External, 128-bit encryption, 64-bit encryption, power over EN (PoE)
The state-of-art RF design of the G-470 brings long distance Wi-Fi connection to municipal and WISP wireless networks. Advanced features allow easy self-installation and flexible deployment options. ZyXEL G-470 has an external reverse SMA connector. Taking advantage of this connector, user can freely choose different types of antenna for different environments or geographic conditions to get the best connection quality. The G-470 has an embedded enterprise-level security supplicant that allows w... Read more [ Report abuse or wrong photo | Share your Zyxel G-470 photo ]
User reviews and opinions
|nonsence||9:37am on Thursday, September 23rd, 2010|
|Newegg has it (April 2010) for $60!! It really does work great, especially for a 2nd tv in a bedroom or the like. Maybe not as much for primary (i.e.|
|milenia101||11:06am on Thursday, August 26th, 2010|
|for a simple cheap base unit this thing is great Very good right out of the box - just install the software and turn on the device - it was fun had i...|
|kultgirl||10:36pm on Wednesday, June 23rd, 2010|
|Milk does the Body Good! I have a few TB of video and growing. Most VOB files need to be reconverted due to various issues with VOB files.|
|slates||5:06am on Wednesday, May 5th, 2010|
|Great Media Streamer The Zyxel DMA1100P is an excellent device. Faultlessly streaming Video to your TV with upscaling as well. Search for prices. Rather disappointed I have a Homeplug network, and this product in theory met my requirements for viewing downloaded BBC iPlayer programmes well.|
Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.
Up to 400mW total output power External Signal Strength Indicator Driver-Less Installation Embedded WPA/WPA2 802.1x Security Supplicant 802.3af PoE Support
For Wireless Internet Access Deployment
High Data-Rate and Stable Wireless Internet Connection
The State of Art RF design of G-470 enables long distance WiFi connections to Municipal and WISP wireless networks. Advanced features allow for easy self-install and flexible deployment options.
Flexible Antenna Options
G-470 has an external reverse SMA connector and delivered with a default Antenna. With the external antenna connector, users can choose different type of antenna in different scenarios or different geographic situation to get the best connection quality.
Free from Driver installation
The G-470 is a stand alone Wireless Ethernet Bridge. It works with any device that support an Ethernet connection allowing you to wirelessly enable any computer regardless of operating system, video game systems, printers and more. You can also connect the G-470 to the WAN port of your home router to share a Wireless ISP connection.
802.11g Wireless Ethernet Bridge g-470
Enterprise Level Security support
G-470 embedded a enterprise level Security supplicant. It allows the Wireless deployment with WPA/WPA2 security. Once it has been setup, all the encryption, decryption, authentication are done by G-470. The G-470 supports EAP types of TLS, TTLS, and PEAP for 802.1x authentication.
IEEE 802.3 and 802.3u 10Based-T and 100Based-TX IEEE 802.11b/g standard compliant
Ethernet : One 10/100Base-T Ethernet, Full Duplex RJ-45 connector with Auto Power Supply: 12V DC, 1 A/ 48V PoE Antenna: 4dBi Dipole Antenna Antenna Connector: One Reverse SMA Antenna Connector Reset Button
Internet Explorer 5.0 or later (For conguration)
Dimensions: (W)* (D)* (H)mm Weight: g
Temperature: 0C to 50C Humidity: 20 to 95 % (non-condensing )
Safety: CSA international, CE60950 EMI: CE, FCC part 15B
For more product
ZyXEL North America
information, visit us on the web www.us.ZyXEL.com
Tel: +1-714-632-0882 Fax: +1-714-632-0858 Email: email@example.com http://www.us.zyxel.com
Copyright 2005 ZyXEL Communications Corp. All rights reserved. ZyXEL, ZyXEL logo and ZyNOS are registered trademarks of ZyXEL Communications Corp. All other brands, product names, or trademarks mentioned are the property of their respective owners. All specifications are subject to change without notice.
264856 - 06092005
802.11g Wireless Ethernet Adapter
Version 1.00 Edition 1 5/2006
G-470 Users Guide
Copyright 2006 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Federal Communications Commission (FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operations. This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la classe B est conforme la norme NMB-003 du Canada.
