User manual ZYXEL G-270S

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ZYXEL G-270S. We hope that this ZYXEL G-270S user guide will be useful to you.


ZYXEL G-270S : Download the complete user guide (2274 Ko)

You may also download the following manuals related to this product:

   ZYXEL G-270S BROCHURE (272 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)
   ZYXEL G-270S V1.00 QUICK START GUIDE (1558 ko)

Manual abstract: user guide ZYXEL G-270S

Detailed instructions for use are in the User's Guide.

[. . . ] ZyXEL G-270S 802. 11g Wireless USB 2. 0 Adapter User's Guide Version 1. 00 12/2005 Edition 1 ZyXEL G-270S User's Guide Copyright Copyright © 2005 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. [. . . ] To have OTIST automatically generate a WPA-PSK key, select the Yes check box. If you manually configured a WEP key or a WPA-PSK key and you also selected this check box, then the key you manually configured is used. 30 Chapter 2 Wireless LAN Network ZyXEL G-270S User's Guide 2. 5. 1. 2 Wireless Client Start the ZyXEL Utility and click the Adapter tab. Select the Auto Security check box, enter the same Setup Key as your AP's and click Save. Chapter 2 Wireless LAN Network 31 ZyXEL G-270S User's Guide 2. 5. 2 Starting OTIST Note: You must click Start in the AP OTIST web configurator screen and Save in the wireless client(s) Adapter screen all within three minutes (at the time or writing). You can start OTIST in the wireless clients and AP in any order but they must all be within range and have OTIST enabled. 1 In the AP, a web configurator screen pops up showing you the security settings to transfer. It closes when the transfer is complete. · In the wireless client, you see this screen if it can't find an OTIST-enabled AP (with the same Setup key). · If there is more than one OTIST-enabled AP within range, you see a screen asking you to select one AP to get settings from. 2. 5. 3 Notes on OTIST 1 If you enabled OTIST in the wireless client, you see this screen each time you start the ZyXEL utility. Click Yes for it to search for an OTIST-enabled AP. 2 If an OTIST-enabled wireless client loses its wireless connection for more than ten seconds, it will search for an OTIST-enabled AP for up to one minute. (If you manually have the wireless client search for an OTIST-enabled AP, there is no timeout; click Cancel in the OTIST progress screen to stop the search. ) 32 Chapter 2 Wireless LAN Network ZyXEL G-270S User's Guide 3 When the wireless client finds an OTIST-enabled AP, you must still click Start in the AP OTIST web configurator screen or hold in the Reset button (for one or two seconds) for the AP to transfer settings. 4 If you change the SSID or the keys on the AP after using OTIST, you need to run OTIST again or enter them manually in the wireless client(s). 5 If you configure OTIST to generate a WPA-PSK key, this key changes each time you run OTIST. Therefore, if a new wireless client joins your wireless network, you need to run OTIST on the AP and ALL the wireless clients again. Chapter 2 Wireless LAN Network 33 ZyXEL G-270S User's Guide 34 Chapter 2 Wireless LAN Network ZyXEL G-270S User's Guide CHAPTER 3 ZyXEL Utility Configuration This chapter shows you how to configure your ZyXEL G-270S in wireless station mode. 3. 1 The Link Info Screen When the ZyXEL Utility starts, the Link Info screen displays, showing the current configuration and connection status of your ZyXEL G-270S. Figure 10 Link Info The following table describes the labels in this screen. Table 3 Link Info LABEL Wireless Network Status Profile Name Network Name (SSID) AP MAC Address Network Type This is the name of the profile you are currently using. The SSID identifies the Service Set to which a wireless station is associated. This field displays the name of the wireless device to which the ZyXEL G-270S is associated. This field displays the MAC address of the wireless device to which the ZyXEL G270S is associated. This field displays the network type (Infrastructure(BSS) or Ad Hoc) of the wireless network. DESCRIPTION Chapter 3 ZyXEL Utility Configuration 35 ZyXEL G-270S User's Guide Table 3 Link Info (continued) LABEL DESCRIPTION Transmission Rate This field displays the current transmission rate of the ZyXEL G-270S in megabits per second (Mbps). Security Channel Statistics Transmit Rate Receive Rate Authentication Network Mode Total Transmit Total Receive Link Quality Trend Chart Signal Strength Link Quality This field displays the current data transmission rate in kilobits per second (Kbps). This field displays the current data receiving rate in kilobits per second (Kbps). This field displays the network standard (B or G) of the wireless device. Click this button to display the real-time statistics of the data rate in kilobits per second (Kbps). This field displays whether data encryption is activated (WEP (WEP or 802. 1x), TKIP (WPA/WPA-PSK), AES (WPA2/WPA2-PSK)) or inactive (DISABLE). [. . . ] Client authentication is then done by sending username and password through the secure connection, thus client identity is protected. For client authentication, EAP-TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2. Appendix D Types of EAP Authentication 75 ZyXEL G-270S User's Guide PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secured connection to authenticate the clients, thus hiding client identity. However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is implemented only by Cisco. LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802. 1x. Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ZYXEL G-270S




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ZYXEL G-270S will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.