ZyXEL Communications G-162 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications G-162, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications G-162 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications G-162. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL Communications G-162 should contain:
- informations concerning technical data of ZyXEL Communications G-162
- name of the manufacturer and a year of construction of the ZyXEL Communications G-162 item
- rules of operation, control and maintenance of the ZyXEL Communications G-162 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications G-162 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications G-162, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications G-162.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications G-162 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    ZyXEL G-162/G-360 User’s G uide ZyXEL G-162/G-360 (Hardware Revisi on v2) 802.11b/g Wireless LAN Adapter User's Guide Version 1.0 May 2005[...]

  • Page 2

    ZyXEL G-162/G-360 User’ s Guide ii Copyright Copyright Copyright ©2005 by ZyXEL Communications Corp oration The contents of this publ ication ma y not be reproduced in any part or as a whole, transcribed, stored in a retrieva l system , translated into an y langua ge, or tra nsmitt ed in any form or by any means, electroni c, mechanical, magneti[...]

  • Page 3

    ZyXEL G-162/G-360 User’ s Guide ZyXEL Limited Warranty iii ZyXEL Limited W arranty ZyXEL war rants to the or iginal en d user (purchaser) that this product is free from any defects in materials or workmanshi p for a period of u p to two (2) years fr om the date of purcha se. During the warranty perio d and upon proof of purchase, should the produ[...]

  • Page 4

    ZyXEL G-162/G-360 User’ s Guide iv FCC Statement Federal Communications Commission (FCC) Interference S tatement FCC Certification The United States Federal Communicatio n (FCC) and the Canadian Department of Com municat ions have establ ished certa in rules gove rning the use of electronic eq uipm ent. Part 15, Class B The devic e complies with [...]

  • Page 5

    ZyXEL G-162/G-360 User’ s Guide Customer Support v Customer Support When contacting your Cust omer Support R epresentati ve, please have the followi ng informatio n ready:  Product model and serial nu mber.  Warranty Information.  The Date you purchased your prod uct.  Brief description of the problem and the steps you to ok to solve [...]

  • Page 6

    ZyXEL G-162/G-360 User’ s Guide vi Table of Conte nts T able of Content s Copy right ... ......... ........... ......... ........... ......... ......... ........... ......... ........... ......... ......... ........ .......... ......... ......... ........ i i ZyXEL Li mi ted Wa rran ty.......... ......... ............ ........... ......... ......[...]

  • Page 7

    ZyXEL G-162/G-360 User’ s Guide Table Of Contents vii 2.5 OTIST (One T ou ch Int ellig ent Sec urit y Techn olog y) ... ........... ........... ........... ............ ........... ....... 2-23 Chap ter 3 Ma inte nanc e ... ........... ......... ......... ........... ......... ........... ......... ......... ........... ......... ..... .... .....[...]

  • Page 8

    ZyXEL G-162/G-360 User’ s Guide viii Preface Preface Congratulat ions on the purchase of yo ur new ZyXEL G-162/G-360! About This U ser's Guide This manual provides inform ation ab out the ZyXEL Wireless LAN Utility. Synt ax Conventions • “Type” or “Enter” means for you to type one or more characters. "Select" or "Cho[...]

  • Page 9

    ZyXEL G-162/G-360 User’ s Guide Preface ix Graphics Ico ns Key Wireless Access Point Computer Notebook computer Server Modem Wireless Signal Telephone Switch Router[...]

  • Page 10

    [...]

  • Page 11

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-1 Chapter 1 Getting Started This chapter introduces the ZyXEL G-162/G-360 and prepares you to use the ZyXEL Utility. 1.1 About Y our ZyXEL G-162/G-360 The ZyXEL G-162/ G-360 is an IEEE 802.11b and 802.11g complia n t wireless LAN adapt ers. With the ZyXEL G-162/G-360, you can enjoy wireless mobil[...]

  • Page 12

    ZyXEL G-162/G-360 User’ s Guide 1-2 WLAN Net wor king Double-c lick ing on the Z icon will dis pla y th e following ZyXEL utility window. Each of the pages (Site Survey, Profile, Link Info, About) presen ted in the ZyXEL Utility are explained in the follo wing section s.[...]

