ZyXEL Communications G-162 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 72 pages
- 1.36 mb
Aller à la page of
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation ZyXEL Communications G-162. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel ZyXEL Communications G-162 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation ZyXEL Communications G-162 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation ZyXEL Communications G-162 devrait contenir:
- informations sur les caractéristiques techniques du dispositif ZyXEL Communications G-162
- nom du fabricant et année de fabrication ZyXEL Communications G-162
- instructions d'utilisation, de réglage et d’entretien de l'équipement ZyXEL Communications G-162
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage ZyXEL Communications G-162 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles ZyXEL Communications G-162 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service ZyXEL Communications en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées ZyXEL Communications G-162, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif ZyXEL Communications G-162, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation ZyXEL Communications G-162. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
ZyXEL G-162/G-360 User’s G uide ZyXEL G-162/G-360 (Hardware Revisi on v2) 802.11b/g Wireless LAN Adapter User's Guide Version 1.0 May 2005[...]
-
Page 2
ZyXEL G-162/G-360 User’ s Guide ii Copyright Copyright Copyright ©2005 by ZyXEL Communications Corp oration The contents of this publ ication ma y not be reproduced in any part or as a whole, transcribed, stored in a retrieva l system , translated into an y langua ge, or tra nsmitt ed in any form or by any means, electroni c, mechanical, magneti[...]
-
Page 3
ZyXEL G-162/G-360 User’ s Guide ZyXEL Limited Warranty iii ZyXEL Limited W arranty ZyXEL war rants to the or iginal en d user (purchaser) that this product is free from any defects in materials or workmanshi p for a period of u p to two (2) years fr om the date of purcha se. During the warranty perio d and upon proof of purchase, should the produ[...]
-
Page 4
ZyXEL G-162/G-360 User’ s Guide iv FCC Statement Federal Communications Commission (FCC) Interference S tatement FCC Certification The United States Federal Communicatio n (FCC) and the Canadian Department of Com municat ions have establ ished certa in rules gove rning the use of electronic eq uipm ent. Part 15, Class B The devic e complies with [...]
-
Page 5
ZyXEL G-162/G-360 User’ s Guide Customer Support v Customer Support When contacting your Cust omer Support R epresentati ve, please have the followi ng informatio n ready: Product model and serial nu mber. Warranty Information. The Date you purchased your prod uct. Brief description of the problem and the steps you to ok to solve [...]
-
Page 6
ZyXEL G-162/G-360 User’ s Guide vi Table of Conte nts T able of Content s Copy right ... ......... ........... ......... ........... ......... ......... ........... ......... ........... ......... ......... ........ .......... ......... ......... ........ i i ZyXEL Li mi ted Wa rran ty.......... ......... ............ ........... ......... ......[...]
-
Page 7
ZyXEL G-162/G-360 User’ s Guide Table Of Contents vii 2.5 OTIST (One T ou ch Int ellig ent Sec urit y Techn olog y) ... ........... ........... ........... ............ ........... ....... 2-23 Chap ter 3 Ma inte nanc e ... ........... ......... ......... ........... ......... ........... ......... ......... ........... ......... ..... .... .....[...]
-
Page 8
ZyXEL G-162/G-360 User’ s Guide viii Preface Preface Congratulat ions on the purchase of yo ur new ZyXEL G-162/G-360! About This U ser's Guide This manual provides inform ation ab out the ZyXEL Wireless LAN Utility. Synt ax Conventions • “Type” or “Enter” means for you to type one or more characters. "Select" or "Cho[...]
-
Page 9
ZyXEL G-162/G-360 User’ s Guide Preface ix Graphics Ico ns Key Wireless Access Point Computer Notebook computer Server Modem Wireless Signal Telephone Switch Router[...]
-
Page 10
[...]
-
Page 11
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-1 Chapter 1 Getting Started This chapter introduces the ZyXEL G-162/G-360 and prepares you to use the ZyXEL Utility. 1.1 About Y our ZyXEL G-162/G-360 The ZyXEL G-162/ G-360 is an IEEE 802.11b and 802.11g complia n t wireless LAN adapt ers. With the ZyXEL G-162/G-360, you can enjoy wireless mobil[...]
