Instruction/ maintenance manual of the product 4410B Zoom
Go to page of 50
Wi r e l e s s- G USB Adapter USER GUIDE.
Wireless-G USB Adapter 2.
Contents 3 Contents Overview .................................................................. 4 1. Installation Instructions ...................................... 5 Installing and Connecti ng the Adapter .................... 6 The Adapter LED .....
Wireless-G USB Adapter 4 Overview The chapters in this User Guide descri be how to: • Install the Zoom Wireless-G USB adapter on a Wind ows ® PC • Connect to a wireless network • Enable securit.
Chapter 1: Installation Instructio ns 5 1 Installation Instructions This chapter provides sim ple instructions for installing the Wireless-G USB adapter on a Windows PC. If you ha ve already installed the adapter on a comput er (usi ng the separate Quick Start guide), you can ski p this chapter and begin with Chapter 2: Setting Security.
Installing and Connecting the Adapter Important! Install the software BEFORE you plug the Wireless- G USB adapter into your computer. 1 Insert the Wireless-G USB CD into the CD or DV D drive. The CD should start automati cally. Windows Vista: If the AutoPlay dialog box appears, click Run Setup.
Windows Vista: If a message tells you that Wind ows can't verify the publisher of the driver software, select Install this driver soft ware anyway . 5 At the prompt, click Finish and remove the CD. If the Zoom installation menu remains on scree n, click Exit .
2 In the Zoom Wireless-G USB window, click the Site Survey tab to see a list of available wireless net works. 3 Highlight the network you want and cli ck Join . If the network you select has security configured, you must enable and configure securi ty on your computer before you can connect.
Chapter 1: Installation Instructio ns 9 The Adapter LED The states of the LED on the Wireless-G USB adapter are explained below. LED Status Meaning Flashing The Wireless-G USB adapter is attempting to connect to a wireless net work. Steady The Wireless-G USB adapter is connected to a wireless network and is transmitting or receiving data.
2 Setting Security We strongly recommen d security, although you do not need to use it to get your wireless connection wo rking. Important! You must first enable secu rity on the the wireless access point. You then enable secu rity on the adapter using the same configuration that you used for the access poi nt.
This option requires you to enter an encryption key sh ared by the access point. • WEP ( W ired E quivalent P rivacy) Both the Open and Shared Authentication modes require WEP security. The most recent assessments of WEP advise choosing Open rathe r than Shared.
2 The Zoom Wireless-G USB configuration software open s to display the configuration paramete rs: 3 Make sure that the desired wirele ss network is displa yed in the Profile and SSID text boxes (the term <Infra> designates an Infrastructure network) and that the Net w ork Typ e is correct.
Chapter 2: Setting Security 13 • In the unlikely event that you use an Ad Hoc network, you must set up Static IP addressing. See Appendix A: TCP/IP Settings .
WP A2-PSK (Pre-Shared Key) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2- PSK . 2 At Encryption Mode , accept the default: AES ( A dvanced E ncryption S tandard). 3 In the Pre-shared key [WPA] area, enter the same network key that is used on the wireless access point.
WP A - PSK (Pre - Shared Key) If all of the wireless devices in your network DO NOT supp ort the recommended WPA2-PSK, select WPA-PSK. 1 In the Privacy Configuration window, click the Authentication Mode drop-down a rrow and select WPA- PSK . 2 At Encryption Mode , accept the default: TKIP ( T emporal K ey I ntegrity P rotocol).
That’s it! You have configured WPA-PSK security for your wireless connection, and you’re rea dy to use the Internet. WEP (W ired Equivalent Privacy) 1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select Open (recommend ed) or Shared : The USB Adapter automatically select s WEP as the Encryption Mode.
Chapter 2: Setting Security 17 • Hexadecimal digits if an access point, router, or some adapters are not Zoo m products b c d In the Key Length drop-down lis t, select 128 bits , 64 bits , or 256 bits . Note: 128-bit and 256-bit WEP provide more security than 64-bit, but the longer keys could di minish network performance.
