Zoom 4410B manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Zoom 4410B. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Zoom 4410B ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Zoom 4410B décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Zoom 4410B devrait contenir:
- informations sur les caractéristiques techniques du dispositif Zoom 4410B
- nom du fabricant et année de fabrication Zoom 4410B
- instructions d'utilisation, de réglage et d’entretien de l'équipement Zoom 4410B
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Zoom 4410B ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Zoom 4410B et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Zoom en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Zoom 4410B, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Zoom 4410B, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Zoom 4410B. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    Wi r e l e s s- G USB Adapter USER GUIDE[...]

  • Page 2

    Wireless-G USB Adapter 2[...]

  • Page 3

    Contents 3 Contents Overview .................................................................. 4 1. Installation Instructions ...................................... 5 Installing and Connecti ng the Adapter .................... 6 The Adapter LED .................................................... 9 2. Setting S ecurity ............................[...]

  • Page 4

    Wireless-G USB Adapter 4 Overview The chapters in this User Guide descri be how to: • Install the Zoom Wireless-G USB adapter on a Wind ows ® PC • Connect to a wireless network • Enable security on the Wireless-G USB adapter • Use the advanced features of the Wirele ss-G USB configuration software Chapters 1 and 2 cover the basi cs – wha[...]

  • Page 5

    Chapter 1: Installation Instructio ns 5 1 Installation Instructions This chapter provides sim ple instructions for installing the Wireless-G USB adapter on a Windows PC. If you ha ve already installed the adapter on a comput er (usi ng the separate Quick Start guide), you can ski p this chapter and begin with Chapter 2: Setting Security. What’s i[...]

  • Page 6

    Installing and Connecting the Adapter Important! Install the software BEFORE you plug the Wireless- G USB adapter into your computer. 1 Insert the Wireless-G USB CD into the CD or DV D drive. The CD should start automati cally. Windows Vista: If the AutoPlay dialog box appears, click Run Setup.exe . If a message appears sayi ng An unidentified prog[...]

  • Page 7

    Windows Vista: If a message tells you that Wind ows can't verify the publisher of the driver software, select Install this driver soft ware anyway . 5 At the prompt, click Finish and remove the CD. If the Zoom installation menu remains on scree n, click Exit . 6 Shut down the computer. 7 Plug in the USB Adapter and turn your computer back on. [...]

  • Page 8

    2 In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless net works. 3 Highlight the network you want and cli ck Join . If the network you select has security configured, you must enable and configure securi ty on your computer before you can connect. See Chapter 2, Settin g Security . 4 If you join a wirele[...]

  • Page 9

    Chapter 1: Installation Instructio ns 9 The Adapter LED The states of the LED on the Wireless-G USB adapter are explained below. LED Status Meaning Flashing The Wireless-G USB adapter is attempting to connect to a wireless net work. Steady The Wireless-G USB adapter is connected to a wireless network and is transmitting or receiving data.[...]

  • Page 10

    2 Setting Security We strongly recommen d security, although you do not need to use it to get your wireless connection wo rking. Important! You must first enable secu rity on the the wireless access point. You then enable secu rity on the adapter using the same configuration that you used for the access poi nt. For example, if the wireless access p[...]

  • Page 11

    This option requires you to enter an encryption key sh ared by the access point. • WEP ( W ired E quivalent P rivacy) Both the Open and Shared Authentication modes require WEP security. The most recent assessments of WEP advise choosing Open rathe r than Shared. If the devices in your network do not support WPA2-PSK or WPA-PSK, select Open with W[...]

  • Page 12

    2 The Zoom Wireless-G USB configuration software open s to display the configuration paramete rs: 3 Make sure that the desired wirele ss network is displa yed in the Profile and SSID text boxes (the term <Infra> designates an Infrastructure network) and that the Net w ork Typ e is correct. There are two types of wireless networks: Infrastruct[...]

  • Page 13

    Chapter 2: Setting Security 13 • In the unlikely event that you use an Ad Hoc network, you must set up Static IP addressing. See Appendix A: TCP/IP Settings . 4 Select the Enable Security check box to open the Security Configuration window. For configuratio n instructions, consult this table: To configure Go to page WPA2-PSK 14 WPA-PSK 15 WEP 15 [...]

  • Page 14

    WP A2-PSK (Pre-Shared Key) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2- PSK . 2 At Encryption Mode , accept the default: AES ( A dvanced E ncryption S tandard). 3 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a[...]

  • Page 15

    WP A - PSK (Pre - Shared Key) If all of the wireless devices in your network DO NOT supp ort the recommended WPA2-PSK, select WPA-PSK. 1 In the Privacy Configuration window, click the Authentication Mode drop-down a rrow and select WPA- PSK . 2 At Encryption Mode , accept the default: TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the Pre-shared[...]

