Wireless-G USB U S E R ’ S G U I D E
Contents Overview .................................................................. 3 Installation Instructions .......................................... 4 Installing the Wireless-G USB Adapter................... 5 The Adapter LED.................................................. 10 Setting Security ..................................................... 11 WPA2-PSK (Pre-Shared Key) .............................. 14 WPA-PSK (Pre-Shared Key) ................................
Overview The chapters in this User Guide describe how to: • Install the Zoom Wireless-G USB adapter on a Windows® PC • Connect to a wireless network • Enable security on the Wireless-G USB adapter • Use the advanced features of the Wireless-G USB configuration software Chapters 1 and 2 cover the basics – what you need to get connected and to enable security. If you are interested in the more advanced features of the Wireless-G USB adapter, please see Chapter 3.
1 Installation Instructions This chapter provides simple instructions for installing the Wireless-G USB adapter on a Windows PC. If you have already installed the adapter on a computer (using the separate Quick Start guide), you can skip this chapter and begin with Chapter 2: Setting Security.
Installing the Wireless-G USB Adapter Important! Install the software BEFORE you plug the WirelessG USB adapter into your computer. If you are running Windows XP, 2000, Me or 98SE, please go to page 8 for instructions. Installing and connecting on Windows Vista 1 Insert the Wireless-G USB CD into the CD or DVD drive. The CD should start automatically. If the AutoPlay dialog box appears, click Run Setup.exe. If the User Account Control dialog box appears, click Continue.
4 On the Zoom Wireless-G USB Installation Wizard Welcome screen, click OK to install the adapter. If a message tells you that Windows can't verify the publisher of the driver software, select Install this driver software anyway. 5 At the prompt, plug in the USB Adapter and click OK. A pop-up notification message tells you that your hardware has been installed successfully. 6 On the Zoom installation menu, select Exit.
• If your desired network is unsecured, in the message box select Connect Anyway. Note: We strongly recommend that you choose a secured network. For information on wireless security, see Setting Security on page 11. If you have difficulty connecting, make sure you have entered the correct password. Then perform a power cycle on your computer and router/gateway/access point as described in the Troubleshooting Tips on page 41.
To disconnect from the current network: 1 From the Start menu, select Connect to. 2 In the Disconnect or Connect to another network dialog box, select the current network and click Disconnect. In the Are You Sure? message box, click Disconnect again. 3 In the next dialog box, you can connect to another network or click Close to complete the disconnect procedure. Installing and connecting on Windows XP, 2000, Me and 98SE 1 Insert the USB Adapter CD into your CD drive. The CD should start automatically.
Windows 2000: If the Digital Signature Not Found message appears, click Yes to continue. Windows Me and 98: If prompted, restart your computer. Congratulations! Your installation is complete. Follow the instructions below to get connected. To connect to a network: 1 Double-click the Zoom Wireless-G USB icon on your desktop to open the configuration software. 2 In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless networks.
4 If you join a wireless network that does not have security, you should now be connected. To check your connection, open your Web browser and go to your favorite site. We highly recommend security. Chapter 2, Setting Security on page 11 has descriptions of the five security options and setup instructions. If you have difficulty accessing the Internet, follow the suggestions in your browser’s “Page cannot be displayed” message. You may need to adjust your LAN settings.
2 Setting Security This chapter is for users who have Windows XP, 2000, Me or 98SE. If you are using Windows Vista, the operating system automatically handles security configuration. We strongly recommend security, although you do not need to use it to get your wireless connection working. Important! You must first enable security on the the wireless access point. You then enable security on the adapter using the same configuration that you used for the access point.
select WPA-PSK. WPA-PSK protects your communications with TKIP (Temporal Key Integrity Protocol). This option requires you to enter an encryption key shared by the access point. • WEP (Wired Equivalent Privacy) If the devices in your network do not support WPA2-PSK or WPA-PSK, select WEP data encryption. This method requires you to enter an encryption key. The keys can be 64 or 128 bits in length.
2 3 The Zoom Wireless-G USB configuration software opens to display the configuration parameters: Make sure that the desired wireless network is displayed in the Profile and SSID text boxes (the term designates an Infrastructure network) and that the Network Type is correct. There are two types of wireless networks: Infrastructure and Ad Hoc.
4 Select the Enable Security check box to open the Security Configuration window. For Step 5, consult the table below: To configure Go to page WPA2-PSK 14 WPA-PSK 15 WEP 16 WPA2-Enterprise 18 WPA 20 WPA2-PSK (Pre-Shared Key) 1 14 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WPA2-PSK.
2 3 4 5 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise you to enter a key with a minimum of 20 random characters. Click OK to save your settings and return to the Configuration tab. On the Configuration tab, click Apply. Click the Close box to exit the configuration software. That’s it! You have configured WPA2-PSK security for your wireless connection, and you’re ready to use the Internet.
