NWD2205 Wireless N USB Adapter Version 1.8.1 Edition 1, 09/2010 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NWD2205 using the ZyXEL utility. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com. • Use the PDF’s bookmarks to quickly navigate to the areas that interest you.
About This User's Guide Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com. • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the documentation in order to better understand how to use your product.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your NWD2205. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NWD2205 may be referred to as the “NWD2205”, the “device”, the “system” or the “product” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device.
Safety Warnings 8 NWD2205 User’s Guide
Contents Overview Contents Overview Introduction and Configuration ............................................................................................ 17 Getting Started ........................................................................................................................... 19 Wireless LANs ........................................................................................................................... 27 ZyXEL Utility ..................................................
Contents Overview 10 NWD2205 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents 3.1 Overview .............................................................................................................................. 37 3.1.1 What You Can Do in This Chapter ............................................................................. 37 3.1.2 What You Need to Know ............................................................................................ 37 3.1.3 Before You Begin ....................................................................................
CHAPTER 1 Getting Started 1.1 Overview The ZyXEL NWD2205 wireless N USB adapter brings you a better Internet experience over existing IEEE 802.11 b/g/n networks. With data rates of up to 300 Mbps, you can enjoy a high-speed connection at home or in the office. It is an excellent solution for daily activities such as file transfers, music downloading, video streaming and online gaming. 1.1.
Chapter 1 Getting Started 1.2 Features Your NWD2205 is an IEEE 802.11n 2.0 compliant wireless LAN adapter. It can also connect to IEEE 802.11b/g wireless networks. The NWD2205 is WPS (Wi-Fi Protected Setup) compliant. WPS allows you to easily set up a secure connection with another WPS-enabled device. The NWD2205 is a USB adapter which connects to an empty USB port on your computer. Figure 1 The NWD2205 A B The following table describes the NWD2205.
Chapter 1 Getting Started 1.3 Software Installation This section shows you how to install the Mac OS X version of the ZyXEL Utility. For detailed information on using it, see Chapter 3 on page 37. 1.3.1 Minimum System Requirements In order to install the ZyXEL Utility for Mac OS X, your computer must meet the following minimum system requirements: • 20 MB of free hard drive space • 128 MB RAM • Mac OS X 10.4 and higher 1.3.2 Installing the ZyXEL Utility Screen shots for Macintosh 10.
Chapter 1 Getting Started 16 4 Open the folder for your version of Mac OS X on the included disc. For example, if you are using 10.4 then open the MacOS10.4 Driver folder. Double-click the Installer.mpkg to run the installation program. 5 A welcome screen appears. Follow the on-screen instructions.
Chapter 1 Getting Started 6 When you see the Select a Destination screen, select a destination (this must be on an actual physical hard drive on the Macintosh, not a virtual drive) and click Continue. 7 When you see the Authenticate screen, enter the administrative password you use to log in to the Mac computer and click OK.
Chapter 1 Getting Started 18 8 You then see a screen telling you that you must restart the computer after the installation completes. Click Continue Installation. The driver will automatically install. 9 After installing the ZyXEL utility and device driver, you must restart your computer. Click Restart to reboot your computer and complete the driver installation.
Chapter 1 Getting Started 10 Once your computer restarts, you can find the ZyXEL utility in your Applications folder. 11 The ZyXEL utility starts automatically after you connect the NWD2205 to the computer. 1.3.3 Uninstalling the ZyXEL Utility You need to remove the ZyXEL utility from your computer only when you want to upgrade the ZyXEL utility or the ZyXEL utility cannot work properly. Note: Disconnect the NWD2205 if you are going to uninstall or upgrade the ZyXEL utility.
Chapter 1 Getting Started 20 2 Double-click your Macintosh OS’s driver folder on the included disc. Double-click the file Uninstall.command. 3 The command screen displays. Enter the administrative password you use to log in to the Mac computer and press [ENTER].
