 with RADIUS Application Example You need the IP address of t he RADIUS server, its port num ber (default i s 1812), and the RADIU S shared secret. A WPA/W PA2 applica tion exa mple with a n exte rnal RADIUS server looks as follows[...]
-
Seite 31
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-21 Figure 2-7 WPA/WPA2 with RADIUS Application Example 2.2.4 IEEE 802.1x The IEEE 802.1x standard outlines enhance d security methods for both the authentica tion of wireless stations and encryption key managem e nt. Authentic ation can be done us ing an external R ADIUS server. EAP Authenticatio[...]
-
Seite 32
ZyXEL G-162/G-360 User’ s Guide 2-22 WLAN Networking 2.3 Fragment ation Threshold The Fragmentation Threshold is the maximum data frag ment size (betw een 256 and 24 32 bytes) th at can be sent in the wireless network befo re the ZyXEL G-162/G-360 will fragment the packet into smaller data frames. A larg e Fragmentation Threshold is recomm ended [...]
-
Seite 33
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-23 Stations can send frames s maller than the speci fied RTS/CTS Threshold directl y to th e AP withou t the RTS (Request To Send)/CTS (Clea r to Send) handshake. You should o nly configure RTS/CTS Threshold if the possibility of hid den nodes exists on your network and the “cos t” of resendi[...]
-
Seite 34
[...]
-
Seite 35
ZyXEL G-162/G-360 User’ s Guide Maintenance 3-1 Chapter 3 Maintenance This chapter describes how to uninstall or upgrade th e ZyXEL Utility and Driver. 3.1 The About Screen About screen displa ys relate d version num bers of th e ZyXEL Wireless LA N Adapter (G-162 or G-360). When you contact ZyXEL for the tech s upport, please tell us the utility[...]
-
Seite 36
ZyXEL G-162/G-360 User’ s Guide 3-2 Maintenance The following table describes the read-only fields in this s creen. About LABEL DESCRIPT ION Model Name This field displays the devic e’s model name. Driver Version This field display s the version number of the ZyXEL driver. Utility Version This field displays the version number of the ZyXEL util[...]
-
Seite 37
ZyXEL G-162/G-360 User’ s Guide Maintenance 3-3 3.3 Upgrading the ZyXEL Utility Before you uninst all the ZyXEL G-162/G-360v2 Utility , take note of the current netw ork c onfi gurat ion . To perform the upgrade, follow the steps below. Step 1. Download the latest version of the utility from the ZyXEL web site and save the file on your computer. [...]
-
Seite 38
[...]
-
Seite 39
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-1 Chapter 4 Configuring Wireless Security This ch apter co vers the con f iguration of security opti ons in the ZyXEL Utility. 4.1 Configuring Security You can configure your security sett in gs at any ti me. S imp ly sel ect th e wi reless AP/Ro uter f ound under Site Su rvey, do uble cl ick to[...]
-
Seite 40
ZyXEL G-162/G-360 User’ s Guide 4-2 Wireless Security 4.2 Configuring WEP 1. Select [ WEP] un der [Secur ity] 2. Select [A uto] under [A uthentication Mode] 3. Click [C onfigure]. You will then see the screen below. 4. Keep [Auto] in Authenticatio n Mode, which depen ding on AP/Router’s Authenticatio n Mode.[...]
-
Seite 41
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-3 5. [Create Keys Manua lly] Ent er W EP key exactly as you d id in your access point. Select the correct encrypt ion l evel to match your a ccess point . Eith er 64, 1 28, or 256-bit. T he encryp tion lev el set her must m atch the encryp tion level us ed by your AP/Router. 6. [Key Form at] Sel[...]
-
Seite 42
ZyXEL G-162/G-360 User’ s Guide 4-4 Wireless Security 9. Click [OK] to save your settings a nd retur n to the previous screen. 10. If you want to select 802.1 x authentica tio ns with WEP, you w ill need to con figure your 802.1x settings by checking [enable CCX mode] to see advanced settings. To configure the 802.1x authentication, pleas e refer[...]
-
Seite 43
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-5 4. Enter the sam e pass phrase us ed to configure W PA-PSK on your access po int. 5. The key you enter is m asked by de fault with asterisks (*). To v iew the key tha t you ente red, check [Unmas k].[...]
-
Seite 44
ZyXEL G-162/G-360 User’ s Guide 4-6 Wireless Security 4.4 Configuring WP A2-PSK 1. Select [W PA2 ] under [Securi ty Mode]. 2. Select [ PSK(Pre-Share d Key)] under [ Authentica tion Mode]. 3. Click [Configure] and then you will see the screen below.[...]
