User Guide
Page 5
... ...1-1 1.1 About Your G-360 ...1-1 1.2 Syntax Conventions ...1-1 1.3 Graphics Icons Key ...1-2 1.4 Application Overview...1-2 1.4.1 Infrastructure ...1-2 1.4.2 Ad-Hoc...1-3 1.5 G-360 Hardware and Utility Installation 1-3 1.6 Configuration Methods ...1-3 1.7 Accessing the ZyXEL Utility...1-4 1.7.1 ZyXEL Utility Screen Summary 1-4 1.8... Authentication Type ...4-2 4.3 Configuring Security Settings...4-2 4.3.1 WEP Encryption...4-3 4.3.2 WPA-PSK/WPA2-PSK...4-5 4.3.3 WPA/WPA2 or 802.1x...4-6 Chapter 5 Profile...5-1 5.1 Configuring the Profile screen...5-1 5.1.1 Adding a New Profile...5-2 Chapter ...
... ...1-1 1.1 About Your G-360 ...1-1 1.2 Syntax Conventions ...1-1 1.3 Graphics Icons Key ...1-2 1.4 Application Overview...1-2 1.4.1 Infrastructure ...1-2 1.4.2 Ad-Hoc...1-3 1.5 G-360 Hardware and Utility Installation 1-3 1.6 Configuration Methods ...1-3 1.7 Accessing the ZyXEL Utility...1-4 1.7.1 ZyXEL Utility Screen Summary 1-4 1.8... Authentication Type ...4-2 4.3 Configuring Security Settings...4-2 4.3.1 WEP Encryption...4-3 4.3.2 WPA-PSK/WPA2-PSK...4-5 4.3.3 WPA/WPA2 or 802.1x...4-6 Chapter 5 Profile...5-1 5.1 Configuring the Profile screen...5-1 5.1.1 Adding a New Profile...5-2 Chapter ...
User Guide
Page 7
ZyXEL G-360 User's Guide List of Figures Figure 1-1 Infrastructure Example ...1-2 Figure 1-2 Ad-Hoc Example ...1-3 Figure 1-3 ZyXEL Utility: System Tray Icon 1-4 Figure 1-4 Screen Overview ...1-5 Figure 1-5 Site Survey ...1-6 Figure 1-6 Site Survey: Security...Figure 2-2 Link Info: Trend Chart ...2-4 Figure 3-1 Site Survey ...3-1 Figure 4-1 Security Settings: WEP ...4-3 Figure 4-2 Security Settings: WPA-PSK/WPA2-PSK 4-5 Figure 4-3 Security Settings: WPA/WPA2 or 802.1x 4-6 Figure 5-1 Profile ...5-1 Figure 5-2 Profile: Add New Profile ...5-3 Figure 5-3 Profile: Select a Channel ...5-5 Figure 5-4...
ZyXEL G-360 User's Guide List of Figures Figure 1-1 Infrastructure Example ...1-2 Figure 1-2 Ad-Hoc Example ...1-3 Figure 1-3 ZyXEL Utility: System Tray Icon 1-4 Figure 1-4 Screen Overview ...1-5 Figure 1-5 Site Survey ...1-6 Figure 1-6 Site Survey: Security...Figure 2-2 Link Info: Trend Chart ...2-4 Figure 3-1 Site Survey ...3-1 Figure 4-1 Security Settings: WEP ...4-3 Figure 4-2 Security Settings: WPA-PSK/WPA2-PSK 4-5 Figure 4-3 Security Settings: WPA/WPA2 or 802.1x 4-6 Figure 5-1 Profile ...5-1 Figure 5-2 Profile: Add New Profile ...5-3 Figure 5-3 Profile: Select a Channel ...5-5 Figure 5-4...
User Guide
Page 8
ZyXEL G-360 User's Guide List of Tables Table 1-1ZyXEL Utility: System Tray Icon 1-4 Table 1-2 Screen Summary...1-5 Table 2-1 Link Info ...2-2 Table 2-2 Link Info: Trend Chart...2-4 Table 3-1 Site Survey...3-2 Table 4-1 Wireless LAN Security Levels ...4-1 Table 4-2 Security Settings: WEP...4-3 Table 4-3 Security Settings: WPA-PSK/WPA2-PSK 4-5 Table 4-4 Security Settings: WPA/WPA2 or 802.1x 4-6 Table 5-1 Profile ...5-2 Table 5-2 Profile...
