Manual De UsuarioTabla de contenidosIntroduction and Wizards21Introducing the ZyXEL Device23Introducing the Web Configurator31Wizards35Advanced43Navigating the Advanced Screens45Status Screens47System Screen51Wireless Screens55Management and Troubleshooting87Management Screens89Troubleshooting95Appendices and Index99About This User's Guide3Document Conventions4Safety Warnings6Contents Overview9Table of Contents11List of Figures15List of Tables19Part I: Introduction and Wizards21Introducing the ZyXEL Device231.1 Overview231.2 Applications for the ZyXEL Device231.2.1 Access Point for Internet Access231.2.2 Corporate Network Access Application241.2.3 Wireless Client Application241.2.4 Bridge / Repeater251.2.5 Access Point and Repeater261.3 Ways to Manage the ZyXEL Device261.4 Good Habits for Managing the ZyXEL Device271.5 LEDs271.6 Management Computer Setup281.6.1 Wired Connection281.6.2 Wireless Connection281.7 Restarting the ZyXEL Device291.8 Resetting the ZyXEL Device291.8.1 Methods of Restoring Factory-Defaults29Introducing the Web Configurator312.1 Web Configurator Overview312.2 Accessing the Web Configurator31Wizards353.1 Using the Wizards353.1.1 Wizard: Basic Settings353.1.2 Wizard: Wireless Settings363.1.3 Wizard: Security Settings373.1.4 Wizard: Confirm Your Settings40Part II: Advanced43Navigating the Advanced Screens454.0.1 Navigation Panel46Status Screens475.1 System Status475.1.1 Statistics485.1.2 Association List49System Screen516.1 TCP/IP Parameters516.1.1 IP Address Assignment516.1.2 IP Address and Subnet Mask516.2 System Settings52Wireless Screens557.1 Wireless Network Overview557.2 Wireless Security Overview567.2.1 SSID567.2.2 MAC Address Filter567.2.3 User Authentication567.2.4 Encryption577.2.5 One-Touch Intelligent Security Technology (OTIST)587.3 Wireless Performance Overview587.3.1 Quality of Service (QoS)587.4 Additional Wireless Terms587.5 Quality of Service597.5.1 WMM QoS597.6 Configuring Wireless607.6.1 Access Point Mode607.6.2 Wireless Client Mode627.6.3 The Site Survey Window647.6.4 Bridge Mode657.6.5 AP+Repeater Mode697.7 Configuring Wireless Security727.7.1 Wireless Security: Disable737.7.2 Wireless Security: WEP737.7.3 Wireless Security: WPA(2)-PSK757.7.4 Wireless Security: WPA(2)757.7.5 Wireless Security: IEEE 802.1x777.8 MAC Filter787.9 OTIST817.9.1 Enabling OTIST817.9.2 Starting OTIST837.9.3 Notes on OTIST84Part III: Management and Troubleshooting87Management Screens898.1 Maintenance Overview898.2 Password898.3 Logs908.4 Configuration File918.4.1 Backup Configuration918.4.2 Restore Configuration928.4.3 Back to Factory Defaults938.5 F/W Upload Screen93Troubleshooting959.1 Power, Hardware Connections, and LEDs959.2 ZyXEL Device Access and Login969.3 Internet Access98Part IV: Appendices and Index99Appendix A Product Specifications101Appendix B Setting up Your Computer’s IP Address107Appendix C Pop-up Windows, JavaScripts and Java Permissions123Appendix D Wireless LANs129Appendix E Customer Support143Appendix F Legal Information147Index151Figure 1 Internet Access Application24Figure 2 Corporate Network Application24Figure 3 Wireless Client Application25Figure 4 Bridge Application25Figure 5 Bridge Repeater Application26Figure 6 AP+Repeater Application26Figure 7 LEDs27Figure 8 Wired Connection28Figure 9 Wireless Connection28Figure 10 Web Configurator Address32Figure 11 Login Screen32Figure 12 Language Screen32Figure 13 Select Wizard or Advanced Setup Screen33Figure 14 Wizard: Basic Settings36Figure 15 Wizard: Wireless Settings37Figure 16 Setup Wizard 3: Disable38Figure 17 Wizard 3: WEP39Figure 18 Wizard 3: WPA(2)-PSK40Figure 19 Wizard: Confirm Your Settings41Figure 20 Status Screen45Figure 21 Status47Figure 22 Status: View Statistics49Figure 23 Status: View Association List50Figure 24 Status: View Association List: Wireless Client Mode50Figure 25 System Settings52Figure 26 Example of a Wireless Network55Figure 27 Wireless Settings: Access Point60Figure 28 Wireless Settings: Wireless Client63Figure 29 Wireless Client Mode: the Site Survey Screen64Figure 30 Bridging Example66Figure 31 Bridge Loop: Two Bridges Connected to Hub66Figure 32 Bridge Loop: Bridge