Chapter 1 Getting Started 1.4 Hardware Installation This sections shows you how to install your NWD2205. 1 Locate an available USB port on the computer. 2 Insert the NWD2205 into an available USB port on the computer. The NWD2205’s LED (light) turns on if it is properly inserted. Note: Never bend, twist or force the NWD2205 into the port. If there is not enough space to attach the NWD2205, use the included USB cable.
Chapter 1 Getting Started 1.5 Device Applications This section describes some network applications for the NWD2205. You can either set the network type to Infrastructure and connect to an AP or use Ad-Hoc mode and connect to a peer computer (another wireless device in Ad-Hoc mode). Infrastructure To connect to a network via an access point (AP), set the NWD2205 network type to Infrastructure. Through the AP, you can access the Internet or the wired network behind it.
Chapter 1 Getting Started Ad-Hoc To set up a small independent wireless workgroup without an AP, use Ad-Hoc. Ad-Hoc does not require an AP or a wired network. Two or more wireless clients communicate directly with each other. Note: Wi-Fi Protected Setup (WPS) is not available in ad-hoc mode.
Chapter 1 Getting Started 24 NWD2205 User’s Guide
CHAPTER 2 Wireless LANs 2.1 Overview This section provides background information on wireless Local Area Networks. 2.1.1 What You Can Do in This Section • Connect securely to an AP using many of the strongest and most common encryption protocols. See Section 2.3 on page 27 for details. • Connect securely either to an AP or computer-to-computer using WPS. See Section 2.4 on page 29 for details. 2.1.2 What You Need to Know The following terms and concepts may help as you read through this section.
Chapter 2 Wireless LANs Encryption The process of taking data and encoding it, usually using a mathematical formula, so that it becomes unreadable unless decrypted with the proper code or pass phrase. 2.1.3 Before You Begin • You should have valid login information for an existing network Access Point, otherwise you may not be able to make a network connection right away. 2.2 Wireless LAN Overview The following figure provides an example of a wireless network with an AP.
Chapter 2 Wireless LANs • If two wireless networks overlap, they should use a different channel. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. • Every device in the same wireless network must use security compatible with the AP or peer computer. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 2.
Chapter 2 Wireless LANs • Automatic WEP key generation based on a “password phrase” called a passphrase. The passphrase is case sensitive. You must use the same passphrase for all WLAN adapters with this feature in the same WLAN. For WLAN adapters without the passphrase feature, you can still take advantage of this feature by writing down the four automatically generated WEP keys from the Security Settings screen of the ZyXEL utility and entering them manually as the WEP keys in the other WLAN adapter(s).
Chapter 2 Wireless LANs For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). Certificates (also called digital IDs) can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner. 2.3.1.3 WPA and WPA2 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.
Chapter 2 Wireless LANs Depending on the devices you have, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (a unique Personal Identification Number that allows one device to authenticate the other) in each of the two devices. When WPS is activated on a device, it has two minutes to find another device that also has WPS activated. Then, the two devices connect and set up a secure network by themselves. 2.4.
Chapter 2 Wireless LANs When you use the PIN method, you must enter the PIN from one device (usually the wireless client) into the second device (usually the Access Point or wireless router). Then, when WPS is activated on the first device, it presents its PIN to the second device. If the PIN matches, one device sends the network and security information to the other, allowing it to join the network.
Chapter 2 Wireless LANs The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 5 Example WPS Process: PIN Method ENROLLEE REGISTRAR WPS This device’s WPS PIN: 123456 WPS Enter WPS PIN from other device: WPS START WPS START WITHIN 2 MINUTES SECURE EAP TUNNEL SSID WPA(2)-PSK COMMUNICATION 2.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role.
Chapter 2 Wireless LANs already part of a network, it sends the existing information. If not, it generates the SSID and WPA(2)-PSK randomly. The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point.
Chapter 2 Wireless LANs subsequent WPS connections in which it is involved. If you want a configured AP to act as an enrollee, you must reset it to its factory defaults. 2.4.3.1 Example WPS Network Setup This section shows how security settings are distributed in an example WPS setup. The following figure shows an example network. In step 1, both AP1 and Client 1 are unconfigured. When WPS is activated on both, they perform the handshake. In this example, AP1 is the registrar, and Client 1 is the enrollee.