  • Page 13

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-3 1.3.1 Site Survey Site Survey screen shows how the network is presently co nfi gured: ne twork m ode, inform ation, channel, signal strength, etc. The Select ed Network window show s you a list of SSI Ds in your v icinity. Inf ormation regarding each SSID is also show n as Security Status, SSID[...]

  • Page 14

    ZyXEL G-162/G-360 User’ s Guide 1-4 WLAN Net wor king Use Windows Zero Configuration Checking this box will allow you to use Windows to co nfigure your wire less network se ttings. When you check this box to configure, you will no longer use ZyXEL’s utility. Connect Clicking on this bottom will gu ide you to the fol lowing Profile Config uratio[...]

  • Page 15

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-5 should use the sam e SSID (whatever your choice is). TX Rate This field displays t he current data transm ission rate in Megabit per second (Mbps). RX Rate This field disp lays the current data receiving rate in Megabit per second (Mbps). Signal Strength This shows the strength of the signal (t[...]

  • Page 16

    ZyXEL G-162/G-360 User’ s Guide 1-6 WLAN Net wor king a. [Profile ] Defa ult pr ofile nam e is ZyXEL. You m ay also ent er in a descr iptive nam e for this pr ofile. b. [SSID Name] is depends on the A P/Router you connect to from Site Surv ey page. c. [Network Mod e] if connec ting to an AP/R outer, cho o se “Infras tructure”. If you a re goi[...]

  • Page 17

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-7 2.2) [Enable CCX Mode] refers the Cisco Com patib le Extension, whi ch is the certi ficate-ba sed authentications (EAP-TLS , PEAP and LEAP) using dy nam ic keys for data encryption. Check this box will en able PEAP-MS-CHAP-V2, PEAP-G TC, T LS and LEAP. Pl ease see your MIS administrat or for th[...]

  • Page 18

    ZyXEL G-162/G-360 User’ s Guide 1-8 WLAN Net wor king Advanced Mode : This screen (Botto m Red Rectangle) allows yo u to make changes to the default ways the card operates in cluding adv anced 80 2.1 1 settings. Unless y o u are an ad vanced user and have deep knowledge ab out each property on this page, it is recommended tha t you leave them at [...]

  • Page 19

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-9 [Turbo Mode] allows y ou either “Active” or “ Inactive” th e 22Mbps and 125Mbp s. The information wil l be also shown unde r Link Info screen . Please refer to 1.1.3 Lin k Info for the detail exp lanation. [Packet Bu rst] allows you e ither “Activ e” or “Inactive” the packet bur[...]

  • Page 20

    ZyXEL G-162/G-360 User’ s Guide 1-10 WLAN Networking Profil e Pool A li st of inactiv e profi les, wh ich are not cu rrently c onnected to AP/ Router. Defau lt prof ile name i s set “ZyXEL”. You can add new profile by clicking [N ew], modif y profile by clic king [ Edit] and delete it by clicking [Delet e]. Active Profiles 1) A list of active[...]

  • Page 21

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-11 1.3.3 Link Info Link Info screen shows th e current configurat ion an d connect ion stat us of yo ur G-162/ G-360. The Link Info shows you the information inc luding Rec eive, Transmit, Co nnection Informat ion, Network informatio n and OTIST.[...]

  • Page 22

    ZyXEL G-162/G-360 User’ s Guide 1-12 WLAN Networking OTIST Function (Above Red Rectang le) OTIST (O ne T ouch In tell igent Sec urity T echno logy ) is the ZyXEL propriet ary one bottom security technology . Y ou must have th e ZyXEL P-334WT ro uter or othe r ZyXEL AP/Router suppor ting O TIST to set the wire less adapter to use the sam e wireles[...]

  • Page 23

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 1-13 Transmit Good Packets This field dis plays the total num ber of good packets tra nsmit ted Total Bytes This field displays the total num ber of bytes t ransmitted Connection Information Associa tio n Reje cts This field disp lays t he tota l number of rejecti ons when connectin g between Acces[...]

