ZyXEL Communications G-100 Network Card User Manual


 
ZyAIR G-100 User’s Guide
x List of Figures
List of Figures
Figure 1-1 Windows XP: System Tray Icon................................................................................................ 1-1
Figure 1-2 Windows XP: System Tray Icon................................................................................................ 1-1
Figure 1-3 Windows XP: Wireless Network Connection Status.................................................................. 1-2
Figure 1-4 Windows XP: Connect to Wireless Network ............................................................................. 1-2
Figure 1-5 Windows XP: Wireless Network Connection Properties........................................................... 1-3
Figure 1-6 ZyAIR Utility: System Tray Icon .............................................................................................. 1-3
Figure 2-1 Ad-hoc Network Example ......................................................................................................... 2-2
Figure 2-2 BSS Example............................................................................................................................. 2-3
Figure 2-3 Infrastructure Network Example................................................................................................ 2-3
Figure 2-4 Roaming Example...................................................................................................................... 2-4
Figure 2-5 ZyAIR Utility: Link Info ........................................................................................................... 2-4
Figure 2-6 Site Survey................................................................................................................................. 2-6
Figure 2-7 Configuration............................................................................................................................. 2-7
Figure 2-8 ZyAIR Wireless Security Levels ............................................................................................... 2-8
Figure 2-9 WEP Authentication Steps ....................................................................................................... 2-10
Figure 2-10 WEP Authentication............................................................................................................... 2-11
Figure 2-11 WPA Authentication............................................................................................................... 2-13
Figure 2-12 WPA - PSK Authentication.................................................................................................... 2-15
Figure 2-13 WPA with RADIUS Application Example............................................................................. 2-16
Figure 2-14 WPA-PSK Authentication...................................................................................................... 2-16
Figure 2-15 802.1x Authentication............................................................................................................ 2-18
Figure 2-16 About ..................................................................................................................................... 2-19
Figure 3-1 Confirm Uninstallation .............................................................................................................. 3-1
Figure 3-2 ZyAIR Utility: Exit.................................................................................................................... 3-2
Figure 3-3 Removable Device System Tray Icon: Windows XP................................................................. 3-2
Figure 3-4 Safely Remove Hardware: Windows XP...................................................................................3-2
Figure 3-5 Stop a Hardware device: Windows XP...................................................................................... 3-3
Figure 3-6 Safe To Remove Hardware Message: Windows XP .................................................................. 3-3