N220 Wireless N-lite USB Adapter Version 1.0 Edition 1, 07/2010 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the N220 using the ZyXEL utility. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com. • Use the PDF’s bookmarks to quickly navigate to the areas that interest you.
About This User's Guide Customer Support Should problems arise that cannot be solved by using this manual, please contact your vendor for customer service. Please have the following information ready when you contact the vendor. • Product model and serial number. • Date that you received your device. • Brief description of the problem and the steps you took to solve it.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your N220. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The N220 may be referred to as the “N220”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings 8 N220 User’s Guide
Contents Overview Contents Overview Introduction and Configuration ............................................................................................ 15 Getting Started ........................................................................................................................... 17 Tutorial ....................................................................................................................................... 23 Wireless LANs ...........................................
Contents Overview 10 N220 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents 2.3.1 Manually Connecting to a Wireless LAN ................................................................... 29 2.3.2 Creating and Using a Profile ...................................................................................... 31 2.4 Configuring the N220 as an AP ........................................................................................... 34 Chapter 3 Wireless LANs....................................................................................................
Table of Contents 5.1 Overview .............................................................................................................................. 75 5.1.1 What You Can Do in This Section .............................................................................. 76 5.1.2 What You Need to Know ............................................................................................ 76 5.1.3 Before You Begin ...................................................................................
Table of Contents Appendix E Legal Information .............................................................................................. 179 Index.......................................................................................................................................
P ART I Introduction and Configuration Getting Started (17) Tutorial (23) Wireless LANs (37) Station Mode (49) AP Mode (75) Maintenance (85) 15
CHAPTER 1 Getting Started 1.1 Overview The ZyXEL N220 wireless N-lite USB adapter brings you a better Internet experience over existing 802.11 networks. With data rates of up to 150 Mbps, you can enjoy a breathtaking high-speed connection at home or in the office. It is an excellent solution for daily activities such as file transfers, music downloading, video streaming and online gaming.
Chapter 1 Getting Started Ad-Hoc An Ad-Hoc wireless LAN is a self-contained group of computers connected wirelessly and which is independent of any other networks and Access Points. 1.1.2 Before You Begin • Read the Quick Start Guide for information on making hardware connections and using the ZyXEL utility to connect your N220 to a network. 1.2 About Your N220 Your N220 is an IEEE 802.11n compliant wireless LAN adapter. It can also connect to IEEE 802.11b/g wireless networks.
Chapter 1 Getting Started The following table describes the operation of the N220’s LEDs. Table 2 N220 LEDs LED COLOR STATUS DESCRIPTION Orange Slow Blinking The N220 is turned on, connected to an AP, and is not transmitting or receiving data. Rapid Blinking The N220 is turned on, connected to an AP, and is transmitting or receiving data. It also blinks when the WPS feature is being used or a WPS connection is being initiated. Off The N220 is turned off. 1.
Chapter 1 Getting Started 1.3.2 Ad-Hoc To set up a small independent wireless workgroup without an AP, use Ad-Hoc (see Chapter 4 on page 62). Ad-Hoc does not require an AP or a wired network. Two or more wireless clients communicate directly with each other. Note: Wi-Fi Protected Setup (WPS) is not available in ad-hoc mode. Figure 3 Application: Ad-Hoc 1.4 Hardware and Utility Installation Follow the instructions in the Quick Start Guide to install the ZyXEL utility and make hardware connections. 1.4.
Chapter 1 Getting Started The color of the ZyXEL utility system tray icon indicates the status of the N220. Refer to the following table for details. Table 3 ZyXEL Utility: System Tray Icon COLOR DESCRIPTION Red The N220 is not connected to a wireless network. Green The N220 is connected to a wireless network. 1.
Chapter 1 Getting Started The ZyXEL utility screens are similar in all Microsoft Windows versions. Screens for Windows XP are shown in this User’s Guide. Note: Click the window.
CHAPTER 2 Tutorial 2.1 Overview This tutorial shows you how to join a wireless infrastructure network using the ZyXEL utility. The wireless client is labeled C and the Access Point is labeled AP. Figure 6 Infrastructure Network 2.1.1 What You Can Do in This Tutorial • Connect securely either to an infrastructure AP using the WPS protocol. See Section 2.2 on page 24 for details. • Connect securely to an infrastructure AP using many of the strongest and most common encryption protocols. See Section 2.
Chapter 2 Tutorial 2.1.3 Before You Begin • Make sure that you have already familiarized yourself with the N220’s features and hardware, as described in Chapter 1 on page 17. • You should have valid login information for an existing network Access Point, otherwise you may not be able to make a network connection right away. 2.2 Connecting to an AP using Wi-Fi Protected Setup (WPS) This section gives you an example of how to set up your wireless network using WPS.
Chapter 2 Tutorial The AP sends the proper configuration settings to the N220. This may take up to two minutes. Then the N220 is able to communicate with the AP securely. The following figure shows you an example to set up wireless network and security by pressing a button on both the AP (the NBG334W in this example) and the N220. Figure 7 Example WPS Process: PBC Method You AP WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 2.2.
Chapter 2 Tutorial 3 Click the Start buttons on both the N220 utility screen and the AP’s configuration utility (the WPS Station screen on the NBG334W) within two minutes. The NBG334W authenticates the wireless client and sends the proper configuration settings to the wireless client. This may take up to two minutes. Then the wireless client is able to communicate with the NBG334W securely.
Chapter 2 Tutorial The following figure shows you the example of configuring the wireless network and security on the N220 and the AP (ZyXEL’s NBG334W in this example) by using the PIN method.
