User manual ZYXEL M-102

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ZYXEL M-102. We hope that this ZYXEL M-102 user guide will be useful to you.


ZYXEL M-102 : Download the complete user guide (1765 Ko)

You may also download the following manuals related to this product:

   ZYXEL M-102 BROCHURE (462 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)
   ZYXEL M-102 BROCHURE (1784 ko)
   ZYXEL M-102 QUICK GUIDE (466 ko)

Manual abstract: user guide ZYXEL M-102

Detailed instructions for use are in the User's Guide.

[. . . ] ZyXEL M-102 802. 11g Wireless MIMO CardBus Card User's Guide Version 2. 00 Edition 1 3/2006 ZyXEL M-102 User's Guide Copyright Copyright © 2006 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. [. . . ] This field displays whether data encryption is activated (WEP (WEP or 802. 1x), TKIP (WPA/WPA-PSK), AES (WPA/WPA-PSK)) or inactive (DISABLE). This field displays the radio channel the M-102 is currently using. 3. 1. 1 Trend Chart Click Trend Chart in the Link Info screen to display a screen as shown below. Use this screen to view real-time data traffic statistics. Figure 13 Link Info: Trend Chart 34 Chapter 3 ZyXEL Utility Configuration ZyXEL M-102 User's Guide The following table describes the labels in this screen. Table 4 Link Info: Trend Chart LABEL Transmit Receive DESCRIPTION This field displays the current data transmission rate in kilobits per second (Kbps). This field displays the current data receiving rate in kilobits per second (Kbps). 3. 2 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically. Figure 14 Site Survey The following table describes the labels in this screen. Table 5 Site Survey LABEL Available Network List , , or DESCRIPTION Click a column heading to sort the entries. denotes that the wireless device is in infrastructure mode and the wireless security is activated. denotes that the wireless device is in infrastructure mode but the wireless security is deactivated. denotes that the wireless device is in Ad-Hoc mode and the wireless security is activated. denotes that the wireless device is in Ad-Hoc mode but the wireless security is deactivated. This field displays the SSID (Service Set IDentifier) of each wireless device. SSID Chapter 3 ZyXEL Utility Configuration 35 ZyXEL M-102 User's Guide Table 5 Site Survey (continued) LABEL Channel Signal Scan Connect Site Information Network Type Network Mode Channel Security MAC Address Surveyed at DESCRIPTION This field displays the channel number used by each wireless device. Click Scan to search for available wireless devices within transmission range. Click an entry in the Available Network List table to display the information of the selected wireless device. This field displays the network type (Infrastructure or Ad Hoc) of the wireless device. This fields displays the network standard (802. 11g or 802. 11b) of the wireless device. This field shows whether data encryption is activated (WEP (WEP or 802. 1x), WPA or WPA-PSK) or inactive (DISABLE). This field displays the time when the wireless device is scanned. 3. 2. 1 Connecting to a WLAN Network Follow the steps below to connect to a WLAN network using the Site Survey screen. 1 Click Scan to search for all available wireless networks within range. 2 To join a network, click an entry in the table to select a wireless network and then click Connect or double-click an entry. 3 If the WEP encryption is activated for the selected wireless network, the Security Settings screen displays. You must set the related fields in the Security Settings screen to the same security settings as the associated wireless device. Otherwise click the Back or Exit button and connect to another wireless network without data encryption. 4 Verify that you have successfully connected to the selected network and check the network information in the Link Info screen. 3. 2. 2 Security Settings When you configure the M-102 to connect to a network with wireless security activated and the security settings are disabled on the M-102, the screen varies according to the encryption method used by the selected network. 36 Chapter 3 ZyXEL Utility Configuration ZyXEL M-102 User's Guide 3. 2. 2. 1 WEP Encryption Figure 15 Security Settings: WEP The following table describes the labels in this screen. Table 6 Security Settings: WEP LABEL WEP Authentication Type Pass Phrase DESCRIPTION Select 64 Bits, 128 Bits or 152 Bits to activate WEP encryption and then fill in the related fields. As you enter the passphrase, the M-102 automatically generates four different WEP keys and displays it in the key field below. [. . . ] This all happens in the background automatically. Appendix C Wireless Security 73 ZyXEL M-102 User's Guide The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped. By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi network than WEP and difficult for an intruder to break into the network. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ZYXEL M-102




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ZYXEL M-102 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.