ZyXEL Communications G-162 Network Card User Manual


 
ZyXEL G-162 User’s Guide
List of Figures xi
List of Figures
Figure 1-1 Windows XP: System Tray Icon.................................................................................................1-2
Figure 1-2 Windows XP: Wireless Network Connection Status ..................................................................1-3
Figure 1-3 Windows XP: Connect to Wireless Network..............................................................................1-4
Figure 1-4 Windows XP: Wireless Network Connection Properties............................................................1-5
Figure 1-5 ZyXEL Utility: System Tray Icon ..............................................................................................1-5
Figure 2-1 IBSS Example ............................................................................................................................2-2
Figure 2-2 BSS Example..............................................................................................................................2-3
Figure 2-3 Infrastructure Network Example ................................................................................................2-3
Figure 2-4 Roaming Example ......................................................................................................................2-4
Figure 2-5 Wireless LAN Security Levels ...................................................................................................2-5
Figure 2-6 WPA-PSK Authentication ..........................................................................................................2-7
Figure 2-7 WPA with RADIUS Application Example .................................................................................2-8
Figure 2-8 RTS Threshold............................................................................................................................2-9
Figure 3-1 Link Info.....................................................................................................................................3-1
Figure 3-2 Link Info: Trend Chart ...............................................................................................................3-3
Figure 3-3 Site Survey .................................................................................................................................3-4
Figure 3-4 Site Survey: Security Settings: WEP..........................................................................................3-6
Figure 3-5 Site Survey: Security Settings: WPA-PSK.................................................................................3-8
Figure 3-6 Site Survey: Security Settings: WPA..........................................................................................3-9
Figure 3-7 Site Survey: Security Settings: 802.1x .....................................................................................3-11
Figure 3-8 Profile.......................................................................................................................................3-13
Figure 3-9 Profile: Add New Profile..........................................................................................................3-15
Figure 3-10 Profile: Select a Channel ........................................................................................................3-17
Figure 3-11 Profile: Wireless Settings........................................................................................................3-18
Figure 3-12 Profile: Security Settings........................................................................................................3-19
Figure 3-13 Profile: Confirm New Settings ...............................................................................................3-20
Figure 3-14 Profile: Activate the Profile....................................................................................................3-21
Figure 3-15 Adapter ...................................................................................................................................3-22
Figure 4-1 About..........................................................................................................................................4-1
Figure 4-2 Confirm Uninstall.......................................................................................................................4-2