Feeds
90%

ZyXel ZyAir AG-225H Wi-Fi sniffer

Gartner critical capabilities for enterprise endpoint backup

Using the AG-225H as a USB wireless adapter is simple enough: you install the drivers and configuration utility first and then plug in the device. The utility is accessed from the System Tray and its icon changes colour to denote the connection status of the adapter. The Network screen provides plenty of information about the current wireless connection and shows the AP's SSID, whether Infrastructure or Ad Hoc modes are in use, the signal strength and general network IP settings. Profiles are used to manage different AP connections and these can be easily created from the utility to include an SSID and security mode. Usefully, the utility can run a full site-survey, which displays all discovered APs allowing one to be selected for use in the profile. Wireless security features are extremely good, with support for 64/128/256-bit WEP plus WPA and the latest WPA 2.

Zyxel Zyair AG-225H

To use the adapter as an access point you need to have it connected to a system with the ZyXel utility installed and linked to the LAN via a wired connection. To swap modes you simply select one from the drop-down menu in the utility interface and it is automatically applied to the adapter. However, there is more to do as the LAN and WLAN connections on the system being used for AP duties must be bridged. Typically, ZyXel points out in its manual that this needs to be done and then forgets that some instructions and an example might be rather useful. It's actually fairly simple as you open the Windows Network Connections from the Control Panel, and select the LAN and WLAN icons together with the Ctrl key held down. From the Advanced menu select Bridge Connections and a bridge will be automatically created. We found a bridge connection worked fine allowing our wireless test clients to access the internal DHCP server and other resources on the LAN via the AG-225H. Security features are reasonable as you can implement 64/128/256-bit WEP encryption (but not WPA) and enable a MAC address control list.

Verdict

The ZyAir AG-225H could prove to be a really handy gadget for mobile users. The access point mode does have some limitations but it certainly impresses as a wireless hotspot locator and USB adapter and comes at a price that's less than some standard USB wireless adapters.

Review by
TrustedReviews.com

5 things you didn’t know about cloud backup

90%

ZyXel ZyAir AG-225H Wi-Fi sniffer

A really handy gadget for mobile users...
Price: £52 RRP

More from The Register

next story
Trying to sell your house? It'd better have KILLER mobile coverage
More NB than transport links to next-gen buyers - study
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Speak your brains on SIGNAL-FREE mobile comms
Readers chat to the pair who flog the tech
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?