Manual De UsuarioTabla de contenidosUser’s Guide1Copyright3Certifications4ZyXEL Limited Warranty6Safety Warnings7Customer Support8Table of Contents11List of Figures15List of Tables19Preface211. Getting Started231.2.1 Station Mode231.2.1.1 Infrastructure231.2.1.2 Ad-Hoc241.2.2 Access Point Mode251.2.3 Changing AG-120 Mode251.3 AG-120 Hardware and Utility Installation261.4.1 Enabling WZC261.4.2 Accessing the ZyXEL Utility272. Tutorial292.1 Connecting to a Wireless LAN292.2 Creating and Using a Profile312.3 Configuring the AG-120 as an AP343. Wireless LAN Network373.2.1 Hide SSID383.2.2 MAC Address Filter383.2.3 User Authentication and Encryption393.2.3.1 WEP393.2.3.2 IEEE 802.1x403.2.3.3 WPA and WPA2403.3.1 Enabling OTIST413.3.1.1 AP413.3.1.2 Wireless Client423.3.2 Starting OTIST423.3.3 Notes on OTIST434. Wireless Station Mode Configuration454.1.1 ZyXEL Utility Screen Summary454.2 The Link Info Screen464.2.1 Trend Chart474.3 The Site Survey Screen484.3.1 Security Settings504.3.1.1 WEP Encryption504.3.1.2 WPA-PSK/WPA2-PSK514.3.1.3 WPA/WPA2524.3.1.4 IEEE 802.1x534.3.2 Confirm New Settings544.4 The Profile Screen554.4.1 Adding a New Profile574.5 The Advanced Screen614.6 The Adapter Screen625. Access Point Mode Configuration655.1.1 ZyXEL Utility Screen Summary655.1.2 Additional Setup Requirements665.2 The Link Info Screen665.3 The Configuration Screen675.4 The Advanced Screen695.5 The MAC Filter Screen706. Maintenance737. Troubleshooting777.1 Problems Starting the ZyXEL Utility777.2 Problem Connecting to an Access Point777.3 Problem with the Link Quality787.4 Problems Communicating With Other Computers78A. Product Specifications79B. Access Point Mode Setup Example81Configuring the Computer on Which You Install the AG-12081Configuring the Wireless Station Computer83C. Management with Wireless Zero Configuration85Activating Wireless Zero Configuration85Connecting to a Wireless Network87Security Settings91Association92Authentication93Ordering the Preferred Networks96D. Wireless Security99Types of EAP Authentication99EAP-MD5 (Message-Digest Algorithm 5)99EAP-TLS (Transport Layer Security)100EAP-TTLS (Tunneled Transport Layer Service)100PEAP (Protected EAP)100LEAP100Dynamic WEP Key Exchange100WPA and WPA2101Encryption101User Authentication102WPA(2)-PSK Application Example103WPA(2) with RADIUS Application Example103Security Parameters Summary104E. Setting up Your Computer’s IP Address105Windows 95/98/Me105Installing Components106Configuring107Verifying Settings108Windows 2000/NT/XP108Verifying Settings112Macintosh OS 8/9112Verifying Settings114Macintosh OS X114Verifying Settings115Index117A117C117D117E117F117G117H117I117L118M118N118O118P118Q118R118S118T118U118V119W119Z119Tamaño: 4 MBPáginas: 119Language: EnglishManuales abiertas