1 Go to http://www.zyxel.com. 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page.
For your safety, be sure to read and follow all warning notices and instructions. Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device. Please contact your vendor for further information. Connect the power cord to the right supply voltage (110V AC in North America or 230V AC in Europe). Place connecting cables carefully so that no one will step on them or stumble over them. Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord. If you wall mount your device, make sure that no electrical, gas or water pipes will be damaged. Do NOT install nor use your device during a thunderstorm. There may be a remote risk of electric shock from lightning. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Make sure to connect the cables to the correct ports. Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. Do NOT store things on the device. Connect ONLY suitable accessories to the device.
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser. To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Please have the following information ready when you contact customer support. Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it.
TELEPHONEA FAX WEB SITE REGULAR MAIL LOCATION CORPORATE HEADQUARTERS (WORLDWIDE) SALES E-MAIL FTP SITE www.zyxel.com ZyXEL Communications Corp. www.europe.zyxel.com 6 Innovation Road II Science Park ftp.zyxel.com Hsinchu 300 Taiwan ftp.europe.zyxel.com www.zyxel.cz ZyXEL Communications Czech s.r.o. Modransk 01 Praha 4 - Modrany Cesk Republika ZyXEL Communications A/S Columbusvej 2860 Soeborg Denmark ZyXEL Communications Oy Malminkaari Helsinki Finland ZyXEL France 1 rue des Vergers Bat. 1 / C 69760 Limonest France ZyXEL Deutschland GmbH. Adenauerstr. 20/A2 D-52146 Wuerselen Germany ZyXEL Hungary 48, Zoldlomb Str. H-1025, Budapest Hungary ZyXEL Kazakhstan 43, Dostyk ave.,Office 414 Dostyk Business Centre 050010, Almaty Republic of Kazakhstan ZyXEL Communications Inc. 1130 N. Miller St. Anaheim CA 92806-2001 U.S.A. ZyXEL Communications A/S Nils Hansens vei Oslo Norway firstname.lastname@example.org +886-3-578-3942 email@example.com firstname.lastname@example.org CZECH REPUBLIC email@example.com +886-3-578-2439 +420-241-091-350 +420-241-091-359
List of Figures
Figure 1 Device application: Basic... 21 Figure 2 Device Application: Home Network... 21 Figure 3 The ZyXEL Device: Front Panel.. 22 Figure 4 The ZyXEL Device: Rear Panel... 23 Figure 5 Application: Infrastructure... 24 Figure 6 Roaming Example... 25 Figure 7 Example of a Wireless Network... 31 Figure 8 Wired Connection... 36 Figure 9 Control Panel... 36 Figure 10 Network Connection... 37 Figure 11 Local Area Connection Properties.. 37 Figure 12 Internet Protocol Properties... 38 Figure 13 Advanced TCP/IP Settings... 38 Figure 14 Web Configurator: Login Screen.. 39 Figure 15 Web Configurator: the Status icon.. 39 Figure 16 Web Configurator: the Status screen.. 40 Figure 17 Web Configurator: Change Administrator Login Password.. 42 Figure 18 View Statistics.... 42 Figure 19 Setup Wizard 1: Basic Settings.. 44 Figure 20 Setup Wizard 2: Wireless Settings... 45 Figure 21 Setup Wizard 3: Disable.. 46 Figure 22 Wizard 3: WEP.... 47 Figure 23 Wizard 3: WPA(2)-PSK... 48 Figure 24 Wizard: Confirm Your Settings... 49 Figure 25 System Settings... 52 Figure 26 Basic Service set... 55 Figure 27 Extended Service Set... 56 Figure 28 RTS/CTS... 57 Figure 29 Wireless: Wireless Settings.. 58 Figure 30 Wireless: the AP Survey Screen.. 60 Figure 31 Wireless Security: Disable... 62 Figure 32 Wireless Security: WEP... 63 Figure 33 Wireless Security: WPA(2)-PSK... 64 Figure 34 Wireless Security: WPA(2)... 65 Figure 35 Wireless Security: 802.1x... 67 Figure 36 Management: Password.. 69 Figure 37 Management: Configuration File.. 70 Figure 38 Management: Configuration Upload Successful. 71