Chapter 2 Tutorial Figure 8 Example WPS Process: PIN Method You AP WITHIN 2 MINUTES Authentication by PIN SECURITY INFO COMMUNICATION 28 N220 User’s Guide
Chapter 2 Tutorial 2.3 Connecting to an AP Without Using WPS There are three ways to connect the wireless client (the N220) to a network without using WPS. • Configure nothing and leave the wireless client to automatically scan for and connect to any available network that has no wireless security configured. • Manually connect to a network (see Section 2.3.1 on page 29). • Configure a profile to have the wireless client automatically connect to a specific network or peer computer (see Section 2.3.
Chapter 2 Tutorial 3 To connect to an AP or peer computer, either click an entry in the list and then click Connect or double-click an entry (SSID_Example3 in this example). 4 When you try to connect to an AP with security configured, a window will pop up prompting you to specify the security settings. Enter the pre-shared key and leave the encryption type at the default setting. Use the Next button to move on to the next screen.
Chapter 2 Tutorial 6 The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your settings. When the wireless link is established, the ZyXEL utility icon in the system tray turns green and the Link Info screen displays details of the active connection. Check the network information in the Link Info screen to verify that you have successfully connected to the selected network.
Chapter 2 Tutorial 1 Open the ZyXEL utility and click the Profile tab to open the screen as shown. Click Add to configure a new profile. Figure 13 ZyXEL Utility: Profile 2 The Add New Profile screen appears. The wireless client automatically searches for available wireless networks, which are displayed in the Scan Info box. You can also configure your profile for a wireless network that is not in the list.
Chapter 2 Tutorial 4 Choose the same encryption method as the AP to which you want to connect (In this example, WPA-PSK). Figure 15 ZyXEL Utility: Profile Security 5 This screen varies depending on the encryption method you selected in the previous screen. In this example, enter the pre-shared key and leave the encryption type at the default setting. Figure 16 ZyXEL Utility: Profile Encryption 6 Verify the profile settings in the ready-only screen. Click Save to save and go to the next screen.
Chapter 2 Tutorial 7 Click Activate Now to use the new profile immediately. Otherwise, click the Activate Later button to go back to the Profile List screen. If you clicked Activate Later you can select the profile from the list in the Profile screen and click Connect to activate it. Note: Only one profile can be activated and used at any given time.
Chapter 2 Tutorial 1 Select AP Mode in the main ZyXEL Utility screen. The AP Mode version of the default Link Info screen displays. Figure 19 ZyXEL Utility - AP Mode 2 Under Status, you can view the current settings on the N220. In the Association List, you can see if any wireless clients have connected to your N220. Figure 20 ZyXEL Utility - AP Mode: Link Info 3 If you want to change the access point’s SSID and enable wireless security for your N220, click the Configuration tab. See Section 5.4.
Chapter 2 Tutorial 36 N220 User’s Guide
CHAPTER 3 Wireless LANs 3.1 Overview This section provides background information on wireless Local Area Networks. 3.1.1 What You Can Do in This Section • Connect securely to an AP using many of the strongest and most common encryption protocols. See Section 3.3 on page 39 for details. • Connect securely either to an AP or computer-to-computer using WPS. See Section 3.4 on page 41 for details. 3.1.2 What You Need to Know The following terms and concepts may help as you read through this section.
Chapter 3 Wireless LANs Encryption The process of taking data and encoding it, usually using a mathematical formula, so that it becomes unreadable unless decrypted with the proper code or pass phrase. 3.1.3 Before You Begin • You should have valid login information for an existing network Access Point, otherwise you may not be able to make a network connection right away. 3.2 Wireless LAN Overview The following figure provides an example of a wireless network with an AP.
Chapter 3 Wireless LANs • If two wireless networks overlap, they should use a different channel. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. • Every device in the same wireless network must use security compatible with the AP or peer computer. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 3.
Chapter 3 Wireless LANs • Automatic WEP key generation based on a “password phrase” called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s).
Chapter 3 Wireless LANs For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). Certificates (also called digital IDs) can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. 3.3.1.3 WPA and WPA2 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.
Chapter 3 Wireless LANs Depending on the devices you have, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to authenticate the other) in each of the two devices. When WPS is activated on a device, it has two minutes to find another device that also has WPS activated. Then, the two devices connect and set up a secure network by themselves. 3.4.
Chapter 3 Wireless LANs need to log into the configuration interfaces of both devices to use the PIN method. When you use the PIN method, you must enter the PIN from one device (usually the wireless client) into the second device (usually the Access Point or wireless router). Then, when WPS is activated on the first device, it presents its PIN to the second device. If the PIN matches, one device sends the network and security information to the other, allowing it to join the network.
Chapter 3 Wireless LANs The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 23 Example WPS Process: PIN Method ENROLLEE REGISTRAR WPS This device’s WPS PIN: 123456 WPS Enter WPS PIN from other device: WPS START WPS START WITHIN 2 MINUTES SECURE EAP TUNNEL SSID WPA(2)-PSK COMMUNICATION 3.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role.
Chapter 3 Wireless LANs already part of a network, it sends the existing information. If not, it generates the SSID and WPA(2)-PSK randomly. The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point.
Chapter 3 Wireless LANs subsequent WPS connections in which it is involved. If you want a configured AP to act as an enrollee, you must reset it to its factory defaults. 3.4.3.1 Example WPS Network Setup This section shows how security settings are distributed in an example WPS setup. The following figure shows an example network. In step 1, both AP1 and Client 1 are unconfigured. When WPS is activated on both, they perform the handshake. In this example, AP1 is the registrar, and Client 1 is the enrollee.
