ZyXEL G-162 User’s Guide
Table of Contents ix
Table of Contents
Copyright.......................................................................................................................................................ii
ZyXEL Limited Warranty ..........................................................................................................................iii
Information for Canadian Users.................................................................................................................iv
Federal Communications Commission (FCC) Interference Statement....................................................v
Customer Support........................................................................................................................................vi
List of Figures...............................................................................................................................................xi
List of Tables ...............................................................................................................................................xii
Preface.........................................................................................................................................................xiii
Chapter 1 Getting Started.........................................................................................................................1-1
1.1 About Your G-162 ........................................................................................................................1-1
1.2 G-162 Hardware and Utility Installation.....................................................................................1-1
1.3 Configuration Methods ................................................................................................................1-1
1.4 Windows XP Users Only ..............................................................................................................1-2
1.5 Accessing the ZyXEL Utility.........................................................................................................1-2
Chapter 2 Wireless LAN Network............................................................................................................2-1
2.1 Overview ......................................................................................................................................2-1
2.1.1 SSID.....................................................................................................................................2-1
2.1.2 Channel ................................................................................................................................2-1
2.1.3 Transmission Rate (Transfer Rate).......................................................................................2-1
2.1.4 Wireless Network Application .............................................................................................2-1
2.1.5 Roaming ...............................................................................................................................2-3
2.2 Wireless LAN Security..................................................................................................................2-4
2.2.1 Data Encryption with WEP ..................................................................................................2-5
2.2.2 IEEE 802.1x .........................................................................................................................2-5
2.2.3 WPA.....................................................................................................................................2-5
2.2.4 WPA-PSK Application Example .........................................................................................2-6
2.2.5 WPA with RADIUS Application Example ..........................................................................2-7
2.3 Fragmentation Threshold.............................................................................................................2-8
2.4 RTS/CTS Threshold......................................................................................................................2-8
2.5 Authentication Type .....................................................................................................................2-9
2.6 OTIST (One-Touch Intelligent Security Technology).................................................................2-10
Chapter 3 Using the ZyXEL Utility..........................................................................................................3-1
3.1 The Link Info Screen ....................................................................................................................3-1
3.1.1 Trend Chart ..........................................................................................................................3-3
3.2 The Site Survey Screen.................................................................................................................3-3
3.2.1 Connecting to a Network......................................................................................................3-5
3.2.2 Security Settings...................................................................................................................3-6
3.3 The Profile Screen......................................................................................................................3-12
3.3.1 Adding a New Profile.........................................................................................................3-14