6 Click the Close box to exit the configuration software. That’s it! You have configured W EP secu rity for your wi reless connection, and you’re ready to use the Internet.
1 In the Privacy Configuration windo w, click the Authentication Mode drop-down a rrow and select WPA2 . 2 At Encryption Mode , accept the default AES ( A dvanced E ncryption S tandard) 3 In the IEEE 802.1X Authentica tion area, note that the check box marked Enable IEEE 802.
• TTLS ( T unneled T ransport L ayer S ecurity). With TTLS, you can select from four authentication e xtensions: PAP ( P assword A uthentication P roto col) CHAP ( C hallenge H andshake A uthentication P rotocol) MS-CHAP (Microsoft’s ve rsion of CHAP).
2 Accept the default Authentication Mode : TKIP ( T emporal K ey I ntegrity P rotocol). 3 In the IEEE 802.1X Authentication area, note that the check box marked Enable IEEE 802.
• PEAP ( P rotected E xtensible A uthentication P rotocol – the default). With PEAP, you can select from three authentication extensions: MS-CHAPV2 (the default). This is Microsoft’s version of CHAP (Challenge-Handsh ake Authentication Protocol.
Certificate (WP A2 and WP A) A certificate is issued to a wireless network user by a Certificate Authority – often the corporate network administrator – to confirm the user’s identity and thereby maintain the security o f the network.
W iFi™ Protected Setup (WPS) If your access point supports W iFi P rotected S etup (WPS), this protocol can greatly simplify t he process of configuring WPA2- PSK or WPA-PSK security.
Chapter 2: Setting Security 25 a You can select the Push Button option if your access point has a hardware Secure Setup o r similarly named button, or a virtual pushbutton on a software display. Before you initiate WPS by clicking Next, go to the access point and activate its pushbutton.
Wireless-G USB Adapter 26 Changing your Security Setting If the type of security on your wireless network cha nges, you need to modify your securit y settings. On the Configuration tab, click the Con figure Security button to select a different security option and enter the required information.
3 Advanced Options The Zoom Wireless-G USB utility provides options so you can create profiles, monitor the si gnal stren gth of your network connection, scan available net works, and specify advanced settings. This chapter tells you whe n and how to use each of these options.
3 In the Configuration area, enter the following setting s: • SSID – Enter the network name. In the example above, the SSID is Home . • Network Ty pe – From the drop-down list, select Ad Hoc. • Ad Hoc channel – From the drop -down list, select the channel used by the other device(s) in the network.
• Enable Security – Select this check box to open the Security Configuration window. Note: If you are se tting up an ad hoc network, as in this example, only WEP security is available to you. After you enter your security settings, cli ck OK to return to the Configuration tab.
Monitoring Link Status The Status area on the Configuration tab displays in formation about your wireless connection: • State : In an Infrastructure network, the name and the MAC address of the wireless access point to which your computer is connected.
Using Site Survey and Re s ca n Use the Site Survey window and the Rescan button when you need to do any of the following: • Find a list of network nam es ( ESSIDs) so you can connect to a network .
32 Wireless-G USB Adapter The information displayed on the Site Surv ey tab is as follows: • ESSID ( E xtended S ervice S et Id entifier): An Extended Service Set consists of two or more Basic Service Sets (see below). An ESSID, also known as an SSID or Network Name, is chosen by the person who sets up the network.
Advanced Configuration To access this window, click the Advanced button on the Configuration tab. • Wireless Mode : • Power Save Enabled : When you select this option, the Wireless-G USB adapter immediately signals the acce ss point that it is in Power Save mode.