Chapter 3 Wireless LANs In step 3, you add another access point (AP2) to your network. AP2 is out of range of AP1, so you cannot use AP1 for the WPS handshake with the new access point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead. Figure 27 WPS: Example Network Step 3 EXISTING CONNECTION CLIENT 1 E N TIO EC N ON GC N I T XIS AP1 REGISTRAR CLIENT 2 SE CU RIT Y ENROLLEE INF O AP1 3.4.
Chapter 3 Wireless LANs configuration interface of the registrar device to discover the key the network is using (if the device supports this feature). Then, you can enter the key into the non-WPS device and join the network as normal (the non-WPS device must also support WPA-PSK or WPA2-PSK). • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network.
CHAPTER 4 Station Mode 4.1 Overview This section shows you how to configure your N220 using the ZyXEL utility in Windows. Note: Some features available in Windows XP or Windows 2000 are not available in Windows Vista. 4.1.1 What You Can Do in This Section • On the Link Info screen, you can see your current connection details, monitor signal strength and quality, and more. See Section 4.3 on page 51 for details.
Chapter 4 Station Mode Message Integrity Check (MIC) and IEEE 802.1x. WPA uses Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. The WPA protocol affords users with vastly stronger security than the WEP protocol.
Chapter 4 Station Mode Table 4 ZyXEL Utility Menu Summary TAB DESCRIPTION Profile Use this screen to add, delete, edit or activate a profile with a set of wireless and security settings. Adapter Use this screen to configure preamble type, enable power saving and use WiFi Protected Setup (WPS). 4.3 The Link Info Screen When the ZyXEL utility starts, the Link Info screen displays, showing the current configuration and connection status of your N220.
Chapter 4 Station Mode Table 5 Link Info (continued) LABEL DESCRIPTION Receive Speed This field displays the current receive speed of the N220 in megabits per second (Mbps). Security This field displays whether data encryption is activated (WEP / 802.1x / WPA /WPA-PSK / WPA2 / WPA2-PSK) or inactive (DISABLE). Channel This field displays the radio channel the N220 is currently using. Statistics 52 Transmit Rate This field displays the current data transmission rate in kilobits per second (Kbps).
Chapter 4 Station Mode 4.3.1 Trend Chart Click Trend Chart in the Link Info screen to display a screen as shown below. Use this screen to view real-time data traffic statistics. Figure 30 Link Info: Trend Chart The following table describes the labels in this screen. Table 6 Link Info: Trend Chart LABEL DESCRIPTION Transmit This field displays the current data transmission rate in kilobits per second (Kbps). Receive This field displays the current data reception rate in kilobits per second (Kbps).
Chapter 4 Station Mode 4.4 The Site Survey Screen Use the Site Survey screen to scan for and connect to a wireless network automatically. Figure 31 Site Survey The following table describes the labels in this screen. Table 7 Site Survey LABEL DESCRIPTION Available Network List Click a column heading to sort the entries. denotes that the wireless device is in infrastructure mode and the wireless security is activated.
Chapter 4 Station Mode Table 7 Site Survey (continued) LABEL DESCRIPTION Network Type This field displays the network type (Infrastructure or Ad Hoc) of the wireless device. Channel This field displays the channel number used by each wireless device. Security This field shows whether data encryption is activated (WEP, WPA, WPA-PSK, WPA2, WPA2-PSK or 802.1x) or inactive (DISABLE). MAC address This field displays the MAC address of the wireless device.
Chapter 4 Station Mode Table 8 Security Setting: WEP (continued) LABEL DESCRIPTION Next Click Next to confirm your selections and advance to the Security Settings screen that corresponds to the one you select here. Exit Click Exit to return to the Site Survey screen without saving. 4.4.1.2 WEP Encryption Configure WEP security in this screen. Figure 33 Security Setting: WEP The following table describes the labels in this screen.
Chapter 4 Station Mode Table 9 Security Setting: WEP (continued) LABEL DESCRIPTION Key x (where x is a number between 1 and 4) Select this option if you want to manually enter the WEP keys. Enter the WEP key in the field provided. If you select 64 Bits in the WEP field. Enter either 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (for example, 11AA22BB33) for HEX key type.
Chapter 4 Station Mode The following table describes the labels in this screen. Table 10 Security Setting: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Encryption Type The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2PSK are the same. The only difference between the two is that WPAPSK/WPA2-PSK uses a simple common password, instead of userspecific credentials. Select the encryption type (TKIP or AES) for data encryption. Refer to Section 3.3.1.3 on page 41 for more information.
Chapter 4 Station Mode The following table describes the labels in this screen. Table 11 Security Setting: WPA/WPA2 LABEL DESCRIPTION Encryption Type The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2PSK are the same. The only difference between the two is that WPAPSK/WPA2-PSK uses a simple common password, instead of userspecific credentials. Select the encryption type (TKIP or AES) for data encryption. Refer to Section 3.3.1.3 on page 41 for more information.
Chapter 4 Station Mode Note: The procedure to configure 802.1x is different in Windows Vista. See Section 4.7 on page 71 for information on setting up your N220 to use 802.1x in Vista. Figure 36 Security Setting: 802.1x The following table describes the labels in this screen. Table 12 Security Settings: IEEE 802.1x LABEL DESCRIPTION Encryption Type Select WEP if the access point is configured to use 802.1x with WEP encryption. A dynamic WEP key is generated automatically.
