Zyxel g-220 v3 software
Hold in the Reset button for one or two seconds. Note: If you hold in the Reset button too long, the device may reset to the factory defaults! To change the Setup key, enter zero to eight printable characters.
Page Wireless Station Mode Configuration This chapter shows you how to configure your G v3 in wireless station mode. See Chapter 5 on page 75 4. Page Trend Chart Kbps. Signal Strength The status bar shows the strength of the signal. The signal strength is mainly depending on the antenna output power and the distance between your G v3 and the AP or peer computer.
Link Quality The status bar shows the quality of wireless connection. This refers to the percentage of packets transmitted successfully.
Receive This field displays the current data receiving rate in kilobits per second Kbps. Page Security Settings This field displays the time when the wireless device is scanned. As you enter the passphrase, the G v3 automatically generates four different WEP keys and displays it in the key field below.
Refer to more information. Section 4. Consult your network administrator for more information. Please see Section 4. Please Section 4. Figure 33 Station Mode: Security Setting: Page Confirm Save Screen This field displays the channel number used by the profile. Page The Profile Screen G v3 cannot connect to a network.
If you do not configure and activate a profile, each time you start the G v3, the G v3 uses the default profile to connect to any available network with security disabled. Otherwise, enter Any to have the G v3 associate to any AP or roam between any infrastructure wireless networks. Page 65 Select an available wireless device in the table and click Select to add it to this profile.
Whenever you activate this profile, the G v3 associates to the selected wireless network only. The settings must be exactly the same on the APs or other peer wireless computers as they are on the G v3.
Refer to wireless security configuration. Page Figure 42 Station Mode: Adapter Transfer Rate In most networking scenarios, the factory default Fully Auto setting is the most efficient and allows your G v3 to operate at the highest possible transmission data rate. If you want to select a specific transmission rate, select one that the AP or peer wireless device supports. The Enter Credentials screen disappears and the G v3 tries to connect to the network.
Page Figure 46 Vista Security: Select Certificate Note: If you do not have the right certificate, or are not sure which certificate you should use, contact your network administrator.
The Select Certificate screen disappears and the G v3 tries to connect to the network. Page Additional Setup Requirements To bridge your wired and wireless network using the G v3, the following requirements must be met: 1 The G v3 must be installed on a computer connected to the wired network.
Transmission Rate This field displays the current transmission rate of the G v3 in megabits per second Mbps. This allows for the least power consumption. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, A0:C Select Disable to deactivate the MAC filter feature.
To display the screen as shown below, click the about Figure 51 About The following table describes the read-only fields in this screen.
Section 6. Chapter 6 Maintenance Change the AP and the associated wireless clients to use another radio channel if interference is high. Refer to Chapter 5 on page 75 Steps may vary depending on your Windows version. Click OK. Figure 56 Windows Network Properties If there is more than one network adapter on the computer, select Enable Internet Connection Sharing for this connection and select the network adapter to which you want to share network access.
Be sure you have the Windows XP service pack 2 installed on your computer. Otherwise, you should at least have the Windows XP service pack 1 already on your computer and download the support patch for WPA from the Microsoft web site. The G v3 is in the process of connecting to a wireless network. The connection to a wireless network is limited because the network did not assign a network address to the computer.
Ordering your preferred networks is important because the G v3 tries to associate to the preferred network first in the order that you specify. Refer to the section on ordering the preferred networks for detailed information.
Security Settings When you configure the G v3 to connect to a secure network but the security settings are not yet enabled on the G v3, you will see different screens according to the authentication and encryption methods used by the selected network. Page Figure 67 Windows Xp: Wireless Network Properties: Association This field is available only when the network use WEP encryption method and the The key is provided for me automatically check box is not selected.
The key is If this check box is selected, the wireless AP assigns the G v3 a key. Properties Click this button to open the properties screen and configure certificates. The screen varies depending on what you select in the EAP type field. Select a network and click Move up or Move down to change it's order, click Remove to delete it or click Properties to view the security, authentication or connection information of the selected network.
You must configure WEP encryption keys for data encryption. The server presents a certificate to the client. The hexadecimal equivalent of your passphrase will display in the Key 1 field. Confirm that "1" one is selected in the Transmit Key field and click Next. The final step is to test the Internet connection on the computer you're adding to your network.
This ensures that all the connections are secure, and the Verizon MIWR router and network adapter configurations are working properly.
Return to Actiontec MI Wireless. Select your language and click OK. Select Yes, I want to restart my computer now and click Finish. Click Scan to display all the available wireless networks. Select your network from the list of available wireless networks and click Connect. Select the type of network encryption you are using on your wireless network. Verizon recommends using the strongest encryption that is compatible with all the devices on your network. The next steps vary depending on what type of encryption you have chosen.
Please select the type of encryption your network is using from the list below. Select the same level of security 64 bit, bit, or bit in the WEP field as you entered in your gateway when setting up your network.
Request Quote Order Now. The utility should start automatically. Click Setup. Click Next when the Install Shield screen displays. Click Next to accept the default location for saving the utility files. Select Yes, I want to restart my computer now. Click Finish. Select your network from the list and click Connect. If you're unsure of the type of encryption you chose when configuring your wireless network, you can display your security entries by accessing the Actiontec MIWR router's configuration screen.
If you're unsure of the WPA2 or WPA encryption key you entered when configuring your wireless network, you can display your security entries by accessing the Actiontec MIWR router's configuration screen. Close the network adapter configuration window. If you're unsure of the WPA encryption key you entered when configuring your wireless network, you can display your security entries by accessing the Actiontec MIWR router's configuration screen. If you're unsure of the level of security you chose when creating your network, you can display your WEP key and the level of security by accessing the Actiontec MIWR router's configuration screen.