Chapter 2 Wireless LANs In step 3, you add another access point (AP2) to your network. AP2 is out of range of AP1, so you cannot use AP1 for the WPS handshake with the new access point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead. Figure 9 WPS: Example Network Step 3 EXISTING CONNECTION CLIENT 1 E N TIO EC N ON GC N I T XIS AP1 REGISTRAR CLIENT 2 SE CU RIT Y INF O ENROLLEE AP1 2.4.
Chapter 2 Wireless LANs • WPS works only with other WPS-enabled devices. However, you can still add non-WPS devices to a network you already set up using WPS. WPS works by automatically issuing a randomly-generated WPA-PSK or WPA2PSK pre-shared key from the registrar device to the enrollee devices. Whether the network uses WPA-PSK or WPA2-PSK depends on the device.
CHAPTER 3 ZyXEL Utility - Mac OS X 3.1 Overview This chapter shows you how to use the ZyXEL utility to configure your NWD2205 using the Macintosh operating system, Mac OS X. 3.1.1 What You Can Do in This Chapter • The Link Status screen (Section 3.3 on page 39) lets you see your current connection details, monitor signal strength and quality, and more. • The Profiles screen (Section 3.4 on page 40) lets you create, delete and manage your wireless network profiles.
Chapter 3 ZyXEL Utility - Mac OS X Wi-Fi Protected Access (WPA) The WPA protocol affords users with vastly stronger security than WEP. It comes in two different varieties: WPA and WPA2. Always try to use WPA2 as it implements the full version of the security standard and WPA does not. Pre-Shared Key (PSK) A pre-shared key is a password shared between the server and the client that unlocks the algorithm used to encrypt the data traffic between them.
Chapter 3 ZyXEL Utility - Mac OS X Table 3 ZyXEL Utility: Menu Summary (continued) TAB DESCRIPTION Available Network Use this screen to: Advanced Setting Use this screen to configure advanced settings on your NWD2205. WPS Use this screen to configure the WPS (Wi-Fi Protected Security) settings on your NWD2205. Information Use this screen to find the utility and driver version.
Chapter 3 ZyXEL Utility - Mac OS X The following table describes the labels in this screen. Table 4 ZyXEL Utility: Link Status LABEL DESCRIPTION MAC Address This field displays the MAC address of the NWD2205. SSID The SSID (Service Set IDentifier) identifies the wireless network to which a wireless station is associated. This field displays the name of the wireless device to which the NWD2205 is associated.
Chapter 3 ZyXEL Utility - Mac OS X This screen allows you to configure and manage wireless profiles. Figure 12 ZyXEL Utility: Profile The following table describes the labels in this screen. Table 5 ZyXEL Utility: Profile LABEL DESCRIPTION Default An “*” (asterisk) indicates the currently active profile. Profile Name This is the name of the pre-configured profile. SSID This is the SSID of the wireless network to which the selected profile associates.
Chapter 3 ZyXEL Utility - Mac OS X 3.4.1 The Profile Properties Screen This screen allows you to create a new profile or edit an existing profile after you click the Add button or select an entry and click the Edit button in the Profiles screen. Figure 13 ZyXEL Utility: Profile Properties The following table describes the labels in this screen. Table 6 ZyXEL Utility: Profile Properties LABEL DESCRIPTION Profile Name Enter a descriptive name in this field.
Chapter 3 ZyXEL Utility - Mac OS X Table 6 ZyXEL Utility: Profile Properties (continued) LABEL DESCRIPTION Network Authentication Select the security standard you want to use. All the other wireless devices on your network must be able to use the same standard you select. • • • • • Data Encryption • • • ASCII OPEN_SYSTEM mode is used when security is not an issue. No authentication is required, and any wireless device can join the network.