  • Page 16

    That’s it! You have configured WPA-PSK security for your wireless connection, and you’re rea dy to use the Internet. WEP (W ired Equivalent Privacy) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select Open (recommend ed) or Shared : The USB Adapter automatically select s WEP as the Encryption Mode. [...]

  • Page 17

    Chapter 2: Setting Security 17 • Hexadecimal digits if an access point, router, or some adapters are not Zoo m products b c d In the Key Length drop-down lis t, select 128 bits , 64 bits , or 256 bits . Note: 128-bit and 256-bit WEP provide more security than 64-bit, but the longer keys could di minish network performance. In the Key Index drop-d[...]

  • Page 18

    6 Click the Close box to exit the configuration software. That’s it! You have configured W EP secu rity for your wi reless connection, and you’re ready to use the Internet. WP A2 Select WPA2 if: • you are linking to a corporat e network that use s a RADIUS ( R emote A uthentication D ial- I n U ser S ervice) authe ntication server • all of [...]

  • Page 19

    1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2 . 2 At Encryption Mode , accept the default AES ( A dvanced E ncryption S tandard) 3 In the IEEE 802.1X Authentica tion area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentic[...]

  • Page 20

    • TTLS ( T unneled T ransport L ayer S ecurity). With TTLS, you can select from four authentication e xtensions: PAP ( P assword A uthentication P roto col) CHAP ( C hallenge H andshake A uthentication P rotocol) MS-CHAP (Microsoft’s ve rsion of CHAP). MS-CHAPV2 (the default). • SIM ( S ubscriber I dentity M odule). A SIM card stores t he key[...]

  • Page 21

    2 Accept the default Authentication Mode : TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With I EEE 802.1X authentication, each wireless device (client) sends a sig nal to the wireless access point, which in turn s[...]

  • Page 22

    • PEAP ( P rotected E xtensible A uthentication P rotocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handsh ake Authentication Protocol. GTC • TLS ( T ransport L ayer S e curity). There are no authentication extension options with TL[...]

  • Page 23

    Certificate (WP A2 and WP A) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security o f the network. If you are linking to a corporate network that uses an authentication server and you have con figured WPA2 or[...]

  • Page 24

    W iFi™ Protected Setup (WPS) If your access point supports W iFi P rotected S etup (WPS), this protocol can greatly simplify t he process of configuring WPA2- PSK or WPA-PSK security. To access WPS, on the Configuration tab, click the WPS button to open the WPS Config screen: 1 If you are like most users, you will want to join a wireless network [...]

  • Page 25

    Chapter 2: Setting Security 25 a You can select the Push Button option if your access point has a hardware Secure Setup o r similarly named button, or a virtual pushbutton on a software display. Before you initiate WPS by clicking Next, go to the access point and activate its pushbutton. The acce ss point will begin accepting WPS connections. Now, [...]

  • Page 26

    Wireless-G USB Adapter 26 Changing your Security Setting If the type of security on your wireless network cha nges, you need to modify your securit y settings. On the Configuration tab, click the Con figure Security button to select a different security option and enter the required information.[...]

  • Page 27

    3 Advanced Options The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the si gnal stren gth of your network connection, scan available net works, and specify advanced settings. This chapter tells you whe n and how to use each of these options. Creating Profiles A profile is a collection of settings needed for a par[...]

  • Page 28

    3 In the Configuration area, enter the following setting s: • SSID – Enter the network name. In the example above, the SSID is Home . • Network Ty pe – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop -down list, select the channel used by the other device(s) in the network. If you are setting up the first comput[...]

  • Page 29

    • Enable Security – Select this check box to open the Security Configuration window. Note: If you are se tting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, cli ck OK to return to the Configuration tab. 4 In the Configuration area, click the Apply button to save the sett[...]

  • Page 30

    Monitoring Link Status The Status area on the Configuration tab displays in formation about your wireless connection: • State : In an Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected. In an ad hoc network, the virtual MAC addre ss used by computers in the network. • Current Ch[...]

  • Page 31

    Using Site Survey and Re s ca n Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network nam es ( ESSIDs) so you can connect to a network • Identify the MAC add ress (BSSID) of your wireless access point or wireless router • Che ck the channel difference bet ween your network a nd oth[...]

  • Page 32

    32 Wireless-G USB Adapter The information displayed on the Site Surv ey tab is as follows: • ESSID ( E xtended S ervice S et Id entifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network. The ESSID is a code attached to[...]

  • Page 33

    Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Wireless Mode : • Power Save Enabled : When you select this option, the Wireless-G USB adapter immediately signals the acce ss point that it is in Power Save mode. The access point buffers all packets until it is polled by the adapter. Note: The [...]