  • Page 24

    ZyXEL G-162/G-360 User’ s Guide 1-14 WLAN Networking 1.3.4 About About screen shows you the product nam e and software informati on of the current client device (G-1 62 or G-360) you are usi ng. ZyX EL W e bs it e Clicking , You can go to ZyXEL US website for up grading driver, utility and updating user’s gu ide as well as registering products.[...]

  • Page 25

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-15 Chapter 2 Wireless LAN Networking This chapter provid es background inf ormation on general wirele ss LAN netw orkin g technol ogy and term inolog y. 2.1 Overview This section describes the wireless LA N network term s and applica tions. 2.1.1 SSID The SSID (Service Set Iden tity) is a unique [...]

  • Page 26

    ZyXEL G-162/G-360 User’ s Guide 2-16 WLAN Networking Ad-Hoc (IBSS) Ad-hoc mode does not require an AP or a wired ne twork. Two or more wireless stations comm unicate directly to each ot her. A n ad-hoc netw ork may som e tim es be referred to as an Independe nt Basic Service Set (IBSS). Figure 2-1 IB SS Example T o set up an ad-hoc netw ork, conf[...]

  • Page 27

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-17 Figure 2-3 Infras tructure N etwork Exam ple 2.1.5 Roaming In an infrastructure network, wireless stations are ab le to switch from one BSS to another as they move between the co verage areas. During this period, the wi re less sta tions m aintai n uninter rupte d connec tion to the netw ork. [...]

  • Page 28

    ZyXEL G-162/G-360 User’ s Guide 2-18 WLAN Networking Figure 2-4 R o aming Exa mple 2.2 Wireless LAN Securi ty Wireless LAN security is vital to your network to protect wireless comm unication between wireless stations and the wired ne twork. The figure below shows the possib le wireless security levels o n your ZyXEL G-162/G-360. EAP (Extensible [...]

  • Page 29

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-19 Configure the wireless LAN se curity us ing the Profil e Security Settings scre en. If you do not enabl e any wireless secur ity on your Z yXEL G-162 /G-360, t h e ZyXEL G-162 /G-360’s wire less communi cations ar e accessible to any wireless netw orking device that is i n the co verage are [...]

  • Page 30

    ZyXEL G-162/G-360 User’ s Guide 2-20 WLAN Networking Figure 2-6 WP A-PSK/WPA2-PSK Authentication 2.2.3 WP A and WP A2 with RADIUS Application Example You need the IP address of t he RADIUS server, its port num ber (default i s 1812), and the RADIU S shared secret. A WPA/W PA2 applica tion exa mple with a n exte rnal RADIUS server looks as follows[...]

  • Page 31

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-21 Figure 2-7 WPA/WPA2 with RADIUS Application Example 2.2.4 IEEE 802.1x The IEEE 802.1x standard outlines enhance d security methods for both the authentica tion of wireless stations and encryption key managem e nt. Authentic ation can be done us ing an external R ADIUS server. EAP Authenticatio[...]

  • Page 32

    ZyXEL G-162/G-360 User’ s Guide 2-22 WLAN Networking 2.3 Fragment ation Threshold The Fragmentation Threshold is the maximum data frag ment size (betw een 256 and 24 32 bytes) th at can be sent in the wireless network befo re the ZyXEL G-162/G-360 will fragment the packet into smaller data frames. A larg e Fragmentation Threshold is recomm ended [...]

  • Page 33

    ZyXEL G-162/G-360 User’ s Guide WLAN Networkin g 2-23 Stations can send frames s maller than the speci fied RTS/CTS Threshold directl y to th e AP withou t the RTS (Request To Send)/CTS (Clea r to Send) handshake. You should o nly configure RTS/CTS Threshold if the possibility of hid den nodes exists on your network and the “cos t” of resendi[...]

  • Page 34

    [...]

  • Page 35

    ZyXEL G-162/G-360 User’ s Guide Maintenance 3-1 Chapter 3 Maintenance This chapter describes how to uninstall or upgrade th e ZyXEL Utility and Driver. 3.1 The About Screen About screen displa ys relate d version num bers of th e ZyXEL Wireless LA N Adapter (G-162 or G-360). When you contact ZyXEL for the tech s upport, please tell us the utility[...]