Chapter 3 ZyXEL Utility - Mac OS X 3.5 The Available Network Screen This screen allows you to view available networks and connect to a network. Figure 14 ZyXEL Utility: Available Network The following table describes the labels in this screen. Table 7 ZyXEL Utility: Available Network 44 LABEL DESCRIPTION Associated An “*” (asterisk) indicates a connection to the associated wireless device. SSID This displays the network’s Service Set IDentifier. The SSID is the name of the network.
Chapter 3 ZyXEL Utility - Mac OS X 3.6 The Advanced Setting Screen This screen allows you to configure advanced network settings on your NWD2205. Figure 15 ZyXEL Utility: Advanced Setting The following table describes the labels in this screen. Table 8 ZyXEL Utility: Advanced Setting LABEL DESCRIPTION 802.11b Preamble Mode Preamble is used to signal that data is coming to the receiver. Select the preamble type that the AP uses.
Chapter 3 ZyXEL Utility - Mac OS X Table 8 ZyXEL Utility: Advanced Setting (continued) LABEL DESCRIPTION Fragment Threshold Select the packet size above which the NWD2205 fragments (breaks up) the packet into smaller pieces. RTS Threshold Select the packet size above which the NWD2205 transmits an RTS (Request To Send) message. Refresh Click this to update this screen. Apply Click this to save your settings. Set Default Click this to set every field in this screen to its default value. 3.
Chapter 3 ZyXEL Utility - Mac OS X Table 9 ZyXEL Utility: WPS (continued) LABEL DESCRIPTION Security This field indicates the type of authentication and encryption required by the AP. BSSID This field indicates the AP’s MAC address. SCAN Click this button to rescan the local area for WPS-compatible devices. PIN This field displays a randomly generated 8-digit personal identification code for your NWD2205. PIN Click this button to make a PIN-based WPS connection. For details, see Section 2.4.
Chapter 3 ZyXEL Utility - Mac OS X 3.8 The Information Screen This screen shows you the driver, utility version of your NWD2205. Figure 17 ZyXEL Utility: About The following table describes the labels in this screen. Table 10 ZyXEL Utility: About 48 LABEL DESCRIPTION Version This section displays the version number and release date of the NWD2205’s wireless utility application.
CHAPTER 4 Troubleshooting 4.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Accessing the ZyXEL Utility • Link Quality • Problems Communicating with Other Computers 4.2 Power, Hardware Connections, and LEDs The NWD2205 does not turn on. None of the LEDs turn on. 1 Make sure the NWD2205 is correctly installed.
Chapter 4 Troubleshooting 4 If the problem continues, contact the vendor. 4.3 Accessing the ZyXEL Utility I cannot access the ZyXEL Utility 1 Make sure the NWD2205 is properly inserted and the LEDs are on. 2 Install the NWD2205 on another computer. 3 If the error persists, you may have a hardware problem. In this case, you should contact your vendor. 4.4 Link Quality The link quality and/or signal strength is poor.
Chapter 4 Troubleshooting 4.5 Problems Communicating with Other Computers The computer with the NWD2205 installed cannot communicate with the other computer(s). In Infrastructure Mode • Make sure that the AP and the associated computers are turned on and working properly. • Make sure the NWD2205 computer and the associated AP use the same SSID. • Change the AP and the associated wireless clients to use another radio channel if interference is high.
Chapter 4 Troubleshooting 52 NWD2205 User’s Guide
CHAPTER 5 Product Specifications Table 11 Product Specifications PHYSICAL AND ENVIRONMENTAL Product Name NWD2205 Wireless N USB Adapter Interface USB 2.0 Standards IEEE 802.11b IEEE 802.11g IEEE 802.11n Operating Frequency 2.4GHZ Antenna Type PIFA (Planar Inverted F Antenna) Antenna Peak Gain Left: 2.8 dBi Right: 2.
