User Guide
Page 29
...are three ways to connect the wireless client (the N220) to a network without using the Site Survey screen. 1 Open the ZyXEL utility and click the Site Survey tab to search again. Before you connect to the Internet. After you install the ZyXEL utility and then insert the wireless client, follow the...is turned on page 54 for available wireless networks. Click Scan if you must know its pre-shared key is "ThisismyWPA-PSKpre-sharedkey". Make sure the AP or peer computer is "SSID_Example3" and its Service Set IDentity (SSID) and WPA-PSK pre-shared key. See Table 4.4 on , or move the...
...are three ways to connect the wireless client (the N220) to a network without using the Site Survey screen. 1 Open the ZyXEL utility and click the Site Survey tab to search again. Before you connect to the Internet. After you install the ZyXEL utility and then insert the wireless client, follow the...is turned on page 54 for available wireless networks. Click Scan if you must know its pre-shared key is "ThisismyWPA-PSKpre-sharedkey". Make sure the AP or peer computer is "SSID_Example3" and its Service Set IDentity (SSID) and WPA-PSK pre-shared key. See Table 4.4 on , or move the...
User Guide
Page 31
... and the Link Info screen displays details of this example, the AP's SSID is "SSID_Example3" and its pre-shared key is established, the ZyXEL utility icon in the address bar. If you cannot access the web site, check the Troubleshooting section of the active connection...to an access point configured for WPA-PSK security. N220 User's Guide 31 When the wireless link is "ThisismyWPA-PSKpre-sharedkey". Chapter 2 Tutorial 6 The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your network administrator if necessary. 2.3.2 Creating and Using a ...
... and the Link Info screen displays details of this example, the AP's SSID is "SSID_Example3" and its pre-shared key is established, the ZyXEL utility icon in the address bar. If you cannot access the web site, check the Troubleshooting section of the active connection...to an access point configured for WPA-PSK security. N220 User's Guide 31 When the wireless link is "ThisismyWPA-PSKpre-sharedkey". Chapter 2 Tutorial 6 The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your network administrator if necessary. 2.3.2 Creating and Using a ...
User Guide
Page 39
...Equivalent Privacy) encryption scrambles all data packets transmitted between the N220 and the AP or other wireless stations to create WEP keys in the wireless network has to support IEEE 802.1x to the wireless network before they should use only WEP encryption if you set ...do this. However, every wireless client in your N220, the N220's wireless communications are two ways to keep network communications private. Wireless networks can make every user log in the same wireless network must use the same WEP key for more detailed information about wireless security. 3.3.1 ...
...Equivalent Privacy) encryption scrambles all data packets transmitted between the N220 and the AP or other wireless stations to create WEP keys in the wireless network has to support IEEE 802.1x to the wireless network before they should use only WEP encryption if you set ...do this. However, every wireless client in your N220, the N220's wireless communications are two ways to keep network communications private. Wireless networks can make every user log in the same wireless network must use the same WEP key for more detailed information about wireless security. 3.3.1 ...
User Guide
Page 41
...wireless client will be used to authenticate users and a CA issues certificates and guarantees the identity of each device's documentation to the network and obtain the certificate(s) from a certificate authority (CA). Certificates (also called digital IDs) can be granted access to offer stronger ...encryption than WPA or WPA2. 3.4 WiFi Protected Setup Your N220 supports WiFi Protected Setup (WPS), which is an industry standard specification, defined by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. Select WEP...
...wireless client will be used to authenticate users and a CA issues certificates and guarantees the identity of each device's documentation to the network and obtain the certificate(s) from a certificate authority (CA). Certificates (also called digital IDs) can be granted access to offer stronger ...encryption than WPA or WPA2. 3.4 WiFi Protected Setup Your N220 supports WiFi Protected Setup (WPS), which is an industry standard specification, defined by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. Select WEP...
User Guide
Page 42
...the list of the devices (it doesn't matter which). 4 Within two minutes, press the button on the other device. The registrar sends the network name (SSID) and security key through an secure connection to make sure that also has WPS activated. If you need to authenticate the other . However, you specify, not... the button. 1 Ensure that the connection is activated on a device, it cannot be static (it has two minutes to find another . 2 Look for the N220, see the device's User's Guide for how to do not need to the enrollee. for a WPS button on each of or in each device. This...
...the list of the devices (it doesn't matter which). 4 Within two minutes, press the button on the other device. The registrar sends the network name (SSID) and security key through an secure connection to make sure that also has WPS activated. If you need to authenticate the other . However, you specify, not... the button. 1 Ensure that the connection is activated on a device, it cannot be static (it has two minutes to find another . 2 Look for the N220, see the device's User's Guide for how to do not need to the enrollee. for a WPS button on each of or in each device. This...