  • Page 36

    ZyXEL G-162/G-360 User’ s Guide 3-2 Maintenance The following table describes the read-only fields in this s creen. About LABEL DESCRIPT ION Model Name This field displays the devic e’s model name. Driver Version This field display s the version number of the ZyXEL driver. Utility Version This field displays the version number of the ZyXEL util[...]

  • Page 37

    ZyXEL G-162/G-360 User’ s Guide Maintenance 3-3 3.3 Upgrading the ZyXEL Utility Before you uninst all the ZyXEL G-162/G-360v2 Utility , take note of the current netw ork c onfi gurat ion . To perform the upgrade, follow the steps below. Step 1. Download the latest version of the utility from the ZyXEL web site and save the file on your computer. [...]

  • Page 38

    [...]

  • Page 39

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-1 Chapter 4 Configuring Wireless Security This ch apter co vers the con f iguration of security opti ons in the ZyXEL Utility. 4.1 Configuring Security You can configure your security sett in gs at any ti me. S imp ly sel ect th e wi reless AP/Ro uter f ound under Site Su rvey, do uble cl ick to[...]

  • Page 40

    ZyXEL G-162/G-360 User’ s Guide 4-2 Wireless Security 4.2 Configuring WEP 1. Select [ WEP] un der [Secur ity] 2. Select [A uto] under [A uthentication Mode] 3. Click [C onfigure]. You will then see the screen below. 4. Keep [Auto] in Authenticatio n Mode, which depen ding on AP/Router’s Authenticatio n Mode.[...]

  • Page 41

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-3 5. [Create Keys Manua lly] Ent er W EP key exactly as you d id in your access point. Select the correct encrypt ion l evel to match your a ccess point . Eith er 64, 1 28, or 256-bit. T he encryp tion lev el set her must m atch the encryp tion level us ed by your AP/Router. 6. [Key Form at] Sel[...]

  • Page 42

    ZyXEL G-162/G-360 User’ s Guide 4-4 Wireless Security 9. Click [OK] to save your settings a nd retur n to the previous screen. 10. If you want to select 802.1 x authentica tio ns with WEP, you w ill need to con figure your 802.1x settings by checking [enable CCX mode] to see advanced settings. To configure the 802.1x authentication, pleas e refer[...]

  • Page 43

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-5 4. Enter the sam e pass phrase us ed to configure W PA-PSK on your access po int. 5. The key you enter is m asked by de fault with asterisks (*). To v iew the key tha t you ente red, check [Unmas k].[...]

  • Page 44

    ZyXEL G-162/G-360 User’ s Guide 4-6 Wireless Security 4.4 Configuring WP A2-PSK 1. Select [W PA2 ] under [Securi ty Mode]. 2. Select [ PSK(Pre-Share d Key)] under [ Authentica tion Mode]. 3. Click [Configure] and then you will see the screen below.[...]

  • Page 45

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-7 4. Enter the sam e pass phrase us ed to configure WPA -PSK on your access poin t. The same pass phrase used to configure W PA-PSK/W PA2-PSK on your access point. 5. The key you enter is m asked by de fault with asterisks (*). To v iew the key tha t you ente red, check [Unmas k].[...]

  • Page 46

    ZyXEL G-162/G-360 User’ s Guide 4-8 Wireless Security 4.5 Configuring WEP-802.1x 1. You need to know if y our AP/Router supp ort 802.1x or not and then follo w its configuration. 2. Check [Enable CCX mode] box when you ne ed to enable the 802.1x setting . Then the EPA mode of LEAP, PEAP-MS-CHAP-V2, PEAP-GTC and TLS wil l be s how n u nder [ Authe[...]

  • Page 47

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-9 4.5.1 Configuring WEP-802.1x: EAP- LEAP 1. Select [WEP] under [Securi ty]. 2. Select [LEAP] under [A uthentication Mode] 3. Click [Configu re] and then you will see the screen below.[...]

