User ManualTable of ContentsZyXEL G-570S User’s Guide1Copyright2Interference Statements and Certifications3Safety Warnings5ZyXEL Limited Warranty6Customer Support7Table of Contents9List of Figures13List of Tables17Preface19Getting to Know Your G-570S211.1 Introducing the G-570S Wireless Access Point211.2 G-570S Features211.3 Applications for the G-570S241.3.1 Access Point for Internet Access241.3.2 Corporate Network Access Application241.3.3 Wireless Client Application251.3.4 Bridge / Repeater261.3.5 Access Point and Repeater271.4 The LED Display27Management Computer Setup292.1 Introduction292.2 Wired Connection292.2.1 Setting Up Your Computer's IP Address292.3 Wireless Connection322.4 Restarting the G-570S332.5 Resetting the G-570S332.5.1 Methods of Restoring Factory-Defaults33Introducing the Web Configurator353.1 Web Configurator Overview353.2 Accessing the G-570S Web Configurator353.3 Configuring the G-570S Using the Wizard373.4 Navigating the Advanced Screens433.4.1 Navigation Panel44Status Screens47System Screen535.1 TCP/IP Parameters535.1.1 IP Address Assignment535.1.2 IP Address and Subnet Mask53Wireless Screens576.1 Wireless LAN Overview576.1.1 IBSS576.1.2 BSS576.1.3 ESS586.2 Wireless LAN Basics596.2.1 Channel596.2.2 SSID596.2.3 RTS/CTS606.2.4 Fragmentation Threshold616.3 Configuring Wireless616.4 Wireless Security Overview736.4.1 Encryption746.4.2 Authentication746.4.3 Restricted Access746.4.4 Hide G-570S Identity756.5 WEP Overview756.5.1 Data Encryption756.5.2 Authentication756.6 802.1x Overview766.7 Introduction to RADIUS766.7.1 Types of RADIUS Messages766.8 EAP Authentication Overview776.9 Dynamic WEP Key Exchange786.10 Introduction to WPA and WPA2786.10.1 Encryption796.10.2 User Authentication796.11 WPA(2)-PSK Application Example796.12 WPA(2) with RADIUS Application Example806.13 Security Parameters Summary816.14 Wireless Client WPA Supplicants816.15 Configuring Wireless Security816.17.1 Enabling OTIST896.17.2 Starting OTIST916.17.3 Notes on OTIST92Management Screens957.1 Maintenance Overview957.4.1 Backup Configuration987.4.2 Restore Configuration987.4.3 Back to Factory Defaults99Troubleshooting1038.1 Problems Starting Up the G-570S1038.2 Problems with the Password1038.3 Problems with the WLAN Interface1048.4 Problems with the Ethernet Interface1048.4.1 Pop-up Windows, JavaScripts and Java Permissions1058.5 Testing the Connection to the G-570S112Product Specifications115Specification Tables115Approvals117Power Adaptor Specifications118Setting up Your Computer’s IP Address121Windows 95/98/Me121Installing Components122Configuring123Verifying Settings124Windows 2000/NT/XP124Verifying Settings129Macintosh OS 8/9129Verifying Settings131Macintosh OS X131Verifying Settings132Linux132Using the K Desktop Environment (KDE)133Using Configuration Files134Verifying Settings136Wireless LANs137Wireless LAN Topologies137Ad-hoc Wireless LAN Configuration137BSS137ESS138Channel139RTS/CTS139Fragmentation Threshold140IEEE 802.11g Wireless LAN141IEEE 802.1x141RADIUS141Types of RADIUS Messages142EAP Authentication143Types of Authentication143EAP-MD5 (Message-Digest Algorithm 5)143EAP-TLS (Transport Layer Security)144EAP-TTLS (Tunneled Transport Layer Service)144PEAP (Protected EAP)144LEAP144WEP Encryption144WEP Authentication Steps145Dynamic WEP Key Exchange146WPA(2)146User Authentication146Encryption146Roaming147Requirements for Roaming148IP Subnetting151IP Addressing151IP Classes151Subnet Masks152Subnetting152Example: Two Subnets153Example: Four Subnets155Example Eight Subnets156Subnetting With Class A and Class B Networks.157Index159Numerics159A159B159C159D159E160F160G160H160I160L160M160N160O161P161Q161R161S161T162U162V162W162Z162Size: 6.44 MBPages: 162Language: EnglishOpen manual