-
Page 12
ZyXEL G-162/G-360 User’ s Guide 1-2 WLAN Net wor king Double-c lick ing on the Z icon will dis pla y th e following ZyXEL utility window. Each of the pages (Site Survey, Profile, Link Info, About) presen ted in the ZyXEL Utility are explained in the follo wing section s.[...]
-
Page 13
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-3 1.3.1 Site Survey Site Survey screen shows how the network is presently co nfi gured: ne twork m ode, inform ation, channel, signal strength, etc. The Select ed Network window show s you a list of SSI Ds in your v icinity. Inf ormation regarding each SSID is also show n as Security Status, SSID[...]
-
Page 14
ZyXEL G-162/G-360 User’ s Guide 1-4 WLAN Net wor king Use Windows Zero Configuration Checking this box will allow you to use Windows to co nfigure your wire less network se ttings. When you check this box to configure, you will no longer use ZyXEL’s utility. Connect Clicking on this bottom will gu ide you to the fol lowing Profile Config uratio[...]
-
Page 15
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-5 should use the sam e SSID (whatever your choice is). TX Rate This field displays t he current data transm ission rate in Megabit per second (Mbps). RX Rate This field disp lays the current data receiving rate in Megabit per second (Mbps). Signal Strength This shows the strength of the signal (t[...]
-
Page 16
ZyXEL G-162/G-360 User’ s Guide 1-6 WLAN Net wor king a. [Profile ] Defa ult pr ofile nam e is ZyXEL. You m ay also ent er in a descr iptive nam e for this pr ofile. b. [SSID Name] is depends on the A P/Router you connect to from Site Surv ey page. c. [Network Mod e] if connec ting to an AP/R outer, cho o se “Infras tructure”. If you a re goi[...]
-
Page 17
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-7 2.2) [Enable CCX Mode] refers the Cisco Com patib le Extension, whi ch is the certi ficate-ba sed authentications (EAP-TLS , PEAP and LEAP) using dy nam ic keys for data encryption. Check this box will en able PEAP-MS-CHAP-V2, PEAP-G TC, T LS and LEAP. Pl ease see your MIS administrat or for th[...]
-
Page 18
ZyXEL G-162/G-360 User’ s Guide 1-8 WLAN Net wor king Advanced Mode : This screen (Botto m Red Rectangle) allows yo u to make changes to the default ways the card operates in cluding adv anced 80 2.1 1 settings. Unless y o u are an ad vanced user and have deep knowledge ab out each property on this page, it is recommended tha t you leave them at [...]
-
Page 19
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-9 [Turbo Mode] allows y ou either “Active” or “ Inactive” th e 22Mbps and 125Mbp s. The information wil l be also shown unde r Link Info screen . Please refer to 1.1.3 Lin k Info for the detail exp lanation. [Packet Bu rst] allows you e ither “Activ e” or “Inactive” the packet bur[...]
-
Page 20
ZyXEL G-162/G-360 User’ s Guide 1-10 WLAN Networking Profil e Pool A li st of inactiv e profi les, wh ich are not cu rrently c onnected to AP/ Router. Defau lt prof ile name i s set “ZyXEL”. You can add new profile by clicking [N ew], modif y profile by clic king [ Edit] and delete it by clicking [Delet e]. Active Profiles 1) A list of active[...]
-
Page 21
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-11 1.3.3 Link Info Link Info screen shows th e current configurat ion an d connect ion stat us of yo ur G-162/ G-360. The Link Info shows you the information inc luding Rec eive, Transmit, Co nnection Informat ion, Network informatio n and OTIST.[...]
-
Page 22
ZyXEL G-162/G-360 User’ s Guide 1-12 WLAN Networking OTIST Function (Above Red Rectang le) OTIST (O ne T ouch In tell igent Sec urity T echno logy ) is the ZyXEL propriet ary one bottom security technology . Y ou must have th e ZyXEL P-334WT ro uter or othe r ZyXEL AP/Router suppor ting O TIST to set the wire less adapter to use the sam e wireles[...]