-
Seite 45
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-7 4. Enter the sam e pass phrase us ed to configure WPA -PSK on your access poin t. The same pass phrase used to configure W PA-PSK/W PA2-PSK on your access point. 5. The key you enter is m asked by de fault with asterisks (*). To v iew the key tha t you ente red, check [Unmas k].[...]
-
Seite 46
ZyXEL G-162/G-360 User’ s Guide 4-8 Wireless Security 4.5 Configuring WEP-802.1x 1. You need to know if y our AP/Router supp ort 802.1x or not and then follo w its configuration. 2. Check [Enable CCX mode] box when you ne ed to enable the 802.1x setting . Then the EPA mode of LEAP, PEAP-MS-CHAP-V2, PEAP-GTC and TLS wil l be s how n u nder [ Authe[...]
-
Seite 47
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-9 4.5.1 Configuring WEP-802.1x: EAP- LEAP 1. Select [WEP] under [Securi ty]. 2. Select [LEAP] under [A uthentication Mode] 3. Click [Configu re] and then you will see the screen below.[...]
-
Seite 48
ZyXEL G-162/G-360 User’ s Guide 4-10 Wireless Security 4. Select an appropri ate AP/R outer to i ndicate wh ether: a. The ut ility prompts yo u for them each t ime y ou try to c onnect to AP/Router b. Enter login name and password under the [Login Nam e] and [Password]. 5. The key you enter is masked by default with asterisks (*). To view the key[...]
-
Seite 49
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-11 4.5.2 Configuring WEP-802. 1x: EAP- PEAP-MS-CHAPv2 1. Select [WEP] under [Securi ty]. 2. Select [PEAP MS-CHAP-V2] un der [Authentica tion proto col] 3. Click [Configu re] and then you will see the screen below.[...]
-
Seite 50
ZyXEL G-162/G-360 User’ s Guide 4-12 Wireless Security 4. [Personal certif icate] enables you to suppl y a person al certificate. This wind ow is only appl icable with Ent erpris e security . Pleas e refe r to your MIS administrator for this setting. 5. To supply a per sonal certi ficate, please enter the user name assigned t o the certificate un[...]
-
Seite 51
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-13 4.5.3 Configuring W EP-802.1x: PEA P-GTC 1. Select [WEP] under [Securi ty]. 2. Select [PEA P-GTC] under [Authentica tion Mode]. 3. Click [Configu re] and then you will see the screen below.[...]
-
Seite 52
ZyXEL G-162/G-360 User’ s Guide 4-14 Wireless Security 4. Select an appropria te AP/Router to indica te whet her: a. The ut ility prompts yo u for them each t ime y ou try to c onnect to AP/Router b. Enter login name and password under the [Login Nam e] and [Password]. 5. The key you enter is m asked by de fault with as terisks (*). To view the k[...]
-
Seite 53
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-15 4.5.4 Configuring WEP-802.1x: EAP- TLS 1. Select [W EP] under [Security] . 2. Select [TLS] under [Authe nticatio n protoco l]. 3. Click [ Configure] and then you will see the screen below.[...]
-
Seite 54
ZyXEL G-162/G-360 User’ s Guide 4-16 Wireless Security 4. [Persona l certificate] enables you to supply a pers onal c ertificate. This w indow is only applicable with Enterprise se curity. Please refer to your MIS administrator for this setting. 5. To supply a personal certific ate, please enter the user name assigned to th e certificate under [U[...]
-
Seite 55
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-17 4.6 Configuring WP A-802.1x 3. You need to know if your AP/Router supp ort 802.1x or not and then follow up its configuratio n. 4. Check [Enable CCX m ode] box when you need to enable the 802. 1x setting. Then the EPA mode of LEAP, PEAP-MS-CHAP-V2, PEA P-GTC and TLS will be shown under [A uth[...]
-
Seite 56
ZyXEL G-162/G-360 User’ s Guide 4-18 Wireless Security 4.6.1 Configuring WP A-802.1x: EAP-LEAP 7. Select [ WPA] under [ Security] . 8. Select [ LEAP] unde r [Authenticat ion Mode] 9. Click [Configure] and then you will see the screen below.[...]
-
Seite 57
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-19 10. Select an ap propri ate AP/Route r to indica te whethe r: c. The utility prompts you for them each time you try to connect to AP/Router d. Enter login name and password under the [Login Name] and [Password]. 11. The key you enter is masked by default with asterisks (*). To view the key th[...]