Chapter 4 Station Mode Table 12 Security Settings: IEEE 802.1x LABEL DESCRIPTION PEAP Inner EAP This field is only available when you select PEAP in the EAP Type field. The PEAP method used by the RADIUS server or AP for client authentication is MS CHAP v2. Validate Server Certificate (Click to Enable) Select this option to validate a server’s certificate when you select PEAP in the EAP Type field. Back Click Back to go to the Site Survey screen to select and connect to another network.
Chapter 4 Station Mode Table 13 Summary Screen LABEL DESCRIPTION Save Click Save to save the changes back to the N220 and display the Link Info screen. Exit Click Exit to discard changes and return to the Site Survey screen. 4.5 The Profile Screen A profile is a set of wireless parameters that you need to connect to a wireless network.
Chapter 4 Station Mode The following table describes the labels in this screen. Table 14 Profile LABEL DESCRIPTION Profile List Click a column heading to sort the entries. denotes that the wireless device is in infrastructure mode and the wireless security is activated. , denotes that the wireless device is in infrastructure mode but the wireless security is deactivated. , or denotes that the wireless device is in Ad-Hoc mode and the wireless security is activated.
Chapter 4 Station Mode 1 Click Add in the Profile screen. An Add New Profile screen displays as shown next. Figure 39 Profile: Add a New Profile The following table describes the labels in this screen. Table 15 Profile: Add a New Profile LABEL DESCRIPTION Add New Profile Profile Name Enter a descriptive name in this field. SSID Select an available wireless device in the Scan Info table and click Select, or enter the SSID of the wireless device to which you want to associate in this field manually.
Chapter 4 Station Mode Table 15 Profile: Add a New Profile (continued) LABEL DESCRIPTION Scan Click Scan to search for available wireless devices within transmission range. Select Select an available wireless device in the table and click Select to add it to this profile. Whenever you activate this profile, the N220 associates to the selected wireless network only. 2 If you select the Infrastructure network type in the previous screen, skip to step 3.
Chapter 4 Station Mode 3 If you selected Infrastructure network type in the first screen, select WEP, WPA, WPA2, WPA-PSK, WPA2-PSK or 802.1x from the drop-down list box to enable data encryption. If you selected Ad-Hoc network type in the first screen, you can use only WEP encryption method. Otherwise, select DISABLE to allow the N220 to communicate with the access points or other peer wireless computers without any data encryption, and skip to step 5.
Chapter 4 Station Mode 5 This read-only screen shows a summary of the new profile settings. Verify that the settings are correct. Click Save to save and go to the next screen. Click Back to return to the previous screen. Otherwise, click Exit to go back to the Profile screen without saving. Figure 43 Profile: Confirm New Settings 6 To use this network profile, click the Activate Now button. Otherwise, click the Activate Later button. You can activate only one profile at a time.
Chapter 4 Station Mode 4.6 The Adapter Screen To set the other advanced features on the N220, click the Adapter tab. Figure 45 Adapter The following table describes the labels in this screen. Table 17 Adapter LABEL DESCRIPTION Adapter Setting Power Saving Mode Select Maximum or Normal to save power. This forces the N220 to go to sleep mode when it is not transmitting data. When you select Off, the N220 will never go to sleep mode. At the time of writing, this field is not available in Windows Vista.
Chapter 4 Station Mode Table 17 Adapter (continued) LABEL PIN - Use the PIN From the AP or Wireless Router Save DESCRIPTION Select this to use the PIN (Personal Identification Number) WPS mode. Use this option when you want to enter the PIN from another WPSenabled device in the N220. When you select this, the PIN - Use the PIN From the AP or Wireless Router screen appears (see Section 4.6.3 on page 70). Click Save to save the changes to the N220 and return to the Link Info screen. 4.6.
Chapter 4 Station Mode and PIN - Use this Device’s PIN in the Adapter screen. The following screen displays. Figure 47 WPS: PIN - Use this Device’s PIN The following table describes the labels in this screen. Table 18 WPS: PIN - Use this Device’s PIN LABEL DESCRIPTION This device’s PIN This is the N220’s Personal Identification Number (PIN). This field is read-only. Enter the number that displays in this field into the configuration interface of the other WPSenabled device.
Chapter 4 Station Mode PIN from the AP or Wireless Router in the Adapter screen. The following screen displays. Figure 48 WPS: PIN - Use the PIN from the AP or Wireless Router The following table describes the labels in this screen. Table 19 WPS: PIN - Use the PIN from the AP or Wireless Router LABEL DESCRIPTION AP or Router’s PIN Enter the PIN from your AP or wireless router in this field before you click Start. Start Click this to start WPS.
Chapter 4 Station Mode 4.7.1 Using PEAP in Vista Take the following steps to set up WPA, WPA2 or 802.1x security using PEAP in Windows Vista. 1 Either select the AP to which you want to connect in the Site Survey screen (see Section 4.4 on page 54), or configure a profile in the normal way (see Section 4.5 on page 62). 2 In the WPA, WPA2 or 802.1x security screen (see Section 4.4.1.4 on page 58 and Section 4.4.1.5 on page 59), select PEAP as the EAP Type.
Chapter 4 Station Mode 7 Click OK. The Enter Credentials screen disappears and the N220 tries to connect to the network. The ZyXEL utility’s Link Info screen displays, showing the connection status (see Section 4.3 on page 51). If the Link Info screen displays an active connection, you have successfully completed the procedure. 4.7.2 Using TLS in Vista Take the following steps to set up WPA, WPA2 or 802.1x security using TLS in Windows Vista.