2 3 4 5 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point. We advise a key with a minimum of 20 random characters. Click OK to save your settings and return to the Configuration tab. On the Configuration tab, click Apply. Click the Close box to exit the configuration software. That’s it! You have configured WPA-PSK security for your wireless connection, and you’re ready to use the Internet.
2 In the Preconfigured key [WEP] area, do the following: a In the Format for entering key drop-down list, select • ASCII characters if your network uses all Zoom wireless products • Hexadecimal digits if an access point, router, or some adapters are not Zoom products b In the Key Length drop-down list, select 128 bits or 64 bits. Note: 128-bit WEP provides more security than 64-bit, but 128-bit could diminish network performance.
4 5 6 Click OK to save your settings and return to the Configuration tab. On the Configuration tab, click Apply. Click the Close box to exit the configuration software. That’s it! You have configured WEP security for your wireless connection, and you’re ready to use the Internet.
1 In the Security Configuration window, click the Encryption Mode drop-down arrow and select WPA2-Enterprise. 2 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentication, each wireless device (client) sends a signal to the wireless access point, which in turn sends the signal to the RADIUS server. The server determines whether or not the client is allowed to join the network.
PAP (Password Authentication Protocol) CHAP (Challenge Handshake Authentication Protocol) MS-CHAP (Microsoft’s version of CHAP). MS-CHAPV2 (the default). 4 5 6 7 Click the Certification tab and enter the required information (see page 23). Click OK to save your settings and return to the Configuration tab. On the Configuration tab, click Apply. Click the Close box to exit the configuration software.
2 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.1X authentication for this network is selected. With IEEE 802.1X authentication, each wireless device (client) sends a signal to the wireless access point, which in turn sends the signal to the RADIUS server. The server determines whether or not the client is allowed to join the network.
MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handshake Authentication Protocol. GTC TLS/SmartCard • TLS (Transport Layer Security). There are no authentication extension options with TLS. • TTLS (Tunneled Transport Layer Security). With TTLS, you can select from four authentication extensions: PAP (Password Authentication Protocol), the most basic form of authentication. CHAP (Challenge Handshake Authentication Protocol) MS-CHAP (Microsoft’s version of CHAP).
Certificate (WPA2-Enterprise and WPA) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security of the network. If you are linking to a corporate network that uses an authentication server and you have configured WPA2 Enterprise or WPA security, your MIS staff will assist you in completing the the Certification information.
Changing your Security Setting If the type of security on your wireless network changes, you need to modify your security settings. On the Configuration tab, click the Configure Security button to select a different security option and enter the required information.
3 Advanced Options Note: This chapter is for users who have Windows XP, 2000, Me or 98SE. The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the signal strength of your network connection, scan available networks, and specify advanced settings. This chapter tells you when and how to use each of these options. Creating Profiles A profile is a collection of settings needed for a particular wireless connection.
For example, let’s say you have a small home network to which you want to be able to switch quickly when you arrive home. Give the profile the name “Home”: 3 In the Configuration area, enter the following settings: • SSID – Enter the network name. In the example above, the SSID is Home. • Network Type – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop-down list, select the channel used by the other device(s) in the network.
• Enable Security – Select this check box to open the Security Configuration window. Note: If you are setting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, click OK to return to the Configuration tab. 4 5 In the Configuration area, click the Apply button to save the settings. Click the Save button to save the Profile.
Monitoring Link Status The Status area on the Configuration tab displays information about your wireless connection: • State: In an Infrastructure • Link Quality (Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected. In an ad hoc network, the virtual MAC address used by computers in the network. • Current Tx (Transmission) Rate: Highest transmission speed in Megabytes per second of the last received packet.
Using Site Survey and Rescan Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network names (ESSIDs) so you can connect to a network • Identify the MAC address (BSSID) of your wireless access point or wireless router • Check the channel difference between your network and other networks within range • Check the network type (infrastructure or ad hoc) of your network • Verify whether security is enabled for your network To use this window, click the
The information displayed on the Site Survey tab is as follows: • ESSID (Extended Service Set Identifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network. The ESSID is a code attached to all packets sent over an infrastructure wireless network. The code can contain up to 32 alphanumeric characters. All devices in the network must share the same ESSID.
Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Power Save Enabled: When you select this option, the Wireless-G USB adapter immediately signals the access point that it is in Power Save mode. The access point buffers all packets until it is polled by the adapter. Note: The access point you use must also support Power Save. • Nitro XM: Selected by default.