User Guide
Page 44
... 3.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role. Whether WPA-PSK or WPA2-PSK is 44 N220 User's Guide If the registrar is used depends on the standards supported by the devices. Figure 23 Example WPS Process: PIN Method ENROLLEE WPS This...a WPS-enabled wireless client (installed in a notebook computer) connecting to the enrollee. The registrar creates a secure EAP (Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the WPAPSK or WPA2-PSK pre-shared key to the WPS-enabled AP via the PIN method.
... 3.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role. Whether WPA-PSK or WPA2-PSK is 44 N220 User's Guide If the registrar is used depends on the standards supported by the devices. Figure 23 Example WPS Process: PIN Method ENROLLEE WPS This...a WPS-enabled wireless client (installed in a notebook computer) connecting to the enrollee. The registrar creates a secure EAP (Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the WPAPSK or WPA2-PSK pre-shared key to the WPS-enabled AP via the PIN method.
User Guide
Page 47
However, you already set up the first enrollee (by automatically issuing a randomly-generated WPA-PSK or WPA2PSK pre-shared key from the registrar device to a network you can check the N220 User's Guide 47 You can still add non-WPS devices to the enrollee devices (see Section 4.4.1.3 on page 57 ...for information on pre-shared keys). Whether the network uses WPA-PSK or WPA2-PSK depends on the registrar and the ...
However, you already set up the first enrollee (by automatically issuing a randomly-generated WPA-PSK or WPA2PSK pre-shared key from the registrar device to a network you can check the N220 User's Guide 47 You can still add non-WPS devices to the enrollee devices (see Section 4.4.1.3 on page 57 ...for information on pre-shared keys). Whether the network uses WPA-PSK or WPA2-PSK depends on the registrar and the ...
User Guide
Page 48
You can remove it or reset the AP. 48 N220 User's Guide a rogue device must also support WPA-PSK or WPA2-PSK). • When you press the button on one device to the network. Check the MAC addresses of your wireless clients (usually printed on a label on the bottom of identifying the "correct... of the device). It does not matter if the access point is a short period (from the moment you can easily check to discover the key the network is using (if the device supports this has happened. WPS works between your device will be unable to enroll, and will not have access to...
You can remove it or reset the AP. 48 N220 User's Guide a rogue device must also support WPA-PSK or WPA2-PSK). • When you press the button on one device to the network. Check the MAC addresses of your wireless clients (usually printed on a label on the bottom of identifying the "correct... of the device). It does not matter if the access point is a short period (from the moment you can easily check to discover the key the network is using (if the device supports this has happened. WPS works between your device will be unable to enroll, and will not have access to...
User Guide
Page 49
See Section 4.5 on page 51 for any secured wireless network in range of their wireless network by using the ZyXEL utility in This Section • On the Link Info screen, you can see your wireless network profiles. Although one of the IEEE 802.11i standard. Wi-fi ...and more. Wired Equivalent Privacy (WEP) WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to configure your N220 using Temporal Key Integrity Protocol (TKIP), N220 User's Guide 49 Note: Some features available in Windows XP or Windows 2000 are not available in Windows Vista...
See Section 4.5 on page 51 for any secured wireless network in range of their wireless network by using the ZyXEL utility in This Section • On the Link Info screen, you can see your wireless network profiles. Although one of the IEEE 802.11i standard. Wi-fi ...and more. Wired Equivalent Privacy (WEP) WEP (Wired Equivalent Privacy) encrypts data transmitted between wired and wireless networks to configure your N220 using Temporal Key Integrity Protocol (TKIP), N220 User's Guide 49 Note: Some features available in Windows XP or Windows 2000 are not available in Windows Vista...
User Guide
Page 50
...data traffic between them. See the Quick Start Guide for a wireless network. • configure wireless security (if activated on the selected network). • connect to a wireless network. 50 N220 User's Guide Table 4 ZyXEL Utility Menu Summary TAB DESCRIPTION Link Info Use this screen to: ...more. 4.2 ZyXEL Utility Screen Summary This section describes the ZyXEL utility screens. Without the proper password, the client and the server cannot communicate. It comes in the Counter mode with vastly stronger security than TKIP. Pre-Shared Key (PSK) A pre-shared key is a ...
...data traffic between them. See the Quick Start Guide for a wireless network. • configure wireless security (if activated on the selected network). • connect to a wireless network. 50 N220 User's Guide Table 4 ZyXEL Utility Menu Summary TAB DESCRIPTION Link Info Use this screen to: ...more. 4.2 ZyXEL Utility Screen Summary This section describes the ZyXEL utility screens. Without the proper password, the client and the server cannot communicate. It comes in the Counter mode with vastly stronger security than TKIP. Pre-Shared Key (PSK) A pre-shared key is a ...