Chapter 4 Station Mode 7 74 Click OK. The Select Certificate screen disappears and the N220 tries to connect to the network. The ZyXEL utility’s Link Info screen displays, showing the connection status (see Section 4.3 on page 51). If the Link Info screen displays an active connection, you have successfully completed the procedure.
CHAPTER 5 AP Mode 5.1 Overview This section shows you how to configure your N220 in AP Mode using the Windows version of the ZyXEL Utility. Note: Some features available in Windows XP or Windows 2000 are not available in Windows Vista. AP Mode allows you to set up a wireless network without using a pre-existing AP. The following figure shows a sample AP network set up. Figure 53 AP Network Example . Here, the N220 is installed on computer A and set to operate in access point mode.
Chapter 5 AP Mode 5.1.1 What You Can Do in This Section • On the Link Info screen, you can see your AP’s current transmission and security status See Section 5.3 on page 77 for details. • On the Configuration screen, you can set up the broadcast parameters for your access point as well as its security options. See Section 5.4 on page 78 for details. • On the MAC Filter screen, you can configure the N220 to give exclusive access to devices or exclude specific devices from connecting to the AP.
Chapter 5 AP Mode 5.2 AP Mode Screen Summary This section describes the ZyXEL Utility screens while in AP Mode. Figure 55 ZyXEL Utility Menu Summary The following table describes the menus. Table 20 ZyXEL Utility Menu Summary TAB DESCRIPTION Link Info Use this screen to see your current connection status, configuration and data rate statistics. Configuration Use this screen to configure wireless LAN settings.
Chapter 5 AP Mode The following table describes the labels in this screen. Table 21 Link Info LABEL DESCRIPTION Status SSID This field displays the name that identifies your N220 in the wireless LAN network. Current Channel This field displays the radio channel the N220 is currently using. Transmission Rate This field displays the current transmission rate of the N220 in megabits per second (Mbps).
Chapter 5 AP Mode The following table describes the labels in this screen. Table 22 Configuration LABEL DESCRIPTION Wireless Settings SSID Enter a name for your AP This name is broadcast to all wireless-capable devices in range and can be used to connect to your AP. You can enter up to 32 printable ASCII characters in this field. Hide SSID Select this option to keep your AP’s SSID private.
Chapter 5 AP Mode 5.4.1 Security Settings When you configure the N220 to act as an AP and wireless security is activated, the Configuration screen varies according to the encryption method used by your network. 5.4.1.1 Disable This option indicates that no security services are enabled. Anyone within range of your AP can connect to it without having to enter a pre-shared key.
Chapter 5 AP Mode Table 23 Security Setting: WEP (continued) LABEL Key 1-4 DESCRIPTION Select this option if you want to manually enter a transmit key. Enter the key in the field provided. If you select 64 Bits in the WEP field. Enter either 10 hexadecimal digits in the range of “A-F”, “a-f” and “09” (for example, 11AA22BB33) for HEX key type. or Enter 5 ASCII characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (for example, MyKey) for ASCII key type.
Chapter 5 AP Mode Table 24 Security Setting: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Pre-Shared Key Type a pre-shared key (same as the AP or peer device) of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters. Save Click to save the changes. Cancel Click to discard the changes. 5.
Chapter 5 AP Mode The following table describes the labels in this screen. Table 25 MAC Filter LABEL DESCRIPTION Filter Type Define the filter action for the list of MAC addresses in the MAC address filter table. Select Disable to deactivate the MAC filter feature. Select Reject all to block access to the N220, MAC addresses not listed will be allowed to access the N220. Select Allow all to permit access to the N220, MAC addresses not listed will be denied access to the N220.
Chapter 5 AP Mode 84 N220 User’s Guide
CHAPTER 6 Maintenance 6.1 Overview This section describes how to uninstall or upgrade the ZyXEL utility. 6.1.1 What You Can Do in This Section • Learn which version of the ZyXEL utility and device driver you’re currently using. See Section 6.2 on page 86 for details. • Remove the ZyXEL utility from your computer. See Section 6.3 on page 86 for details. • Upgrade the ZyXEL utility. See Section 6.4 on page 87 for details. 6.1.
Chapter 6 Maintenance 6.2 The About Screen The About screen displays driver and utility version numbers of the N220. To display the screen as shown below, click the About ( ) button. Figure 61 About The following table describes the read-only fields in this screen. Table 26 About LABEL DESCRIPTION Driver Version This field displays the version number of the N220 driver. Utility Version This field displays the version number of the ZyXEL utility. 6.
Chapter 6 Maintenance 3 Click Finish to complete uninstalling the software and restart the computer when prompted. Figure 63 Uninstall: Finish 6.4 Upgrading the ZyXEL Utility Note: Before you uninstall the ZyXEL utility, take note of your current wireless configurations. To perform the upgrade, follow the steps below. 1 Download the latest version of the utility from the ZyXEL web site and save the file on your computer. 2 Follow the steps in Section 6.
Chapter 6 Maintenance 88 N220 User’s Guide
P ART II Troubleshooting and Specifications Troubleshooting (91) Product Specifications (95) 89
CHAPTER 7 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Accessing the ZyXEL Utility • Link Quality • Problems Communicating with Other Computers 7.1 Power, Hardware Connections, and LEDs The N220 does not turn on. None of the LEDs turn on. 1 Make sure the N220 is correctly installed (refer to your Quick Start Guide).