ZyXEL G-360 User's Guide List of Tables Table 1-1ZyXEL Utility: System Tray Icon 1-4 Table 1-2 Screen Summary...1-5 Table 2-1 Link Info ...2-2 Table 2-2 Link Info: Trend Chart...2-4 Table 3-1 Site Survey...3-2 Table 4-1 Wireless LAN Security Levels ...4-1 Table 4-2 Security Settings: WEP...4-3 Table 4-3 Security Settings: WPA-PSK/WPA2-PSK 4-5 Table 4-4 Security Settings: WPA/WPA2 or 802.1x 4-6 Table 5-1 Profile ...5-2 Table 5-2 Profile...
User Guide
Page 9
...WPA2 • A built-in antenna • Driver support for Windows 98 Second Edition, Windows Me, Windows 2000 and Windows XP 1.2 • • • • • Syntax Conventions "Type" or "Enter" means for you to type one of your mouse pointer to Settings and then click Control Panels. The ZyXEL 360... then Control Panels" means first click Start, then point your G-360. Window and command choices are denoted using a comma. ZyXEL G-360 User's Guide Chapter 1 Getting Started This chapter introduces the G-360 and prepares you to use one or more characters. "Select" ...
...WPA2 • A built-in antenna • Driver support for Windows 98 Second Edition, Windows Me, Windows 2000 and Windows XP 1.2 • • • • • Syntax Conventions "Type" or "Enter" means for you to type one of your mouse pointer to Settings and then click Control Panels. The ZyXEL 360... then Control Panels" means first click Start, then point your G-360. Window and command choices are denoted using a comma. ZyXEL G-360 User's Guide Chapter 1 Getting Started This chapter introduces the G-360 and prepares you to use one or more characters. "Select" ...
User Guide
Page 19
If you selected AdHoc, you want to which you can only use WEP. Figure 1-11 Profile: Encryption Getting Started 1-11 ZyXEL G-360 User's Guide 6. If you selected Infrastructure, choose the same encryption method (Disable, WEP, WPA, WPA2, WPA-PSK, WPA2-PSK or 802.1x) as the AP to connect.
If you selected AdHoc, you want to which you can only use WEP. Figure 1-11 Profile: Encryption Getting Started 1-11 ZyXEL G-360 User's Guide 6. If you selected Infrastructure, choose the same encryption method (Disable, WEP, WPA, WPA2, WPA-PSK, WPA2-PSK or 802.1x) as the AP to connect.
User Guide
Page 25
ZyXEL G-360 User's Guide Table 2-1 Link Info LABEL DESCRIPTION AP MAC Address This field displays the MAC address of the G-360 in megabits per second (Mbps). Transmission Rate This field displays the current transmission rate of the wireless device to display the real-...the wireless device. The MAC address is associated. A radio frequency used by a wireless device is activated (WEP, WPA-PSK, WPA2PSK, WPA-RADIUS, WPA2-RADIUS or RADIUS) or not (Disabled). Signal Strength This field displays the signal strength of hexadecimal characters, for example, 00:A0:C5:00:00:02...
ZyXEL G-360 User's Guide Table 2-1 Link Info LABEL DESCRIPTION AP MAC Address This field displays the MAC address of the G-360 in megabits per second (Mbps). Transmission Rate This field displays the current transmission rate of the wireless device to display the real-...the wireless device. The MAC address is associated. A radio frequency used by a wireless device is activated (WEP, WPA-PSK, WPA2PSK, WPA-RADIUS, WPA2-RADIUS or RADIUS) or not (Disabled). Signal Strength This field displays the signal strength of hexadecimal characters, for example, 00:A0:C5:00:00:02...
User Guide
Page 28
...Set IDentifier) of each wireless network. Wireless devices must have the same SSID to display the information of each wireless network. ZyXEL G-360 User's Guide Table 3-1 Site Survey LABEL DESCRIPTION Available Network List The wireless network to sort the entries. Signal This field ... all wireless devices in Ad-Hoc mode. A radio frequency used by a wireless device is activated (WEP, WPA-PSK, WPA2-PSK, WPA-RADIUS, WPA2-RADIUS or RADIUS) or inactive (Disabled). Connect Click Connect to search for available wireless networks within transmission range. Encryption This ...