-
Page 23
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-13 Transmit Good Packets This field dis plays the total num ber of good packets tra nsmit ted Total Bytes This field displays the total num ber of bytes t ransmitted Connection Information Associa tio n Reje cts This field disp lays t he tota l number of rejecti ons when connectin g between Acces[...]
-
Page 24
ZyXEL G-162/G-360 User’ s Guide 1-14 WLAN Networking 1.3.4 About About screen shows you the product nam e and software informati on of the current client device (G-1 62 or G-360) you are usi ng. ZyX EL W e bs it e Clicking , You can go to ZyXEL US website for up grading driver, utility and updating user’s gu ide as well as registering products.[...]
-
Page 25
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-15 Chapter 2 Wireless LAN Networking This chapter provid es background inf ormation on general wirele ss LAN netw orkin g technol ogy and term inolog y. 2.1 Overview This section describes the wireless LA N network term s and applica tions. 2.1.1 SSID The SSID (Service Set Iden tity) is a unique [...]
-
Page 26
ZyXEL G-162/G-360 User’ s Guide 2-16 WLAN Networking Ad-Hoc (IBSS) Ad-hoc mode does not require an AP or a wired ne twork. Two or more wireless stations comm unicate directly to each ot her. A n ad-hoc netw ork may som e tim es be referred to as an Independe nt Basic Service Set (IBSS). Figure 2-1 IB SS Example T o set up an ad-hoc netw ork, conf[...]
-
Page 27
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-17 Figure 2-3 Infras tructure N etwork Exam ple 2.1.5 Roaming In an infrastructure network, wireless stations are ab le to switch from one BSS to another as they move between the co verage areas. During this period, the wi re less sta tions m aintai n uninter rupte d connec tion to the netw ork. [...]
-
Page 28
ZyXEL G-162/G-360 User’ s Guide 2-18 WLAN Networking Figure 2-4 R o aming Exa mple 2.2 Wireless LAN Securi ty Wireless LAN security is vital to your network to protect wireless comm unication between wireless stations and the wired ne twork. The figure below shows the possib le wireless security levels o n your ZyXEL G-162/G-360. EAP (Extensible [...]
-
Page 29
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-19 Configure the wireless LAN se curity us ing the Profil e Security Settings scre en. If you do not enabl e any wireless secur ity on your Z yXEL G-162 /G-360, t h e ZyXEL G-162 /G-360’s wire less communi cations ar e accessible to any wireless netw orking device that is i n the co verage are [...]
-
Page 30
ZyXEL G-162/G-360 User’ s Guide 2-20 WLAN Networking Figure 2-6 WP A-PSK/WPA2-PSK Authentication 2.2.3 WP A and WP A2 with RADIUS Application Example You need the IP address of t he RADIUS server, its port num ber (default i s 1812), and the RADIU S shared secret. A WPA/W PA2 applica tion exa mple with a n exte rnal RADIUS server looks as follows[...]
-
Page 31
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-21 Figure 2-7 WPA/WPA2 with RADIUS Application Example 2.2.4 IEEE 802.1x The IEEE 802.1x standard outlines enhance d security methods for both the authentica tion of wireless stations and encryption key managem e nt. Authentic ation can be done us ing an external R ADIUS server. EAP Authenticatio[...]
-
Page 32
ZyXEL G-162/G-360 User’ s Guide 2-22 WLAN Networking 2.3 Fragment ation Threshold The Fragmentation Threshold is the maximum data frag ment size (betw een 256 and 24 32 bytes) th at can be sent in the wireless network befo re the ZyXEL G-162/G-360 will fragment the packet into smaller data frames. A larg e Fragmentation Threshold is recomm ended [...]
-
Page 33
ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-23 Stations can send frames s maller than the speci fied RTS/CTS Threshold directl y to th e AP withou t the RTS (Request To Send)/CTS (Clea r to Send) handshake. You should o nly configure RTS/CTS Threshold if the possibility of hid den nodes exists on your network and the “cos t” of resendi[...]
-
Page 34
[...]
