User manual ZYXEL G-302 V3
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ZYXEL G-302 V3. We hope that this ZYXEL G-302 V3 user guide will be useful to you.
Lastmanuals help download the user guide ZYXEL G-302 V3.
You may also download the following manuals related to this product:
ZYXEL G-302 V3 (1576 ko)
ZYXEL G-302 V3 QUICK GUIDE (458 ko)
ZYXEL G-302 V3 QUICK GUIDE V4.0 (447 ko)
Manual abstract: user guide ZYXEL G-302 V3
Detailed instructions for use are in the User's Guide.
[. . . ] ZyXEL G-302 v3
802. 11g Wireless PCI Adapter
User's Guide
Version 2. 00 Edition 1 4/2006
ZyXEL G-302 v3 User's Guide
Copyright
Copyright © 2006 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. [. . . ] This field displays the signal strength of each wireless device. Click Scan to search for available wireless devices within transmission range. Click Connect to associate to the selected wireless device. Click an entry in the Available Network List table to display the information of the selected wireless device. This field displays the network type (Infrastructure or Ad Hoc) of the wireless device. This fields displays the network standard (802. 11g or 802. 11b) of the wireless device. This field displays the channel number used by each wireless device. This field shows whether data encryption is activated (WEP, WPA, WPA2, WPAPSK or WPA2-PSK) or inactive (DISABLE). This field displays the MAC address of the wireless device. This field displays the time when the wireless device is scanned.
3. 2. 1 Connecting to a WLAN Network
Follow the steps below to connect to a WLAN network using the Site Survey screen. 1 Click Scan to search for all available wireless networks within range. 2 To join a network, click an entry in the table to select a wireless network and then click Connect. 3 If the WEP encryption is activated for the selected wireless network, the Security Settings screen displays. You must set the related fields in the Security Settings screen to the same security settings as the associated wireless device. Refer to Section 3. 2. 2 on page 34 for more information. Otherwise click the Back or Exit button and connect to another wireless network without data encryption. 4 Verify that you have successfully connected to the selected network and check the network information in the Link Info screen.
3. 2. 2 Security Settings
When you configure the G-302 v3 to connect to a network with wireless security activated and the security settings are disabled on the G-302 v3, the screen varies according to the encryption method used by the selected network.
34
Chapter 3 ZyXEL Utility Configuration
ZyXEL G-302 v3 User's Guide
3. 2. 2. 1 WEP Encryption
Figure 15 Security Settings: WEP
The following table describes the labels in this screen.
Table 6 Security Settings: WEP
LABEL WEP Authentication Type Pass Phrase DESCRIPTION Select 64 Bits or 128 Bits to activate WEP encryption and then fill in the related fields. Refer to Section 2. 3 on page 29 for more information. Enter a passphrase of up to 63 case-sensitive printable characters. As you enter the passphrase, the G-302 v3 automatically generates four different WEP keys and displays it in the key field below. Refer to Section 2. 2. 1 on page 26 for more information. At the time of writing, you cannot use passphrase to generate 152-bit WEP keys. [. . . ] If they do not match, it is assumed that the data has been tampered with and the packet is dropped. By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi network than WEP and difficult for an intruder to break into the network. The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ZYXEL G-302 V3 Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ZYXEL G-302 V3 will begin.