User ManualTable of ContentsG-560 User's Guide1Copyright3Federal Communications Commission (FCC) Interference Statement4Safety Warnings6ZyXEL Limited Warranty7Customer Support8Table of Contents11List of Figures15List of Tables19Preface211. Getting to Know Your G-560231.1 Introducing the G-560 Wireless Access Point231.2 G-560 Features231.3 Applications for the G-560261.3.1 Access Point261.3.1.1 Internet Access Application261.3.1.2 Corporation Network Application261.3.2 Access Point + Bridge271.4 The LED Display282. Management Computer Setup312.1 Introduction312.2 Wired Connection312.2.1 Setting Up Your Computer's IP Address312.2.1.1 Windows 2000/NT/XP322.3 Wireless Connection342.4 Resetting the G-560352.4.1 Method of Restoring Factory-Defaults353. Introducing the Web Configurator373.1 Web Configurator Overview373.2 Accessing the G-560 Web Configurator373.3 Configuring the G-560 Using the Wizard393.3.1 Basic Settings393.3.2 Wireless Settings403.3.3 Security Settings413.3.3.1 Disable413.3.3.2 WEP423.3.3.3 WPA-PSK433.3.4 Confirm Your Settings434. Status Screens454.1 System Status454.1.1 Statistics464.1.2 Association List475. System Screens495.1 Factory Ethernet Defaults495.2 TCP/IP Parameters495.2.1 IP Address Assignment495.2.2 IP Address and Subnet Mask505.3 Configuring System Settings505.4 Time Settings526. Wireless Screens536.1 Wireless LAN Overview536.1.1 IBSS536.1.2 BSS536.1.3 ESS546.2 Wireless LAN Basics556.2.1 Channel556.2.2 SSID556.2.3 RTS/CTS566.2.4 Fragmentation Threshold576.3.1 WMM QoS Example576.3.2 WMM QoS Priorities576.3.3 ToS (Type of Service) and WMM QoS586.4 Configuring Wireless586.4.1 Access Point Mode586.4.2 Access Point + Bridge Mode616.4.2.1 Bridge Loop616.4.2.2 Configuring Access Point + Bridge Mode636.5 Wireless Security Overview666.5.1 Encryption676.5.2 Authentication676.5.3 Restricted Access676.5.4 Hide G-560 Identity676.6 WEP Overview676.6.1 Data Encryption676.6.2 Authentication676.7 802.1x Overview686.8 Introduction to RADIUS696.8.1 Types of RADIUS Messages696.9 EAP Authentication Overview706.10 Dynamic WEP Key Exchange706.11 Introduction to WPA and WPA2716.11.1 Encryption716.11.2 User Authentication726.12 WPA(2)-PSK Application Example726.13 WPA(2) with RADIUS Application Example726.14 Security Parameters Summary736.15 Wireless Client WPA Supplicants746.16 Configuring Wireless Security746.16.1 Disable746.16.2 WEP756.16.3 WPA-PSK/WPA2-PSK/Mixed766.16.4 WPA/WPA2/Mixed776.16.5 IEEE 802.1x786.17 MAC Filter806.18 Introduction to OTIST816.18.1 Enabling OTIST816.18.1.1 AP816.18.1.2 Wireless Client826.18.2 Starting OTIST836.18.3 Notes on OTIST847. Management Screens857.1 Maintenance Overview857.2 Configuring Password857.3 Logs867.4 Configuration Screen877.4.1 Backup Configuration887.4.2 Restore Configuration887.4.3 Back to Factory Defaults897.5 F/W Upload Screen907.6 Language Screen918. Troubleshooting938.1 Problems Starting Up the G-560938.2 Problems with the Password938.3 Problems with the WLAN Interface948.4 Problems with the Ethernet Interface948.4.1 Pop-up Windows, JavaScripts and Java Permissions958.4.1.1 Internet Explorer Pop-up Blockers958.4.1.2 JavaScripts988.4.1.3 Java Permissions1008.5 Testing the Connection to the G-560102A. Setting up Your Computer’s IP Address103Windows 95/98/Me103Installing Components104Configuring105Verifying Settings106Windows 2000/NT/XP106Verifying Settings111Macintosh OS 8/9111Verifying Settings113Macintosh OS X113Verifying Settings114Linux114Using the K Desktop Environment (KDE)115Using Configuration Files116Verifying Settings118B. Wireless LANs119Wireless LAN Topologies119Ad-hoc Wireless LAN Configuration119BSS119ESS120Channel121RTS/CTS121Fragmentation Threshold122IEEE 802.11g Wireless LAN123IEEE 802.1x123RADIUS123Types of RADIUS Messages124EAP Authentication125Types of Authentication125EAP-MD5 (Message-Digest Algorithm 5)125EAP-TLS (Transport Layer Security)126EAP-TTLS (Tunneled Transport Layer Service)126PEAP (Protected EAP)126LEAP126WEP Encryption126WEP Authentication Steps127Dynamic WEP Key Exchange128WPA(2)128User Authentication128Encryption128Roaming129Requirements for Roaming130C. IP Subnetting133IP Addressing133IP Classes133Subnet Masks134Subnetting134Example: Two Subnets135Example: Four Subnets137Example Eight Subnets138Subnetting With Class A and Class B Networks.139Index141Numerics141A141B141C141D141E141F142G142H142I142L142M142N142O142P142Q143R143S143T144U144V144W144Z144Size: 6.65 MBPages: 144Language: EnglishOpen manual