-
Page 35
ZyXEL G-162/G-360 User’ s Guide Maintenance 3-1 Chapter 3 Maintenance This chapter describes how to uninstall or upgrade th e ZyXEL Utility and Driver. 3.1 The About Screen About screen displa ys relate d version num bers of th e ZyXEL Wireless LA N Adapter (G-162 or G-360). When you contact ZyXEL for the tech s upport, please tell us the utility[...]
-
Page 36
ZyXEL G-162/G-360 User’ s Guide 3-2 Maintenance The following table describes the read-only fields in this s creen. About LABEL DESCRIPT ION Model Name This field displays the devic e’s model name. Driver Version This field display s the version number of the ZyXEL driver. Utility Version This field displays the version number of the ZyXEL util[...]
-
Page 37
ZyXEL G-162/G-360 User’ s Guide Maintenance 3-3 3.3 Upgrading the ZyXEL Utility Before you uninst all the ZyXEL G-162/G-360v2 Utility , take note of the current netw ork c onfi gurat ion . To perform the upgrade, follow the steps below. Step 1. Download the latest version of the utility from the ZyXEL web site and save the file on your computer. [...]
-
Page 38
[...]
-
Page 39
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-1 Chapter 4 Configuring Wireless Security This ch apter co vers the con f iguration of security opti ons in the ZyXEL Utility. 4.1 Configuring Security You can configure your security sett in gs at any ti me. S imp ly sel ect th e wi reless AP/Ro uter f ound under Site Su rvey, do uble cl ick to[...]
-
Page 40
ZyXEL G-162/G-360 User’ s Guide 4-2 Wireless Security 4.2 Configuring WEP 1. Select [ WEP] un der [Secur ity] 2. Select [A uto] under [A uthentication Mode] 3. Click [C onfigure]. You will then see the screen below. 4. Keep [Auto] in Authenticatio n Mode, which depen ding on AP/Router’s Authenticatio n Mode.[...]
-
Page 41
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-3 5. [Create Keys Manua lly] Ent er W EP key exactly as you d id in your access point. Select the correct encrypt ion l evel to match your a ccess point . Eith er 64, 1 28, or 256-bit. T he encryp tion lev el set her must m atch the encryp tion level us ed by your AP/Router. 6. [Key Form at] Sel[...]
-
Page 42
ZyXEL G-162/G-360 User’ s Guide 4-4 Wireless Security 9. Click [OK] to save your settings a nd retur n to the previous screen. 10. If you want to select 802.1 x authentica tio ns with WEP, you w ill need to con figure your 802.1x settings by checking [enable CCX mode] to see advanced settings. To configure the 802.1x authentication, pleas e refer[...]
-
Page 43
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-5 4. Enter the sam e pass phrase us ed to configure W PA-PSK on your access po int. 5. The key you enter is m asked by de fault with asterisks (*). To v iew the key tha t you ente red, check [Unmas k].[...]
-
Page 44
ZyXEL G-162/G-360 User’ s Guide 4-6 Wireless Security 4.4 Configuring WP A2-PSK 1. Select [W PA2 ] under [Securi ty Mode]. 2. Select [ PSK(Pre-Share d Key)] under [ Authentica tion Mode]. 3. Click [Configure] and then you will see the screen below.[...]
-
Page 45
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-7 4. Enter the sam e pass phrase us ed to configure WPA -PSK on your access poin t. The same pass phrase used to configure W PA-PSK/W PA2-PSK on your access point. 5. The key you enter is m asked by de fault with asterisks (*). To v iew the key tha t you ente red, check [Unmas k].[...]
-
Page 46
ZyXEL G-162/G-360 User’ s Guide 4-8 Wireless Security 4.5 Configuring WEP-802.1x 1. You need to know if y our AP/Router supp ort 802.1x or not and then follo w its configuration. 2. Check [Enable CCX mode] box when you ne ed to enable the 802.1x setting . Then the EPA mode of LEAP, PEAP-MS-CHAP-V2, PEAP-GTC and TLS wil l be s how n u nder [ Authe[...]
-
Page 47
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-9 4.5.1 Configuring WEP-802.1x: EAP- LEAP 1. Select [WEP] under [Securi ty]. 2. Select [LEAP] under [A uthentication Mode] 3. Click [Configu re] and then you will see the screen below.[...]