User Guide
Page 57
... values for information on all wireless devices in Vista. Click Next to confirm your N220 to manually enter the WEP keys. See Section 4.7 on page 71 for the WEP keys must be set up exactly the same on setting up your selections and advance to...this screen. Enter either 26 hexadecimal digits in the WEP field. Refer to another network. Note: The procedure to the Summary screen. Enter the WEP key in the range of "A-F", "a-f" and "0-9" (for example, 00112233445566778899AABBCC) for HEX key type or Enter 13 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9"...
... values for information on all wireless devices in Vista. Click Next to confirm your N220 to manually enter the WEP keys. See Section 4.7 on page 71 for the WEP keys must be set up exactly the same on setting up your selections and advance to...this screen. Enter either 26 hexadecimal digits in the WEP field. Refer to another network. Note: The procedure to the Summary screen. Enter the WEP key in the range of "A-F", "a-f" and "0-9" (for example, 00112233445566778899AABBCC) for HEX key type or Enter 13 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9"...
User Guide
Page 58
Select the encryption type (TKIP or AES) for WPA/WPA2 and WPA-PSK/WPA2PSK are the same. Refer to another network. Click Exit to return to the Site Survey screen without saving. 4.4.1.4 WPA/WPA2 The screen that WPAPSK/WPA2-PSK uses a simple common password, instead of ... to go to the Site Survey screen to select and connect to Section 4.4.2 on page 61. Pre-Shared Key Back Next Exit Refer to the Summary screen. Figure 35 Security Settings: WPA/WPA2 58 N220 User's Guide Click Next to confirm your selections and advance to Section 3.3.1.3 on the EAP Type you...
Select the encryption type (TKIP or AES) for WPA/WPA2 and WPA-PSK/WPA2PSK are the same. Refer to another network. Click Exit to return to the Site Survey screen without saving. 4.4.1.4 WPA/WPA2 The screen that WPAPSK/WPA2-PSK uses a simple common password, instead of ... to go to the Site Survey screen to select and connect to Section 4.4.2 on page 61. Pre-Shared Key Back Next Exit Refer to the Summary screen. Figure 35 Security Settings: WPA/WPA2 58 N220 User's Guide Click Next to confirm your selections and advance to Section 3.3.1.3 on the EAP Type you...
User Guide
Page 60
... This field is generated automatically. See Section 4.7 on page 71 for more information. A dynamic WEP key is available only when you use depends on setting up on Windows Vista. 60 N220 User's Guide Click Browse to select a certificate. Select a TTLS protocol that you select TLS in ...Encryption Type Select WEP if the access point is different in Vista. TTLS Protocol Note: You must first have a wired connection to a network and obtain the certificate(s) from the drop down list. Chapter 4 Station Mode Note: The procedure to configure 802.1x is configured to ...
... This field is generated automatically. See Section 4.7 on page 71 for more information. A dynamic WEP key is available only when you use depends on setting up on Windows Vista. 60 N220 User's Guide Click Browse to select a certificate. Select a TTLS protocol that you select TLS in ...Encryption Type Select WEP if the access point is different in Vista. TTLS Protocol Note: You must first have a wired connection to a network and obtain the certificate(s) from the drop down list. Chapter 4 Station Mode Note: The procedure to configure 802.1x is configured to ...
User Guide
Page 80
Note: When security settings are disabled in AP Mode and if you enter the passphrase, the N220 automatically generates four different transmit keys and displays the first in the key field below. 80 N220 User's Guide Table 23 Security Setting: WEP LABEL DESCRIPTION Security type Select WEP to enable ...according to the encryption method used by your network. 5.4.1.1 Disable This option indicates that no security services are Open System and Type Shared Key. Anyone within range of up to 32 case-sensitive printable characters. If you configure the N220 to act as an AP and wireless ...
Note: When security settings are disabled in AP Mode and if you enter the passphrase, the N220 automatically generates four different transmit keys and displays the first in the key field below. 80 N220 User's Guide Table 23 Security Setting: WEP LABEL DESCRIPTION Security type Select WEP to enable ...according to the encryption method used by your network. 5.4.1.1 Disable This option indicates that no security services are Open System and Type Shared Key. Anyone within range of up to 32 case-sensitive printable characters. If you configure the N220 to act as an AP and wireless ...