G-470 Users Guide Figure 39 Management: Reset Warning Message.. 71 Figure 40 Management: F/W Upload... 72 Figure 41 Management: Firmware Upgrading Screen.. 73 Figure 42 Network Temporarily Disconnected.. 73 Figure 43 Management: Firmware Upload Error.. 73 Figure 44 Pop-up Blocker... 78 Figure 45 Internet Options... 79 Figure 46 Internet Options: Settings... 80 Figure 47 Pop-up Blocker Settings.. 81 Figure 48 Internet Options: Custom Level... 82 Figure 49 Security Settings - Java Scripting... 83 Figure 50 Security Settings - Java... 84 Figure 51 Java (Sun).... 85 Figure 52 Pinging the G-470.... 85 Figure 53 WPA-PSK Authentication... 93 Figure 54 WPA(2) with RADIUS Application Example.. 93 Figure 55 WIndows 95/98/Me: Network: Configuration.. 96 Figure 56 Windows 95/98/Me: TCP/IP Properties: IP Address.. 97 Figure 57 Windows 95/98/Me: TCP/IP Properties: DNS Configuration.. 98 Figure 58 Windows XP: Start Menu... 99 Figure 59 Windows XP: Control Panel.. 99 Figure 60 Windows XP: Control Panel: Network Connections: Properties. 100 Figure 61 Windows XP: Local Area Connection Properties.. 100 Figure 62 Windows XP: Advanced TCP/IP Settings... 101 Figure 63 Windows XP: Internet Protocol (TCP/IP) Properties.. 102 Figure 64 Macintosh OS 8/9: Apple Menu... 103 Figure 65 Macintosh OS 8/9: TCP/IP... 103 Figure 66 Macintosh OS X: Apple Menu... 104 Figure 67 Macintosh OS X: Network... 105
Your ZyXEL Device can use certificates (also called digital IDs) for user authentication. Certificates are based on public-private key pairs. A certificate contains the certificate owners identity and public key. Certificates provide a way to exchange public keys for use in authentication. A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner. There are commercial certification authorities like CyberTrust or VeriSign and government certification authorities. In public-key encryption and decryption, each host has two keys. One key is public and can be made openly available; the other key is private and must be kept secure. Public-key encryption in general works as follows. 1 Tim wants to send a private message to Jenny. Tim generates a public key pair. What is encrypted with one key can only be decrypted using the other. 2 Tim keeps the private key and makes the public key openly available. 3 Tim uses his private key to encrypt the message and sends it to Jenny. 4 Jenny receives the message and uses Tims public key to decrypt it.
5 Additionally, Jenny uses her own private key to encrypt a message and Tim uses Jennys public key to decrypt the message. The certification authority uses its private key to sign certificates. Anyone can then use the certification authoritys public key to verify the certificates.
126.96.36.199.1 Data Encryption WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the ZyXEL Device and the AP or other wireless stations to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption. There are two ways to create WEP keys in your ZyXEL Device. Automatic WEP key generation based on a password phrase called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s). Enter the WEP keys manually. Your ZyXEL Device allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys. Only one key is used as the default key at any one time. 188.8.131.52.2 Authentication Type The IEEE 802.11b/g standard describes a simple authentication method between the wireless stations and AP. Three authentication types are defined: Auto, Open System and Shared Key. Open System mode is implemented for ease-of-use and when security is not an issue. The wireless station and the AP or peer computer do not share a secret key (WEP key). Thus the wireless stations can associate with any AP or peer computer and listen to any transmitted data that is not encrypted. Shared Key mode involves a shared secret key (WEP key) to authenticate the wireless station to the AP or peer computer. This requires you to enable the wireless LAN security and use same settings on both the wireless station and the AP or peer computer. Auto authentication mode allows the ZyXEL Device to switch between the open system and shared key modes automatically. Use the auto mode if you do not know the authentication mode of the other wireless stations.
184.108.40.206 IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Authentication can be done using an external RADIUS server. 220.127.116.11.1 EAP Authentication EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a RADIUS server perform authentication. The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that supports IEEE 802.1x. The ZyXEL Device supports EAP-TLS, EAP-TTLS and EAPPEAP. Refer to the Wireless Security appendix for descriptions. For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). A certificate (also called a digital ID) can be used to authenticate users, and a CA issues certificates and guarantees the identity of each certificate owner.
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption than TKIP. Select WEP only when the AP does not support WPA. WEP is less secure than WPA.
WPA 2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA.
