Zoom 4410B manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Zoom 4410B, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Zoom 4410B one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Zoom 4410B. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Zoom 4410B should contain:
- informations concerning technical data of Zoom 4410B
- name of the manufacturer and a year of construction of the Zoom 4410B item
- rules of operation, control and maintenance of the Zoom 4410B item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Zoom 4410B alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Zoom 4410B, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Zoom service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Zoom 4410B.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Zoom 4410B item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Wi r e l e s s- G USB Adapter USER GUIDE[...]

  • Page 2

    Wireless-G USB Adapter 2[...]

  • Page 3

    Contents 3 Contents Overview .................................................................. 4 1. Installation Instructions ...................................... 5 Installing and Connecti ng the Adapter .................... 6 The Adapter LED .................................................... 9 2. Setting S ecurity ............................[...]

  • Page 4

    Wireless-G USB Adapter 4 Overview The chapters in this User Guide descri be how to: • Install the Zoom Wireless-G USB adapter on a Wind ows ® PC • Connect to a wireless network • Enable security on the Wireless-G USB adapter • Use the advanced features of the Wirele ss-G USB configuration software Chapters 1 and 2 cover the basi cs – wha[...]

  • Page 5

    Chapter 1: Installation Instructio ns 5 1 Installation Instructions This chapter provides sim ple instructions for installing the Wireless-G USB adapter on a Windows PC. If you ha ve already installed the adapter on a comput er (usi ng the separate Quick Start guide), you can ski p this chapter and begin with Chapter 2: Setting Security. What’s i[...]

  • Page 6

    Installing and Connecting the Adapter Important! Install the software BEFORE you plug the Wireless- G USB adapter into your computer. 1 Insert the Wireless-G USB CD into the CD or DV D drive. The CD should start automati cally. Windows Vista: If the AutoPlay dialog box appears, click Run Setup.exe . If a message appears sayi ng An unidentified prog[...]

  • Page 7

    Windows Vista: If a message tells you that Wind ows can't verify the publisher of the driver software, select Install this driver soft ware anyway . 5 At the prompt, click Finish and remove the CD. If the Zoom installation menu remains on scree n, click Exit . 6 Shut down the computer. 7 Plug in the USB Adapter and turn your computer back on. [...]

  • Page 8

    2 In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless net works. 3 Highlight the network you want and cli ck Join . If the network you select has security configured, you must enable and configure securi ty on your computer before you can connect. See Chapter 2, Settin g Security . 4 If you join a wirele[...]

  • Page 9

    Chapter 1: Installation Instructio ns 9 The Adapter LED The states of the LED on the Wireless-G USB adapter are explained below. LED Status Meaning Flashing The Wireless-G USB adapter is attempting to connect to a wireless net work. Steady The Wireless-G USB adapter is connected to a wireless network and is transmitting or receiving data.[...]

  • Page 10

    2 Setting Security We strongly recommen d security, although you do not need to use it to get your wireless connection wo rking. Important! You must first enable secu rity on the the wireless access point. You then enable secu rity on the adapter using the same configuration that you used for the access poi nt. For example, if the wireless access p[...]

  • Page 11

    This option requires you to enter an encryption key sh ared by the access point. • WEP ( W ired E quivalent P rivacy) Both the Open and Shared Authentication modes require WEP security. The most recent assessments of WEP advise choosing Open rathe r than Shared. If the devices in your network do not support WPA2-PSK or WPA-PSK, select Open with W[...]

  • Page 12

    2 The Zoom Wireless-G USB configuration software open s to display the configuration paramete rs: 3 Make sure that the desired wirele ss network is displa yed in the Profile and SSID text boxes (the term <Infra> designates an Infrastructure network) and that the Net w ork Typ e is correct. There are two types of wireless networks: Infrastruct[...]

  • Page 13

    Chapter 2: Setting Security 13 • In the unlikely event that you use an Ad Hoc network, you must set up Static IP addressing. See Appendix A: TCP/IP Settings . 4 Select the Enable Security check box to open the Security Configuration window. For configuratio n instructions, consult this table: To configure Go to page WPA2-PSK 14 WPA-PSK 15 WEP 15 [...]

  • Page 14

    WP A2-PSK (Pre-Shared Key) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2- PSK . 2 At Encryption Mode , accept the default: AES ( A dvanced E ncryption S tandard). 3 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a[...]

  • Page 15

    WP A - PSK (Pre - Shared Key) If all of the wireless devices in your network DO NOT supp ort the recommended WPA2-PSK, select WPA-PSK. 1 In the Privacy Configuration window, click the Authentication Mode drop-down a rrow and select WPA- PSK . 2 At Encryption Mode , accept the default: TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the Pre-shared[...]

