Zoom 4412A/TF User manual

Wireless-G
PC Card
U S E R’S G U I D E

Wireless-G PC Card Adapter2
Contents
Overview ......................................................................... 3
Installation Instructions................................................. 4
What’s in the Package................................................... 4
Before You Begin .......................................................... 4
Installing the Wireless-G PC Card Adapter.................... 5
Getting Connected ........................................................ 9
The Adapter LEDs........................................................12
Setting Security.............................................................13
Accessing the Security Screen.....................................14
WPA2-PSK (Pre-Shared Key) ......................................16
WPA-PSK (Pre-Shared Key) ........................................17
WEP (Wired Equivalent Privacy) ..................................18
WPA2-Enterprise .........................................................20
WPA.............................................................................23
Certificate (WPA2-Enterprise and WPA) ......................25
Changing your Security Setting ....................................26
Advanced Options.........................................................27
Creating Profiles...........................................................27
Monitoring Link Status..................................................30
Using Site Survey and Rescan.....................................31
Advanced Configuration ...............................................33
Appendix A. TCP/IP Settings........................................34
Appendix B. Troubleshooting.......................................39
Appendix C. Zoom Technical Support Services..........41
Appendix D Regulatory Information.............................45

Overview 3
Overview
The chapters in this User’s Guide describe how to:
•Install the Zoom Wireless-G PC Card adapter on a Windows
PC
•Connect to a wireless network
•Enable security on the Wireless-G PC Card adapter
•Use the advanced features of the Wireless-G PC Card
configuration software
Chapters 1 and 2 cover the basics – what you need to get
connected and to enable security.
If you are interested in the more advanced features of the
Wireless-G PC Card adapter, please see Chapter 3. This
chapter explains how to create profiles so you can switch your
connection from one network to another, monitor the strength of
your network connection, and scan a list of available networks.

Wireless-G PC Card Adapter4
1
Installation Instructions
This chapter provides simple instructions for installing the
Wireless-G PC Card software on a Windows PC. If you have
already installed the adapter on a computer (using the separate
Quick Start booklet), you can skip this chapter and begin with
Chapter 2: Setting Security.
What’s in the Package
The Wireless-G PC Card adapter package includes the
following:
•Wireless-G PC Card
adapter
•Quick Start manual
•CD containing the
Installation Wizard and
documentation
Before You Begin
Before you install the Wireless-G PC Card adapter, check that
your computer has the following:
•PCMCIA slot
•Windows XP, 2000, Me,
or 98SE
•CD drive
•At least 6 MB of free hard
drive space
If you are using Windows 98SE: Your computer must have at
least 64MB RAM and a 300 MHz or faster CPU. Also, you may
need the Windows 98SE Installation CD during the setup
process.

Chapter 1: Installation Instructions 5
Installing the Wireless-G PC
Card Adapter
Important! Install the software BEFORE you insert the
Wireless-G PC Card into your laptop.
1
11
1Insert the Wireless-G PC Card CD into the CD drive. The
CD should start automatically and the Language Selection
screen should appear. Select your language. (If the CD does
not start automatically, on the Windows desktop click the
Start button, click Run, and then type E:\setup.exe where E
is the letter of your CD drive.)
2
22
2From the menu choices, select Installation Wizard then PC
Card. (Note to Windows Me users — If you are prompted to
do so, restart your computer after you complete this step.)

Wireless-G PC Card Adapter6
3
33
3The setup program opens:
4
44
4Follow the prompts to complete the installation.
5
55
5At the final setup screen, click Finish and then turn off your
computer.

Chapter 1: Installation Instructions 7
6
66
6While your laptop is off, insert the Wireless-G PC Card into
the PCMCIA slot on your laptop, making sure that the LEDs
are facing up. You will hear the card click softly into place.
7
77
7Turn the computer on. Windows will find your new hardware.
You may see a Found New Hardware box indicating the
progression of the installation. Typically no user action is
necessary. If you are using Windows XP, you may be
required to click Next.
Depending on your operating system, you may also see a
Hardware Installation box or a Digital Signature Not
Found box. You can safely ignore these messages and click
Yes or Continue Anyway. If prompted, click Finish and/or
Yes to restart your computer to finish setting up your new
hardware.
8
88
8To verify that the adapter is working correctly, on your
Desktop, right-click My Computer and select Properties
from the pop-up menu.
9
99
9Windows XP/Windows 2000: In the System Properties
window, select the Hardware tab and click the Device
Manager button.
Windows Me/Windows 98SE: In the System Properties
window, select the Device Manager tab.