Introducing the Web Configurator
This chapter shows you how to configure the ZyXEL Device using the embedded web configurator.
4.1 Web Configurator Overview
4.1.1 Setting Up Your Computer's IP Address
4.4 Configuring the ZyXEL Device Using the Wizard
The wizard consists of a series of screens to help you configure your ZyXEL Device to access the wireless network. Use the following buttons to navigate the Wizard:
Back Next Click Back to return to the previous screen. Click Next to continue to the next screen.
No configuration changes will be saved to the ZyXEL Device until you click Finish.
4.4.1 Wizard: Basic Settings
Click on the Wizard icon in the Status screen to start the setup wizard ( Settings screen appears. ). The Basic
1 Enter a descriptive name to identify the device in the Ethernet network. 2 Select Obtain IP Address Automatically only if you want to put the device behind a router that assigns an IP address. Warning: If you select Obtain IP Address Automatically you will not be able to access the ZyXEL Device through the Web Configurator unless you have a router that assigns an IP address. If you select this by mistake, use the RESET button to restore the factory default IP address.
3 Select Use fixed IP Address to give the device a static IP address. The IP address you configure here is used for management of the device (accessing the web configurator). 4 Enter a Subnet Mask appropriate to your network and the Gateway IP Address of the neighboring device, if you know it. If you do not, leave the Gateway IP Address field as 0.0.0.0.
Figure 19 Setup Wizard 1: Basic Settings
Do not select this unless you have a router that can assign the G-470 an IP address.
Click Next to continue.
4.4.2 Wizard: Wireless Settings
Use this wizard screen to set up the wireless LAN. See the chapter on the wireless screens for background information. 1 The SSID is a unique name to identify the device in a wireless network. Enter up to 32 printable characters. Spaces are allowed. If you change the SSID on the device, make sure all wireless stations use the same SSID in order to access the network. Note: The wireless AP and your ZyXEL Device must use the same SSID, channel and wireless security settings for wireless communication.
G-470 Users Guide Figure 20 Setup Wizard 2: Wireless Settings.
Click Next to continue, or Back to return to the Basic Settings screen.
4.4.3 Wizard: Security Settings
Use this screen to configure security for your wireless LAN connection. The screen varies depending on what you select in the Encryption Method field. Select Disable to have no wireless security configured, select WEP, or select WPA-PSK if your wireless AP supports WPA-PSK. In the Status page, go to Wireless > Security if you want to use WPA2, WPA or 802.1x. See Chapter 6 on page 55 for background information.
Select Disable to have no wireless LAN security configured. If you do not enable any wireless security on your device, your network is accessible to any wireless networking device that is within range. Note: With no wireless security a neighbor can access and see traffic in your network.
Note: If you have changed the IP address, you will need to use the new address to log in to the ZyXEL Device.
Reset Click Reset to clear any unsaved changes to this screen.
This chapter discusses how to configure wireless settings and wireless security on your ZyXEL Device.
6.1 Wireless LAN Overview
This section introduces the wireless LAN (WLAN) and some basic scenarios.
6.1.1 BSS (Infrastructure)
A Basic Service Set (BSS), also called an Infrastructure network, exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS is enabled, wireless station A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other.
Figure 26 Basic Service set
Chapter 6 Wireless Screens
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate.
Figure 27 Extended Service Set
6.2 Wireless LAN Basics
This section describes the wireless LAN network terms.
A channel is the radio frequency or frequencies used by IEEE 802.11b wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel from an adjacent AP (access point) to reduce interference. Interference occurs when radio signals from different access points overlap, causing signal disruption and degrading performance. Adjacent channels partially overlap, however. To avoid interference due to overlap, your AP should be on a channel at least five channels away from a channel that an adjacent AP is using. For example, if your region has 11 channels and an adjacent AP is using channel 1, then you need to select a channel between 6 or 11.
The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other.
A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations are within range of the access point (AP) or wireless gateway, but out of range of each other, so they cannot hear each other; that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other.
Figure 28 RTS/CTS
When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is invoked. When a data frame exceeds the RTS/CTS value you set (between 0 to 2432 bytes), the station that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations within its range to notify them to defer their transmission. It also reserves and confirms with the requesting station the time frame for the requested transmission. Stations can send frames smaller than the specified RTS/CTS directly to the AP without the RTS (Request To Send)/CTS (Clear to Send) handshake. You should only configure RTS/CTS if the possibility of hidden nodes exists on your network and the cost of resending large frames is more than the extra network overhead involved in the RTS (Request To Send)/CTS (Clear to Send) handshake.