Connected to Wired LAN67Figure 33 Wireless Settings: Bridge67Figure 34 Wireless Settings: AP+Repeater70Figure 35 Wireless Security: Disable73Figure 36 Wireless Security: WEP74Figure 37 Wireless Security: WPA(2)-PSK75Figure 38 Wireless Security: WPA(2)76Figure 39 Wireless Security: 802.1x77Figure 40 MAC Filter80Figure 41 OTIST82Figure 42 Example Wireless Client OTIST Screen82Figure 43 ZyXEL Device in Wireless Client Mode: OTIST Screen83Figure 44 Security Key83Figure 45 OTIST in Progress (AP)84Figure 46 OTIST in Progress (Client)84Figure 47 No AP with OTIST Found84Figure 48 Start OTIST?84Figure 49 Management: Password89Figure 50 Management: Logs90Figure 51 Management: Configuration File91Figure 52 Configuration Upload Successful92Figure 53 Network Temporarily Disconnected92Figure 54 Configuration Upload Error93Figure 55 Reset Warning Message93Figure 56 Management: F/W Upload93Figure 57 Firmware Upgrading Screen94Figure 58 Network Temporarily Disconnected94Figure 59 Firmware Upload Error94Figure 60 WIndows 95/98/Me: Network: Configuration108Figure 61 Windows 95/98/Me: TCP/IP Properties: IP Address109Figure 62 Windows 95/98/Me: TCP/IP Properties: DNS Configuration110Figure 63 Windows XP: Start Menu111Figure 64 Windows XP: Control Panel111Figure 65 Windows XP: Control Panel: Network Connections: Properties112Figure 66 Windows XP: Local Area Connection Properties112Figure 67 Windows XP: Internet Protocol (TCP/IP) Properties113Figure 68 Windows XP: Advanced TCP/IP Properties114Figure 69 Windows XP: Internet Protocol (TCP/IP) Properties115Figure 70 Macintosh OS 8/9: Apple Menu116Figure 71 Macintosh OS 8/9: TCP/IP116Figure 72 Macintosh OS X: Apple Menu117Figure 73 Macintosh OS X: Network118Figure 74 Red Hat 9.0: KDE: Network Configuration: Devices119Figure 75 Red Hat 9.0: KDE: Ethernet Device: General119Figure 76 Red Hat 9.0: KDE: Network Configuration: DNS120Figure 77 Red Hat 9.0: KDE: Network Configuration: Activate120Figure 78 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0121Figure 79 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0121Figure 80 Red Hat 9.0: DNS Settings in resolv.conf121Figure 81 Red Hat 9.0: Restart Ethernet Card121Figure 82 Red Hat 9.0: Checking TCP/IP Properties122Figure 83 Pop-up Blocker123Figure 84 Internet Options: Privacy124Figure 85 Internet Options: Privacy125Figure 86 Pop-up Blocker Settings125Figure 87 Internet Options: Security126Figure 88 Security Settings - Java Scripting127Figure 89 Security Settings - Java127Figure 90 Java (Sun)128Figure 91 Peer-to-Peer Communication in an Ad-hoc Network129Figure 92 Basic Service Set130Figure 93 Infrastructure WLAN131Figure 94 RTS/CTS132Figure 95 WPA(2) with RADIUS Application Example139Figure 96 WPA(2)-PSK Authentication140Table 1 Front Panel LED Description27Table 2 Factory Defaults29Table 3 Global Icon Key45Table 4 Screens Summary46Table 5 Status47Table 6 Status: View Statistics49Table 7 Status: View Association List50Table 8 Status: View Association List: Wireless Client Mode50Table 9 Private IP Address Ranges51Table 10 System Settings52Table 11 Types of Encryption for Each Type of Authentication57Table 12 Additional Wireless Terms58Table 13 WMM QoS Priorities59Table 14 Wireless Settings: Access Point60Table 15 Wireless Settings: Wireless Client63Table 16 Wireless: the AP Survey Screen65Table 17 Wireless Settings: Bridge68Table 18 Wireless Settings: AP + Repeater70Table 19 Wireless Security: Disable73Table 20 Wireless Security: WEP74Table 21 Wireless Security: WPA-PSK75Table 22 Wireless Security: WPA(2)76Table 23 Wireless Security: 802.1x78Table 24 MAC Filter80Table 25 OTIST82Table 26 Management: Password89Table 27 Management: Logs90Table 28 Management: Configuration File: Restore Configuration92Table 29 Management: F/W Upload94Table 30 Hardware Specifications101Table 31 Feature Specifications101Table 32 Wireless Specifications104Table 33 Approvals104Table 34 Power Adaptor Specifications105Table 35 IEEE 802.11g133Table 36 Wireless Security Levels134Table 37 Comparison of EAP Authentication Types137Table 38 Wireless Security Relational Matrix140Tamaño: 2 MBPáginas: 154Language: EnglishManuales abiertas