Chapter 5 Product Specifications Table 11 Product Specifications (continued) FCC and NCC RF Output Power 802.11b: 18.1 dBm 802.11g: 24.5 dBm 802.11n: @ HT20: 28.3 dBm @ HT40: 27.7 dBm Receiver Sensitivity 802.11b: 11Mbps at -88 dBm 802.11g: 54Mbps at -74 dBm 802.11n: HT20 at -65 dBm HT40 at -63 dBm WIRELESS STANDARDS IEEE 802.11b Dynamically shifts between 11, 5.5, 2, and 1 Mbps network speed. Operation Frequency 2.412GHz~2.472GHz Operation Channels N. America & Taiwan 2.412GHz~ 2.
Chapter 5 Product Specifications Table 11 Product Specifications (continued) Approvals Safety European Union: EN60950 (CE-LVD) EMI United States: FCC Part 15B Class B Canada: ICES-003 European Union: CE EN 55022 Class B, CE EN 301489-1 Australia: C-Tick EMS European Union: CE EN55024, CE EN 301489-17 RF United States: FCC Part 15C, FCC SAR Canada: RSS-210 European Union: CE EN 300 328 Taiwan: NCC LP0002 Wi-Fi Certification 11 b/g/n WPA/WPA2/WPS Microsoft Certification WHQL: Windows 7 (32- and 64-bit), Win
Chapter 5 Product Specifications 56 NWD2205 User’s Guide
APPENDIX A Wireless LANs This appendix discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix A Wireless LANs BSS A Basic Service Set (BSS) exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled, wireless client A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other.
Appendix A Wireless LANs ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood.
Appendix A Wireless LANs adjacent AP is using. For example, if your region has 11 channels and an adjacent AP is using channel 1, then you need to select a channel between 6 or 11. RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node.
Appendix A Wireless LANs If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Note: Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy.
Appendix A Wireless LANs IEEE 802.11g Wireless LAN IEEE 802.11g is fully compatible with the IEEE 802.11b standard. This means an IEEE 802.11b adapter can interface directly with an IEEE 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. IEEE 802.11g has several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 12 IEEE 802.
Appendix A Wireless LANs Note: You must enable the same wireless security settings on the NWD2205 and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.
Appendix A Wireless LANs • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message.
Appendix A Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses.
Appendix A Wireless LANs LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x. Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed.
Appendix A Wireless LANs If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server, you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical) password entered into each access point, wireless gateway and wireless client. As long as the passwords match, a wireless client will be granted access to a WLAN.
Appendix A Wireless LANs The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it’s still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys.
Appendix A Wireless LANs 2 The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly. 3 A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the RADIUS server and the client. 4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys.
Appendix A Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 23 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix A Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.
Appendix A Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. • Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb.
APPENDIX B Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix B Legal Information This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Appendix B Legal Information FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules.
Appendix B Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003.
Appendix B Legal Information including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.
Appendix B Legal Information 78 NWD2205 User’s Guide
Index Index A about your ZyXEL Device 14 interference 59 copyright 73 CTS (Clear to Send) 60 Access Point (AP) 26 Access point (AP) 26 Access Point. See also AP. D ACT LED 14 Ad-Hoc 23 digital ID 29 Advanced Encryption Standard 29 See AES. dimensions 53 AES 67 dynamic WEP key exchange 66 antenna directional 72 gain 71 omni-directional 72 E AP 59 See also access point.
Index H physical specifications 53 preamble mode 61 hidden node 60 product registration 77 humidity 53 product specifications 53 PSK 68 I R IBSS 57 IEEE 802.11g 62 radio interference 50 IEEE 802.
Index U user authentication 27 W warranty 76 note 76 weight 53 WEP 27 automatic setup 28 manual setup 28 passphrase 28 WEP (Wired Equivalent Privacy) 27 WEP key generation 28 Wi-Fi Protected Access 29, 66 wireless client 26 wireless client WPA supplicants 68 wireless LAN introduction 25 security 27 wireless LAN (WLAN) 25 wireless network 26 wireless security 62 wireless standard 53 WLAN interference 59 security parameters 70 WPA 29, 66 key caching 68 pre-authentication 68 user authentication 68 vs WPA-PSK
Index 82 NWD2205 User’s Guide