  • Page 16

    That’s it! You have configured WPA-PSK security for your wireless connection, and you’re rea dy to use the Internet. WEP (W ired Equivalent Privacy) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select Open (recommend ed) or Shared : The USB Adapter automatically select s WEP as the Encryption Mode. [...]

  • Page 17

    Chapter 2: Setting Security 17 • Hexadecimal digits if an access point, router, or some adapters are not Zoo m products b c d In the Key Length drop-down lis t, select 128 bits , 64 bits , or 256 bits . Note: 128-bit and 256-bit WEP provide more security than 64-bit, but the longer keys could di minish network performance. In the Key Index drop-d[...]

  • Page 18

    6 Click the Close box to exit the configuration software. That’s it! You have configured W EP secu rity for your wi reless connection, and you’re ready to use the Internet. WP A2 Select WPA2 if: • you are linking to a corporat e network that use s a RADIUS ( R emote A uthentication D ial- I n U ser S ervice) authe ntication server • all of [...]

  • Page 19

    1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2 . 2 At Encryption Mode , accept the default AES ( A dvanced E ncryption S tandard) 3 In the IEEE 802.1X Authentica tion area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentic[...]

  • Page 20

    • TTLS ( T unneled T ransport L ayer S ecurity). With TTLS, you can select from four authentication e xtensions: PAP ( P assword A uthentication P roto col) CHAP ( C hallenge H andshake A uthentication P rotocol) MS-CHAP (Microsoft’s ve rsion of CHAP). MS-CHAPV2 (the default). • SIM ( S ubscriber I dentity M odule). A SIM card stores t he key[...]

  • Page 21

    2 Accept the default Authentication Mode : TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With I EEE 802.1X authentication, each wireless device (client) sends a sig nal to the wireless access point, which in turn s[...]

  • Page 22

    • PEAP ( P rotected E xtensible A uthentication P rotocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handsh ake Authentication Protocol. GTC • TLS ( T ransport L ayer S e curity). There are no authentication extension options with TL[...]

  • Page 23

    Certificate (WP A2 and WP A) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security o f the network. If you are linking to a corporate network that uses an authentication server and you have con figured WPA2 or[...]

  • Page 24

    W iFi™ Protected Setup (WPS) If your access point supports W iFi P rotected S etup (WPS), this protocol can greatly simplify t he process of configuring WPA2- PSK or WPA-PSK security. To access WPS, on the Configuration tab, click the WPS button to open the WPS Config screen: 1 If you are like most users, you will want to join a wireless network [...]

  • Page 25

    Chapter 2: Setting Security 25 a You can select the Push Button option if your access point has a hardware Secure Setup o r similarly named button, or a virtual pushbutton on a software display. Before you initiate WPS by clicking Next, go to the access point and activate its pushbutton. The acce ss point will begin accepting WPS connections. Now, [...]

  • Page 26

    Wireless-G USB Adapter 26 Changing your Security Setting If the type of security on your wireless network cha nges, you need to modify your securit y settings. On the Configuration tab, click the Con figure Security button to select a different security option and enter the required information.[...]

  • Page 27

    3 Advanced Options The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the si gnal stren gth of your network connection, scan available net works, and specify advanced settings. This chapter tells you whe n and how to use each of these options. Creating Profiles A profile is a collection of settings needed for a par[...]

  • Page 28

    3 In the Configuration area, enter the following setting s: • SSID – Enter the network name. In the example above, the SSID is Home . • Network Ty pe – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop -down list, select the channel used by the other device(s) in the network. If you are setting up the first comput[...]

  • Page 29

    • Enable Security – Select this check box to open the Security Configuration window. Note: If you are se tting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, cli ck OK to return to the Configuration tab. 4 In the Configuration area, click the Apply button to save the sett[...]

  • Page 30

    Monitoring Link Status The Status area on the Configuration tab displays in formation about your wireless connection: • State : In an Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected. In an ad hoc network, the virtual MAC addre ss used by computers in the network. • Current Ch[...]

  • Page 31

    Using Site Survey and Re s ca n Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network nam es ( ESSIDs) so you can connect to a network • Identify the MAC add ress (BSSID) of your wireless access point or wireless router • Che ck the channel difference bet ween your network a nd oth[...]

  • Page 32

    32 Wireless-G USB Adapter The information displayed on the Site Surv ey tab is as follows: • ESSID ( E xtended S ervice S et Id entifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network. The ESSID is a code attached to[...]

  • Page 33

    Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Wireless Mode : • Power Save Enabled : When you select this option, the Wireless-G USB adapter immediately signals the acce ss point that it is in Power Save mode. The access point buffers all packets until it is polled by the adapter. Note: The [...]

