Detailed instructions for use are in the User's Guide.
[. . . ] ZyXEL G-360
802. 11g Wireless PCI Adapter
User's Guide
Version 3. 0 4/2005
ZyXEL G-360 User's Guide
Copyright
Copyright ©2005 by ZyXEL Communications Corporation
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patents' rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. [. . . ] OTIST (One-Touch Intelligent Security Technology) allows you to transfer your AP's SSID and WEP or WPA(2)-PSK security settings to wireless clients that support OTIST and are within transmission range. You can also choose to have OTIST generate a WPA(2)-PSK key for you if you didn't configure one manually.
6. 1. 1 Enabling OTIST
You must enable OTIST on both the AP and wireless client before you start transferring settings. Select the OTIST check box, enter the same Setup Key as your AP's and click Save.
Adapter
6-1
ZyXEL G-360 User's Guide AP You can enable OTIST using the reset button or the web configurator. If you use the reset button, the default (01234567) or previous saved (through the web configurator) Setup Key is used to encrypt the settings that you want to transfer. If you hold in the Reset button too long, the device will reset to the factory defaults!In the web configurator, go to the Wireless LAN main screen and then select OTIST. To have OTIST automatically generate a WPA(2)-PSK key, select the Yes check box. If you manually configured a WEP key or a WPA(2)-PSK key and you also selected this check box, then the key you manually configured is used.
6. 1. 2 Starting OTIST
You must click Start in the AP OTIST web configurator screen and in the wireless client(s) Adapter screen all within three minutes (at the time of writing). You can start OTIST in the wireless clients and AP in any order but they must all be within range and have OTIST enabled. In the AP, a web configurator screen pops up showing you the security settings to transfer. 6-2 Adapter
ZyXEL G-360 User's Guide
In the wireless client, you see this screen if it can't find an OTIST-enabled AP (with the same Setup Key). Click OK to go back to the ZyXEL Utility main screen.
If there is more than one OTIST-enabled AP within range, you see a screen asking you to select one AP to get settings from.
6. 1. 3 Notes on OTIST
1. If you enabled OTIST in the wireless client, you see this screen each time you start the ZyXEL Utility. If an OTIST-enabled wireless client loses its wireless connection for more than ten seconds, it will search for an OTIST-enabled AP for up to one minute. (If you manually have the wireless client search for an OTIST-enabled AP, there is no timeout; click Cancel in the OTIST progress screen to stop the search. ) 3. When the wireless client finds an OTIST-enabled AP, you must still click Start in the AP OTIST web configurator screen or hold in the Reset button (for one or two seconds) for the AP to transfer settings.
Adapter
6-3
ZyXEL G-360 User's Guide 4. If you change the SSID or the keys on the AP after using OTIST, you need to run OTIST again or enter them manually in the wireless client(s). If you configure OTIST to generate a WPA(2)-PSK key, this key changes each time you run OTIST. Therefore, if a new wireless client joins your wireless network, you need to run OTIST on the AP and ALL the wireless clients again.
6. 2
Configuring the Adapter Screen
Use the Adapter screen to set a transfer rate, enable power saving and activate OTIST.
Figure 6-1 Adapter The following table describes the labels in this screen. Table 6-1 Adapter
LABEL Adapter Setting DESCRIPTION
6-4
Adapter
ZyXEL G-360 User's Guide Table 6-1 Adapter
LABEL Transfer Rate DESCRIPTION Select a transmission speed from the drop-down list box. Options are Fully Auto (default), 1 Mbps, 2 Mbps, 5. 5 Mbps, 11 Mbps, 6 Mbps, 9 Mbps, 12 Mbps, 18 Mbps, 22 Mbps, 24 Mbps, 36 Mbps, 48 Mbps, 54 Mbps and 125 Mbps. Select Fully Auto to allow your G-360 to operate at the maximum available transmission rate. [. . . ] GG Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CC ESS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . BB Extended Service Set. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . See ESS
F
Federal Communications Commission (FCC) Interference Statement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
G
G-plus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1 Graphics Icons Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
C
CA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . See CA Communication Problem Ad-hoc(IBSS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2 Configuration Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 Configuring the Link Info screen. . . . . . . . . . . . . . . . . . . . 2-2 Connecting to a Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5 Copyright . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Disclaimer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Create WEP key with passphrase. . . . . . . . . . . . 4-5, 4-6 Customer Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
L
LEAP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HH Lightweight Extensible Authentication Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]