Zoom 1077 Series User manual

Wireless-N
USB Adapter
USER GUIDE

Wireless-N USB Adapter
2
Contents
Overview .................................................................. 4
1. Installation Instructions...................................... 5
Installing and Connecting the Adapter.................... 6
The Adapter LED.................................................... 9
2. Setting Security................................................. 10
Accessing security options ................................... 10
WiFi™ Protected Setup (WPS) ............................ 12
WEP (Wired Equivalent Privacy) / WEP-Shared .. 14
WPA2 ................................................................... 15
WPA ..................................................................... 16
802.1x................................................................... 16
Changing your Security Setting ............................ 17
3. Advanced Options............................................. 18
Creating Profiles................................................... 18
Monitoring Link Status.......................................... 20
Using Network and Rescan .................................. 22
Advanced Configuration ....................................... 23
WMM (WiFi™ Multimedia).................................... 23
Radio On / Off ...................................................... 24
About tab .............................................................. 25
Help tab ................................................................ 25
Soft AP Mode ....................................................... 26

Contents 3
4. Installation Instructions for Mac OS X 10.3,
10.4, and 10.5......................................................... 35
Installing and Connecting the Adapter.................. 35
5. Setting Security for Mac ................................... 40
6. Advanced Configuration for Mac..................... 53
Appendix A. TCP/IP Settings................................ 56
Appendix B. Troubleshooting .............................. 69
Appendix C. Technical Support ........................... 71
Appendix D. Regulatory Information ................... 75

Wireless-N USB Adapter
4
Overview
What’s in the Package
The adapter package includes the following:
•Wireless-N USB adapter
•CD containing the
Installation Wizard and
documentation
•USB extension cable
•Quick Start manual
What’s in this User Guide
The chapters in this User Guide describe how to:
•Install the Zoom Wireless-N USB adapter on a Windows®PC
and Mac
•Connect your computer to a wireless network
•Enable security on the Wireless-N USB adapter
•Use the advanced features of the Wireless-N USB
configuration software
Chapters 1 and 2 cover the basics – what you need to get
connected and to enable security.
If you are interested in the more advanced features of the
Wireless-N USB adapter, please see Chapter 3. This chapter
explains how to create profiles so you can switch your
connection from one network to another, monitor the strength of
your network connection, scan a list of available networks, and
switch to Soft AP mode.

Chapter 1: Installation Instructions 5
1
Installation Instructions
This chapter provides simple instructions for installing the
Wireless-N USB adapter on a Windows PC (for Windows 7, Vista,
XP, and 2000). If you have already installed the adapter on a
computer (by using the separate Quick Start guide, for instance),
you can skip this chapter. If you have a Mac, please go to Chapter 4
on page 35.
Before You Begin
If you want to install the Wireless-N USB adapter on a Windows
PC, your PC needs the following:
•Available USB port
•Windows 7, Vista, XP, or
2000
•CD or DVD drive
•6 MB of free hard drive
space

Installing and Connecting the Adapter
on a Windows PC
Important: Do not plug the Adapter into your computer yet. We
will tell you when to plug it in.
1Insert the Wireless-N USB CD into the CD or DVD drive. The
CD should start automatically.
For Windows Vista and Windows 7 only:
If the AutoPlay dialog box appears, click Run Setup.exe.
If a message appears saying An unidentified program
wants access to your computer or Do you want to allow
the following program from an unknown publisher to make
changes to this computer?, click Allow or Yes.
2On the next screen, select Install.
3A Zoom Wireless-N USB Setup screen is displayed for a few
seconds while the installation proceeds.
6
Wireless-N USB Adapter

4On the InstallShield Wizard Complete screen, click Finish
and remove the CD.
5Plug the USB Adapter into one of the available USB slots on
your computer. (If it is difficult to insert the USB Adapter
directly into the USB slot because there isn’t enough space
near the slot, first plug the USB Adapter into the extension
cable included in the package and then plug the other end of
the extension cable into the USB slot in your computer. Since
the extension cable is semi-rigid, you can twist the extension
cable to orient the USB Adapter for best reception. Usually a
vertical orientation is best.)
To connect to a network
Now you are ready to connect to a network. Wireless networks
typically have a wireless access point, router, or gateway at the
heart of the wireless network. Wireless networks sometimes use
wireless security and sometimes do not. What you do next
depends on your network’s wireless security. You have several
options:
1If your access point or router supports WPS, we highly
recommend that you connect to a network using WPS.
See WiFi™ Protected Setup (WPS) on page 12.
7
Chapter 1: Installation Instructions

2If your access point or router does not support WPS or you
prefer not to connect this way, you can connect to a
network without security as described below.
3If you decide that you want to join a wireless network that
has security, scroll down to Section 2: Setting Security
and follow the instructions.
To connect to a network without
security
1Double-click the Zoom icon on your taskbar to open the
configuration software.
2In the Zoom Wireless-N USB Network window, look through
the list of available wireless networks and highlight the
network you want, and then click Connect.
8
Wireless-N USB Adapter