-
Seite 58
ZyXEL G-162/G-360 User’ s Guide 4-20 Wireless Security 4.6.2 Configuring WP A-80 2.1x: EAP-PEAP- MS-CHAPv2 9. Select [ WPA] under [ Security] . 10. Select [ PEAP MS-CHA P-V2] under [ Authentica tion protoc ol] 11. Click [Configure] and then you will see the screen below.[...]
-
Seite 59
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-21 12. [Personal certif icate] enables yo u to supply a pers ona l certificate. This window is only applicab le with Enterprise security. Please refer to your MIS administrator for this setti ng. 13. To supply a personal certifi cate, please enter th e user name assign ed to th e certificate und[...]
-
Seite 60
ZyXEL G-162/G-360 User’ s Guide 4-22 Wireless Security 4.6.3 Configuring WP A-802.1x: PEAP-GTC 4. Select [ WPA] under [ Security] . 5. Select [ PEAP-GTC] under [A uthenticatio n Mode]. 6. Click [Configure] and then you will see the screen below.[...]
-
Seite 61
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-23 4. Select an appropriate AP/Rou ter to indicate wheth er: a. The utility prompts you for them each time you try to connect to AP/Router b. Enter login name and password under the [Login Name] and [Password]. 5. The key you enter is masked by defaul t with asterisks (*). To view the key that y[...]
-
Seite 62
ZyXEL G-162/G-360 User’ s Guide 4-24 Wireless Security 4.6.4 Configuring WP A-802.1x: EAP-TLS 4. Select [WPA] under [Security] . 5. Select [TLS] under [Authe ntication pro tocol]. 6. Click [Configure] and then you will see the screen below.[...]
-
Seite 63
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-25 4. [Personal certificate] enables you to supply a personal certif icate. This window is only applicable with Enterprise security. Please refer to your MIS ad ministrator for this se tting. 5. To supply a personal cert ificate, please ente r the user na me assigned to the cert ificate under [ [...]
-
Seite 64
ZyXEL G-162/G-360 User’ s Guide 4-26 Wireless Security 4.6.5 Configuring WP A2-802.1x: EAP-TLS 1. Select [WPA 2] under Security. 2. Select [TLS] under [Authe ntication pro tocol] 3. Click [Confi gure] and then y ou will see the screen be low.[...]
-
Seite 65
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-27 4. [Personal certificate] enables you to supply a personal certific ate. This w indow is only applicab le with Ente rprise security. Please refe r to your MIS adm inistra tor for this sett ing. 5. To supply a person al certifi cate, pl ease ent er the u ser n ame assign ed to th e certificat [...]
-
Seite 66
[...]
-
Seite 67
ZyXEL G-162/G-360 User’ s Guide Troubleshooti ng 5-1 Chapter 5 Troubleshooting This chapter covers potential probl ems and possibl e rem edies. After each p roblem descrip tion, some instru ctions are provid ed to help you diagnos e and solve the pro blem. 5.1 Problems S tarting th e ZyXEL Utility Program Table 5-1 Tr oubleshooting Starting ZyXEL[...]
-
Seite 68
ZyXEL G-162/G-360 User’ s Guide 5-2 Troublesho oting 5.2 Problems with LED St atus Table 5-2 Troublesho oting LED Status LED PWR is not On Make sure the ZyXEL G -162/G-360 is pro perly in serted. LED LINK is not On or Blinking Please check and make sure your AP/Router is up and ru nning. 5.3 Problems with the Link St atus Table 5-3 Troublesho oti[...]
-
Seite 69
ZyXEL G-162/G-360 User’ s Guide Troubleshooti ng 5-3 5.5 Problems Communicati ng W ith Other Computers Table 5-5 Troublesho oting Communication Problems PROBLEM CORRECTIVE ACTION The ZyXEL G-162/G-360 computer cann ot communicate with the other computer . Make sure your adapters are conn ected to the ne twork. A. Infrastructu re M ake sure that t[...]
-
Seite 70
[...]
-
Seite 71
ZyXEL G-162/G-360 User’ s Guide Appendix A i Appendix A T ypes of EAP Authentication This appendix discuss es the five pop ular EAP authen tication types : EAP-MD5 , E AP-TLS , EAP-TT LS , PEAP and LEAP . The type o f authentication yo u use depends on the RADIUS server. Consult your network adminis trator for m ore informatio n. For the EAP-MD5,[...]
-
Seite 72
ZyXEL G-162/G-360 User’ s Guide ii Appendix A LEAP LEAP (Lightweigh t Extensible Authe ntication Protocol) is a Cisco im plementation of IEEE802.1x. For added security, cer tific ate-based authentications (EAP- TLS, EAP-TTLS and PEAP) use dynamic keys for data enc ryption. They are often dep loyed in cor porate enviro nments, but for publ ic depl[...]