Manuel D’UtilisationTable des matièresZyXEL G-220 v2 User's Guide1Copyright3Federal Communications Commission (FCC) Interference Statement4ZyXEL Limited Warranty6Customer Support7Table of Contents9List of Figures13List of Tables15Preface171. Getting Started191.1.1 Application Overview191.1.1.1 Infrastructure191.1.1.2 Ad-Hoc201.1.1.3 Access Point Mode211.2 ZyXEL G-220 v2 Hardware and Utility Installation211.4 Windows XP Users Only211.6.1 Site Survey231.7.1 Change ZyXEL G-220 v2 Mode252. Wireless LAN Network272.1.1 SSID272.1.2 Channel272.1.3 Transmission Rate (Tx Rate)272.2.1 Data Encryption with WEP282.2.2 IEEE 802.1x282.2.2.1 EAP Authentication282.2.3 WPA(2)292.2.3.1 Encryption292.2.3.2 User Authentication292.2.4 WPA(2)-PSK Application Example292.2.5 WPA(2) with RADIUS Application Example302.3 Encryption Type312.4 Preamble Type312.5.1 Enabling OTIST322.5.1.1 AP322.5.1.2 Wireless Client332.5.2 Starting OTIST332.5.3 Notes on OTIST343. Wireless Station Mode Configuration353.2 The Link Info Screen353.2.1 Trend Chart363.3 The Site Survey Screen373.3.1 Connecting to a WLAN Network383.3.2 Security Settings393.3.2.1 WEP Encryption393.3.2.2 WPA-PSK/WPA2-PSK403.3.2.3 WPA/WPA2413.3.2.4 IEEE 802.1x423.3.3 Confirm Save Screen433.4 The Profile Screen443.4.1 Adding a New Profile463.5 The Adapter Screen504. Access Point Mode Configuration534.1.1 Additional Setup Requirements534.2 The Link Info Screen534.3 The Configuration Screen544.4 The MAC Filter Screen575. Maintenance596. Troubleshooting636.1 Problems Starting the ZyXEL Utility Program636.2 Problem Connecting to an Access Point636.3 Problem with the Link Status646.4 Problems Communicating With Other Computers64A. Product Specifications65B. Access Point Mode Setup Example67Configuring the Computer on Which You Install the ZyXEL G- 220 v267Configuring the Wireless Station Computer69C. Disable Windows XP Wireless LAN Configuration Tool71Via the Wireless Network System Tray Icon71Via the Control Panel74D. Management with Wireless Zero Configuration77Activating Wireless Zero Configuration77Connecting to a Wireless Network78Security Settings81Association82Authentication83Ordering the Preferred Networks86E. Types of EAP Authentication89EAP-MD5 (Message-Digest Algorithm 5)89EAP-TLS (Transport Layer Security)89EAP-TTLS (Tunneled Transport Layer Service)89PEAP (Protected EAP)90LEAP90Dynamic WEP Key Exchange90WPA(2)91Encryption91User Authentication92WPA(2)-PSK Application Example92WPA(2) with RADIUS Application Example93Security Parameters Summary94F. Setting up Your Computer’s IP Address95Windows 95/98/Me95Installing Components96Configuring97Verifying Settings98Windows 2000/NT/XP98Verifying Settings102Macintosh OS 8/9102Verifying Settings104Macintosh OS X104Verifying Settings105Index107A107C107D107E107F107G107H107I108L108M108N108O108P108Q108R108S108T109U109V109W109Z109Taille: 3,6 MoPages: 109Language: EnglishOuvrir le manuel