Appendix A TCP/IP Settings By default, Windows is set for dynamic addressing (DHCP). Generally, this is the correct setting for an Infrastructure network, but needs to be changed if you are using an Ad Hoc network. (Note: Use our instructions as a basic guide. Advanced users will know other ways to set up their networks.) Please go to the section that corresponds to your Windows operating system. Windows Vista 1 Follow these steps to open the TCP/IPv4 or TCP/IPv6 Properties dialog box.
c In the Network Connections window, double-click the Wireless Network Connection option: d In the Wireless Network Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Settings 33
e In the Wireless Network Connection Properties dialog box, highlight the version of TCP/IP (Transmission Control Protocol/Internet Protocol) that you are using and click the Properties button: f If you have an ad hoc network, continue with Step 2 below. If you have an infrastructure network, continue with Step 3 below. If you're not sure what kind of network you have, refer to page 13.
c Enter 255.255.255.0 for Subnet mask. The Subnet mask should be the same for each computer in your ad hoc network. d Enter 10.0.0.5 for Default gateway and Preferred DNS server. (This is the IP address of the first computer that was set up in your ad hoc network.) The Default Gateway and Preferred DNS server should be the same for each computer in your ad hoc network. e Click OK twice. That’s it! You have set static IP addressing for a Windows Vista computer in an ad hoc network.
c Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure network. Windows XP 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box. a From the desktop, click the Start button, select Control Panel, and then click Network Connections. b Right-click the Wireless Network Connection icon, and select Properties.
Gateway and Preferred DNS server should be the same for each computer in your ad hoc network. e Click OK twice. That’s it! You have set static IP addressing for a Windows XP computer in an ad hoc network. 3 For Infrastructure Networks: To verify your DHCP settings, complete the following: a Ensure that Obtain an IP address automatically is selected. b Ensure that either Obtain a DNS server address automatically or Enable DNS is selected. All text boxes for static IP addressing should be blank.
2 Complete the following steps to set static IP addressing: a In the Internet Protocol (TCP/IP) Properties dialog box, ensure that Obtain an IP address automatically is not selected. Then make sure the buttons labeled Use the following IP address and Use the following DNS server addresses are selected. b If this is the first computer to be set up in the ad hoc network, enter 10.0.0.5 for IP address. If you are adding it to an existing ad hoc network, increment the last digit by one, for example, 10.0.0.
Windows 98SE/Me 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box: a From the desktop, click the Start button, point to Settings, then click Control Panel. b In the Control Panel window, double-click the Network icon. c In the Network dialog box, select the Zoom Wireless-G USB TCP/IP from the list, click the Properties button and then click OK. d If you have an ad hoc network, continue with step 2a. If you have an infrastructure network, continue with step 3a.
f Click OK twice. That’s it! You have set static IP addressing for a Windows 98SE/Me computer in an ad hoc network. 3 For Infrastructure Networks: To verify your DHCP settings, complete the following: a Ensure that Obtain an IP address automatically is selected. b Ensure that either Obtain a DNS server address automatically or Enable DNS is selected. All text boxes for static IP addressing should be blank. c Click OK twice to exit.
Appendix B Troubleshooting If your Zoom Wireless-G USB adapter is not working properly, try these suggestions. • Make sure the adapter is securely connected to the computer, either directly or through its USB extender cable. • Perform a power cycle – take the following steps in the order given: 1. Turn off the computer. 2. Turn off your wireless router, gateway or access point and wait a few seconds. 3. Turn the router, gateway or access point back on. 4. Turn on the computer.
2 Then click the Security tab and check the settings to make sure that the adapter is configured for the same security system as the other devices in your wireless network. Make sure that your security key is the same – remember that the keys are case-sensitive. 3 Check your TCP/IP settings as discussed in Appendix A of the User Guide. 4 If the adapter still does not work, uninstall the software and then re-install it.
Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenient, professional support responsive to our customers’ needs and capabilities. If you find yourself unable to get your Zoom product to operate, and you have thoroughly reviewed your owner’s manual and all relevant documentation, please feel free to contact us for help.
World Wide Web Zoom’s Web page lets you send email for assistance, register on-line, access product reviews and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Product. To access Zoom’s Web page, please log onto your local Internet Service Provider, then go to the Web browser and select: www.zoom.com From Zoom’s Homepage you can easily go to Technical Support or many other useful areas.
Contact Zoom by Email You can email Zoom with any tech support questions you might have and one of our Technical Support Engineers will respond by email within 2 business days. You may request personal assistance via email at www.zoom.com/techmail.
Return of Defective Units Please contact your local distributor or reseller for Factory Authorized Repair or Replacement of your In-Warranty Defective Product.
Appendix D Regulatory Information U.S. FCC Part 15 Emissions Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Countries of Operation & Conditions of Use in the European Community This device is intended to be operated in all countries of the European Community. Requirements for indoor vs. outdoor operation, license requirements and allowed channels of operation apply in some countries as described below: Note: The user must ensure that the channels of operation are in conformance with the spectrum usage rules for European Community countries as described below.
Declaration of Conformity Declaration of Conformity Déclaration de conformité Konformitätserklärung Dichiarazione di conformità Declaração de Conformidade Konformitetsdeklaration Overensstemmelseserklæring Conformiteitsverklaring van de EU Δήλωση Συμμόρφωσης Deklaracja zgodności Declaración de conformidad Cam kết về sự tuân thủ ở Châu Âu Manufacturer/Producent/Fabrikant/ Constructeur/Hersteller/Κατασκευαστής/ Fabbricante/ Fabricante/Tillverkare/ Nhà sản xuất Zoom Technologies, Inc.
NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form.