3If you join a wireless network that does not have security,
you should now be connected. To check your connection,
open your Web browser and go to your favorite site.
If the network you select has security configured, you
must enable and configure security on your Zoom Wireless-
N USB Adapter before you can connect. See Chapter 2,
Setting Security.
We highly recommend security. Chapter 2, Setting Security on
page 10 has descriptions of the available security options and
setup instructions.
If you have difficulty accessing the Internet, follow the
suggestions in the Troubleshooting section in Appendix B at the
end of this User Manual.
The Adapter LED
The state of the LED on the Wireless-N USB adapter is
explained below.
LED Status Meaning
Flashing The Wireless-N USB adapter is attempting
to or has connected to a wireless network
and is transmitting or receiving data.
9
Chapter 1: Installation Instructions

Wireless-N USB Adapter
10
2
Setting Security
We strongly recommend security, although you do not need to
use it to get your wireless connection working.
Important! You must first enable security on the wireless access
point or router. You then enable security on the adapter using
the same configuration that you used for the access point or
router. For example, if the wireless access point or router is
configured for WEP, you must select WEP security in the
Wireless-N USB configuration software and enter the same
encryption key.
Accessing security options
1On your taskbar, double-click the Zoom Wireless-N USB
icon to open the Zoom Wireless-N USB configuration
software.
2Make sure that the desired wireless network is displayed in
the Profile and SSID text boxes (the term <Infra>
designates an Infrastructure network) and that the Network
Type is correct.
There are two types of wireless networks: Infrastructure and
Ad Hoc.
•In an Infrastructure network, wireless devices
communicate with each other via a wireless access
point, router, or ADSL modem with built-in wireless
technology.
•In an Ad Hoc network, a group of wireless devices
communicate directly with other “client” devices that are
using wireless adapters. The network does not include a
wireless access point or wireless router.

Chapter 2: Setting Security 11
•In the unlikely event that you use an Ad Hoc network,
you must set up Static IP addressing.
See Appendix A: TCP/IP Settings.
3For configuration instructions for the different types of
available security options, consult this table:
To configure Go to page
WPS 12
WEP / WEP-Shared 14
WPA2 15
WPA 16
802.1x 16
•WiFi™ Protected Setup (WPS): This is the option we
recommend, if it is supported by the wireless access point or
router and the other devices in your network. This protocol
can greatly simplify the process of configuring WPA2 or
WPA security.
•WEP (Wired Equivalent Privacy): Both the WEP and WEP-
Shared Authentication modes set WEP security. WEP is the
preferred setting, WEP–Shared should only be used when
connecting with certain Mac products that do not support
standard WEP. If the devices in your network do not support
WPA2 or WPA, select WEP data encryption.
This method requires you to enter an encryption key. The
keys can be 64 or 128 bits in length.
•WPA2: Select WPA2 if all of the devices in the network
support WPA2, or if your access point or router offers both
WPA2 and WPA. To use this option, you will need to enter
the WPA Preshared Key in the text box.
•WPA: To use this option, you will need to enter the WPA
Preshared Key in the text box.
•802.1x: With 802.1X authentication, each wireless device
(client) sends a signal to the wireless access point or router,
which in turn sends the signal to the RADIUS server. The
server determines whether or not the client is allowed to join

the network. You can access 802.1x option from WEP,
WPA2, or WPA.
WiFi™ Protected Setup (WPS)
To connect to a network using WPS
If your wireless access point or router supports WiFi™Protected
Setup (WPS), this protocol can greatly simplify the process of
configuring WPA2 or WPA security. If your wireless access point
or router supports WPS it typically has a WPS button built into its
case.
1Start by double-clicking the Zoom icon on your taskbar to
launch the Config Utility.
2On the Configuration tab, click the WPS button to open the
WPS Config screen.
3Go to the wireless access point or router and activate the
WPS pushbutton (or Secure Setup or similarly named
button, or a virtual pushbutton on the software display of the
access point). You may have to hold down the WPS button
for several seconds or until the WiFi™indicator light on the
access point starts flashing. The access point will now begin
accepting WPS connections. (If security has not been set on
the access point, a random SSID and WPA key will be
used.)
12
Wireless-N USB Adapter

4Now, click on PBC (Push Button configuration) on Zoom’s
WPS Config screen.
You should now have a secure connection. Open your Web
browser and go to your favorite site.
PIN option:
1If the access point does not have a hard or soft security
pushbutton, you can use the PIN option.
2In the text box, the Adapter's randomly generated PIN number
will be displayed.
3Go to the access point or router, enter the Adapter's PIN
number in the appropriate place on the access point's
configuration interface, and click a button -- called Start PIN
13
Chapter 2: Setting Security

or something similar -- to activate a search for the Adapter.
When the access point or router identifies the Adapter, it will
automatically configure security.
You should now have a secure connection. Open your Web
browser and go to your favorite site.
That’s it! You have configured WPS security for your wireless
connection, and you’re ready to use the Internet.
WEP (Wired Equivalent Privacy) /
WEP-Shared
1In the Network window select the wireless network you want
to join and click Connect.
2In the Encryption tab, click the Encryption drop-down arrow
and select WEP (recommended) or WEP-Shared.
3In the WEP Key area,do the following:
a
b
In the first drop-down list select:
•Hexadecimal digits
or
•ASCII characters
In the (Network) Key text box, enter a key using the
table below as a guide.
14
Wireless-N USB Adapter