  • Page 34

    Appendix A TCP/IP Settings By default, Windows is set for dynamic addre ssing (DHCP). Generally, this is the correct se tting for an Infrastructure network, but needs to be changed if you are usi ng an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the sectio[...]

  • Page 35

    c In the Network Connec tions window, double-clic k the Wireless Network Connection option: d In the Wireless Net work Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Settings 35[...]

  • Page 36

    e In the Wireless Net work Connection Properties dialog box, highlight the version of TCP/IP (Transmi ssion Control Protocol/Internet Protocol) that you are using and click the Properties button: f If you have an ad hoc network, continue with Step 2 below. If you have an infrastructure network, continue with Step 3 below. If you're not sure wh[...]

  • Page 37

    c Enter 255.255.255.0 for Subnet ma sk . The Subnet mask should be the same for each comp uter in your ad hoc netw ork. d Enter 10.0.0.5 for De fault gateway and Preferred DNS server . (This is the IP address of the first computer that was set up in your ad hoc network.) T he Default Gateway and Preferred DNS server should be the same for each comp[...]

  • Page 38

    38 Wireless-G USB Adapter c Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure net work. Windows XP 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box. a From the desktop, click the Start button, sele ct Control Panel , and then click Net work Co[...]

  • Page 39

    Appendix A: TCP/IP Settings 39 Gateway and Preferred DNS server should be the same for each computer in your ad ho c network. e Click OK twice. That’s it! You have set static IP addressing for a Wi ndows XP computer in an ad hoc net work. 3 For Infrastructure Networks : To verify your DHCP settings, complete the following: a Ensure that Obtain an[...]

  • Page 40

    40 Wireless-G USB Adapter 2 Complete the following steps to set stati c IP addressing: a In the Internet Protocol (TCP/IP) Properties dial og box, ensure that Obtain an IP address automatically is not selected. Then make sure the butto ns labeled Use the following IP address and Use the follo w ing DNS server addresses are selected. b If this is th[...]

  • Page 41

    Appendix B: Troubleshooting 41 Appendix B Troubleshooting ¾ If your Zoom Wireless-G USB ad apter is not working properly, try these suggestions . • Make sure the adapter is secu rely connected to the computer, either dire ctly or through its USB extender cable. • Perform a power cycle – take the follo wing steps in the order given: 1. Turn o[...]

  • Page 42

    42 Wireless-G USB Adapter as these settings for the other devices in your wirele ss network. 2 Then click the Security tab and check t he settings to make sure that the adapter is configured for the same security system as the other devices in your wireless net work. Make sure that your secu rity key is the same – remember that the keys are case-[...]

  • Page 43

    Appendix C: Zoom Technical Support Services 43 Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenie nt, professional support responsive to our cu stomers’ needs and ca pabilities. If you find yourself unable to get your Zoom product to operate, and yo[...]

  • Page 44

    44 Wireless-G USB Adapter World Wide Web Zoom’s Web page lets you send em ail for assistance, registe r on-line, access product re views and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Produ ct. To access Zoom’s Web page, please log onto your local Internet Se[...]

  • Page 45

    Appendix C: Zoom Technical Support Services 45 Contact Zoom by Email You can email Zoom with any tech supp ort questions you might have and one of our Technical Supp ort Engineers will respond by email within 2 business days. You ma y request personal assistance via email at www.zoom.com/techmail . When emailing Zoom, be sure to include the followi[...]

  • Page 46

    46 Wireless-G USB Adapter Return of Defective Units Please contact your local distributor or reselle r for Factory Authorized Repair or Replacem ent of your In-Warranty Defective Product . If you are unable to reach you r distributor, you can contact the Zoom Facto r y Customer Service by calling: US: (617) 753-00 23 UK: 0870 720 0090 Please note t[...]

  • Page 47

    Appendix D: Regulato ry Information 47 Appendix D Regulatory Information U.S. FCC Part 15 Emissions Stateme nt This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protec tion against harmful interference in a residentia[...]

  • Page 48

    48 Wireless-G USB Adapter Countries of Operation & C onditions of Use in the European Co mmunity This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must [...]

  • Page 49

    Declaration of Conformit y Declaration of Conformity Overensstemmelseserklæring Déclaration de conformité Conformiteitsverklaring v an de EU Konformitätserklärung Δήλωση Συμμόρφωσης Dichiarazione di conformità Deklaracja zgodno ś ci Declaração de Conformidade Declaración de conformidad Konformitetsdeklaration Cam k ế t [...]

  • Page 50

    0888-A 27478 ©2008 NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form. The manufacturer does not warrant that [...]