If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Note: Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy.
Table 9 Wireless Security Levels
SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication Wi-Fi Protected Access (WPA) Most Secure WPA2
If you do not enable any wireless security on your ZyXEL Device, your network is accessible to any wireless networking device that is within range.
6.5 Configuring Wireless Security
In order to configure and enable wireless security; click Wireless > Security to display the Security screen. This screen varies according to the encryption method you select.
6.5.1 Wireless Security: Disable
If you do not enable any wireless security on your device, your network is accessible to any wireless networking device that is within range.
Figure 31 Wireless Security: Disable
Table 10 Wireless Security: Disable
LABEL Encryption Method Apply Reset DESCRIPTION Select Disable to have no wireless LAN security configured. Click Apply to save your changes back to the device. Click Reset to begin configuring this screen afresh.
6.5.2 Wireless Security: WEP
WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless stations must use the same WEP key to encrypt and decrypt data. You can configure up to four 64-bit or 128-bit WEP keys, but only one key can be used at any one time.
G-470 Users Guide Figure 32 Wireless Security: WEP
Table 11 Wireless Security: WEP
LABEL Encryption Method Authentication Type Data Encryption Passphrase DESCRIPTION Select WEP if you want to configure WEP encryption parameters. Select Open or Shared from the drop-down list box. Select 64 bit WEP or 128 bit WEP to enable data encryption. With 64-bit or 128-bit WEP, you can enter a passphrase (password phrase) of up to 32 case-sensitive printable characters and click Generate to have the device create four different WEP keys. After you enter the passphrase, click Generate to have the device generate four different WEP keys automatically. If you want to manually set the WEP keys, enter the WEP key in the field provided. Select a WEP key to use for data encryption. The WEP keys are used to encrypt data. Both the device and the wireless stations must use the same WEP key for data transmission. If you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). Click Apply to save your changes back to the device. Click Reset to begin configuring this screen afresh.
Note: You must first have a wired connection to a network and obtain the certificate(s) from a certificate authority (CA).
Login Name Enter a user name. This is the user name that you or an administrator set up on a RADIUS server. Enter the password associated with the login name above.
Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) User Certificate File
This is your encrypted private key file.
G-470 Users Guide Table 13 Wireless Security: WPA(2) (continued)
LABEL Select File DESCRIPTION Click here to choose a private key. Select a private key from the list box and click Select to activate it. Click Delete if you want to remove a private key from the list. Alternatively, click Browse to locate a private key. Click Upload to add it to the list. The private key file must have a.pfx ending. Enter the password associated with the private key above. Select the check box to verify the certificate of the authentication server. Click Apply to save your changes to the device. Click Reset to begin configuring this screen afresh.
Private Key Password (EAP-TLS only) Validate Server Certificate (EAP-TLS, EAP-TTLS and EAP-PEAP only) Apply Reset
6.5.5 Wireless Security: IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Note: Once you enable user authentication, you need to specify an external RADIUS server on the device for authentication.
G-470 Users Guide Figure 35 Wireless Security: 802.1x
Table 14 Wireless Security: 802.1x
LABEL Encryption Method EAP Type Data Encryption (EAP-MD5 only) Trusted Root CA File (EAP-TLS, EAP-TTLS and EAP-PEAP only) Select File (EAP-TLS, EAP-TTLS and EAP-PEAP only) DESCRIPTION Select 802.1X to configure encryption key management. Select EAP-TLS, EAP-TTLS, EAP-LEAP or EAP-PEAP from the dropdown box. See the Wireless Security appendix for more information. Select 64 bit WEP or 128 bit WEP to enable data encryption. This is the name of the certificate issued by the certificate authority (CA). Click here to choose a certificate. Select a certificate from the list box and click Select to activate it. Click Delete if you want to remove a certificate from the list. Alternatively, click Browse to locate a certificate. Click Upload to add it to the list. The certificate file must have a.pem or.cer ending.
G-470 Users Guide Table 14 Wireless Security: 802.1x
LABEL Login Name DESCRIPTION Enter a user name. This is the user name that you or an administrator set up on a RADIUS server. Enter the password associated with the login name above.
Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) User Certificate File (EAP-TLS only) Select File (EAP-TLS only)
This is your encrypted private key file. Click here to choose a private key. Select a private key from the list box and click Select to activate it. Click Delete if you want to remove a private key from the list. Alternatively, click Browse to locate a private key. Click Upload to add it to the list. The private key file must have a.pfx ending. Enter the password associated with the private key above. Select the check box to verify the certificate of the authentication server. With 64-bit or 128-bit WEP, you can enter a passphrase (password phrase) of up to 32 case-sensitive printable characters and click Generate to have the device create four different WEP keys. After you enter the passphrase, click Generate to have the device generate four different WEP keys automatically. If you want to manually set the WEP keys, enter the WEP key in the field provided. Select a WEP key to use for data encryption. The WEP keys are used to encrypt data. Both the device and the wireless stations must use the same WEP key for data transmission. If you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). Click Apply to save your changes to the device. Click Reset to begin configuring this screen afresh.
I cannot ping any computer on the LAN.
I cannot access the web configurator.
18.104.22.168 Internet Explorer Pop-up Blockers
You may have to disable pop-up blocking to log into your device. Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your devices IP address. 22.214.171.124.1 Disable pop-up Blockers 1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker.
Figure 44 Pop-up Blocker
You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled.
G-470 Users Guide Figure 45 Internet Options
3 Click Apply to save this setting. 126.96.36.199.2 Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settingsto open the Pop-up Blocker Settings screen.
G-470 Users Guide Figure 46 Internet Options: Settings
3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix http://. For example, http://192.168.1.11. 4 Click Add to move the IP address to the list of Allowed sites.
G-470 Users Guide Figure 47 Pop-up Blocker Settings
5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting.
G-470 Users Guide Figure 48 Internet Options: Custom Level
2 Click the Custom Level. button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window.
G-470 Users Guide Figure 49 Security Settings - Java Scripting
188.8.131.52 Java Permissions
1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level. button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
G-470 Users Guide Figure 50 Security Settings - Java
184.108.40.206.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window.
G-470 Users Guide Figure 51 Java (Sun)
8.6 Testing the Connection to the ZyXEL Device
1 Click Start, (All) Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type ping followed by a space and the IP address of the ZyXEL Device (192.168.1.11 is the default). 3 Press ENTER. The following screen displays.
Figure 52 Pinging the G-470
C:\>ping 192.168.1.11 Pinging 192.168.1.11 with 32 bytes of data: Reply Reply Reply Reply from from from from 192.168.1.11: 192.168.1.11: 192.168.1.11: 192.168.1.11: bytes=32 bytes=32 bytes=32 bytes=32 time=10ms time<10ms time<10ms time<10ms TTL=254 TTL=254 TTL=254 TTL=254
Ping statistics for 192.168.1.11: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 10ms, Average = 2m
Your computer can now communicate with the ZyXEL Device via the ETHERNET port.
Table 23 Product Specifications
PHYSICAL AND ENVIRONMENTAL Product Name Standards Network Architectures Security G-470 802.11g Wireless Ethernet Adapter IEEE 802.11b IEEE 802.11g Infrastructure 64/128/152-bit WEP Encryption WPA/WPA-PSK IEEE 802.1x 0 ~ 50 degrees Centigrade -25 ~ 70 degrees Centigrade 0 ~ 70% (non-condensing) 10 ~ 90% (non-condensing) TX: 620mA 5V 104mm 127mm 26mm excluding external antenna and foot stand. RX: 600mA
Operating Temperature Storage Temperature Operating Humidity Storage Humidity Power Consumption Voltage Dimensions RADIO SPECIFICATIONS Media Access Protocol Frequency
Figure 59 Windows XP: Control Panel
3 Right-click Local Area Connection and then click Properties.
G-470 Users Guide Figure 60 Windows XP: Control Panel: Network Connections: Properties
4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties.
Figure 61 Windows XP: Local Area Connection Properties
5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). If you have a dynamic IP address click Obtain an IP address automatically.
If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. Click Advanced.
Figure 62 Windows XP: Advanced TCP/IP Settings
6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: In the IP Settings tab, in IP addresses, click Add. In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add. Repeat the above two steps for each IP address you want to add. Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways. In TCP/IP Gateway Address, type the IP address of the default gateway in Gateway. To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. Click Add. Repeat the previous three steps for each default gateway you want to add. Click OK when finished.