-
Page 48
ZyXEL G-162/G-360 User’ s Guide 4-10 Wireless Security 4. Select an appropri ate AP/R outer to i ndicate wh ether: a. The ut ility prompts yo u for them each t ime y ou try to c onnect to AP/Router b. Enter login name and password under the [Login Nam e] and [Password]. 5. The key you enter is masked by default with asterisks (*). To view the key[...]
-
Page 49
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-11 4.5.2 Configuring WEP-802. 1x: EAP- PEAP-MS-CHAPv2 1. Select [WEP] under [Securi ty]. 2. Select [PEAP MS-CHAP-V2] un der [Authentica tion proto col] 3. Click [Configu re] and then you will see the screen below.[...]
-
Page 50
ZyXEL G-162/G-360 User’ s Guide 4-12 Wireless Security 4. [Personal certif icate] enables you to suppl y a person al certificate. This wind ow is only appl icable with Ent erpris e security . Pleas e refe r to your MIS administrator for this setting. 5. To supply a per sonal certi ficate, please enter the user name assigned t o the certificate un[...]
-
Page 51
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-13 4.5.3 Configuring W EP-802.1x: PEA P-GTC 1. Select [WEP] under [Securi ty]. 2. Select [PEA P-GTC] under [Authentica tion Mode]. 3. Click [Configu re] and then you will see the screen below.[...]
-
Page 52
ZyXEL G-162/G-360 User’ s Guide 4-14 Wireless Security 4. Select an appropria te AP/Router to indica te whet her: a. The ut ility prompts yo u for them each t ime y ou try to c onnect to AP/Router b. Enter login name and password under the [Login Nam e] and [Password]. 5. The key you enter is m asked by de fault with as terisks (*). To view the k[...]
-
Page 53
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-15 4.5.4 Configuring WEP-802.1x: EAP- TLS 1. Select [W EP] under [Security] . 2. Select [TLS] under [Authe nticatio n protoco l]. 3. Click [ Configure] and then you will see the screen below.[...]
-
Page 54
ZyXEL G-162/G-360 User’ s Guide 4-16 Wireless Security 4. [Persona l certificate] enables you to supply a pers onal c ertificate. This w indow is only applicable with Enterprise se curity. Please refer to your MIS administrator for this setting. 5. To supply a personal certific ate, please enter the user name assigned to th e certificate under [U[...]
-
Page 55
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-17 4.6 Configuring WP A-802.1x 3. You need to know if your AP/Router supp ort 802.1x or not and then follow up its configuratio n. 4. Check [Enable CCX m ode] box when you need to enable the 802. 1x setting. Then the EPA mode of LEAP, PEAP-MS-CHAP-V2, PEA P-GTC and TLS will be shown under [A uth[...]
-
Page 56
ZyXEL G-162/G-360 User’ s Guide 4-18 Wireless Security 4.6.1 Configuring WP A-802.1x: EAP-LEAP 7. Select [ WPA] under [ Security] . 8. Select [ LEAP] unde r [Authenticat ion Mode] 9. Click [Configure] and then you will see the screen below.[...]
-
Page 57
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-19 10. Select an ap propri ate AP/Route r to indica te whethe r: c. The utility prompts you for them each time you try to connect to AP/Router d. Enter login name and password under the [Login Name] and [Password]. 11. The key you enter is masked by default with asterisks (*). To view the key th[...]
-
Page 58
ZyXEL G-162/G-360 User’ s Guide 4-20 Wireless Security 4.6.2 Configuring WP A-80 2.1x: EAP-PEAP- MS-CHAPv2 9. Select [ WPA] under [ Security] . 10. Select [ PEAP MS-CHA P-V2] under [ Authentica tion protoc ol] 11. Click [Configure] and then you will see the screen below.[...]
-
Page 59
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-21 12. [Personal certif icate] enables yo u to supply a pers ona l certificate. This window is only applicab le with Enterprise security. Please refer to your MIS administrator for this setti ng. 13. To supply a personal certifi cate, please enter th e user name assign ed to th e certificate und[...]