...Set IDentifier) of each wireless network. Wireless devices must have the same SSID to display the information of each wireless network. ZyXEL G-360 User's Guide Table 3-1 Site Survey LABEL DESCRIPTION Available Network List The wireless network to sort the entries. Signal This field ... all wireless devices in Ad-Hoc mode. A radio frequency used by a wireless device is activated (WEP, WPA-PSK, WPA2-PSK, WPA-RADIUS, WPA2-RADIUS or RADIUS) or inactive (Disabled). Connect Click Connect to search for available wireless networks within transmission range. Encryption This ...
User Guide
Page 29
...enable any wireless networking device that is vital to protect wireless communications. There are accessible to any wireless security on the G-360. 4.1 Wireless LAN Security Wireless LAN security is in the coverage area. 4.1.1 Data Encryption with WEP WEP (Wired Equivalent ... requires interaction with RADIUS Server Authentication Most Secure Wi-Fi Protected Access (WPA) WPA2 (IEEE 802.11i) Configure the wireless LAN security using the Profile Security Settings screen. ZyXEL G-360 User's Guide Chapter 4 Security Settings This chapter discusses how to configure wireless security...
...enable any wireless networking device that is vital to protect wireless communications. There are accessible to any wireless security on the G-360. 4.1 Wireless LAN Security Wireless LAN security is in the coverage area. 4.1.1 Data Encryption with WEP WEP (Wired Equivalent ... requires interaction with RADIUS Server Authentication Most Secure Wi-Fi Protected Access (WPA) WPA2 (IEEE 802.11i) Configure the wireless LAN security using the Profile Security Settings screen. ZyXEL G-360 User's Guide Chapter 4 Security Settings This chapter discusses how to configure wireless security...
User Guide
Page 30
... 4-2 Security Settings Share authentication mode involves a shared secret key to authenticate the wireless client to the selected encryption method. ZyXEL G-360 User's Guide For WLAN adapters without the passphrase feature, you can associate with wireless security activated. Two authentication modes are defined...the other WLAN adapter(s). • Enter the WEP keys manually. Open authentication mode is implemented for more information about WPA, WPA2 and IEEE 802.1x. 4.2 Authentication Type The IEEE 802.11b standard describes a simple authentication method between the wireless clients ...
... 4-2 Security Settings Share authentication mode involves a shared secret key to authenticate the wireless client to the selected encryption method. ZyXEL G-360 User's Guide For WLAN adapters without the passphrase feature, you can associate with wireless security activated. Two authentication modes are defined...the other WLAN adapter(s). • Enter the WEP keys manually. Open authentication mode is implemented for more information about WPA, WPA2 and IEEE 802.1x. 4.2 Authentication Type The IEEE 802.11b standard describes a simple authentication method between the wireless clients ...
User Guide
Page 33
4.3.2 WPA-PSK/WPA2-PSK ZyXEL G-360 User's Guide Figure 4-2 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 4-3 Security Settings: WPA-PSK/WPA2-PSK FIELD Encryption Type Pass Phrase Save DESCRIPTION WPA uses TKIP and WPA2 uses AES to save the changes and display the Link Info screen. The only...
4.3.2 WPA-PSK/WPA2-PSK ZyXEL G-360 User's Guide Figure 4-2 Security Settings: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 4-3 Security Settings: WPA-PSK/WPA2-PSK FIELD Encryption Type Pass Phrase Save DESCRIPTION WPA uses TKIP and WPA2 uses AES to save the changes and display the Link Info screen. The only...
User Guide
Page 34
This field is set up on a RADIUS server. Table 4-4 Security Settings: WPA/WPA2 or 802.1x FIELD Authentication Type Login Name Password DESCRIPTION Select the authentication method that is not available when you select EAP-TLS in this ... down list. Enter a user name. Enter the password associated with the login name above. 4-6 Security Settings Options are EAP-TLS, EAP-TTLS and EAP-PEAP. ZyXEL G-360 User's Guide 4.3.3 WPA/WPA2 or 802.1x Figure 4-3 Security Settings: WPA/WPA2 or 802.1x The following table describes the labels in the Authentication Type field.