  • Page 34

    Appendix A TCP/IP Settings By default, Windows is set for dynamic addre ssing (DHCP). Generally, this is the correct se tting for an Infrastructure network, but needs to be changed if you are usi ng an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the sectio[...]

  • Page 35

    c In the Network Connec tions window, double-clic k the Wireless Network Connection option: d In the Wireless Net work Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Settings 35[...]

  • Page 36

    e In the Wireless Net work Connection Properties dialog box, highlight the version of TCP/IP (Transmi ssion Control Protocol/Internet Protocol) that you are using and click the Properties button: f If you have an ad hoc network, continue with Step 2 below. If you have an infrastructure network, continue with Step 3 below. If you're not sure wh[...]

  • Page 37

    c Enter 255.255.255.0 for Subnet ma sk . The Subnet mask should be the same for each comp uter in your ad hoc netw ork. d Enter 10.0.0.5 for De fault gateway and Preferred DNS server . (This is the IP address of the first computer that was set up in your ad hoc network.) T he Default Gateway and Preferred DNS server should be the same for each comp[...]

  • Page 38

    38 Wireless-G USB Adapter c Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure net work. Windows XP 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box. a From the desktop, click the Start button, sele ct Control Panel , and then click Net work Co[...]

  • Page 39

    Appendix A: TCP/IP Settings 39 Gateway and Preferred DNS server should be the same for each computer in your ad ho c network. e Click OK twice. That’s it! You have set static IP addressing for a Wi ndows XP computer in an ad hoc net work. 3 For Infrastructure Networks : To verify your DHCP settings, complete the following: a Ensure that Obtain an[...]

  • Page 40

    40 Wireless-G USB Adapter 2 Complete the following steps to set stati c IP addressing: a In the Internet Protocol (TCP/IP) Properties dial og box, ensure that Obtain an IP address automatically is not selected. Then make sure the butto ns labeled Use the following IP address and Use the follo w ing DNS server addresses are selected. b If this is th[...]

  • Page 41

    Appendix B: Troubleshooting 41 Appendix B Troubleshooting ¾ If your Zoom Wireless-G USB ad apter is not working properly, try these suggestions . • Make sure the adapter is secu rely connected to the computer, either dire ctly or through its USB extender cable. • Perform a power cycle – take the follo wing steps in the order given: 1. Turn o[...]

  • Page 42

    42 Wireless-G USB Adapter as these settings for the other devices in your wirele ss network. 2 Then click the Security tab and check t he settings to make sure that the adapter is configured for the same security system as the other devices in your wireless net work. Make sure that your secu rity key is the same – remember that the keys are case-[...]

  • Page 43

    Appendix C: Zoom Technical Support Services 43 Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenie nt, professional support responsive to our cu stomers’ needs and ca pabilities. If you find yourself unable to get your Zoom product to operate, and yo[...]

  • Page 44

    44 Wireless-G USB Adapter World Wide Web Zoom’s Web page lets you send em ail for assistance, registe r on-line, access product re views and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Produ ct. To access Zoom’s Web page, please log onto your local Internet Se[...]

  • Page 45

    Appendix C: Zoom Technical Support Services 45 Contact Zoom by Email You can email Zoom with any tech supp ort questions you might have and one of our Technical Supp ort Engineers will respond by email within 2 business days. You ma y request personal assistance via email at www.zoom.com/techmail . When emailing Zoom, be sure to include the followi[...]

  • Page 46

    46 Wireless-G USB Adapter Return of Defective Units Please contact your local distributor or reselle r for Factory Authorized Repair or Replacem ent of your In-Warranty Defective Product . If you are unable to reach you r distributor, you can contact the Zoom Facto r y Customer Service by calling: US: (617) 753-00 23 UK: 0870 720 0090 Please note t[...]

  • Page 47

    Appendix D: Regulato ry Information 47 Appendix D Regulatory Information U.S. FCC Part 15 Emissions Stateme nt This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protec tion against harmful interference in a residentia[...]

  • Page 48

    48 Wireless-G USB Adapter Countries of Operation & C onditions of Use in the European Co mmunity This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must [...]

  • Page 49

    Declaration of Conformit y Declaration of Conformity Overensstemmelseserklæring Déclaration de conformité Conformiteitsverklaring v an de EU Konformitätserklärung Δήλωση Συμμόρφωσης Dichiarazione di conformità Deklaracja zgodno ś ci Declaração de Conformidade Declaración de conformidad Konformitetsdeklaration Cam k ế t [...]

  • Page 50

    0888-A 27478 ©2008 NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form. The manufacturer does not warrant that [...]