Wireless-G PC Card Adapter8
10
1010
10 All operating systems: In the list of devices, double-click
Network Adapters and make sure there is no alert icon
next to the Zoom Wireless-G PC Card adapter.
(This alert icon appears next to devices that are not
responding or that are not installed properly.)
Your Wireless-G PC Card adapter is successfully installed!
Continue with Getting Connected on the next page.

Chapter 1: Installation Instructions 9
Getting Connected
The installation places a Zoom Wireless-G PC Card icon on
your desktop:
1
11
1Double-click this icon to open the Wireless-G PC Card
configuration software:
In the Profile text box, the term “ANY” indicates that the
adapter has identified the strongest wireless network signal
in your vicinity – in your office building, for example, or in a
public space such as a cafe or airport.

Wireless-G PC Card Adapter10
2
22
2Select the Site Survey tab to see a list of wireless networks
within range:
There are two types of wireless networks: Infrastructure and
Ad Hoc.
•In an
Infrastructure network, wireless devices
communicate with each other via a wireless access
point, a router, or an ADSL modem with built-in wireless
technology.
•In an
Ad Hoc network, a group of wireless devices
communicate directly with other “client” devices that are
using wireless adapters. The network does not include a
wireless access point.
Important: When you join an Ad Hoc network, you need to
set up Static IP addressing. See Appendix A: TCP/IP
Settings on page 34.
3
33
3Highlight the network you want and click Join.

Chapter 1: Installation Instructions 11
If the network you select has security configured, you
must enable and configure security on your computer before
you can connect. See Chapter 2, Setting Security on page
13.
4
44
4Your laptop should now be connected to the network, as
long as your security settings match those of the access
point and other network users. To check your connection,
open your Web browser and go to your favorite site.
If you have difficulty accessing the Internet, follow the
suggestions in your browser’s “Page cannot be displayed”
message. You may need to adjust your LAN settings.
As you work online, you can monitor your connection easily
using the Link Status icon that appears in the right corner of the
taskbar when you open the Wireless-G PC Card utility:
The icon’s color indicates the link status:
Blue indicates an excellent or good link.
Yellow indicates a usable but weak link.
Red indicates no link or a very poor link.

Wireless-G PC Card Adapter12
The Adapter LEDs
The states of the LEDs on the Wireless-G PC Card adapter are
explained below.
LED Status Meaning
LINK Flashing
Steady
Adapter is attempting to connect to a
wireless network.
Adapter is connected to a network.
ACT
(Activity) Flashing Adapter is transmitting or receiving
data.

Chapter 2: Setting Security 13
2
Setting Security
We strongly recommend security, although you do not need to
use it to get your wireless connection working.
Important! You must first enable security on the the wireless
access point. You then enable security on the adapter using the
same configuration that you used for the access point. For
example, if the wireless access point is configured for WPA2-
PSK, you must select WPA2-PSK security in the Wireless-G PC
Card configuration software and enter the same encryption key.
Select one of five ways to configure and implement security for
your wireless network:
•WPA2-PSK (WiFi ® Protected Access 2Pre-Shared Key) is
the recommended option if it is supported by the access
point and the devices in your network. WPA2-PSK protects
your communications with AES (Advanced Encryption
Standard). Some access points permit a “mixed mode”
network composed of both WPA and WPA2 wireless clients.
WPA2-PSK requires you to enter an encryption key shared
by the access point.
•WPA PSK (WiFi ® Protected Access Pre-Shared Key)
If the devices in your network do not all support WPA2-PSK,
select WPA-PSK. WPA-PSK protects your communications
with TKIP (Temporal Key Integrity Protocol).

Wireless-G PC Card Adapter14
This option requires you to enter an encryption key shared
by the access point.
•WEP (Wired Equivalent Privacy)
If the devices in your network do not support WPA2-PSK or
WPA-PSK, select WEP data encryption.
This method requires you to enter an encryption key. The
keys can be 64 or 128 bits in length.
•WPA2-Enterprise
If you are linking to a network that accesses a RADIUS
(Remote Authentication Dial-In User Service) authentication
server, and if the devices in the network support WPA2,
select WPA2-Enterprise. This option provides security with
AES (Advanced Encryption Standard). AES has a key size
of 128, 192, or 256-bits. In order for eavesdroppers to
decipher a message, they would have to try every possible
key.
•WPA is an option for users who access a RADIUS (Remote
Authentication Dial-In User Service) authentication server
that does not support WPA2. WPA provides security with
TKIP (Temporal Key Integrity Protocol), which dynamically
changes keys as the system is used.
Accessing the Security Screen
1
11
1On your desktop, double-click the Zoom Wireless-G PC
Card icon:

Chapter 2: Setting Security 15
2
22
2The Zoom Wireless-G PC Card configuration software
opens to display the configuration parameters:
3
33
3Make sure that the desired wireless network is displayed in
the Profile and SSID text boxes (the term <Infra>
designates an Infrastructure network) and that the Network
Type is correct. (For the differences between Infrastructure
and Ad Hoc networks, see page 10.)
4
44
4Select the Enable Security check box to open the Security
Configuration window. For Step 5, consult the table below:
To configure Go to page
WPA2-PSK 16
WPA-PSK 17
WEP 17
WPA2-Enterprise 20
WPA 23

Wireless-G PC Card Adapter16
WPA2-PSK (Pre-Shared Key)
5
55
5In the Security Configuration window, click the Encryption
Mode drop-down arrow and select WPA2-PSK.
6
66
6In the Pre-shared key [WPA] area, enter the same network
key that is used on the wireless access point. We advise you
to enter a key with a minimum of 20 random characters.
7
77
7Click OK to save your settings and return to the
Configuration tab.
8
88
8On the Configuration tab, click Apply.
9
99
9Click the Close box to exit the configuration software.
That’s it! You have configured WPA2-PSK security for your
wireless connection, and you’re ready to use the Internet.

Chapter 2: Setting Security 17
WPA-PSK (Pre-Shared Key)
If not all of the wireless devices in your network support the
recommended WPA2-PSK, select WPA-PSK.
5
55
5In the Security Configuration window, click the Encryption
Mode drop-down arrow and select WPA-PSK.
6
66
6In the Pre-shared key [WPA] area, enter the same network
key that is used on the wireless access point. We advise a
key with a minimum of 20 random characters.
7
77
7Click OK to save your settings and return to the
Configuration tab.
8
88
8On the Configuration tab, click Apply.
9
99
9Click the Close box to exit the configuration software.

Wireless-G PC Card Adapter18
That’s it! You have configured WPA-PSK security for your
wireless connection, and you’re ready to use the Internet.
WEP (Wired Equivalent
Privacy)
5
55
5In the Security Configuration window, click the Encryption
Mode drop-down arrow and select WEP:

Chapter 2: Setting Security 19
6
66
6In the Preconfigured key [WEP] area,do the following:
aIn the Format for entering key drop-down list, select
•ASCII characters if your network uses all Zoom
wireless products
•Hexadecimal digits if an access point, router, or
some adapters are not Zoom products
bIn the Key Length drop-down list, select 128 bits or 64
bits.
Note: 128-bit WEP provides more security than 64-bit,
but 128-bit could diminish network performance.
cIn the Key Index drop-down list, if you are using a 64-bit
key, select which of four keys – 1, 2, 3, or 4 – will be
used to encrypt the data. The key you select must be the
same one that is selected on the access point. We
recommend that you use Key 1.
128-bit WEP uses just a single key.
dIn the Network Key text box, enter a key using the table
below as a guide.
The key must be the same for all the devices on your
network.
If you selected key
type… Enter exactly…
Hexadecimal digits
– 128 bits
26 characters A–F, a–f and 0–9. For
example,
00112233445566778899AABBCC.
Hexadecimal digits
– 64 bits
10 characters. The characters can
be A-F, a-f, and 0-9. For example,
11AA22BB33.
ASCII – 128-bits 13 characters. The characters can
be any upper- or lower-case letters
and numbers. For example:
MyKey12345678.
ASCII – 64 bits 5 characters. The characters can be
any upper- or lower-case letters and
numbers. For example, MyKey.
7
77
7Re-enter the key in the Confirm Network Key text box.

Wireless-G PC Card Adapter20
8
88
8Click OK to save your settings and return to the
Configuration tab.
9
99
9On the Configuration tab, click Apply.
10
1010
10 Click the Close box to exit the configuration software.
That’s it! You have configured WEP security for your wireless
connection, and you’re ready to use the Internet.
WPA2-Enterprise
Select WPA2-Enterprise if
•you are linking to a corporate network that uses a RADIUS
(Remote Authentication Dial-In User Service) authentication
server
•all of the devices in the network support WPA2, or your
access point offers both WPA2 and WPA.
This manual suits for next models
1
Table of contents
Other Zoom Computer Hardware manuals