This field is set up on a RADIUS server. Table 4-4 Security Settings: WPA/WPA2 or 802.1x FIELD Authentication Type Login Name Password DESCRIPTION Select the authentication method that is not available when you select EAP-TLS in this ... down list. Enter a user name. Enter the password associated with the login name above. 4-6 Security Settings Options are EAP-TLS, EAP-TTLS and EAP-PEAP. ZyXEL G-360 User's Guide 4.3.3 WPA/WPA2 or 802.1x Figure 4-3 Security Settings: WPA/WPA2 or 802.1x The following table describes the labels in the Authentication Type field.
User Guide
Page 35
... a PEAP protocol that the RADIUS server uses. Browse This field is only available when you select EAP-TLS in the Authentication Type field. ZyXEL G-360 User's Guide Table 4-4 Security Settings: WPA/WPA2 or 802.1x FIELD Certificate DESCRIPTION This field is only available when you select EAP-TLS in the Authentication Type field.
... a PEAP protocol that the RADIUS server uses. Browse This field is only available when you select EAP-TLS in the Authentication Type field. ZyXEL G-360 User's Guide Table 4-4 Security Settings: WPA/WPA2 or 802.1x FIELD Certificate DESCRIPTION This field is only available when you select EAP-TLS in the Authentication Type field.
User Guide
Page 38
... shown next. Profile Name This is activated (WEP, WPA-PSK, WPA2-PSK, WPA-RADIUS, WPA2-RADIUS or RADIUS) or inactive (Disabled). 5.1.1 Adding a New Profile Follow the steps below to which the G-360 connects using security. Connect To use a previously saved network profile, ... wireless devices are using this profile. Delete To delete an existing wireless network configuration, select a profile in the Profile List table. ZyXEL G-360 User's Guide Table 5-1 Profile LABEL DESCRIPTION Profile List Click a column heading to continue. 5-2 Profile A triangle indicates ascending or descending...
... shown next. Profile Name This is activated (WEP, WPA-PSK, WPA2-PSK, WPA-RADIUS, WPA2-RADIUS or RADIUS) or inactive (Disabled). 5.1.1 Adding a New Profile Follow the steps below to which the G-360 connects using security. Connect To use a previously saved network profile, ... wireless devices are using this profile. Delete To delete an existing wireless network configuration, select a profile in the Profile List table. ZyXEL G-360 User's Guide Table 5-1 Profile LABEL DESCRIPTION Profile List Click a column heading to continue. 5-2 Profile A triangle indicates ascending or descending...
User Guide
Page 42
Otherwise, select Disabled to allow the G-360 to communicate with the access points or other peer wireless devices without any data encryption and skip to enable data encryption. If you can only use WEP encryption method. Figure 5-4 Profile: Wireless Settings 5-6 Profile If you select Ad-Hoc network type in the first screen, you select Infrastructure network type in the first screen, select the same encryption method as the AP (WEP, WPA-PSK, WPA2-PSK, WPA, WPA2 or 802.1x) from the drop-down list box to Step 5. ZyXEL G-360 User's Guide Step 3.
Otherwise, select Disabled to allow the G-360 to communicate with the access points or other peer wireless devices without any data encryption and skip to enable data encryption. If you can only use WEP encryption method. Figure 5-4 Profile: Wireless Settings 5-6 Profile If you select Ad-Hoc network type in the first screen, you select Infrastructure network type in the first screen, select the same encryption method as the AP (WEP, WPA-PSK, WPA2-PSK, WPA, WPA2 or 802.1x) from the drop-down list box to Step 5. ZyXEL G-360 User's Guide Step 3.
User Guide
Page 59
...Architectures Operating Frequencies Operating Channels Data Rate Modulation Security Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Weight Dimension ZyXEL G-360 802.11g Wireless PCI Adapter 3.3V 32-bit PCI V2.2 IEEE 802.11b IEEE 802.11g Infrastructure Ad-Hoc 2.412-2....and BPSK) IEEE 802.11b: PBCC, Direct Sequence Spread Spectrum (CCK, DQPSK, DBPSK). 64/128/256-bit WEP, 802.1x, WPA-PSK, WPA, WPA2-PSK, WPA2 0 ~ 50 degrees Centigrade -30 ~ 60 degrees Centigrade 20 ~ 95% (non-condensing) 20 ~ 95% (non-condensing) IEEE 802.11g: TX: ...