Appendix A TCP/IP Settings By default, Windows is set for dynamic addre ssing (DHCP). Generally, this is the correct se tting for an Infrastructure network, but needs to be changed if you are usi ng an Ad Hoc network. (Note: Use our instructions as a basic guide.
c In the Network Connec tions window, double-clic k the Wireless Network Connection option: d In the Wireless Net work Connection Status dialog box, click the Properties button: Appendix A: TCP/IP Set.
e In the Wireless Net work Connection Properties dialog box, highlight the version of TCP/IP (Transmi ssion Control Protocol/Internet Protocol) that you are using and click the Properties button: f If you have an ad hoc network, continue with Step 2 below.
c Enter 255.255.255.0 for Subnet ma sk . The Subnet mask should be the same for each comp uter in your ad hoc netw ork. d Enter 10.0.0.5 for De fault gateway and Preferred DNS server . (This is the IP address of the first computer that was set up in your ad hoc network.
38 Wireless-G USB Adapter c Click OK twice to exit. That’s it! You have verified your DHCP settings for a Windows Vista computer in an infrastructure net work. Windows XP 1 Follow these steps to open the Internet Protocol (TCP/IP) Properties dialog box.
Appendix A: TCP/IP Settings 39 Gateway and Preferred DNS server should be the same for each computer in your ad ho c network. e Click OK twice. That’s it! You have set static IP addressing for a Wi ndows XP computer in an ad hoc net work.
40 Wireless-G USB Adapter 2 Complete the following steps to set stati c IP addressing: a In the Internet Protocol (TCP/IP) Properties dial og box, ensure that Obtain an IP address automatically is not selected. Then make sure the butto ns labeled Use the following IP address and Use the follo w ing DNS server addresses are selected.
Appendix B: Troubleshooting 41 Appendix B Troubleshooting ¾ If your Zoom Wireless-G USB ad apter is not working properly, try these suggestions . • Make sure the adapter is secu rely connected to the computer, either dire ctly or through its USB extender cable.
42 Wireless-G USB Adapter as these settings for the other devices in your wirele ss network. 2 Then click the Security tab and check t he settings to make sure that the adapter is configured for the same security system as the other devices in your wireless net work.
Appendix C: Zoom Technical Support Services 43 Appendix C Zoom Technical Support Services Zoom has a variety of technical support services available to our customers. We strive to provide convenie nt, professional support responsive to our cu stomers’ needs and ca pabilities.
44 Wireless-G USB Adapter World Wide Web Zoom’s Web page lets you send em ail for assistance, registe r on-line, access product re views and descriptions, and do a whole lot more. Visit the Zoom Technical Support area for the latest Flash Files and Drivers for your Zoom Produ ct.
Appendix C: Zoom Technical Support Services 45 Contact Zoom by Email You can email Zoom with any tech supp ort questions you might have and one of our Technical Supp ort Engineers will respond by email within 2 business days. You ma y request personal assistance via email at www.
46 Wireless-G USB Adapter Return of Defective Units Please contact your local distributor or reselle r for Factory Authorized Repair or Replacem ent of your In-Warranty Defective Product .
Appendix D: Regulato ry Information 47 Appendix D Regulatory Information U.S. FCC Part 15 Emissions Stateme nt This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules.
48 Wireless-G USB Adapter Countries of Operation & C onditions of Use in the European Co mmunity This device is intended to be operated in all countries of the European Community.
Declaration of Conformit y Declaration of Conformity Overensstemmelseserklæring Déclaration de conformité Conformiteitsverklaring v an de EU Konformitätserklärung Δήλωση Συμμόρφωσ.
0888-A 27478 ©2008 NOTICE This document contains proprietary information protected by copyright, and this User Guide and all the accompanying hardware, software, and documentation are copyrighted. No part of this document may be photocopied or reproduced by mechanical, electronic, or other means in any form.
An important point after buying a device Zoom 4410B (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Zoom 4410B yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Zoom 4410B - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Zoom 4410B you will learn all the available features of the product, as well as information on its operation. The information that you get Zoom 4410B will certainly help you make a decision on the purchase.
If you already are a holder of Zoom 4410B, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Zoom 4410B.
However, one of the most important roles played by the user manual is to help in solving problems with Zoom 4410B. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Zoom 4410B along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center