  • Page 48

    ZyXEL G-162/G-360 User’ s Guide 4-10 Wireless Security 4. Select an appropri ate AP/R outer to i ndicate wh ether: a. The ut ility prompts yo u for them each t ime y ou try to c onnect to AP/Router b. Enter login name and password under the [Login Nam e] and [Password]. 5. The key you enter is masked by default with asterisks (*). To view the key[...]

  • Page 49

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-11 4.5.2 Configuring WEP-802. 1x: EAP- PEAP-MS-CHAPv2 1. Select [WEP] under [Securi ty]. 2. Select [PEAP MS-CHAP-V2] un der [Authentica tion proto col] 3. Click [Configu re] and then you will see the screen below.[...]

  • Page 50

    ZyXEL G-162/G-360 User’ s Guide 4-12 Wireless Security 4. [Personal certif icate] enables you to suppl y a person al certificate. This wind ow is only appl icable with Ent erpris e security . Pleas e refe r to your MIS administrator for this setting. 5. To supply a per sonal certi ficate, please enter the user name assigned t o the certificate un[...]

  • Page 51

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-13 4.5.3 Configuring W EP-802.1x: PEA P-GTC 1. Select [WEP] under [Securi ty]. 2. Select [PEA P-GTC] under [Authentica tion Mode]. 3. Click [Configu re] and then you will see the screen below.[...]

  • Page 52

    ZyXEL G-162/G-360 User’ s Guide 4-14 Wireless Security 4. Select an appropria te AP/Router to indica te whet her: a. The ut ility prompts yo u for them each t ime y ou try to c onnect to AP/Router b. Enter login name and password under the [Login Nam e] and [Password]. 5. The key you enter is m asked by de fault with as terisks (*). To view the k[...]

  • Page 53

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-15 4.5.4 Configuring WEP-802.1x: EAP- TLS 1. Select [W EP] under [Security] . 2. Select [TLS] under [Authe nticatio n protoco l]. 3. Click [ Configure] and then you will see the screen below.[...]

  • Page 54

    ZyXEL G-162/G-360 User’ s Guide 4-16 Wireless Security 4. [Persona l certificate] enables you to supply a pers onal c ertificate. This w indow is only applicable with Enterprise se curity. Please refer to your MIS administrator for this setting. 5. To supply a personal certific ate, please enter the user name assigned to th e certificate under [U[...]

  • Page 55

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-17 4.6 Configuring WP A-802.1x 3. You need to know if your AP/Router supp ort 802.1x or not and then follow up its configuratio n. 4. Check [Enable CCX m ode] box when you need to enable the 802. 1x setting. Then the EPA mode of LEAP, PEAP-MS-CHAP-V2, PEA P-GTC and TLS will be shown under [A uth[...]

  • Page 56

    ZyXEL G-162/G-360 User’ s Guide 4-18 Wireless Security 4.6.1 Configuring WP A-802.1x: EAP-LEAP 7. Select [ WPA] under [ Security] . 8. Select [ LEAP] unde r [Authenticat ion Mode] 9. Click [Configure] and then you will see the screen below.[...]

  • Page 57

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-19 10. Select an ap propri ate AP/Route r to indica te whethe r: c. The utility prompts you for them each time you try to connect to AP/Router d. Enter login name and password under the [Login Name] and [Password]. 11. The key you enter is masked by default with asterisks (*). To view the key th[...]

  • Page 58

    ZyXEL G-162/G-360 User’ s Guide 4-20 Wireless Security 4.6.2 Configuring WP A-80 2.1x: EAP-PEAP- MS-CHAPv2 9. Select [ WPA] under [ Security] . 10. Select [ PEAP MS-CHA P-V2] under [ Authentica tion protoc ol] 11. Click [Configure] and then you will see the screen below.[...]

  • Page 59

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-21 12. [Personal certif icate] enables yo u to supply a pers ona l certificate. This window is only applicab le with Enterprise security. Please refer to your MIS administrator for this setti ng. 13. To supply a personal certifi cate, please enter th e user name assign ed to th e certificate und[...]