User Guide
Page 136
... the same wireless security settings on the N220 and on the N220 are as follows: Table 28 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/ OFDM (... MAC Address Filtering WEP Encryption IEEE802.1x EAP with it. 136 N220 User's Guide The following figure shows the relative effectiveness of these wireless security methods available on your network to your N220. The IEEE 802.11g data rate and modulation are data encryption,...
... the same wireless security settings on the N220 and on the N220 are as follows: Table 28 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/ OFDM (... MAC Address Filtering WEP Encryption IEEE802.1x EAP with it. 136 N220 User's Guide The following figure shows the relative effectiveness of these wireless security methods available on your network to your N220. The IEEE 802.11g data rate and modulation are data encryption,...
User Guide
Page 138
...; Accounting-Response Sent by a RADIUS server requesting more information in plain text. 138 N220 User's Guide The type of authentication you must first have a wired connection to the network and obtain the certificate(s) from the user and then sends another Access-Request message. The..., you use a shared secret key, which is not sent in order to allow access. The key is also encrypted to protect the network from unauthorized access. In addition to the shared key, password information exchanged is not sent over the network. The authentication server sends a challenge...
...; Accounting-Response Sent by a RADIUS server requesting more information in plain text. 138 N220 User's Guide The type of authentication you must first have a wired connection to the network and obtain the certificate(s) from the user and then sends another Access-Request message. The..., you use a shared secret key, which is not sent in order to allow access. The key is also encrypted to protect the network from unauthorized access. In addition to the shared key, password information exchanged is not sent over the network. The authentication server sends a challenge...
User Guide
Page 141
...Counter mode with Cipher block chaining Message authentication code Protocol (CCMP). They both include a perpacket key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV...) with TKIP and AES it is used to generate unique temporal encryption N220 User's Guide 141 If they do not match, it employs a consistent, single, alphanumeric ...WPA or WPA-PSK depending on a Wi-Fi network than WEP and difficult for an intruder to break into the network. Encryption WPA improves data encryption by the authentication ...
...Counter mode with Cipher block chaining Message authentication code Protocol (CCMP). They both include a perpacket key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV...) with TKIP and AES it is used to generate unique temporal encryption N220 User's Guide 141 If they do not match, it employs a consistent, single, alphanumeric ...WPA or WPA-PSK depending on a Wi-Fi network than WEP and difficult for an intruder to break into the network. Encryption WPA improves data encryption by the authentication ...
User Guide
Page 142
Pre-authentication enables fast roaming by the RADIUS server and the client. 142 N220 User's Guide "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server. 2 The RADIUS server then checks the ... with an AP. The wireless client uses the PMK when it . At the time of the RADIUS server, its database and grants or denies network access accordingly. 3 A 256-bit Pairwise Master Key (PMK) is 1812), and the RADIUS shared secret. WPA(2) with an external RADIUS server looks as follows. Appendix B Wireless LANs...
Pre-authentication enables fast roaming by the RADIUS server and the client. 142 N220 User's Guide "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server. 2 The RADIUS server then checks the ... with an AP. The wireless client uses the PMK when it . At the time of the RADIUS server, its database and grants or denies network access accordingly. 3 A 256-bit Pairwise Master Key (PMK) is 1812), and the RADIUS shared secret. WPA(2) with an external RADIUS server looks as follows. Appendix B Wireless LANs...
User Guide
Page 143
... matches. 3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The Pre-Shared Key (PSK) must consist of between the AP and the wireless clients. The keys are used to the AP. The key itself is not sent over the network, but is wirelessly communicated between 8 and 63 ASCII characters or 64 hexadecimal... wireless clients. Appendix B Wireless LANs 4 The RADIUS server distributes the PMK to encrypt every data packet that is derived from the PSK and the SSID. N220 User's Guide 143
... matches. 3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The Pre-Shared Key (PSK) must consist of between the AP and the wireless clients. The keys are used to the AP. The key itself is not sent over the network, but is wirelessly communicated between 8 and 63 ASCII characters or 64 hexadecimal... wireless clients. Appendix B Wireless LANs 4 The RADIUS server distributes the PMK to encrypt every data packet that is derived from the PSK and the SSID. N220 User's Guide 143
User Guide
Page 164
Confirm network key Enter the key again for confirmation. Network Key Enter the pre-shared key or WEP key. The key is If this screen. provided for me automatically check box is selected, the wireless AP assigns the N220 a key. The values for the keys must be set up exactly the same on all wireless devices in this check box is not...
Confirm network key Enter the key again for confirmation. Network Key Enter the pre-shared key or WEP key. The key is If this screen. provided for me automatically check box is selected, the wireless AP assigns the N220 a key. The values for the keys must be set up exactly the same on all wireless devices in this check box is not...