Chapter 7 Troubleshooting 7.2 Accessing the ZyXEL Utility I cannot access the ZyXEL Utility 1 Make sure the N220 is properly inserted and the LEDs are on. Refer to the Quick Start Guide for information on how to properly connect the N220. 2 Use the Device Manager to check for possible hardware conflicts. Click Start > Settings > Control Panel > System > Hardware > Device Manager. Verify the status of the N220 under Network Adapter (steps may vary depending on the version of Windows).
Chapter 7 Troubleshooting 7.4 Problems Communicating with Other Computers The computer with the N220 installed cannot communicate with the other computer(s). In Infrastructure Mode • Make sure that the AP and the associated computers are turned on and working properly. • Make sure the N220 computer and the associated AP use the same SSID. • Change the AP and the associated wireless clients to use another radio channel if interference is high.
Chapter 7 Troubleshooting 94 N220 User’s Guide
CHAPTER 8 Product Specifications Table 27 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name N220 Wireless N-lite USB Adapter Interface USB 2.0 Standards IEEE 802.11b IEEE 802.11g IEEE 802.11n Operating Frequency 2.
Chapter 8 Product Specifications Table 27 Product Specifications (continued) Transmit Power (+/- 1.5 dB) 802.11b: 1/2/5.5/11M: 18.5 dBm 802.11g: 54/48M: 15dBm 24/36M: 15dBm 12/18M: 16dBm 6/9M: 16.5 dBm 802.11n: @ HT20 MCS0~MCS07: 15.5 dBm @ HT40 MCS0~MCS07: 15.5 dBm Receiver Sensitivity 802.11b: 11Mbps at -82dBm 802.11g: 54Mbps at -68dBm 802.11n: HT20 at -64dBm HT40 at -62dBm WIRELESS STANDARDS IEEE 802.11b Dynamically shifts between 11, 5.5, 2, and 1 Mbps network speed. Operation Frequency 2.
Chapter 8 Product Specifications Table 27 Product Specifications (continued) Operation Channels N. America & Taiwan HT20 2.412GHz~ 2.462GHz 1-11 N. America & Taiwan HT40 2.422GHz~ 2.452GHz 3-9 Euro ETSI HT20 2.412GHz~ 2.472GHz 1-13 Euro ETSI HT40 2.422GHz~ 2.
Chapter 8 Product Specifications Table 27 Product Specifications (continued) Wireless QoS Wi-Fi Multi Media (WMM) Wi-Fi Protected Setup (WPS) Push button configuration Use device's PIN Use AP or Router's PIN Other WMM power-saving support Compatible with Windows Zero Configuration 98 N220 User’s Guide
P ART III Appendices and Index Note: The appendices provide general information. Some details may not apply to your N220.
APPENDIX A Setting Up Your Computer’s IP Address Note: Your specific N220 may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address 1 Click Start > Control Panel. Figure 64 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix A Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 66 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 68 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel.
Appendix A Setting Up Your Computer’s IP Address 3 Click the Network and Sharing Center icon. Figure 71 Windows Vista: Network And Internet 4 Click Manage network connections. Figure 72 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 73 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 75 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix A Setting Up Your Computer’s IP Address 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel.
Appendix A Setting Up Your Computer’s IP Address 3 Click Change adapter settings. Figure 78 Windows 7: Network And Sharing Center 4 Double click Local Area Connection and then select Properties. Figure 79 Windows 7: Local Area Connection Status Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 81 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Figure 82 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 83 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address 2 In the System Preferences window, click the Network icon. Figure 84 Mac OS X 10.4: System Preferences 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 85 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 86 Mac OS X 10.4: Network Preferences > TCP/IP Tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask.
Appendix A Setting Up Your Computer’s IP Address • In the Router field, type the IP address of your device. Figure 87 Mac OS X 10.4: Network Preferences > Ethernet 6 Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 88 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 Click Apple > System Preferences. Figure 89 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 90 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 91 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix A Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your N220. Figure 92 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 93 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix A Setting Up Your Computer’s IP Address 1 Click System > Administration > Network. Figure 94 Ubuntu 8: System > Administration Menu 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix A Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 96 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 98 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix A Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 99 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix A Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly. Figure 100 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
Appendix A Setting Up Your Computer’s IP Address 1 Click K Menu > Computer > Administrator Settings (YaST). Figure 101 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 102 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 103 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 104 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 105 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 128 Click Next to save the changes and close the Network Card Setup window.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 106 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 107 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
APPENDIX B Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix B Wireless LANs with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 110 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix B Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 111 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix B Wireless LANs hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 112 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix B Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix B Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 28 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.
Appendix B Wireless LANs IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: • User based identification that allows for roaming.
Appendix B Wireless LANs • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: • Accounting-Request Sent by the access point requesting accounting.
Appendix B Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 authentication method does not support data encryption with dynamic session key.
Appendix B Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
Appendix B Wireless LANs If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x.
Appendix B Wireless LANs keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
Appendix B Wireless LANs 4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. Figure 113 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows.
Appendix B Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 114 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix B Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.
Appendix B Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. • Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb.
APPENDIX C Windows Wireless Management This appendix shows you how to manage your N220 using the Windows Vista and Windows XP wireless configuration tools. Windows Vista Take the following steps to connect to a wireless network using the Windows Vista wireless configuration tool (WLAN AutoConfig).
Appendix C Windows Wireless Management Connecting to a Wireless Network 1 In the Windows Vista taskbar, click Start ( ) > Connect To. Figure 115 Vista: Start Menu The Connect To window displays, showing all available networks. Figure 116 Vista: The Connect To Window The security status of each wireless network displays, as well as an indication of its signal strength. If you use the mouse pointer to hover over a network’s entry, additional information about the network displays.