  • Page 60

    ZyXEL G-162/G-360 User’ s Guide 4-22 Wireless Security 4.6.3 Configuring WP A-802.1x: PEAP-GTC 4. Select [ WPA] under [ Security] . 5. Select [ PEAP-GTC] under [A uthenticatio n Mode]. 6. Click [Configure] and then you will see the screen below.[...]

  • Page 61

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-23 4. Select an appropriate AP/Rou ter to indicate wheth er: a. The utility prompts you for them each time you try to connect to AP/Router b. Enter login name and password under the [Login Name] and [Password]. 5. The key you enter is masked by defaul t with asterisks (*). To view the key that y[...]

  • Page 62

    ZyXEL G-162/G-360 User’ s Guide 4-24 Wireless Security 4.6.4 Configuring WP A-802.1x: EAP-TLS 4. Select [WPA] under [Security] . 5. Select [TLS] under [Authe ntication pro tocol]. 6. Click [Configure] and then you will see the screen below.[...]

  • Page 63

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-25 4. [Personal certificate] enables you to supply a personal certif icate. This window is only applicable with Enterprise security. Please refer to your MIS ad ministrator for this se tting. 5. To supply a personal cert ificate, please ente r the user na me assigned to the cert ificate under [ [...]

  • Page 64

    ZyXEL G-162/G-360 User’ s Guide 4-26 Wireless Security 4.6.5 Configuring WP A2-802.1x: EAP-TLS 1. Select [WPA 2] under Security. 2. Select [TLS] under [Authe ntication pro tocol] 3. Click [Confi gure] and then y ou will see the screen be low.[...]

  • Page 65

    ZyXEL G-162/G-360 User’ s Guide Wireless Security 4-27 4. [Personal certificate] enables you to supply a personal certific ate. This w indow is only applicab le with Ente rprise security. Please refe r to your MIS adm inistra tor for this sett ing. 5. To supply a person al certifi cate, pl ease ent er the u ser n ame assign ed to th e certificat [...]

  • Page 66

    [...]

  • Page 67

    ZyXEL G-162/G-360 User’ s Guide Troubleshooti ng 5-1 Chapter 5 Troubleshooting This chapter covers potential probl ems and possibl e rem edies. After each p roblem descrip tion, some instru ctions are provid ed to help you diagnos e and solve the pro blem. 5.1 Problems S tarting th e ZyXEL Utility Program Table 5-1 Tr oubleshooting Starting ZyXEL[...]

  • Page 68

    ZyXEL G-162/G-360 User’ s Guide 5-2 Troublesho oting 5.2 Problems with LED St atus Table 5-2 Troublesho oting LED Status LED PWR is not On Make sure the ZyXEL G -162/G-360 is pro perly in serted. LED LINK is not On or Blinking Please check and make sure your AP/Router is up and ru nning. 5.3 Problems with the Link St atus Table 5-3 Troublesho oti[...]

  • Page 69

    ZyXEL G-162/G-360 User’ s Guide Troubleshooti ng 5-3 5.5 Problems Communicati ng W ith Other Computers Table 5-5 Troublesho oting Communication Problems PROBLEM CORRECTIVE ACTION The ZyXEL G-162/G-360 computer cann ot communicate with the other computer . Make sure your adapters are conn ected to the ne twork. A. Infrastructu re M ake sure that t[...]

  • Page 70

    [...]

  • Page 71

    ZyXEL G-162/G-360 User’ s Guide Appendix A i Appendix A T ypes of EAP Authentication This appendix discuss es the five pop ular EAP authen tication types : EAP-MD5 , E AP-TLS , EAP-TT LS , PEAP and LEAP . The type o f authentication yo u use depends on the RADIUS server. Consult your network adminis trator for m ore informatio n. For the EAP-MD5,[...]

  • Page 72

    ZyXEL G-162/G-360 User’ s Guide ii Appendix A LEAP LEAP (Lightweigh t Extensible Authe ntication Protocol) is a Cisco im plementation of IEEE802.1x. For added security, cer tific ate-based authentications (EAP- TLS, EAP-TTLS and PEAP) use dynamic keys for data enc ryption. They are often dep loyed in cor porate enviro nments, but for publ ic depl[...]