7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP):
Appendix C 101
Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them.
Figure 63 Windows XP: Internet Protocol (TCP/IP) Properties
8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window. 10Restart your computer (if prompted).
The state-of-art RF design of the G-470 brings long distance Wi-Fi connection to municipal and WISP wireless networks. Advanced features allow easy self-installation and flexible deployment options. ZyXEL G-470 has an external reverse SMA connector. Taking advantage of this connector, user can freely choose different types of antenna for different environments or geographic conditions to get the best connection quality. The G-470 has an embedded enterprise-level security supplicant that allows wireless deployment with WPA/WPA2 security. Once properly setup, all encryption, decryption and authentication are performed by the G-470 that supports EAP types of TLS, TTLS and PEAP for 802.1x authentication. The G-470 is a stand-alone wireless Ethernet bridge. It works with any device that supports wireless Ethernet connection, such as computers running any Wi-Fi-capable operating system, video game consoles, printers and more. You can also connect the G-470 to the WAN port of your home router to share an ISP connection wirelessly.
|Connectivity Technology||Wireless, wired|
|Data Link Protocol||Ethernet, Fast Ethernet, IEEE 802.11b, IEEE 802.11g|
|Data Transfer Rate||54 Mbps|
|Network / Transport Protocol||TCP/IP|
|Encryption Algorithm||128-bit WEP, 64-bit WEP, TLS, PEAP, TTLS, WPA, WPA2, WPA-PSK|
|Authentication Method||Extensible Authentication Protocol (EAP)|
|Features||128-bit encryption, 64-bit encryption, power over Ethernet (PoE)|
|Compliant Standards||IEEE 802.3, IEEE 802.3u, IEEE 802.11b, IEEE 802.3af, IEEE 802.11g, IEEE 802.1x, IEEE 802.11i|
|Status Indicators||Power, status|
|Line Coding Format||DBPSK, DQPSK, CCK, 64 QAM, BPSK, QPSK, 16 QAM, OFDM|
|Expansion / Connectivity|
|Interfaces||Antenna : 1 x R-SMA 1 x 10Base-T/100Base-TX - RJ-45|
|Gain Level||4 dBi|
|Power Device||Power adapter - external|
|Compliant Standards||CE, CSA, FCC Part 15 B, RoHS|
|Min Operating Temperature||32 °F|
|Max Operating Temperature||122 °F|
|Humidity Range Operating||20 - 95%|
|Universal Product Identifiers|
|GTIN||00076055911370, 00760559111779, 04718937503810|
64840 XG-MB70X SDM-S204E Lexmark X500 I845GL MDR-RF925RK 26HF7875-10 DMR-E30 42PFL5322-10 CDX-4270R 11-125 CI 42LC2D CDC-665 Coolpix 7900 VGN-NR21z S DCR-PC110E WH105 S9110 POD XT PNA 205 Tv410 Itrax LXD75 Scanmaker 4700 TDR125-2002 Artisan GR-S392QVC Kodak CD90 Atlantic 500 Fire GL2 Casio 2608 Prime-TEC 42PG60D W1952TQ-TF SPP-2020 PET725 Alpine 3539 HT-DDW760 Bizhub 222 CQ-C1300U DHC-MD373 HR102 J1253S V5 1 IC-3FGX WD-10151TP File 2 CL-50 FBQ1502 AR6L 95 WD-14482TP DMP7D Cavalier 2003 ZWG-3101 VSX-815 Ideacentre K320 LRG30357ST 500 D KX-F550 Nomad IIC R-405KS Zumo 500 KC550 Batteries PB80 9 0 Avic-X920BT CS 200 VR605 Fantom-S88 Cluster Powershot S80 GR-DX77E FWF3103 AT111B-rally EH-M2 LE40A552p3R Windows HT-910HD BR-600 40820 TA-RW400 C28WF560N HE-720 E Projector SGH-Z300 Reference TX-28LK1P SP2060 MCD179 NV-MX2000 Igo 8 TA-AX410 Yahourtiere Bila Samson C01U RQ-SX1V DVX9900H DCD-700AE 2010 ES L32H01EA 4 1
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101