-
Page 60
ZyXEL G-162/G-360 User’ s Guide 4-22 Wireless Security 4.6.3 Configuring WP A-802.1x: PEAP-GTC 4. Select [ WPA] under [ Security] . 5. Select [ PEAP-GTC] under [A uthenticatio n Mode]. 6. Click [Configure] and then you will see the screen below.[...]
-
Page 61
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-23 4. Select an appropriate AP/Rou ter to indicate wheth er: a. The utility prompts you for them each time you try to connect to AP/Router b. Enter login name and password under the [Login Name] and [Password]. 5. The key you enter is masked by defaul t with asterisks (*). To view the key that y[...]
-
Page 62
ZyXEL G-162/G-360 User’ s Guide 4-24 Wireless Security 4.6.4 Configuring WP A-802.1x: EAP-TLS 4. Select [WPA] under [Security] . 5. Select [TLS] under [Authe ntication pro tocol]. 6. Click [Configure] and then you will see the screen below.[...]
-
Page 63
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-25 4. [Personal certificate] enables you to supply a personal certif icate. This window is only applicable with Enterprise security. Please refer to your MIS ad ministrator for this se tting. 5. To supply a personal cert ificate, please ente r the user na me assigned to the cert ificate under [ [...]
-
Page 64
ZyXEL G-162/G-360 User’ s Guide 4-26 Wireless Security 4.6.5 Configuring WP A2-802.1x: EAP-TLS 1. Select [WPA 2] under Security. 2. Select [TLS] under [Authe ntication pro tocol] 3. Click [Confi gure] and then y ou will see the screen be low.[...]
-
Page 65
ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-27 4. [Personal certificate] enables you to supply a personal certific ate. This w indow is only applicab le with Ente rprise security. Please refe r to your MIS adm inistra tor for this sett ing. 5. To supply a person al certifi cate, pl ease ent er the u ser n ame assign ed to th e certificat [...]
-
Page 66
[...]
-
Page 67
ZyXEL G-162/G-360 User’ s Guide Troubleshooti ng 5-1 Chapter 5 Troubleshooting This chapter covers potential probl ems and possibl e rem edies. After each p roblem descrip tion, some instru ctions are provid ed to help you diagnos e and solve the pro blem. 5.1 Problems S tarting th e ZyXEL Utility Program Table 5-1 Tr oubleshooting Starting ZyXEL[...]
-
Page 68
ZyXEL G-162/G-360 User’ s Guide 5-2 Troublesho oting 5.2 Problems with LED St atus Table 5-2 Troublesho oting LED Status LED PWR is not On Make sure the ZyXEL G -162/G-360 is pro perly in serted. LED LINK is not On or Blinking Please check and make sure your AP/Router is up and ru nning. 5.3 Problems with the Link St atus Table 5-3 Troublesho oti[...]
-
Page 69
ZyXEL G-162/G-360 User’ s Guide Troubleshooti ng 5-3 5.5 Problems Communicati ng W ith Other Computers Table 5-5 Troublesho oting Communication Problems PROBLEM CORRECTIVE ACTION The ZyXEL G-162/G-360 computer cann ot communicate with the other computer . Make sure your adapters are conn ected to the ne twork. A. Infrastructu re M ake sure that t[...]
-
Page 70
[...]
-
Page 71
ZyXEL G-162/G-360 User’ s Guide Appendix A i Appendix A T ypes of EAP Authentication This appendix discuss es the five pop ular EAP authen tication types : EAP-MD5 , E AP-TLS , EAP-TT LS , PEAP and LEAP . The type o f authentication yo u use depends on the RADIUS server. Consult your network adminis trator for m ore informatio n. For the EAP-MD5,[...]
-
Page 72
ZyXEL G-162/G-360 User’ s Guide ii Appendix A LEAP LEAP (Lightweigh t Extensible Authe ntication Protocol) is a Cisco im plementation of IEEE802.1x. For added security, cer tific ate-based authentications (EAP- TLS, EAP-TTLS and PEAP) use dynamic keys for data enc ryption. They are often dep loyed in cor porate enviro nments, but for publ ic depl[...]