Chapter 2: Setting Security 15
The key must be the same for all the devices on your
network.
If you selected key
type… Enter exactly…
Hexadecimal digits
– 128 bits
26 characters A–F, a–f and 0–9. For
example,
00112233445566778899AABBCC.
Hexadecimal digits
– 64 bits
10 characters. The characters can
be A-F, a-f, and 0-9. For example,
11AA22BB33.
ASCII – 128-bits 13 characters. The characters can
be any upper- or lower-case letters
and numbers. For example:
MyKey12345678.
ASCII – 64 bits 5 characters. The characters can be
any upper- or lower-case letters and
numbers. For example, MyKey.
4Click OK to save your settings and return to the
Configuration tab.
5Click the Close box to exit the configuration software.
That’s it! You have configured WEP security for your wireless
connection, and you’re ready to use the Internet.
WPA2
Select WPA2 if all of the devices in the network support WPA2.
1In the Network window select the wireless network you want
to join and click Connect. In the Encryption tab, click the
Encryption drop-down arrow and select WPA2.
2Enter the WPA Preshared Key in the text box.
3Click OK to save your settings and return to the
Configuration tab.
4Click the Close box to exit the configuration software.

That’s it! You have configured WPA2 security for your wireless
connection, and you’re ready to use the Internet.
WPA
1In the Network window select the wireless network you want
to join and click Connect. In the Encryption tab, click the
Encryption drop-down arrow and select WPA.
2Enter the WPA Preshared Key in the text box.
3Click OK to save your settings and return to the
Configuration tab.
4Click the Close box to exit the configuration software.
That’s it! You have configured WPA security for your wireless
connection, and you’re ready to use the Internet.
802.1x
With 802.1X authentication, each wireless device (client) sends a
signal to the wireless access point or router, which in turn sends
the signal to the RADIUS server. The server determines whether
or not the client is allowed to join the network. You can access
802.1x option from WEP, WPA2, or WPA.
1At the Encryption tab, click the Use 802.1x box to enable it.
2Click on 802.1x tab.
3Click the EAP (Extensible Authentication Protocol) Method
Type drop-down list and select an authentication protocol:
16
Wireless-N USB Adapter

Chapter 2: Setting Security 17
PEAP (Protected Extensible Authentication Protocol). This is
the default. With PEAP, you can select from four
authentication extensions:
¾Tunnel Authentication>> (TTLS: Tunneled Transport
Layer Security). With TTLS, you can select from three
authentication extensions:
♦EAP-MS-CHAPv2 Microsoft’s version of
CHAP (Challenge-Handshake
Authentication Protocol (default)
♦EAP-TLS (Transport Layer Security) /
Smart Card. There are no authentication
extension options with TLS.
♦Generic Token Card
¾TLS / Smart Card
¾EAP-FAST
¾LEAP
4Click OK to save your settings and return to the
Configuration tab.
5Click the Close box to exit the configuration software.
That’s it! You have configured 802.1x security for your wireless
connection, and you’re ready to use the Internet.
Changing your Security Setting
If the type of security on your wireless network changes, you
need to modify your security settings. To do this, follow the
instructions in Section 2: Setting Security on page 10.

Wireless-N USB Adapter
18
3
Advanced Options
The Zoom Wireless-N USB utility provides options so you can
create profiles, monitor the signal strength of your network
connection, scan available networks, and specify advanced
settings. This chapter tells you when and how to use each of
these options.
Creating Profiles
A profile is a collection of settings needed for a particular
wireless connection. If you plan to use more than one network,
you can create a profile for each one and then switch to its
profile when you want to connect to that particular network.
For example, you may want to set up profiles for a work network
and a home network, each of which has different configuration
settings. By creating two profiles, you can store the settings for
each network and then switch quickly and easily from one
network to the other by selecting the appropriate profile.
1On your taskbar, double-click the Zoom Wireless-N USB
icon.

2On the Configuration tab, click on Profile. Then click on
Add. In the text box Profile Name>> enter a name for the
profile you want to create.
For example, let’s say you have a small home network to
which you want to be able to switch quickly when you arrive
home. Give the profile the name “Home”:
3Then enter the following settings:
•SSID – Select the network name. In the example above,
the SSID is Home.
•Network Type – From the drop-down list, select
Infrastructure.
•Enable Security by selecting the Encryption tab. Then,
from the menu, select the type of security you wish to
enable.
Chapter 3: Advanced Options
19

Note: If you are setting up an ad hoc network, as in this
example, only WEP security is available to you.
After you enter your security settings, click OK to return
to the Configuration tab.
4In the Configuration area, click the OK button to save the
settings.
Monitoring Link Status
To access the Status area, click on the arrow on the bottom right
corner of the Zoom utility screen.
20
Wireless-N USB Adapter
Other manuals for 1077 Series
1
This manual suits for next models
1
Table of contents
Other Zoom Adapter manuals