Appendix C Windows Wireless Management Figure 117 Vista: Additional Information 2 Double-click the network’s name to join the network, or select a network and click Connect. Note: If the network to which you want to connect does not display, see the section on setting up a connection manually on page 151.
Appendix C Windows Wireless Management 3 If security is enabled, you may be prompted to enter your security key. Figure 118 Vista: Enter Security Key Your computer tries to connect to the wireless network. Figure 119 Vista: Connecting If your computer has connected to the wireless network successfully, the following screen displays.
Appendix C Windows Wireless Management Figure 120 Vista: Successful Connection 4 If you will use this network again, ensure that Save this network is selected. If you save the network, you do not have to configure its settings again. 5 Select Start this connection automatically if you want Windows to always try to use this network when you start up your computer.
Appendix C Windows Wireless Management 1 Click Set up a connection or network at the bottom of the Connect to screen. The following screen displays.
Appendix C Windows Wireless Management 2 Click Manually connect to a wireless network. The following screen displays. Figure 122 Vista: Connect Manually The following table describes the labels in this screen. Table 32 Vista: Connect Manually LABEL DESCRIPTION Network name Enter your network’s SSID (Service Set IDentifier). Security type Select the type of security used by the network to which you want to connect. The types of available security shown depend on your computer’s wireless client.
Appendix C Windows Wireless Management Table 32 Vista: Connect Manually 3 LABEL DESCRIPTION Next Click this to save your settings and move on to the next page. Cancel Click this to stop setting up your network. When you have finished filling in the fields, click Next. the following screen displays. Figure 123 Vista: Successfully Added Network 4 If you want to make any changes to the settings you just configured, click Change connection settings. Otherwise, click Connect to....
Appendix C Windows Wireless Management 1 Click Start ( ) > Connect To. In the Connect to screen, click Set up a connection or network. The following screen displays. Figure 124 Vista: Set Up An Ad-hoc Network 2 Select Set up a wireless ad hoc (computer-to-computer) network and click Next. The following screen displays. Figure 125 Vista: Ad-hoc Options 3 Enter the Network name (SSID) you want to use for your network. Select a Security type.
Appendix C Windows Wireless Management 4 Enter the Security key/Passphrase. Everybody on the network must enter this key in their computer’s wireless client in order to access the network. If you want to see the characters you entered, select the Display characters box. Otherwise, leave it empty (dots display instead of the characters). 5 If you will use this ad-hoc network again, select the Save this network box.
Appendix C Windows Wireless Management Activating Wireless Zero Configuration 1 Click Start, Control Panel and double-click Network Connections. 2 Double-click on the icon for wireless network connection. 3 The status window displays as shown below. Click Properties.
Appendix C Windows Wireless Management 4 The Wireless Network Connection Properties screen displays. Click the Wireless Networks tab. Make sure the Use Windows to configure my wireless network settings check box is selected.
Appendix C Windows Wireless Management If you see the following screen, refer to article 871122 on the Microsoft web site for information on starting WZC. Figure 131 Windows XP SP2: WZC Not Available Connecting to a Wireless Network 1 Double-click the network icon for wireless connections in the system tray to open the Wireless Network Connection Status screen. Figure 132 Windows XP SP2: System Tray Icon The type of the wireless network icon in Windows XP SP2 indicates the status of the N220.
Appendix C Windows Wireless Management 2 Windows XP SP2: In the Wireless Network Connection Status screen, click View Wireless Networks to open the Wireless Network Connection screen. Figure 133 Windows XP SP2: Wireless Network Connection Status Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the Wireless Network Connection Properties screen.
Appendix C Windows Wireless Management 3 Windows XP SP2: Click Refresh network list to reload and search for available wireless devices within transmission range. Select a wireless network in the list and click Connect to join the selected wireless network. Figure 135 Windows XP SP2: Wireless Network Connection The following table describes the icons in the wireless network list.
Appendix C Windows Wireless Management Figure 136 Windows XP SP1: Wireless Network Connection Properties 4 162 4.Windows XP SP2: If the wireless security is activated for the selected wireless network, the Wireless Network Connection screen displays. You must set the related fields in the Wireless Network Connection screen to the same security settings as the associated AP and click Connect.
Appendix C Windows Wireless Management security settings for more information. Otherwise click Cancel and connect to another wireless network without data encryption. If there is no security activated for the selected wireless network, a warning screen appears. Click Connect Anyway if wireless security is not your concern.
Appendix C Windows Wireless Management Association Select a network in the Preferred networks list and click Properties to view or configure security. Figure 139 Windows XP: Wireless (network) properties: Association The following table describes the labels in this screen. Table 36 Windows XP: Wireless (network) properties: Association LABEL DESCRIPTION Network name (SSID) This field displays the SSID (Service Set IDentifier) of each wireless network.
Appendix C Windows Wireless Management Table 36 Windows XP: Wireless (network) properties: Association (continued) LABEL DESCRIPTION This is a computer-tocomputer (ad hoc) network; wireless access points are not used If this check box is selected, you are connecting to another computer directly. OK Click OK to save your changes. Cancel Click Cancel to leave this screen without saving any changes you may have made.
Appendix C Windows Wireless Management Table 37 Windows XP: Wireless (network) properties: Authentication (continued) LABEL DESCRIPTION Properties Click this button to open the properties screen and configure certificates. The screen varies depending on what you select in the EAP type field. Authenticate as computer when computer information is available Select this check box to have the computer send its information to the network for authentication when a user is not logged on.