...Architectures Operating Frequencies Operating Channels Data Rate Modulation Security Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Weight Dimension ZyXEL G-360 802.11g Wireless PCI Adapter 3.3V 32-bit PCI V2.2 IEEE 802.11b IEEE 802.11g Infrastructure Ad-Hoc 2.412-2....and BPSK) IEEE 802.11b: PBCC, Direct Sequence Spread Spectrum (CCK, DQPSK, DBPSK). 64/128/256-bit WEP, 802.1x, WPA-PSK, WPA, WPA2-PSK, WPA2 0 ~ 50 degrees Centigrade -30 ~ 60 degrees Centigrade 20 ~ 95% (non-condensing) 20 ~ 95% (non-condensing) IEEE 802.11g: TX: ...
User Guide
Page 87
ZyXEL G-360 User's Guide EAP (Extensible Authentication Protocol) is an authentication protocol ... For EAP-TLS authentication type, you use depends on a Wi-Fi network than WPA. Encryption Both WPA and WPA2 improve data encryption by creating an integrity checking mechanism (MIC), TKIP makes it much more difficult to prevent an attacker..., making it is a block cipher that the data has been tampered with sequencing rules, and a re-keying mechanism. WPA2 AES (Advanced Encryption Standard) is assumed that uses a 256-bit mathematical algorithm called digital IDs) can be used twice...
ZyXEL G-360 User's Guide EAP (Extensible Authentication Protocol) is an authentication protocol ... For EAP-TLS authentication type, you use depends on a Wi-Fi network than WPA. Encryption Both WPA and WPA2 improve data encryption by creating an integrity checking mechanism (MIC), TKIP makes it much more difficult to prevent an attacker..., making it is a block cipher that the data has been tampered with sequencing rules, and a re-keying mechanism. WPA2 AES (Advanced Encryption Standard) is assumed that uses a 256-bit mathematical algorithm called digital IDs) can be used twice...
User Guide
Page 88
...single, alphanumeric password. The AP checks each access point, wireless gateway and wireless client. The AP derives and distributes keys to a WLAN. ZyXEL G-360 User's Guide The encryption mechanisms used for stronger data encryption. WPA(2)-PSK Application Example A WPA(2)-PSK application looks as it 's still an ... requires a single (identical) password entered into the AP and all wireless clients. If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, you have an external RADIUS server or not. The AP and wireless clients use the TKIP...
...single, alphanumeric password. The AP checks each access point, wireless gateway and wireless client. The AP derives and distributes keys to a WLAN. ZyXEL G-360 User's Guide The encryption mechanisms used for stronger data encryption. WPA(2)-PSK Application Example A WPA(2)-PSK application looks as it 's still an ... requires a single (identical) password entered into the AP and all wireless clients. If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, you have an external RADIUS server or not. The AP and wireless clients use the TKIP...
User Guide
Page 94
ZyXEL G-360 User's Guide Online Registration iii Open authentication mode 4-2 OTIST 6-1 P passphrase 4-2 PEAP GG problem description 8-1 Profile 5-1 Protected EAP See PEAP R Related Documentation 8-3 S Security Settings WEP Encryption 4-3 WPA/WPA2 4-6 WPA-PSK/WPA2-PSK 4-5 Security Settings 4-1 Shared authentication mode 4-2 Site Survey... Conflict 8-1 Problem with RADIUS Application EE WPA(2 CC WPA-PSK DD WPA-PSK Application DD Z ZyXEL Utility WPA-PSK/WPA2-PSK 4-5 ZyXEL Utility Link Info 2-2 Trend Chart 2-4 Index See TTLS U User Authentication DD W Warranty iii Note...
ZyXEL G-360 User's Guide Online Registration iii Open authentication mode 4-2 OTIST 6-1 P passphrase 4-2 PEAP GG problem description 8-1 Profile 5-1 Protected EAP See PEAP R Related Documentation 8-3 S Security Settings WEP Encryption 4-3 WPA/WPA2 4-6 WPA-PSK/WPA2-PSK 4-5 Security Settings 4-1 Shared authentication mode 4-2 Site Survey... Conflict 8-1 Problem with RADIUS Application EE WPA(2 CC WPA-PSK DD WPA-PSK Application DD Z ZyXEL Utility WPA-PSK/WPA2-PSK 4-5 ZyXEL Utility Link Info 2-2 Trend Chart 2-4 Index See TTLS U User Authentication DD W Warranty iii Note...