Detailed instructions for use are in the User's Guide.
[. . . ] ZyXEL G-220 v2
802. 11g Wireless USB Adapter
User's Guide
Version 1. 00 Edition 2 3/2006
ZyXEL G-220 v2 User's Guide
Copyright
Copyright © 2006 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. [. . . ] 1 Click Scan to search for all available wireless networks within range. 2 To join a network, click an entry in the table to select a wireless network and then click Connect or double-click an entry. 3 If the wireless security is activated for the selected wireless network, the Security Setting screen displays. You must set the related fields in the Security Setting screen to the same security settings as the associated wireless device. Otherwise click the Exit button and connect to another wireless network without data encryption. 4 Verify that you have successfully connected to the selected network and check the network information in the Link Info screen.
38
Chapter 3 Wireless Station Mode Configuration
ZyXEL G-220 v2 User's Guide
3. 3. 2 Security Settings
When you configure the ZyXEL G-220 v2 to connect to a network with wireless security activated and the security settings are disabled on the ZyXEL G-220 v2, the screen varies according to the encryption method used by the selected network.
3. 3. 2. 1 WEP Encryption
Figure 16 Station Mode: Security Settings: WEP
The following table describes the labels in this screen.
Table 6 Station Mode: Security Settings: WEP
LABEL Security Settings WEP Select 64 Bits, 128 Bits or 256 Bits to activate WEP encryption and then fill in the related fields. As you enter the passphrase, the ZyXEL G-220 v2 automatically generates four different WEP keys and displays it in the key field below. At the time of writing, you cannot use passphrase to generate 256-bit WEP keys. DESCRIPTION
Encryption Type Pass Phrase
Transmit Key
Chapter 3 Wireless Station Mode Configuration
39
ZyXEL G-220 v2 User's Guide Table 6 Station Mode: Security Settings: WEP (continued)
LABEL DESCRIPTION
Key x (where x is a Select this option if you want to manually enter the WEP keys. Enter either 10 hexadecimal digits in the range of "A-F", "a-f" and "0-9" (for example, 11AA22BB33) for HEX key type. or Enter 5 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9" (for example, MyKey) for ASCII key type. If you select 128 Bits in the WEP field, Enter either 26 hexadecimal digits in the range of "A-F", "a-f" and "0-9" (for example, 00112233445566778899AABBCC) for HEX key type or Enter 13 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9" (for example, MyKey12345678) for ASCII key type. If you select 256 Bits in the WEP field, Enter either 58 hexadecimal digits in the range of "A-F", "a-f" and "0-9" (for example, 0000111122223333444455556666777788889999AAAABBBBCCCC000011) for HEX key type or Enter 29 ASCII characters (case sensitive) ranging from "a-z", "A-Z" and "0-9" (for example, MyKey111122223333444455556678) for ASCII key type.
Note: The values for the WEP keys must be set up exactly the same on all wireless devices in the same wireless LAN. ASCII WEP keys are case sensitive.
Back Next Exit Click Back to go to the Site Survey screen to select and connect to another network. Click Next to confirm your selections and advance to the Confirm Save screen. Click Exit to return to the Site Survey screen without saving.
3. 3. 2. 2 WPA-PSK/WPA2-PSK
Figure 17 Station Mode: Security Settings: WPA-PSK/WPA2-PSK
40
Chapter 3 Wireless Station Mode Configuration
ZyXEL G-220 v2 User's Guide
The following table describes the labels in this screen.
Table 7 Station Mode: Security Settings: WPA-PSK/WPA2-PSK
LABEL Encryption Type DESCRIPTION The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses a simple common password, instead of user-specific credentials. Type a pre-shared key (same as the AP or peer device) of between 8 and 63 casesensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters. Click Back to go to the Site Survey screen to select and connect to another network. Click Next to confirm your selections and advance to the Confirm Save screen. Click Exit to return to the Site Survey screen without saving.
Pre-Shared Key
Back Next Exit
3. 3. 2. 3 WPA/WPA2
Figure 18 Station Mode: Security Settings: WPA/WPA2
The following table describes the labels in this screen.
Table 8 Station Mode: Security Settings: WPA/WPA2
LABEL Encryption Type DESCRIPTION The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are the same. The only difference between the two is that WPA-PSK/WPA2-PSK uses a simple common password, instead of user-specific credentials. [. . . ] 7 Restart your computer when prompted.
Verifying Settings
1 Click Start and then Run. 2 In the Run window, type "winipcfg" and then click OK to open the IP Configuration window. You should see your computer's IP address, subnet mask and default gateway.
Windows 2000/NT/XP
1 For Windows XP, click start, Control Panel. In Windows 2000/NT, click Start, Settings, Control Panel.
98
Appendix F Setting up Your Computer's IP Address
ZyXEL G-220 v2 User's Guide Figure 68 Windows XP: Start Menu
2 For Windows XP, click Network Connections. [. . . ]