Appendix C Windows Wireless Management The following table describes the labels in this screen. Table 38 Windows XP: Protected EAP Properties LABEL DESCRIPTION Validate server certificate Select the check box to verify the certificate of the authentication server. Connect to these servers Select the check box and specify a domain in the field below to have your computer connect to a server which resides only within this domain.
Appendix C Windows Wireless Management Smart Card or other Certificate Properties Figure 142 Windows XP: Smart Card or other Certificate Properties The following table describes the labels in this screen. Table 39 Windows XP: Smart Card or other Certificate Properties 168 LABEL DESCRIPTION Use my smart card Select this check box to use the smart card for authentication. Use a certificate on this computer Select this check box to use a certificate on your computer for authentication.
Appendix C Windows Wireless Management Ordering the Preferred Networks Follow the steps below to manage your preferred networks.
Appendix C Windows Wireless Management 1 Windows XP SP2: Click Change the order of preferred networks in the Wireless Network Connection screen (see Figure 135 on page 161). The screen displays as shown. Figure 143 Windows XP SP2: Wireless Networks: Preferred Networks Windows XP SP1: In the Wireless Network Connection Status screen, click Properties and the Wireless Networks tab to open the screen as shown.
Appendix C Windows Wireless Management 2 Whenever the N220 tries to connect to a new network, the new network is added in the Preferred networks table automatically. Select a network and click Move up or Move down to change it's order, click Remove to delete it or click Properties to view the security, authentication or connection information of the selected network. Click Add to add a preferred network into the list manually.
Appendix C Windows Wireless Management 172 N220 User’s Guide
APPENDIX D Wireless for Windows 7 Follow these steps to connect to a wireless network for a computer with the Windows 7 Operating System (OS). You should know the network name (SSID) of the wireless network to which you want to connect. You should also know the password (pre-shared key (PSK)/ passphrase) if the wireless network is secured. Enabling the Wireless Adapter Do the following to enable the wireless adapter of your computer.
Appendix D Wireless for Windows 7 2 In the Control Panel, click View network status and tasks under the Network and Internet category. Figure 146 Windows 7: Control Panel 3 Click Change adapter settings. Figure 147 Windows 7: Network And Sharing Center 4 Right click Wireless Network Connection and select Enable.
Appendix D Wireless for Windows 7 A progress indicator appears. Figure 149 Windows 7: Enabling the Wireless Network Connection When it shows Enabled, you are ready to connect to your wireless network. Connecting to a Wireless Network Once the computer’s wireless adapter has been enabled, do the following to connect to a wireless network. 1 Click the wireless adapter icon which appears in the bottom right of your computer monitor. A list of available wireless networks displays.
Appendix D Wireless for Windows 7 2 Select a wireless network and click Connect. Figure 151 Windows 7: Connect to the Wireless Networks • If the wireless network is not password-protected, you should see a progress indicator as follows. Figure 152 Windows 7: Wireless Connection Progress Indicator • If the wireless network is secured, you should provide the correct credentials before you can gain access as shown below.
Appendix D Wireless for Windows 7 Verifying the Settings Open a web browser and try to access a website, such as www.zyxel.com. Additionally, do the following to check your wireless network connection status. 1 Click Start > Control Panel. Figure 154 Windows 7: Start Menu 2 In the Control Panel, click View network status and tasks under the Network and Internet category.
Appendix D Wireless for Windows 7 3 Check the Connections under View you active networks. If the wireless network name displays and the icon is green, you have successfully connected to the wireless network.
APPENDIX E Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Appendix E Legal Information Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) this device may not cause interference and 2) this device must accept any interference, including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 3dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada.
Appendix E Legal Information This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 182 1 Go to http://www.zyxel.com.
Index Index A B About 86 Basic Service Set, See BSS 131 about your ZyXEL Device 18 BSS 131 Access Point (AP) 38 Access point (AP) 38 Access Point. See also AP. ACT LED 19 C activating a profile 67 CA 41, 139 adapter 68 CCMP 41 Ad-Hoc 20, 65 Certificate Authority See CA. Advanced Encryption Standard 41 See AES.
Index dynamic WEP key exchange 140 IEEE 802.
Index O real-time data traffic statistics 53 online help 22 receive speed 52 Output power 78 related documentation 3 receive rate 52 RTS (Request To Send) 134 threshold 133, 134 P packet collisions 52 S Pairwise Master Key (PMK) 141, 143 passphrase 40, 56, 80 safety warnings 7 password 40 Save power 79 PEAP 71, 72 save power 68 peer computer 19, 65 scan 54 physical specifications 95 scan info 65 power saving mode 68 search 54 preamble mode 135 Security 78 product specifications 95
Index transmission rate 51, 63 wireless security 136 transmit key 56, 80 wireless standard 95 transmit rate 52 Wireless station mode profile 62 trend chart 52, 53 TTLS 71 U wireless station mode adapter 68 security settings 55, 80 site survey 54 trend chart 53 wireless tutorial 24 uninstalling the ZyXEL utility 86 upgrading the ZyXEL utility 87 important step 87 user authentication 39 utility installation 20 utility version 86 V Vista 71, 73 W weight 95 WEP 39, 56 automatic setup 40 manual setup
Index accessing 21 driver version number 86 exiting 21 help 22 reactivating 21 status 21 system tray icon 20 upgrading 87 version number 86 N220 User’s Guide 187